diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 49135c37f0..1656faae57 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -20809,6 +20809,701 @@ "source_path": "store-for-business/sign-up-microsoft-store-for-business.md", "redirect_url": "/microsoft-store", "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-sandbox/windows-sandbox-architecture.md", + "redirect_url": "/windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-architecture", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-sandbox/windows-sandbox-configure-using-wsb-file.md", + "redirect_url": "/windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-configure-using-wsb-file", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-sandbox/windows-sandbox-overview.md", + "redirect_url": "/windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-overview", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md", + "redirect_url": "/windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/available-settings", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/microsoft-defender-smartscreen/phishing-protection-microsoft-defender-smartscreen.md", + "redirect_url": "/windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/enhanced-phishing-protection", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md", + "redirect_url": "/windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen", + "redirect_document_id": false + }, + { + "source_path": "windows/security/information-protection/index.md", + "redirect_url": "/windows/security/encryption-data-protection", + "redirect_document_id": false + }, + { + "source_path": "windows/security/identity-protection/vpn/how-to-configure-diffie-hellman-protocol-over-ikev2-vpn-connections.md", + "redirect_url": "/windows/security/operating-system-security/network-security/vpn/how-to-configure-diffie-hellman-protocol-over-ikev2-vpn-connections", + "redirect_document_id": false + }, + { + "source_path": "windows/security/identity-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md", + "redirect_url": "/windows/security/operating-system-security/network-security/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections", + "redirect_document_id": false + }, + { + "source_path": "windows/security/identity-protection/vpn/vpn-authentication.md", + "redirect_url": "/windows/security/operating-system-security/network-security/vpn/vpn-authentication", + "redirect_document_id": false + }, + { + "source_path": "windows/security/identity-protection/vpn/vpn-auto-trigger-profile.md", + "redirect_url": "/windows/security/operating-system-security/network-security/vpn/vpn-auto-trigger-profile", + "redirect_document_id": false + }, + { + "source_path": "windows/security/identity-protection/vpn/vpn-conditional-access.md", + "redirect_url": "/windows/security/operating-system-security/network-security/vpn/vpn-conditional-access", + "redirect_document_id": false + }, + { + "source_path": "windows/security/identity-protection/vpn/vpn-connection-type.md", + "redirect_url": "/windows/security/operating-system-security/network-security/vpn/vpn-connection-type", + "redirect_document_id": false + }, + { + "source_path": "windows/security/identity-protection/vpn/vpn-guide.md", + "redirect_url": "/windows/security/operating-system-security/network-security/vpn/vpn-guide", + "redirect_document_id": false + }, + { + "source_path": "windows/security/identity-protection/vpn/vpn-name-resolution.md", + "redirect_url": "/windows/security/operating-system-security/network-security/vpn/vpn-name-resolution", + "redirect_document_id": false + }, + { + "source_path": "windows/security/identity-protection/vpn/vpn-office-365-optimization.md", + "redirect_url": "/windows/security/operating-system-security/network-security/vpn/vpn-office-365-optimization", + "redirect_document_id": false + }, + { + "source_path": "windows/security/identity-protection/vpn/vpn-profile-options.md", + "redirect_url": "/windows/security/operating-system-security/network-security/vpn/vpn-profile-options", + "redirect_document_id": false + }, + { + "source_path": "windows/security/identity-protection/vpn/vpn-routing.md", + "redirect_url": "/windows/security/operating-system-security/network-security/vpn/vpn-routing", + "redirect_document_id": false + }, + { + "source_path": "windows/security/identity-protection/vpn/vpn-security-features.md", + "redirect_url": "/windows/security/operating-system-security/network-security/vpn/vpn-security-features", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/assign-security-group-filters-to-the-gpo.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/assign-security-group-filters-to-the-gpo", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/basic-firewall-policy-design.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/basic-firewall-policy-design", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/best-practices-configuring.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/best-practices-configuring", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/boundary-zone-gpos.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/boundary-zone-gpos", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/boundary-zone.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/boundary-zone", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design-example.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/certificate-based-isolation-policy-design-example", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/certificate-based-isolation-policy-design", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/change-rules-from-request-to-require-mode.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/change-rules-from-request-to-require-mode", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/checklist-configuring-basic-firewall-settings.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-basic-firewall-settings", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-the-boundary-zone", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-the-encryption-zone", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-the-isolated-domain", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/checklist-creating-group-policy-objects.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-creating-group-policy-objects", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/checklist-creating-inbound-firewall-rules.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-creating-inbound-firewall-rules", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/checklist-creating-outbound-firewall-rules.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-creating-outbound-firewall-rules", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-implementing-a-basic-firewall-policy-design", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-implementing-a-domain-isolation-policy-design", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/configure-authentication-methods.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-authentication-methods", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/configure-data-protection-quick-mode-settings.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-data-protection-quick-mode-settings", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/configure-key-exchange-main-mode-settings.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-key-exchange-main-mode-settings", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/configure-the-rules-to-require-encryption.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-the-rules-to-require-encryption", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/configure-the-windows-firewall-log.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-the-windows-firewall-log", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/configure-the-workstation-authentication-certificate-template.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-the-workstation-authentication-certificate-template", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/confirm-that-certificates-are-deployed-correctly", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/copy-a-gpo-to-create-a-new-gpo", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/create-a-group-account-in-active-directory.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-a-group-account-in-active-directory", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/create-a-group-policy-object.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-a-group-policy-object", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/create-an-authentication-exemption-list-rule.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-an-authentication-exemption-list-rule", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/create-an-authentication-request-rule.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-an-authentication-request-rule", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/create-an-inbound-icmp-rule.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-an-inbound-icmp-rule", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/create-an-inbound-port-rule.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-an-inbound-port-rule", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/create-an-inbound-program-or-service-rule.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-an-inbound-program-or-service-rule", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/create-an-outbound-port-rule.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-an-outbound-port-rule", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/create-an-outbound-program-or-service-rule.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-an-outbound-program-or-service-rule", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/create-inbound-rules-to-support-rpc.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-inbound-rules-to-support-rpc", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/create-windows-firewall-rules-in-intune.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-windows-firewall-rules-in-intune", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/create-wmi-filters-for-the-gpo.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/create-wmi-filters-for-the-gpo", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/determining-the-trusted-state-of-your-devices.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/determining-the-trusted-state-of-your-devices", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/documenting-the-zones.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/documenting-the-zones", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/domain-isolation-policy-design-example.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/domain-isolation-policy-design-example", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/domain-isolation-policy-design.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/domain-isolation-policy-design", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/enable-predefined-inbound-rules.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/enable-predefined-inbound-rules", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/enable-predefined-outbound-rules.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/enable-predefined-outbound-rules", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/encryption-zone-gpos.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/encryption-zone-gpos", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/encryption-zone.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/encryption-zone", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/exempt-icmp-from-authentication.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/exempt-icmp-from-authentication", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/exemption-list.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/exemption-list", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/filter-origin-documentation.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/filter-origin-documentation", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/firewall-gpos.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/firewall-gpos", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/firewall-policy-design-example.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/firewall-policy-design-example", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/firewall-settings-lost-on-upgrade", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/gathering-information-about-your-active-directory-deployment.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/gathering-information-about-your-active-directory-deployment", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/gathering-information-about-your-current-network-infrastructure", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/gathering-information-about-your-devices.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/gathering-information-about-your-devices", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/gathering-other-relevant-information.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/gathering-other-relevant-information", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/gathering-the-information-you-need.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/gathering-the-information-you-need", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/gpo-domiso-boundary.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-boundary", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/gpo-domiso-encryption.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-encryption", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/gpo-domiso-firewall.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-firewall", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-clients.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-isolateddomain-clients", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-servers.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-isolateddomain-servers", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/isolated-domain-gpos.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/isolated-domain-gpos", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/isolated-domain.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/isolated-domain", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/isolating-apps-on-your-network.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/isolating-apps-on-your-network", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/link-the-gpo-to-the-domain.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/link-the-gpo-to-the-domain", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/open-the-group-policy-management-console-to-windows-firewall", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/open-windows-firewall-with-advanced-security.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/open-windows-firewall-with-advanced-security", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/planning-certificate-based-authentication.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/planning-certificate-based-authentication", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/planning-domain-isolation-zones.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/planning-domain-isolation-zones", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/planning-gpo-deployment.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/planning-gpo-deployment", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/planning-isolation-groups-for-the-zones.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/planning-isolation-groups-for-the-zones", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/planning-network-access-groups.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/planning-network-access-groups", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/planning-server-isolation-zones.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/planning-server-isolation-zones", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/planning-settings-for-a-basic-firewall-policy", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/planning-the-gpos.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/planning-the-gpos", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/planning-your-windows-firewall-with-advanced-security-design", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/protect-devices-from-unwanted-network-traffic.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/protect-devices-from-unwanted-network-traffic", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/quarantine.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/quarantine", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/require-encryption-when-accessing-sensitive-network-resources", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/restrict-access-to-only-specified-users-or-devices", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/restrict-access-to-only-trusted-devices.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/restrict-access-to-only-trusted-devices", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/restrict-server-access-to-members-of-a-group-only", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/server-isolation-gpos.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/server-isolation-gpos", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/server-isolation-policy-design-example.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/server-isolation-policy-design-example", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/server-isolation-policy-design.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/server-isolation-policy-design", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/troubleshooting-uwp-firewall.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/troubleshooting-uwp-firewall", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/verify-that-network-traffic-is-authenticated.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/verify-that-network-traffic-is-authenticated", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security-deployment-guide", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security-design-guide", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security.md", + "redirect_url": "/windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security", + "redirect_document_id": false + }, + { + "source_path": "windows/security/cloud.md", + "redirect_url": "/windows/security", + "redirect_document_id": false + }, + { + "source_path": "windows/security/identity-protection/user-account-control/how-user-account-control-works.md", + "redirect_url": "/windows/security/application-security/application-control/user-account-control/how-it-works", + "redirect_document_id": false + }, + { + "source_path": "windows/security/identity-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings.md", + "redirect_url": "/windows/security/application-security/application-control/user-account-control/settings-and-configuration", + "redirect_document_id": false + }, + { + "source_path": "windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings.md", + "redirect_url": "/windows/security/application-security/application-control/user-account-control/settings-and-configuration", + "redirect_document_id": false + }, + { + "source_path": "windows/security/identity-protection/user-account-control/user-account-control-overview.md", + "redirect_url": "/windows/security/application-security/application-control/user-account-control", + "redirect_document_id": false + }, + { + "source_path": "windows/security/identity-protection/configure-s-mime.md", + "redirect_url": "/windows/security/operating-system-security/data-protection/configure-s-mime", + "redirect_document_id": false + }, + { + "source_path": "windows/security/apps.md", + "redirect_url": "/windows/security/application-security", + "redirect_document_id": false } ] -} +} \ No newline at end of file diff --git a/browsers/edge/microsoft-edge.yml b/browsers/edge/microsoft-edge.yml index 053f03eeb7..f8aa58428c 100644 --- a/browsers/edge/microsoft-edge.yml +++ b/browsers/edge/microsoft-edge.yml @@ -9,11 +9,10 @@ metadata: keywords: Microsoft Edge, issues, fixes, announcements, Windows Server, advisories ms.prod: edge ms.localizationpriority: medium - author: lizap - ms.author: elizapo - manager: dougkim + author: aczechowski + ms.author: aaroncz + manager: dansimp ms.topic: landing-page - ms.devlang: na ms.date: 08/19/2020 #Required; mm/dd/yyyy format. # linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | sample | tutorial | video | whats-new @@ -106,10 +105,6 @@ landingContent: # Card (optional) - title: End user readiness linkLists: - - linkListType: video - links: - - text: Microsoft Edge tips and tricks (video, 20:26) - url: https://myignite.microsoft.com/sessions/56630?source=sessions - linkListType: download links: - text: Quick Start - Microsoft Edge (PDF, .98 MB) @@ -137,4 +132,4 @@ landingContent: - text: Microsoft Edge Dev blog url: https://blogs.windows.com/msedgedev - text: Microsoft Edge Dev on Twitter - url: https://twitter.com/MSEdgeDev \ No newline at end of file + url: https://twitter.com/MSEdgeDev diff --git a/education/docfx.json b/education/docfx.json index e799728331..7767861daa 100644 --- a/education/docfx.json +++ b/education/docfx.json @@ -65,7 +65,8 @@ "v-dihans", "garycentric", "v-stsavell", - "beccarobins" + "beccarobins", + "v-stchambers" ] }, "fileMetadata": { diff --git a/education/windows/chromebook-migration-guide.md b/education/windows/chromebook-migration-guide.md index 969f81b3be..8871798ac4 100644 --- a/education/windows/chromebook-migration-guide.md +++ b/education/windows/chromebook-migration-guide.md @@ -1,5 +1,5 @@ --- -title: Chromebook migration guide (Windows 10) +title: Chromebook migration guide description: Learn how to migrate a Google Chromebook-based learning environment to a Windows 10-based learning environment. ms.topic: how-to ms.date: 08/10/2022 diff --git a/education/windows/deploy-windows-10-in-a-school-district.md b/education/windows/deploy-windows-10-in-a-school-district.md index 25b23567fd..03cc1f372b 100644 --- a/education/windows/deploy-windows-10-in-a-school-district.md +++ b/education/windows/deploy-windows-10-in-a-school-district.md @@ -1,5 +1,5 @@ --- -title: Deploy Windows 10 in a school district (Windows 10) +title: Deploy Windows 10 in a school district description: Learn how to deploy Windows 10 in a school district. Integrate the school environment with Office 365, Active Directory Domain Services (AD DS), and Microsoft Azure Active Directory (Azure AD), use Microsoft Configuration Manager, Intune, and Group Policy to manage devices. ms.topic: how-to ms.date: 08/10/2022 diff --git a/education/windows/deploy-windows-10-in-a-school.md b/education/windows/deploy-windows-10-in-a-school.md index 34726cf380..7ca8806b4b 100644 --- a/education/windows/deploy-windows-10-in-a-school.md +++ b/education/windows/deploy-windows-10-in-a-school.md @@ -1,5 +1,5 @@ --- -title: Deploy Windows 10 in a school (Windows 10) +title: Deploy Windows 10 in a school description: Learn how to integrate your school environment with Microsoft Office 365, Active Directory Domain Services (AD DS), and Microsoft Azure Active Directory (Azure AD). Deploy Windows 10 and apps to new devices or upgrade existing devices to Windows 10. Manage faculty, students, and devices by using Microsoft Intune and Group Policy. ms.topic: how-to ms.date: 08/10/2022 diff --git a/education/windows/deploy-windows-10-overview.md b/education/windows/deploy-windows-10-overview.md index 96d9d002e0..bbe2d5fc6c 100644 --- a/education/windows/deploy-windows-10-overview.md +++ b/education/windows/deploy-windows-10-overview.md @@ -1,5 +1,5 @@ --- -title: Windows 10 for Education (Windows 10) +title: Windows 10 for Education description: Learn how to use Windows 10 in schools. ms.topic: how-to ms.date: 08/10/2022 diff --git a/education/windows/federated-sign-in.md b/education/windows/federated-sign-in.md index 326c71ca59..0d98af99f7 100644 --- a/education/windows/federated-sign-in.md +++ b/education/windows/federated-sign-in.md @@ -1,7 +1,7 @@ --- title: Configure federated sign-in for Windows devices description: Description of federated sign-in feature for the Education SKUs of Windows 11 and how to configure it via Intune or provisioning packages. -ms.date: 04/11/2023 +ms.date: 05/01/2023 ms.topic: how-to appliesto: - ✅ Windows 11 @@ -35,34 +35,45 @@ To implement federated sign-in, the following prerequisites must be met: - For a step-by-step guide on how to configure **Google Workspace** as an identity provider for Azure AD, see [Configure federation between Google Workspace and Azure AD](configure-aad-google-trust.md) - For a step-by-step guide on how to configure **Clever** as an identity provider for Azure AD, see [Setup guide for Badges into Windows and Azure AD][EXT-1] -1. Individual IdP accounts created: each user will require an account defined in the third-party IdP platform -1. Individual Azure AD accounts created: each user will require a matching account defined in Azure AD. These accounts are commonly created through automated solutions, for example: +1. Individual IdP accounts created: each user requires an account defined in the third-party IdP platform +1. Individual Azure AD accounts created: each user requires a matching account defined in Azure AD. These accounts are commonly created through automated solutions, for example: - [School Data Sync (SDS)][SDS-1] - [Azure AD Connect sync][AZ-3] for environment with on-premises AD DS - PowerShell scripts that call the [Microsoft Graph API][GRAPH-1] - provisioning tools offered by the IdP - + For more information about identity matching, see [Identity matching in Azure AD](#identity-matching-in-azure-ad). 1. Licenses assigned to the Azure AD user accounts. It's recommended to assign licenses to a dynamic group: when new users are provisioned in Azure AD, the licenses are automatically assigned. For more information, see [Assign licenses to users by group membership in Azure Active Directory][AZ-2] 1. Enable federated sign-in on the Windows devices -To use federated sign-in, the devices must have Internet access. This feature won't work without it, as the authentication is done over the Internet. +To use federated sign-in, the devices must have Internet access. This feature doesn't work without it, as the authentication is done over the Internet. > [!IMPORTANT] > WS-Fed is the only supported federated protocol to join a device to Azure AD. If you have a SAML 2.0 IdP, it's recommended to complete the Azure AD join process using one of the following methods: -> - provisioning packages (PPKG) +> - Provisioning packages (PPKG) > - Windows Autopilot self-deploying mode -### System requirements +[!INCLUDE [federated-sign-in](../../includes/licensing/federated-sign-in.md)] -Federated sign-in is supported on the following Windows SKUs and versions: +Federated sign-in for student assigned (1:1) devices is supported on the following Windows editions and versions: - Windows 11 SE, version 22H2 and later - Windows 11 Pro Edu/Education, version 22H2 with [KB5022913][KB-1] +Federated sign-in for shared devices is supported starting in Windows 11 SE/Pro Edu/Education, version 22H2 with [KB5026446][KB-2]. + ## Configure federated sign-in -To use web sign-in with a federated identity provider, your devices must be configured with different policies. Follow the instructions below to configure your devices using either Microsoft Intune or a provisioning package (PPKG). +You can configure federated sign-in for student assigned (1:1) devices or student shared devices: + +- When federated sign-in is configured for **student assigned (1:1) devices**, the first user who signs in to the device with a federated identity becomes the *primary user*. The primary user is always displayed in the bottom left corner of the sign-in screen +- When federated sign-in is configured for **student shared devices**, there's no primary user. The sign-in screen displays, by default, the last user who signed in to the device + +The configuration is different for each scenario, and is described in the following sections. + +### Configure federated sign-in for student assigned (1:1) devices + +To use web sign-in with a federated identity provider, your devices must be configured with different policies. Review the following instructions to configure your devices using either Microsoft Intune or a provisioning package (PPKG). #### [:::image type="icon" source="images/icons/intune.svg"::: **Intune**](#tab/intune) @@ -72,9 +83,9 @@ To configure federated sign-in using Microsoft Intune, [create a custom profile] | Setting | |--------| +|
  • OMA-URI: **`./Vendor/MSFT/Policy/Config/Education/IsEducationEnvironment`**
  • Data type: **Integer**
  • Value: **1**
  • | |
  • OMA-URI: **`./Vendor/MSFT/Policy/Config/FederatedAuthentication/EnableWebSignInForPrimaryUser`**
  • Data type: **Integer**
  • Value: **1**
  • | |
  • OMA-URI: **`./Vendor/MSFT/Policy/Config/Authentication/ConfigureWebSignInAllowedUrls`**
  • Data type: **String**
  • Value: Semicolon separated list of domains, for example: **`samlidp.clever.com;clever.com;mobile-redirector.clever.com`**
  • | -|
  • OMA-URI: **`./Vendor/MSFT/Policy/Config/Education/IsEducationEnvironment`**
  • Data type: **Integer**
  • Value: **1**
  • | |
  • OMA-URI: **`./Vendor/MSFT/Policy/Config/Authentication/ConfigureWebCamAccessDomainNames`**
  • Data type: **String**
  • Value: This setting is optional, and it should be configured if you need to use the webcam during the sign-in process. Specify the list of domains that are allowed to use the webcam during the sign-in process, separated by a semicolon. For example: **`clever.com`**
  • | :::image type="content" source="images/federated-sign-in-settings-intune.png" alt-text="Custom policy showing the settings to be configured to enable federated sign-in" lightbox="images/federated-sign-in-settings-intune.png" border="true"::: @@ -88,14 +99,54 @@ To configure federated sign-in using a provisioning package, use the following s | Setting | |--------| +|
  • Path: **`Education/IsEducationEnvironment`**
  • Value: **Enabled**
  • | |
  • Path: **`FederatedAuthentication/EnableWebSignInForPrimaryUser`**
  • Value: **Enabled**
  • | |
  • Path: **`Policies/Authentication/ConfigureWebSignInAllowedUrls`**
  • Value: Semicolon separated list of domains, for example: **`samlidp.clever.com;clever.com;mobile-redirector.clever.com`**
  • | -|
  • Path: **`Policies/Education/IsEducationEnvironment`**
  • Value: **Enabled**
  • | |
  • Path: **`Policies/Authentication/ConfigureWebCamAccessDomainNames`**
  • Value: This setting is optional, and it should be configured if you need to use the webcam during the sign-in process. Specify the list of domains that are allowed to use the webcam during the sign-in process, separated by a semicolon. For example: **`clever.com`**
  • | :::image type="content" source="images/federated-sign-in-settings-ppkg.png" alt-text="Custom policy showing the settings to be configured to enable federated sign-in" lightbox="images/federated-sign-in-settings-ppkg.png" border="true"::: -Apply the provisioning package to the devices that require federated sign-in. +Apply the provisioning package to the single-user devices that require federated sign-in. + +> [!IMPORTANT] +> There was an issue affecting Windows 11, version 22H2 when using provisioning packages during OOBE. The issue was fixed with the KB5020044 update. If you plan to configure federated sign-in with a provisioning package during OOBE, ensure that the devices have the update installed. For more information, see [KB5020044][KB-1]. + +--- + +### Configure federated sign-in for student shared devices + +To use web sign-in with a federated identity provider, your devices must be configured with different policies. Review the following instructions to configure your shared devices using either Microsoft Intune or a provisioning package (PPKG). + +#### [:::image type="icon" source="images/icons/intune.svg"::: **Intune**](#tab/intune) + +To configure federated sign-in using Microsoft Intune, [create a custom profile][MEM-1] with the following settings: + +[!INCLUDE [intune-custom-settings-1](includes/intune-custom-settings-1.md)] + +| Setting | +|--------| +|
  • OMA-URI: **`./Vendor/MSFT/Policy/Config/Education/IsEducationEnvironment`**
  • Data type: **Integer**
  • Value: **1**
  • | +|
  • OMA-URI: **`./Vendor/MSFT/SharedPC/EnableSharedPCModeWithOneDriveSync`**
  • Data type: **Boolean**
  • Value: **True**
  • | +|
  • OMA-URI: **`./Vendor/MSFT/Policy/Config/Authentication/EnableWebSignIn`**
  • Data type: **Integer**
  • Value: **1**
  • | +|
  • OMA-URI: **`./Vendor/MSFT/Policy/Config/Authentication/ConfigureWebSignInAllowedUrls`**
  • Data type: **String**
  • Value: Semicolon separated list of domains, for example: **`samlidp.clever.com;clever.com;mobile-redirector.clever.com`**
  • | +|
  • OMA-URI: **`./Vendor/MSFT/Policy/Config/Authentication/ConfigureWebCamAccessDomainNames`**
  • Data type: **String**
  • Value: This setting is optional, and it should be configured if you need to use the webcam during the sign-in process. Specify the list of domains that are allowed to use the webcam during the sign-in process, separated by a semicolon. For example: **`clever.com`**
  • | + +[!INCLUDE [intune-custom-settings-2](includes/intune-custom-settings-2.md)] +[!INCLUDE [intune-custom-settings-info](includes/intune-custom-settings-info.md)] + +#### [:::image type="icon" source="images/icons/provisioning-package.svg"::: **PPKG**](#tab/ppkg) + +To configure federated sign-in using a provisioning package, use the following settings: + +| Setting | +|--------| +|
  • Path: **`Education/IsEducationEnvironment`**
  • Value: **Enabled**
  • | +|
  • Path: **`SharedPC/EnableSharedPCModeWithOneDriveSync`**
  • Value: **True**
  • | +|
  • Path: **`Policies/Authentication/EnableWebSignIn`**
  • Value: **Enabled**
  • | +|
  • Path: **`Policies/Authentication/ConfigureWebSignInAllowedUrls`**
  • Value: Semicolon separated list of domains, for example: **`samlidp.clever.com;clever.com;mobile-redirector.clever.com`**
  • | +|
  • Path: **`Policies/Authentication/ConfigureWebCamAccessDomainNames`**
  • Value: This setting is optional, and it should be configured if you need to use the webcam during the sign-in process. Specify the list of domains that are allowed to use the webcam during the sign-in process, separated by a semicolon. For example: **`clever.com`**
  • | + +Apply the provisioning package to the shared devices that require federated sign-in. > [!IMPORTANT] > There was an issue affecting Windows 11, version 22H2 when using provisioning packages during OOBE. The issue was fixed with the KB5020044 update. If you plan to configure federated sign-in with a provisioning package during OOBE, ensure that the devices have the update installed. For more information, see [KB5020044][KB-1]. @@ -106,20 +157,41 @@ Apply the provisioning package to the devices that require federated sign-in. Once the devices are configured, a new sign-in experience becomes available. -As the end users enter their username, they'll be redirected to the identity provider sign-in page. Once users are authenticated by the IdP, they'll be signed-in. In the following animation, you can see how the first sign-in process works: +As users enter their username, they're redirected to the identity provider sign-in page. Once the Idp authenticates the users, they're signed-in. In the following animation, you can observe how the first sign-in process works for a student assigned (1:1) device: -:::image type="content" source="./images/win-11-se-federated-sign-in.gif" alt-text="Windows 11 SE sign-in using federated sign-in through Clever and QR code badge." border="false"::: +:::image type="content" source="./images/win-11-se-federated-sign-in.gif" alt-text="Windows 11 SE sign-in using federated sign-in through Clever and QR code badge, in a student assigned (1:1) device." border="false"::: > [!IMPORTANT] -> Once the policy is enabled, the first user to sign-in to the device will also set the disambiguation page to the identity provider domain on the device. This means that the device will be defaulting to that IdP. The user can exit the federated sign-in flow by pressing Ctrl+Alt+Delete to get back to the standard Windows sign-in screen. +> For student assigned (1:1) devices, once the policy is enabled, the first user who sign-in to the device will also set the disambiguation page to the identity provider domain on the device. This means that the device will be defaulting to that IdP. The user can exit the federated sign-in flow by pressing Ctrl+Alt+Delete to get back to the standard Windows sign-in screen. +> The behavior is different for student shared devices, where the disambiguation page is always shown, unless preferred Azure AD tenant name is configured. ## Important considerations -Federated sign-in doesn't work on devices that have the following settings enabled: +### Known issues affecting student assigned (1:1) devices -- **EnableSharedPCMode**, which is part of the [SharedPC CSP][WIN-1] +Federated sign-in for student assigned (1:1) devices doesn't work with the following settings enabled: + +- **EnableSharedPCMode** or **EnableSharedPCModeWithOneDriveSync**, which are part of the [SharedPC CSP][WIN-1] - **Interactive logon: do not display last signed in**, which is a security policy part of the [Policy CSP][WIN-2] -- **Take a Test**, since it uses the security policy above +- **Take a Test** in kiosk mode, since it uses the security policy above + +### Known issues affecting student shared devices + +The following issues are known to affect student shared devices: + +- Non-federated users can't sign-in to the devices, including local accounts +- **Take a Test** in kiosk mode, since it uses a local guest account to sign in + +### Account management + +For student shared devices, it's recommended to configure the account management policies to automatically delete the user profiles after a certain period of inactivity or disk levels. For more information, see [Set up a shared or guest Windows device][WIN-3]. + +### Preferred Azure AD tenant name + +To improve the user experience, you can configure the *preferred Azure AD tenant name* feature.\ +When using preferred AAD tenant name, the users bypass the disambiguation page and are redirected to the identity provider sign-in page. This configuration can be especially useful for student shared devices, where the disambiguation page is always shown. + +For more information about preferred tenant name, see [Authentication CSP - PreferredAadTenantDomainName][WIN-4]. ### Identity matching in Azure AD @@ -129,7 +201,7 @@ After the token sent by the IdP is validated, Azure AD searches for a matching u > [!NOTE] > The ImmutableId is a string value that **must be unique** for each user in the tenant, and it shouldn't change over time. For example, the ImmutableId could be the student ID or SIS ID. The ImmutableId value should be based on the federation setup and configuration with your IdP, so confirm with your IdP before setting it. -If the matching object is found, the user is signed-in. If not, the user is presented with an error message. The following picture shows that a user with the ImmutableId *260051* can't be found: +If the matching object is found, the user is signed-in. Otherwise, the user is presented with an error message. The following picture shows that a user with the ImmutableId *260051* can't be found: :::image type="content" source="images/federation/user-match-lookup-failure.png" alt-text="Azure AD sign-in error: a user with a matching ImmutableId can't be found in the tenant." lightbox="images/federation/user-match-lookup-failure.png"::: @@ -180,6 +252,9 @@ Update-MgUser -UserId alton@example.onmicrosoft.com -UserPrincipalName alton@exa [SDS-1]: /schooldatasync [KB-1]: https://support.microsoft.com/kb/5022913 +[KB-2]: https://support.microsoft.com/kb/5026446 [WIN-1]: /windows/client-management/mdm/sharedpc-csp -[WIN-2]: /windows/client-management/mdm/policy-csp-localpoliciessecurityoptions#localpoliciessecurityoptions-interactivelogon-donotdisplaylastsignedin \ No newline at end of file +[WIN-2]: /windows/client-management/mdm/policy-csp-localpoliciessecurityoptions#localpoliciessecurityoptions-interactivelogon-donotdisplaylastsignedin +[WIN-3]: /windows/configuration/set-up-shared-or-guest-pc +[WIN-4]: /windows/client-management/mdm/policy-csp-authentication#preferredaadtenantdomainname \ No newline at end of file diff --git a/education/windows/windows-11-se-overview.md b/education/windows/windows-11-se-overview.md index 44eea6b076..2464884671 100644 --- a/education/windows/windows-11-se-overview.md +++ b/education/windows/windows-11-se-overview.md @@ -78,7 +78,7 @@ The following table lists all the applications included in Windows 11 SE and the ## Available applications -The following applications can also run on Windows 11 SE, and can be deployed using Intune for Education. For more information, see [Configure applications with Microsoft Intune][EDUWIN-1] +The following applications can also run on Windows 11 SE, and can be deployed using Intune for Education. For more information, see [Configure applications with Microsoft Intune][EDUWIN-1]. | Application | Supported version | App Type | Vendor | |-------------------------------------------|-------------------|----------|-------------------------------------------| @@ -101,7 +101,8 @@ The following applications can also run on Windows 11 SE, and can be deployed us | `DRC INSIGHT Online Assessments` | 13.0.0.0 | `Store` | `Data recognition Corporation` | | `Duo from Cisco` | 3.0.0 | Win32 | `Cisco` | | `e-Speaking Voice and Speech recognition` | 4.4.0.8 | Win32 | `e-speaking` | -| `EasyReader` | 10.0.3.481 | Win32 | `Dolphin Computer Access` | +| `EasyReader` | 10.0.4.498 | Win32 | `Dolphin Computer Access` | +| `Easysense 2` | 1.32.0001 | Win32 | `Data Harvest` | | `Epson iProjection` | 3.31 | Win32 | `Epson` | | `eTests` | 4.0.25 | Win32 | `CASAS` | | `Exam Writepad` | 22.10.14.1834 | Win32 | `Sheldnet` | @@ -119,7 +120,7 @@ The following applications can also run on Windows 11 SE, and can be deployed us | `Inspiration 10` | 10.11 | Win32 | `TechEdology Ltd` | | `JAWS for Windows` | 2022.2112.24 | Win32 | `Freedom Scientific` | | `Kite Student Portal` | 9.0.0.0 | Win32 | `Dynamic Learning Maps` | -| `Keyman` | 16.0.138 | Win32 | `SIL International` +| `Keyman` | 16.0.138 | Win32 | `SIL International` | | `Kortext` | 2.3.433.0 | `Store` | `Kortext` | | `Kurzweil 3000 Assistive Learning` | 20.13.0000 | Win32 | `Kurzweil Educational Systems` | | `LanSchool Classic` | 9.1.0.46 | Win32 | `Stoneware, Inc.` | @@ -128,6 +129,7 @@ The following applications can also run on Windows 11 SE, and can be deployed us | `MetaMoJi ClassRoom` | 3.12.4.0 | `Store` | `MetaMoJi Corporation` | | `Microsoft Connect` | 10.0.22000.1 | `Store` | `Microsoft` | | `Mozilla Firefox` | 105.0.0 | Win32 | `Mozilla` | +| `Mobile Plans` | 5.1911.3171.0 | `Store` | `Microsoft Corporation` | | `NAPLAN` | 5.2.2 | Win32 | `NAP` | | `Netref Student` | 23.1.0 | Win32 | `NetRef` | | `NetSupport Manager` | 12.01.0014 | Win32 | `NetSupport` | @@ -136,14 +138,17 @@ The following applications can also run on Windows 11 SE, and can be deployed us | `NextUp Talker` | 1.0.49 | Win32 | `NextUp Technologies` | | `NonVisual Desktop Access` | 2021.3.1 | Win32 | `NV Access` | | `NWEA Secure Testing Browser` | 5.4.356.0 | Win32 | `NWEA` | +| `PC Talker NEO` | 2209 | Win32 | `Kochi System Development` | +| `PC Talker NEO Plus` | 2209 | Win32 | `Kochi System Development` | | `PaperCut` | 22.0.6 | Win32 | `PaperCut Software International Pty Ltd` | -| `Pearson TestNav` | 1.10.2.0 | `Store` | `Pearson` | +| `Pearson TestNav` | 1.11.3 | `Store` | `Pearson` | | `Questar Secure Browser` | 5.0.1.456 | Win32 | `Questar, Inc` | | `ReadAndWriteForWindows` | 12.0.74 | Win32 | `Texthelp Ltd.` | | `Remote Desktop client (MSRDC)` | 1.2.3213.0 | Win32 | `Microsoft` | | `Remote Help` | 4.0.1.13 | Win32 | `Microsoft` | | `Respondus Lockdown Browser` | 2.0.9.03 | Win32 | `Respondus` | | `Safe Exam Browser` | 3.4.1.505 | Win32 | `Safe Exam Browser` | +|`SchoolYear` | 3.4.7 | Win32 |`SchoolYear` | | `Senso.Cloud` | 2021.11.15.0 | Win32 | `Senso.Cloud` | | `Smoothwall Monitor` | 2.9.2 | Win32 | `Smoothwall Ltd` | | `SuperNova Magnifier & Screen Reader` | 21.02 | Win32 | `Dolphin Computer Access` | diff --git a/windows/security/threat-protection/microsoft-defender-smartscreen/images/icons/group-policy.svg b/images/group-policy.svg similarity index 100% rename from windows/security/threat-protection/microsoft-defender-smartscreen/images/icons/group-policy.svg rename to images/group-policy.svg diff --git a/images/information.svg b/images/information.svg new file mode 100644 index 0000000000..bc692eabb9 --- /dev/null +++ b/images/information.svg @@ -0,0 +1,3 @@ + + + \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-smartscreen/images/icons/intune.svg b/images/intune.svg similarity index 100% rename from windows/security/threat-protection/microsoft-defender-smartscreen/images/icons/intune.svg rename to images/intune.svg diff --git a/windows/security/threat-protection/microsoft-defender-smartscreen/images/icons/windows-os.svg b/images/windows-os.svg similarity index 100% rename from windows/security/threat-protection/microsoft-defender-smartscreen/images/icons/windows-os.svg rename to images/windows-os.svg diff --git a/includes/intune/intune-custom-settings-1.md b/includes/intune/intune-custom-settings-1.md new file mode 100644 index 0000000000..d911751e75 --- /dev/null +++ b/includes/intune/intune-custom-settings-1.md @@ -0,0 +1,13 @@ +--- +ms.date: 02/22/2022 +ms.topic: include +--- + +To configure devices with Microsoft Intune, use a custom policy: + +1. Go to the Microsoft Intune admin center +2. Select **Devices > Configuration profiles > Create profile** +3. Select **Platform > Windows 10 and later** and **Profile type > Templates > Custom** +4. Select **Create** +5. Specify a **Name** and, optionally, a **Description > Next** +6. Add the following settings: \ No newline at end of file diff --git a/includes/intune/intune-custom-settings-2.md b/includes/intune/intune-custom-settings-2.md new file mode 100644 index 0000000000..1a601acaa7 --- /dev/null +++ b/includes/intune/intune-custom-settings-2.md @@ -0,0 +1,9 @@ +--- +ms.date: 11/08/2022 +ms.topic: include +--- + +7. Select **Next** +8. Assign the policy to a security group that contains as members the devices or users that you want to configure > **Next** +9. Under **Applicability Rules**, select **Next** +10. Review the policy configuration and select **Create** \ No newline at end of file diff --git a/includes/intune/intune-custom-settings-info.md b/includes/intune/intune-custom-settings-info.md new file mode 100644 index 0000000000..8ff9da4294 --- /dev/null +++ b/includes/intune/intune-custom-settings-info.md @@ -0,0 +1,6 @@ +--- +ms.date: 11/08/2022 +ms.topic: include +--- + +For more information about how to create custom settings using Intune, see [Use custom settings for Windows devices in Intune](/mem/intune/configuration/custom-settings-windows-10). \ No newline at end of file diff --git a/includes/licensing/_edition-requirements.md b/includes/licensing/_edition-requirements.md new file mode 100644 index 0000000000..0135cef94b --- /dev/null +++ b/includes/licensing/_edition-requirements.md @@ -0,0 +1,80 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +| Feature name | Windows Pro | Windows Enterprise | Windows Pro Education/SE | Windows Education | +|:---|:---:|:---:|:---:|:---:| +|**[Access Control (ACLs/SCALS)](/windows/security/identity-protection/access-control/access-control)**|Yes|Yes|Yes|Yes| +|**[Account Lockout Policy](/windows/security/threat-protection/security-policy-settings/account-lockout-policy)**|Yes|Yes|Yes|Yes| +|**[Always On VPN (device tunnel)](/windows-server/remote/remote-access/vpn/always-on-vpn/)**|❌|Yes|❌|Yes| +|**[Assigned Access (kiosk mode)](/windows/configuration/kiosk-methods)**|Yes|Yes|Yes|Yes| +|**[Attack surface reduction (ASR)](/microsoft-365/security/defender-endpoint/overview-attack-surface-reduction)**|Yes|Yes|Yes|Yes| +|**[Azure AD join, Active Directory domain join, and Hybrid Azure AD join with single sign-on (SSO)](/azure/active-directory/devices/concept-azure-ad-join)**|Yes|Yes|Yes|Yes| +|**[BitLocker enablement](/windows/security/information-protection/bitlocker/bitlocker-overview)**|Yes|Yes|Yes|Yes| +|**[BitLocker management](/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises)**|Yes|Yes|Yes|Yes| +|**Bluetooth pairing and connection protection**|Yes|Yes|Yes|Yes| +|**[Common Criteria certifications](/windows/security/threat-protection/windows-platform-common-criteria)**|Yes|Yes|Yes|Yes| +|**[Controlled folder access](/microsoft-365/security/defender-endpoint/controlled-folders)**|Yes|Yes|Yes|Yes| +|**[Device health attestation service](/windows/security/threat-protection/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices)**|Yes|Yes|Yes|Yes| +|**[Direct Access](/windows-server/remote/remote-access/directaccess/directaccess)**|❌|Yes|❌|Yes| +|**[Email Encryption (S/MIME)](/windows/security/identity-protection/configure-s-mime)**|Yes|Yes|Yes|Yes| +|**[Encrypted hard drive](/windows/security/information-protection/encrypted-hard-drive)**|Yes|Yes|Yes|Yes| +|**[Enhanced phishing protection with SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/phishing-protection-microsoft-defender-smartscreen)**|Yes|Yes|Yes|Yes| +|**[Exploit protection](/microsoft-365/security/defender-endpoint/exploit-protection)**|Yes|Yes|Yes|Yes| +|**[Fast Identity Online (FIDO2) security key](/azure/active-directory/authentication/howto-authentication-passwordless-security-key)**|Yes|Yes|Yes|Yes| +|**[Federal Information Processing Standard (FIPS) 140 validation](/windows/security/threat-protection/fips-140-validation)**|Yes|Yes|Yes|Yes| +|**[Federated sign-in](/education/windows/federated-sign-in)**|❌|❌|Yes|Yes| +|**[Hardware-enforced stack protection](https://techcommunity.microsoft.com/t5/windows-os-platform-blog/understanding-hardware-enforced-stack-protection/ba-p/1247815)**|Yes|Yes|Yes|Yes| +|**[Hypervisor-protected Code Integrity (HVCI)](/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity)**|Yes|Yes|Yes|Yes| +|**[Kernel Direct Memory Access (DMA) protection](/windows/security/information-protection/kernel-dma-protection-for-thunderbolt)**|Yes|Yes|Yes|Yes| +|**Local Security Authority (LSA) Protection**|Yes|Yes|Yes|Yes| +|**[Manage by Mobile Device Management (MDM) and group policy](/windows/security/threat-protection/windows-security-configuration-framework/windows-security-baselines)**|Yes|Yes|Yes|Yes| +|**[Measured boot](/windows/compatibility/measured-boot)**|Yes|Yes|Yes|Yes| +|**[Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-windows)**|Yes|Yes|Yes|Yes| +|**[Microsoft Defender Application Guard (MDAG) configure via MDM](/windows/client-management/mdm/windowsdefenderapplicationguard-csp)**|❌|Yes|❌|Yes| +|**[Microsoft Defender Application Guard (MDAG) for Edge enterprise mode and enterprise management](/windows/security/threat-protection/microsoft-defender-application-guard/configure-md-app-guard)**|❌|Yes|❌|Yes| +|**[Microsoft Defender Application Guard (MDAG) for Edge standalone mode](/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-overview)**|Yes|Yes|Yes|Yes| +|**[Microsoft Defender Application Guard (MDAG) for Microsoft Office](https://support.microsoft.com/office/application-guard-for-office-9e0fb9c2-ffad-43bf-8ba3-78f785fdba46)**|❌|Yes|❌|Yes| +|**Microsoft Defender Application Guard (MDAG) public APIs**|❌|Yes|❌|Yes| +|**[Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint)**|Yes|Yes|Yes|Yes| +|**[Microsoft Defender SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview)**|Yes|Yes|Yes|Yes| +|**[Microsoft Pluton security processor](/windows/security/information-protection/pluton/microsoft-pluton-security-processor)**|Yes|Yes|Yes|Yes| +|**[Microsoft Vulnerable Driver Blocklist](/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules)**|Yes|Yes|Yes|Yes| +|**Opportunistic Wireless Encryption (OWE)**|Yes|Yes|Yes|Yes| +|**[Personal data encryption (PDE)](/windows/security/information-protection/personal-data-encryption/overview-pde)**|❌|Yes|❌|Yes| +|**Privacy Resource Usage**|Yes|Yes|Yes|Yes| +|**Privacy Transparency and Controls**|Yes|Yes|Yes|Yes| +|**[Remote wipe](/windows/client-management/mdm/remotewipe-csp)**|Yes|Yes|Yes|Yes| +|**[Secure Boot and Trusted Boot](/windows/security/trusted-boot)**|Yes|Yes|Yes|Yes| +|**[Secured-core configuration lock](/windows/client-management/config-lock)**|Yes|Yes|Yes|Yes| +|**[Secured-core PC](/windows-hardware/design/device-experiences/oem-highly-secure-11)**|Yes|Yes|Yes|Yes| +|**[Security baselines](/windows/security/threat-protection/windows-security-configuration-framework/windows-security-baselines)**|Yes|Yes|Yes|Yes| +|**[Server Message Block (SMB) file service](/windows-server/storage/file-server/file-server-smb-overview)**|Yes|Yes|Yes|Yes| +|**[Server Message Block Direct (SMB Direct)](/windows-server/storage/file-server/smb-direct)**|Yes|Yes|Yes|Yes| +|**[Smart App Control](/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control)**|Yes|Yes|Yes|Yes| +|**[Smart Cards for Windows Service](/windows/security/identity-protection/smart-cards/smart-card-smart-cards-for-windows-service)**|Yes|Yes|Yes|Yes| +|**[Tamper protection settings for MDE](/microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection)**|Yes|Yes|Yes|Yes| +|**[Transport layer security (TLS)](/windows-server/security/tls/tls-ssl-schannel-ssp-overview)**|Yes|Yes|Yes|Yes| +|**[Trusted Platform Module (TPM) 2.0](/windows/security/information-protection/tpm/trusted-platform-module-overview)**|Yes|Yes|Yes|Yes| +|**[Universal Print](/universal-print/)**|Yes|Yes|Yes|Yes| +|**[User Account Control (UAC)](/windows/security/identity-protection/user-account-control/user-account-control-overview)**|Yes|Yes|Yes|Yes| +|**[Virtual Private Network (VPN)](/windows/security/identity-protection/vpn/vpn-guide)**|Yes|Yes|Yes|Yes| +|**[Virtualization-based security (VBS)](/windows-hardware/design/device-experiences/oem-vbs)**|Yes|Yes|Yes|Yes| +|**[WiFi Security](https://support.microsoft.com/windows/faster-and-more-secure-wi-fi-in-windows-26177a28-38ed-1a8e-7eca-66f24dc63f09)**|Yes|Yes|Yes|Yes| +|**[Windows Autopatch](/windows/deployment/windows-autopatch/)**|❌|Yes|❌|Yes| +|**[Windows Autopilot](/windows/deployment/windows-autopilot)**|Yes|Yes|Yes|Yes| +|**[Windows containers](/virtualization/windowscontainers/about/)**|Yes|Yes|Yes|Yes| +|**[Windows Defender Application Control (WDAC)](/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control)**|Yes|Yes|Yes|Yes| +|**[Windows Defender Credential Guard](/windows/security/identity-protection/credential-guard/credential-guard)**|❌|Yes|❌|Yes| +|**[Windows Defender Remote Credential Guard](/windows/security/identity-protection/remote-credential-guard)**|Yes|Yes|Yes|Yes| +|**[Windows Defender System Guard](/windows/security/threat-protection/windows-defender-system-guard/how-hardware-based-root-of-trust-helps-protect-windows)**|Yes|Yes|Yes|Yes| +|**[Windows Firewall](/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security)**|Yes|Yes|Yes|Yes| +|**[Windows Hello for Business](/windows/security/identity-protection/hello-for-business)**|Yes|Yes|Yes|Yes| +|**[Windows Hello for Business Enhanced Security Sign-in (ESS)](/windows-hardware/design/device-experiences/windows-hello-enhanced-sign-in-security)**|Yes|Yes|Yes|Yes| +|**[Windows LAPS](/windows-server/identity/laps/laps-overview)**|Yes|Yes|Yes|Yes| +|**[Windows presence sensing](https://support.microsoft.com/windows/wake-your-windows-11-pc-when-you-approach-82285c93-440c-4e15-9081-c9e38c1290bb)**|Yes|Yes|Yes|Yes| +|**[Windows Sandbox](/windows/security/threat-protection/windows-sandbox/windows-sandbox-overview)**|Yes|Yes|Yes|Yes| +|**[Windows Security policy settings and auditing](/windows/security/threat-protection/security-policy-settings/security-policy-settings)**|Yes|Yes|Yes|Yes| diff --git a/includes/licensing/_licensing-requirements.md b/includes/licensing/_licensing-requirements.md new file mode 100644 index 0000000000..575aef4b30 --- /dev/null +++ b/includes/licensing/_licensing-requirements.md @@ -0,0 +1,80 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +|Feature name|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---|:---:|:---:|:---:|:---:|:---:| +|**[Access Control (ACLs/SCALS)](/windows/security/identity-protection/access-control/access-control)**|Yes|Yes|Yes|Yes|Yes| +|**[Account Lockout Policy](/windows/security/threat-protection/security-policy-settings/account-lockout-policy)**|Yes|Yes|Yes|Yes|Yes| +|**[Always On VPN (device tunnel)](/windows-server/remote/remote-access/vpn/always-on-vpn/)**|❌|Yes|Yes|Yes|Yes| +|**[Assigned Access (kiosk mode)](/windows/configuration/kiosk-methods)**|Yes|Yes|Yes|Yes|Yes| +|**[Attack surface reduction (ASR)](/microsoft-365/security/defender-endpoint/overview-attack-surface-reduction)**|Yes|Yes|Yes|Yes|Yes| +|**[Azure AD join, Active Directory domain join, and Hybrid Azure AD join with single sign-on (SSO)](/azure/active-directory/devices/concept-azure-ad-join)**|Yes|Yes|Yes|Yes|Yes| +|**[BitLocker enablement](/windows/security/information-protection/bitlocker/bitlocker-overview)**|Yes|Yes|Yes|Yes|Yes| +|**[BitLocker management](/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises)**|❌|Yes|Yes|Yes|Yes| +|**Bluetooth pairing and connection protection**|Yes|Yes|Yes|Yes|Yes| +|**[Common Criteria certifications](/windows/security/threat-protection/windows-platform-common-criteria)**|Yes|Yes|Yes|Yes|Yes| +|**[Controlled folder access](/microsoft-365/security/defender-endpoint/controlled-folders)**|Yes|Yes|Yes|Yes|Yes| +|**[Device health attestation service](/windows/security/threat-protection/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices)**|Yes|Yes|Yes|Yes|Yes| +|**[Direct Access](/windows-server/remote/remote-access/directaccess/directaccess)**|❌|Yes|Yes|Yes|Yes| +|**[Email Encryption (S/MIME)](/windows/security/identity-protection/configure-s-mime)**|Yes|Yes|Yes|Yes|Yes| +|**[Encrypted hard drive](/windows/security/information-protection/encrypted-hard-drive)**|Yes|Yes|Yes|Yes|Yes| +|**[Enhanced phishing protection with SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/phishing-protection-microsoft-defender-smartscreen)**|Yes|Yes|Yes|Yes|Yes| +|**[Exploit protection](/microsoft-365/security/defender-endpoint/exploit-protection)**|Yes|Yes|Yes|Yes|Yes| +|**[Fast Identity Online (FIDO2) security key](/azure/active-directory/authentication/howto-authentication-passwordless-security-key)**|Yes|Yes|Yes|Yes|Yes| +|**[Federal Information Processing Standard (FIPS) 140 validation](/windows/security/threat-protection/fips-140-validation)**|Yes|Yes|Yes|Yes|Yes| +|**[Federated sign-in](/education/windows/federated-sign-in)**|❌|❌|❌|Yes|Yes| +|**[Hardware-enforced stack protection](https://techcommunity.microsoft.com/t5/windows-os-platform-blog/understanding-hardware-enforced-stack-protection/ba-p/1247815)**|Yes|Yes|Yes|Yes|Yes| +|**[Hypervisor-protected Code Integrity (HVCI)](/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity)**|Yes|Yes|Yes|Yes|Yes| +|**[Kernel Direct Memory Access (DMA) protection](/windows/security/information-protection/kernel-dma-protection-for-thunderbolt)**|Yes|Yes|Yes|Yes|Yes| +|**Local Security Authority (LSA) Protection**|Yes|Yes|Yes|Yes|Yes| +|**[Manage by Mobile Device Management (MDM) and group policy](/windows/security/threat-protection/windows-security-configuration-framework/windows-security-baselines)**|Yes|Yes|Yes|Yes|Yes| +|**[Measured boot](/windows/compatibility/measured-boot)**|Yes|Yes|Yes|Yes|Yes| +|**[Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-windows)**|Yes|Yes|Yes|Yes|Yes| +|**[Microsoft Defender Application Guard (MDAG) configure via MDM](/windows/client-management/mdm/windowsdefenderapplicationguard-csp)**|❌|Yes|Yes|Yes|Yes| +|**[Microsoft Defender Application Guard (MDAG) for Edge enterprise mode and enterprise management](/windows/security/threat-protection/microsoft-defender-application-guard/configure-md-app-guard)**|❌|Yes|Yes|Yes|Yes| +|**[Microsoft Defender Application Guard (MDAG) for Edge standalone mode](/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-overview)**|Yes|Yes|Yes|Yes|Yes| +|**[Microsoft Defender Application Guard (MDAG) for Microsoft Office](https://support.microsoft.com/office/application-guard-for-office-9e0fb9c2-ffad-43bf-8ba3-78f785fdba46)**|❌|❌|❌|❌|❌| +|**Microsoft Defender Application Guard (MDAG) public APIs**|❌|Yes|Yes|Yes|Yes| +|**[Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint)**|❌|❌|Yes|❌|Yes| +|**[Microsoft Defender SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview)**|Yes|Yes|Yes|Yes|Yes| +|**[Microsoft Pluton security processor](/windows/security/information-protection/pluton/microsoft-pluton-security-processor)**|Yes|Yes|Yes|Yes|Yes| +|**[Microsoft Vulnerable Driver Blocklist](/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules)**|Yes|Yes|Yes|Yes|Yes| +|**Opportunistic Wireless Encryption (OWE)**|Yes|Yes|Yes|Yes|Yes| +|**[Personal data encryption (PDE)](/windows/security/information-protection/personal-data-encryption/overview-pde)**|❌|Yes|Yes|Yes|Yes| +|**Privacy Resource Usage**|Yes|Yes|Yes|Yes|Yes| +|**Privacy Transparency and Controls**|Yes|Yes|Yes|Yes|Yes| +|**[Remote wipe](/windows/client-management/mdm/remotewipe-csp)**|Yes|Yes|Yes|Yes|Yes| +|**[Secure Boot and Trusted Boot](/windows/security/trusted-boot)**|Yes|Yes|Yes|Yes|Yes| +|**[Secured-core configuration lock](/windows/client-management/config-lock)**|Yes|Yes|Yes|Yes|Yes| +|**[Secured-core PC](/windows-hardware/design/device-experiences/oem-highly-secure-11)**|Yes|Yes|Yes|Yes|Yes| +|**[Security baselines](/windows/security/threat-protection/windows-security-configuration-framework/windows-security-baselines)**|Yes|Yes|Yes|Yes|Yes| +|**[Server Message Block (SMB) file service](/windows-server/storage/file-server/file-server-smb-overview)**|Yes|Yes|Yes|Yes|Yes| +|**[Server Message Block Direct (SMB Direct)](/windows-server/storage/file-server/smb-direct)**|Yes|Yes|Yes|Yes|Yes| +|**[Smart App Control](/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control)**|Yes|Yes|Yes|Yes|Yes| +|**[Smart Cards for Windows Service](/windows/security/identity-protection/smart-cards/smart-card-smart-cards-for-windows-service)**|Yes|Yes|Yes|Yes|Yes| +|**[Tamper protection settings for MDE](/microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection)**|Yes|Yes|Yes|Yes|Yes| +|**[Transport layer security (TLS)](/windows-server/security/tls/tls-ssl-schannel-ssp-overview)**|Yes|Yes|Yes|Yes|Yes| +|**[Trusted Platform Module (TPM) 2.0](/windows/security/information-protection/tpm/trusted-platform-module-overview)**|Yes|Yes|Yes|Yes|Yes| +|**[Universal Print](/universal-print/)**|❌|Yes|Yes|Yes|Yes| +|**[User Account Control (UAC)](/windows/security/identity-protection/user-account-control/user-account-control-overview)**|Yes|Yes|Yes|Yes|Yes| +|**[Virtual Private Network (VPN)](/windows/security/identity-protection/vpn/vpn-guide)**|Yes|Yes|Yes|Yes|Yes| +|**[Virtualization-based security (VBS)](/windows-hardware/design/device-experiences/oem-vbs)**|Yes|Yes|Yes|Yes|Yes| +|**[WiFi Security](https://support.microsoft.com/windows/faster-and-more-secure-wi-fi-in-windows-26177a28-38ed-1a8e-7eca-66f24dc63f09)**|Yes|Yes|Yes|Yes|Yes| +|**[Windows Autopatch](/windows/deployment/windows-autopatch/)**|❌|Yes|Yes|❌|❌| +|**[Windows Autopilot](/windows/deployment/windows-autopilot)**|Yes|Yes|Yes|Yes|Yes| +|**[Windows containers](/virtualization/windowscontainers/about/)**|Yes|Yes|Yes|Yes|Yes| +|**[Windows Defender Application Control (WDAC)](/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control)**|Yes|Yes|Yes|Yes|Yes| +|**[Windows Defender Credential Guard](/windows/security/identity-protection/credential-guard/credential-guard)**|❌|Yes|Yes|Yes|Yes| +|**[Windows Defender Remote Credential Guard](/windows/security/identity-protection/remote-credential-guard)**|Yes|Yes|Yes|Yes|Yes| +|**[Windows Defender System Guard](/windows/security/threat-protection/windows-defender-system-guard/how-hardware-based-root-of-trust-helps-protect-windows)**|Yes|Yes|Yes|Yes|Yes| +|**[Windows Firewall](/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security)**|Yes|Yes|Yes|Yes|Yes| +|**[Windows Hello for Business](/windows/security/identity-protection/hello-for-business)**|Yes|Yes|Yes|Yes|Yes| +|**[Windows Hello for Business Enhanced Security Sign-in (ESS)](/windows-hardware/design/device-experiences/windows-hello-enhanced-sign-in-security)**|Yes|Yes|Yes|Yes|Yes| +|**[Windows LAPS](/windows-server/identity/laps/laps-overview)**|Yes|Yes|Yes|Yes|Yes| +|**[Windows presence sensing](https://support.microsoft.com/windows/wake-your-windows-11-pc-when-you-approach-82285c93-440c-4e15-9081-c9e38c1290bb)**|Yes|Yes|Yes|Yes|Yes| +|**[Windows Sandbox](/windows/security/threat-protection/windows-sandbox/windows-sandbox-overview)**|Yes|Yes|Yes|Yes|Yes| +|**[Windows Security policy settings and auditing](/windows/security/threat-protection/security-policy-settings/security-policy-settings)**|Yes|Yes|Yes|Yes|Yes| diff --git a/includes/licensing/access-control-aclsscals.md b/includes/licensing/access-control-aclsscals.md new file mode 100644 index 0000000000..74b2f49090 --- /dev/null +++ b/includes/licensing/access-control-aclsscals.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Access Control (ACLs/SCALS): + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Access Control (ACLs/SCALS) license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/account-lockout-policy.md b/includes/licensing/account-lockout-policy.md new file mode 100644 index 0000000000..f73aa4228c --- /dev/null +++ b/includes/licensing/account-lockout-policy.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Account Lockout Policy: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Account Lockout Policy license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/always-on-vpn-device-tunnel.md b/includes/licensing/always-on-vpn-device-tunnel.md new file mode 100644 index 0000000000..74b2333a3d --- /dev/null +++ b/includes/licensing/always-on-vpn-device-tunnel.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Always On VPN (device tunnel): + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|No|Yes|No|Yes| + +Always On VPN (device tunnel) license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|No|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/assigned-access-kiosk-mode.md b/includes/licensing/assigned-access-kiosk-mode.md new file mode 100644 index 0000000000..a2f4b745bb --- /dev/null +++ b/includes/licensing/assigned-access-kiosk-mode.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Assigned Access (kiosk mode): + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Assigned Access (kiosk mode) license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/attack-surface-reduction-asr.md b/includes/licensing/attack-surface-reduction-asr.md new file mode 100644 index 0000000000..666af08c54 --- /dev/null +++ b/includes/licensing/attack-surface-reduction-asr.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Attack surface reduction (ASR): + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Attack surface reduction (ASR) license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/azure-ad-join-active-directory-domain-join-and-hybrid-azure-ad-join-with-single-sign-on-sso.md b/includes/licensing/azure-ad-join-active-directory-domain-join-and-hybrid-azure-ad-join-with-single-sign-on-sso.md new file mode 100644 index 0000000000..b093cd8faa --- /dev/null +++ b/includes/licensing/azure-ad-join-active-directory-domain-join-and-hybrid-azure-ad-join-with-single-sign-on-sso.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Azure AD join, Active Directory domain join, and Hybrid Azure AD join with single sign-on (SSO): + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Azure AD join, Active Directory domain join, and Hybrid Azure AD join with single sign-on (SSO) license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/bitlocker-enablement.md b/includes/licensing/bitlocker-enablement.md new file mode 100644 index 0000000000..4f0645fe52 --- /dev/null +++ b/includes/licensing/bitlocker-enablement.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support BitLocker enablement: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +BitLocker enablement license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/bitlocker-management.md b/includes/licensing/bitlocker-management.md new file mode 100644 index 0000000000..af3034bd8b --- /dev/null +++ b/includes/licensing/bitlocker-management.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support BitLocker management: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +BitLocker management license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|No|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/bluetooth-pairing-and-connection-protection.md b/includes/licensing/bluetooth-pairing-and-connection-protection.md new file mode 100644 index 0000000000..494fee6609 --- /dev/null +++ b/includes/licensing/bluetooth-pairing-and-connection-protection.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Bluetooth pairing and connection protection: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Bluetooth pairing and connection protection license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/common-criteria-certifications.md b/includes/licensing/common-criteria-certifications.md new file mode 100644 index 0000000000..dbb9d1669a --- /dev/null +++ b/includes/licensing/common-criteria-certifications.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Common Criteria certifications: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Common Criteria certifications license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/controlled-folder-access.md b/includes/licensing/controlled-folder-access.md new file mode 100644 index 0000000000..855d0cf28f --- /dev/null +++ b/includes/licensing/controlled-folder-access.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Controlled folder access: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Controlled folder access license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/device-health-attestation-service.md b/includes/licensing/device-health-attestation-service.md new file mode 100644 index 0000000000..f8fdb1e381 --- /dev/null +++ b/includes/licensing/device-health-attestation-service.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Device health attestation service: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Device health attestation service license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/direct-access.md b/includes/licensing/direct-access.md new file mode 100644 index 0000000000..f1b2da9ef5 --- /dev/null +++ b/includes/licensing/direct-access.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Direct Access: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|No|Yes|No|Yes| + +Direct Access license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|No|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/email-encryption-smime.md b/includes/licensing/email-encryption-smime.md new file mode 100644 index 0000000000..07e14851b2 --- /dev/null +++ b/includes/licensing/email-encryption-smime.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Email Encryption (S/MIME): + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Email Encryption (S/MIME) license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/encrypted-hard-drive.md b/includes/licensing/encrypted-hard-drive.md new file mode 100644 index 0000000000..e365c0d71c --- /dev/null +++ b/includes/licensing/encrypted-hard-drive.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Encrypted hard drive: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Encrypted hard drive license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/enhanced-phishing-protection-with-smartscreen.md b/includes/licensing/enhanced-phishing-protection-with-smartscreen.md new file mode 100644 index 0000000000..4f4c059f8b --- /dev/null +++ b/includes/licensing/enhanced-phishing-protection-with-smartscreen.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Enhanced phishing protection with SmartScreen: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Enhanced phishing protection with SmartScreen license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/exploit-protection.md b/includes/licensing/exploit-protection.md new file mode 100644 index 0000000000..c774cb4f5e --- /dev/null +++ b/includes/licensing/exploit-protection.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Exploit protection: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Exploit protection license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/fast-identity-online-fido2-security-key.md b/includes/licensing/fast-identity-online-fido2-security-key.md new file mode 100644 index 0000000000..b47385e2f5 --- /dev/null +++ b/includes/licensing/fast-identity-online-fido2-security-key.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Fast Identity Online (FIDO2) security key: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Fast Identity Online (FIDO2) security key license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/federal-information-processing-standard-fips-140-validation.md b/includes/licensing/federal-information-processing-standard-fips-140-validation.md new file mode 100644 index 0000000000..ff0563a439 --- /dev/null +++ b/includes/licensing/federal-information-processing-standard-fips-140-validation.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Federal Information Processing Standard (FIPS) 140 validation: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Federal Information Processing Standard (FIPS) 140 validation license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/federated-sign-in.md b/includes/licensing/federated-sign-in.md new file mode 100644 index 0000000000..5a1a787e06 --- /dev/null +++ b/includes/licensing/federated-sign-in.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Federated sign-in: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|No|No|Yes|Yes| + +Federated sign-in license entitlements are granted by the following licenses: + +|Windows Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|No|No|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/hardware-enforced-stack-protection.md b/includes/licensing/hardware-enforced-stack-protection.md new file mode 100644 index 0000000000..50ae05045a --- /dev/null +++ b/includes/licensing/hardware-enforced-stack-protection.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Hardware-enforced stack protection: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Hardware-enforced stack protection license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/hypervisor-protected-code-integrity-hvci.md b/includes/licensing/hypervisor-protected-code-integrity-hvci.md new file mode 100644 index 0000000000..8f6b16cf28 --- /dev/null +++ b/includes/licensing/hypervisor-protected-code-integrity-hvci.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Hypervisor-protected Code Integrity (HVCI): + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Hypervisor-protected Code Integrity (HVCI) license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/kernel-direct-memory-access-dma-protection.md b/includes/licensing/kernel-direct-memory-access-dma-protection.md new file mode 100644 index 0000000000..7c805915cb --- /dev/null +++ b/includes/licensing/kernel-direct-memory-access-dma-protection.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Kernel Direct Memory Access (DMA) protection: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Kernel Direct Memory Access (DMA) protection license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/local-security-authority-lsa-protection.md b/includes/licensing/local-security-authority-lsa-protection.md new file mode 100644 index 0000000000..af4fb5b47f --- /dev/null +++ b/includes/licensing/local-security-authority-lsa-protection.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Local Security Authority (LSA) Protection: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Local Security Authority (LSA) Protection license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/manage-by-mobile-device-management-mdm-and-group-policy.md b/includes/licensing/manage-by-mobile-device-management-mdm-and-group-policy.md new file mode 100644 index 0000000000..7330817deb --- /dev/null +++ b/includes/licensing/manage-by-mobile-device-management-mdm-and-group-policy.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Manage by Mobile Device Management (MDM) and group policy: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Manage by Mobile Device Management (MDM) and group policy license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/measured-boot.md b/includes/licensing/measured-boot.md new file mode 100644 index 0000000000..39c560d47f --- /dev/null +++ b/includes/licensing/measured-boot.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Measured boot: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Measured boot license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/microsoft-defender-antivirus.md b/includes/licensing/microsoft-defender-antivirus.md new file mode 100644 index 0000000000..ba5bb932ea --- /dev/null +++ b/includes/licensing/microsoft-defender-antivirus.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Microsoft Defender Antivirus: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Microsoft Defender Antivirus license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/microsoft-defender-application-guard-mdag-configure-via-mdm.md b/includes/licensing/microsoft-defender-application-guard-mdag-configure-via-mdm.md new file mode 100644 index 0000000000..453b5db930 --- /dev/null +++ b/includes/licensing/microsoft-defender-application-guard-mdag-configure-via-mdm.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Microsoft Defender Application Guard (MDAG) configure via MDM: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|No|Yes|No|Yes| + +Microsoft Defender Application Guard (MDAG) configure via MDM license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|No|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/microsoft-defender-application-guard-mdag-for-edge-enterprise-mode-and-enterprise-management.md b/includes/licensing/microsoft-defender-application-guard-mdag-for-edge-enterprise-mode-and-enterprise-management.md new file mode 100644 index 0000000000..36c1c33234 --- /dev/null +++ b/includes/licensing/microsoft-defender-application-guard-mdag-for-edge-enterprise-mode-and-enterprise-management.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Microsoft Defender Application Guard (MDAG) for Edge enterprise mode and enterprise management: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|No|Yes|No|Yes| + +Microsoft Defender Application Guard (MDAG) for Edge enterprise mode and enterprise management license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|No|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/microsoft-defender-application-guard-mdag-for-edge-standalone-mode.md b/includes/licensing/microsoft-defender-application-guard-mdag-for-edge-standalone-mode.md new file mode 100644 index 0000000000..23bf14013f --- /dev/null +++ b/includes/licensing/microsoft-defender-application-guard-mdag-for-edge-standalone-mode.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Microsoft Defender Application Guard (MDAG) for Edge standalone mode: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Microsoft Defender Application Guard (MDAG) for Edge standalone mode license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/microsoft-defender-application-guard-mdag-for-microsoft-office.md b/includes/licensing/microsoft-defender-application-guard-mdag-for-microsoft-office.md new file mode 100644 index 0000000000..2ccf97f2da --- /dev/null +++ b/includes/licensing/microsoft-defender-application-guard-mdag-for-microsoft-office.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Microsoft Defender Application Guard (MDAG) for Microsoft Office: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|No|Yes|No|Yes| + +Microsoft Defender Application Guard (MDAG) for Microsoft Office license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|No|No|No|No|No| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/microsoft-defender-application-guard-mdag-public-apis.md b/includes/licensing/microsoft-defender-application-guard-mdag-public-apis.md new file mode 100644 index 0000000000..bf903c766f --- /dev/null +++ b/includes/licensing/microsoft-defender-application-guard-mdag-public-apis.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Microsoft Defender Application Guard (MDAG) public APIs: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|No|Yes|No|Yes| + +Microsoft Defender Application Guard (MDAG) public APIs license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|No|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/microsoft-defender-for-endpoint.md b/includes/licensing/microsoft-defender-for-endpoint.md new file mode 100644 index 0000000000..be03daf05e --- /dev/null +++ b/includes/licensing/microsoft-defender-for-endpoint.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Microsoft Defender for Endpoint: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Microsoft Defender for Endpoint license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|No|No|Yes|No|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/microsoft-defender-smartscreen.md b/includes/licensing/microsoft-defender-smartscreen.md new file mode 100644 index 0000000000..a946b12155 --- /dev/null +++ b/includes/licensing/microsoft-defender-smartscreen.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Microsoft Defender SmartScreen: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Microsoft Defender SmartScreen license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/microsoft-pluton-security-processor.md b/includes/licensing/microsoft-pluton-security-processor.md new file mode 100644 index 0000000000..2190c8a4ab --- /dev/null +++ b/includes/licensing/microsoft-pluton-security-processor.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Microsoft Pluton security processor: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Microsoft Pluton security processor license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/microsoft-vulnerable-driver-blocklist.md b/includes/licensing/microsoft-vulnerable-driver-blocklist.md new file mode 100644 index 0000000000..39e258739c --- /dev/null +++ b/includes/licensing/microsoft-vulnerable-driver-blocklist.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Microsoft Vulnerable Driver Blocklist: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Microsoft Vulnerable Driver Blocklist license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/opportunistic-wireless-encryption-owe.md b/includes/licensing/opportunistic-wireless-encryption-owe.md new file mode 100644 index 0000000000..e0203c3e4d --- /dev/null +++ b/includes/licensing/opportunistic-wireless-encryption-owe.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Opportunistic Wireless Encryption (OWE): + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Opportunistic Wireless Encryption (OWE) license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/personal-data-encryption-pde.md b/includes/licensing/personal-data-encryption-pde.md new file mode 100644 index 0000000000..3ca149f34f --- /dev/null +++ b/includes/licensing/personal-data-encryption-pde.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Personal data encryption (PDE): + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|No|Yes|No|Yes| + +Personal data encryption (PDE) license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|No|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/privacy-resource-usage.md b/includes/licensing/privacy-resource-usage.md new file mode 100644 index 0000000000..054bf054cc --- /dev/null +++ b/includes/licensing/privacy-resource-usage.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Privacy Resource Usage: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Privacy Resource Usage license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/privacy-transparency-and-controls.md b/includes/licensing/privacy-transparency-and-controls.md new file mode 100644 index 0000000000..711440f7a5 --- /dev/null +++ b/includes/licensing/privacy-transparency-and-controls.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Privacy Transparency and Controls: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Privacy Transparency and Controls license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/remote-wipe.md b/includes/licensing/remote-wipe.md new file mode 100644 index 0000000000..5f5e79eeb6 --- /dev/null +++ b/includes/licensing/remote-wipe.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Remote wipe: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Remote wipe license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/secure-boot-and-trusted-boot.md b/includes/licensing/secure-boot-and-trusted-boot.md new file mode 100644 index 0000000000..8c60a8b048 --- /dev/null +++ b/includes/licensing/secure-boot-and-trusted-boot.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Secure Boot and Trusted Boot: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Secure Boot and Trusted Boot license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/secured-core-configuration-lock.md b/includes/licensing/secured-core-configuration-lock.md new file mode 100644 index 0000000000..9a2f06088b --- /dev/null +++ b/includes/licensing/secured-core-configuration-lock.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Secured-core configuration lock: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Secured-core configuration lock license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/secured-core-pc.md b/includes/licensing/secured-core-pc.md new file mode 100644 index 0000000000..f22319bbdb --- /dev/null +++ b/includes/licensing/secured-core-pc.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Secured-core PC: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Secured-core PC license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/security-baselines.md b/includes/licensing/security-baselines.md new file mode 100644 index 0000000000..a615d3af13 --- /dev/null +++ b/includes/licensing/security-baselines.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Security baselines: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Security baselines license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/server-message-block-direct-smb-direct.md b/includes/licensing/server-message-block-direct-smb-direct.md new file mode 100644 index 0000000000..ba99c98579 --- /dev/null +++ b/includes/licensing/server-message-block-direct-smb-direct.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Server Message Block Direct (SMB Direct): + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Server Message Block Direct (SMB Direct) license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/server-message-block-smb-file-service.md b/includes/licensing/server-message-block-smb-file-service.md new file mode 100644 index 0000000000..a271907d88 --- /dev/null +++ b/includes/licensing/server-message-block-smb-file-service.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Server Message Block (SMB) file service: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Server Message Block (SMB) file service license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/smart-app-control.md b/includes/licensing/smart-app-control.md new file mode 100644 index 0000000000..ff42750aab --- /dev/null +++ b/includes/licensing/smart-app-control.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Smart App Control: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Smart App Control license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/smart-cards-for-windows-service.md b/includes/licensing/smart-cards-for-windows-service.md new file mode 100644 index 0000000000..98f271770f --- /dev/null +++ b/includes/licensing/smart-cards-for-windows-service.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Smart Cards for Windows Service: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Smart Cards for Windows Service license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/tamper-protection-settings-for-mde.md b/includes/licensing/tamper-protection-settings-for-mde.md new file mode 100644 index 0000000000..95a86ec97c --- /dev/null +++ b/includes/licensing/tamper-protection-settings-for-mde.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Tamper protection settings for MDE: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Tamper protection settings for MDE license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/transport-layer-security-tls.md b/includes/licensing/transport-layer-security-tls.md new file mode 100644 index 0000000000..9af6799b44 --- /dev/null +++ b/includes/licensing/transport-layer-security-tls.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Transport layer security (TLS): + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Transport layer security (TLS) license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/trusted-platform-module-tpm-20.md b/includes/licensing/trusted-platform-module-tpm-20.md new file mode 100644 index 0000000000..b2e593986b --- /dev/null +++ b/includes/licensing/trusted-platform-module-tpm-20.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Trusted Platform Module (TPM) 2.0: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Trusted Platform Module (TPM) 2.0 license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/universal-print.md b/includes/licensing/universal-print.md new file mode 100644 index 0000000000..9c6572d61e --- /dev/null +++ b/includes/licensing/universal-print.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Universal Print: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Universal Print license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|No|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/user-account-control-uac.md b/includes/licensing/user-account-control-uac.md new file mode 100644 index 0000000000..9da42619fe --- /dev/null +++ b/includes/licensing/user-account-control-uac.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support User Account Control (UAC): + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +User Account Control (UAC) license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/virtual-private-network-vpn.md b/includes/licensing/virtual-private-network-vpn.md new file mode 100644 index 0000000000..aa184cdbb6 --- /dev/null +++ b/includes/licensing/virtual-private-network-vpn.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Virtual Private Network (VPN): + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Virtual Private Network (VPN) license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/virtualization-based-security-vbs.md b/includes/licensing/virtualization-based-security-vbs.md new file mode 100644 index 0000000000..bab3110e7a --- /dev/null +++ b/includes/licensing/virtualization-based-security-vbs.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Virtualization-based security (VBS): + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Virtualization-based security (VBS) license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/wifi-security.md b/includes/licensing/wifi-security.md new file mode 100644 index 0000000000..edb7a92967 --- /dev/null +++ b/includes/licensing/wifi-security.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support WiFi Security: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +WiFi Security license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/windows-autopatch.md b/includes/licensing/windows-autopatch.md new file mode 100644 index 0000000000..85f7df53dc --- /dev/null +++ b/includes/licensing/windows-autopatch.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Windows Autopatch: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|No|Yes|No|Yes| + +Windows Autopatch license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|No|Yes|Yes|No|No| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/windows-autopilot.md b/includes/licensing/windows-autopilot.md new file mode 100644 index 0000000000..e187e7a3fa --- /dev/null +++ b/includes/licensing/windows-autopilot.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Windows Autopilot: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Windows Autopilot license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/windows-containers.md b/includes/licensing/windows-containers.md new file mode 100644 index 0000000000..f3f9962827 --- /dev/null +++ b/includes/licensing/windows-containers.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Windows containers: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Windows containers license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/windows-defender-application-control-wdac.md b/includes/licensing/windows-defender-application-control-wdac.md new file mode 100644 index 0000000000..66d6ac70dc --- /dev/null +++ b/includes/licensing/windows-defender-application-control-wdac.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Windows Defender Application Control (WDAC): + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Windows Defender Application Control (WDAC) license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/windows-defender-credential-guard.md b/includes/licensing/windows-defender-credential-guard.md new file mode 100644 index 0000000000..c134726708 --- /dev/null +++ b/includes/licensing/windows-defender-credential-guard.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Windows Defender Credential Guard: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|No|Yes|No|Yes| + +Windows Defender Credential Guard license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|No|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/windows-defender-remote-credential-guard.md b/includes/licensing/windows-defender-remote-credential-guard.md new file mode 100644 index 0000000000..b638a7c661 --- /dev/null +++ b/includes/licensing/windows-defender-remote-credential-guard.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Windows Defender Remote Credential Guard: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Windows Defender Remote Credential Guard license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/windows-defender-system-guard.md b/includes/licensing/windows-defender-system-guard.md new file mode 100644 index 0000000000..0c747b64c5 --- /dev/null +++ b/includes/licensing/windows-defender-system-guard.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Windows Defender System Guard: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Windows Defender System Guard license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/windows-firewall.md b/includes/licensing/windows-firewall.md new file mode 100644 index 0000000000..2e0754b3ac --- /dev/null +++ b/includes/licensing/windows-firewall.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Windows Firewall: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Windows Firewall license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/windows-hello-for-business-enhanced-security-sign-in-ess.md b/includes/licensing/windows-hello-for-business-enhanced-security-sign-in-ess.md new file mode 100644 index 0000000000..3d0c015bc5 --- /dev/null +++ b/includes/licensing/windows-hello-for-business-enhanced-security-sign-in-ess.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Windows Hello for Business Enhanced Security Sign-in (ESS): + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Windows Hello for Business Enhanced Security Sign-in (ESS) license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/windows-hello-for-business.md b/includes/licensing/windows-hello-for-business.md new file mode 100644 index 0000000000..f48b9316b7 --- /dev/null +++ b/includes/licensing/windows-hello-for-business.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Windows Hello for Business: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Windows Hello for Business license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/windows-laps.md b/includes/licensing/windows-laps.md new file mode 100644 index 0000000000..d462168228 --- /dev/null +++ b/includes/licensing/windows-laps.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Windows LAPS: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Windows LAPS license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/windows-presence-sensing.md b/includes/licensing/windows-presence-sensing.md new file mode 100644 index 0000000000..c6cc796c33 --- /dev/null +++ b/includes/licensing/windows-presence-sensing.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Windows presence sensing: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Windows presence sensing license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/windows-sandbox.md b/includes/licensing/windows-sandbox.md new file mode 100644 index 0000000000..7ed933449c --- /dev/null +++ b/includes/licensing/windows-sandbox.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Windows Sandbox: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Windows Sandbox license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/windows-security-policy-settings-and-auditing.md b/includes/licensing/windows-security-policy-settings-and-auditing.md new file mode 100644 index 0000000000..270d3267ee --- /dev/null +++ b/includes/licensing/windows-security-policy-settings-and-auditing.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 05/04/2023 +ms.topic: include +--- + +## Windows edition and licensing requirements + +The following table lists the Windows editions that support Windows Security policy settings and auditing: + +|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| +|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes| + +Windows Security policy settings and auditing license entitlements are granted by the following licenses: + +|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| +|:---:|:---:|:---:|:---:|:---:| +|Yes|Yes|Yes|Yes|Yes| + +For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/store-for-business/acquire-apps-microsoft-store-for-business.md b/store-for-business/acquire-apps-microsoft-store-for-business.md index 82df7d4d32..a5cee55a8b 100644 --- a/store-for-business/acquire-apps-microsoft-store-for-business.md +++ b/store-for-business/acquire-apps-microsoft-store-for-business.md @@ -10,26 +10,31 @@ manager: scotv ms.reviewer: ms.topic: conceptual ms.localizationpriority: medium -ms.date: 07/21/2021 +ms.date: 05/24/2023 --- # Acquire apps in Microsoft Store for Business and Education > [!IMPORTANT] -> The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> +> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed). -> [!IMPORTANT] -> Starting on April 14th, 2021, only free apps will be available in Microsoft Store for Business and Education. For more information, see [Microsoft Store for Business and Education](index.md). +> [!NOTE] +> As of April 14th, 2021, only free apps are available in Microsoft Store for Business and Education. For more information, see [Microsoft Store for Business and Education](index.md). -As an admin, you can acquire apps from the Microsoft Store for Business and Education for your employees. Some apps are free, and some have a price. For info on app types that are supported, see [Apps in the Microsoft Store for Business](apps-in-microsoft-store-for-business.md). The following sections explain some of the settings for shopping. +As an admin, you can acquire apps from the Microsoft Store for Business and Education for your employees. Some apps are free, and some have a price. For info on app types that are supported, see [Apps in the Microsoft Store for Business](apps-in-microsoft-store-for-business.md). The following sections explain some of the settings for shopping. ## App licensing model + The Microsoft Store supports two options to license apps: online and offline. **Online** licensing is the default licensing model. Online licensed apps require users and devices to connect to the Microsoft Store services to acquire an app and its license. **Offline** licensing is a new licensing option for Windows 10. With offline licenses, organizations can cache apps and their licenses to deploy within their network. ISVs or devs can opt-in their apps for offline licensing when they submit them to the developer center. Admins control whether or not offline apps are available in Microsoft Store with an offline app visibility setting. For more information on the Microsoft Store licensing model, see [licensing model](./apps-in-microsoft-store-for-business.md#licensing-model). ## Payment options + Some apps are free, and some have a price. Apps can be purchased in the Microsoft Store using your credit card. You can enter your credit card information on **Account Information**, or when you purchase an app. Currently, we accept these credit cards: + - VISA - MasterCard - Discover @@ -37,19 +42,23 @@ Some apps are free, and some have a price. Apps can be purchased in the Microsof - Japan Commercial Bureau (JCB) ## Organization info + There are a couple of things we need to know when you pay for apps. You can add this info to the **Account information** or **Payments & billing** page before you buy apps. If you haven't provided it, we'll ask when you make a purchase. Either way works. Here's the info you'll need to provide: + - Legal business address - Payment option (credit card) ## Allow users to shop **Allow users to shop** controls the shopping experience in Microsoft Store for Education. When this setting is on, **Purchasers** and **Basic Purchasers** can purchase products and services from Microsoft Store for Education. If your school chooses to closely control how purchases are made, admins can turn off **Allow users to shop**. When the setting is off: + - The shopping experience is not available - **Purchasers** and **Basic Purchasers** can't purchase products and services from Microsoft Store for Education - Admins can't assign shopping roles to users - Products and services previously purchased by **Basic Purchasers** can be managed by admins. **To manage Allow users to shop setting** + 1. Sign in to [Microsoft Store for Business](https://businessstore.microsoft.com) or [Microsoft Store for Education](https://educationstore.microsoft.com) 2. Select **Manage**, and then select **Settings**. 3. On **Shop**, , under **Shopping behavior**, turn on or turn off **Allow users to shop**. @@ -61,12 +70,15 @@ There are a couple of things we need to know when you pay for apps. You can add People in your org can request license for apps that they need, or that others need. When **Allow app requests** is turned on, app requests are sent to org admins. Admins for your tenant will receive an email with the request, and can decide about making the purchase. **To manage Allow app requests** + 1. Sign in to [Microsoft Store for Business](https://businessstore.microsoft.com) or [Microsoft Store for Education](https://educationstore.microsoft.com) 2. Select **Manage**, and then select **Settings**. 3. On **Shop**, under **Shopping behavior** turn on or turn off **Allow app requests**. ## Acquire apps + **To acquire an app** + 1. Sign in to https://businessstore.microsoft.com 2. Select **Shop for my group**, or use Search to find an app. 3. Select the app you want to purchase. @@ -78,6 +90,7 @@ People in your org can request license for apps that they need, or that others n You'll also need to have your business address saved on **My organization - Profile**. The address is used to generate tax rates. For more information on taxes for apps, see [organization tax information](./update-microsoft-store-for-business-account-settings.md#organization-tax-information). Microsoft Store adds the app to your inventory. From **Products & services**, you can: + - Distribute the app: add to private store, or assign licenses - View app licenses: review current licenses, reclaim and reassign licenses - View app details: review the app details page and purchase more licenses diff --git a/store-for-business/add-profile-to-devices.md b/store-for-business/add-profile-to-devices.md index 18af34875e..73cb1cafc3 100644 --- a/store-for-business/add-profile-to-devices.md +++ b/store-for-business/add-profile-to-devices.md @@ -4,22 +4,25 @@ description: Add an Autopilot profile to devices. Autopilot profiles control wha ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: store -author: TrudyHa -ms.author: TrudyHa -ms.date: 07/21/2021 +ms.author: cmcatee +author: cmcatee-MSFT +manager: scotv +ms.date: 05/24/2023 ms.reviewer: -manager: dansimp ms.topic: conceptual ms.localizationpriority: medium --- # Manage Windows device deployment with Windows Autopilot Deployment -**Applies to** -- Windows 10 +**Applies to:** + +- Windows 10 > [!IMPORTANT] -> The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> +> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed). Windows Autopilot simplifies device set up for IT Admins. For an overview of benefits, scenarios, and prerequisites, see [Overview of Windows Autopilot](/windows/deployment/windows-autopilot/windows-10-autopilot). diff --git a/store-for-business/app-inventory-management-microsoft-store-for-business.md b/store-for-business/app-inventory-management-microsoft-store-for-business.md index 2d0ea132bc..1ac1b42374 100644 --- a/store-for-business/app-inventory-management-microsoft-store-for-business.md +++ b/store-for-business/app-inventory-management-microsoft-store-for-business.md @@ -10,17 +10,19 @@ ms.author: cmcatee author: cmcatee-MSFT manager: scotv ms.topic: conceptual -ms.date: 07/21/2021 +ms.date: 05/24/2023 --- # App inventory management for Microsoft Store for Business and Education -**Applies to** +**Applies to:** -- Windows 10 +- Windows 10 > [!IMPORTANT] -> The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> +> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed). You can manage all apps that you've acquired on your **Apps & software** page. This page shows all of the content you've acquired, including apps that from Microsoft Store, and line-of-business (LOB) apps that you've accepted into your inventory. After LOB apps are submitted to your organization, you'll see a notification on your **Apps & software** page. On the **New LOB apps** tab, you can accept, or reject the LOB apps. For more information on LOB apps, see [Working with line-of-business apps](working-with-line-of-business-apps.md). The inventory page includes apps acquired by all people in your organization with the Store for Business Admin role. diff --git a/store-for-business/apps-in-microsoft-store-for-business.md b/store-for-business/apps-in-microsoft-store-for-business.md index 4fc8e74159..92bced3780 100644 --- a/store-for-business/apps-in-microsoft-store-for-business.md +++ b/store-for-business/apps-in-microsoft-store-for-business.md @@ -11,18 +11,19 @@ author: cmcatee-MSFT manager: scotv ms.topic: conceptual ms.localizationpriority: medium -ms.date: 07/21/2021 +ms.date: 05/24/2023 --- # Apps in Microsoft Store for Business and Education +**Applies to:** -**Applies to** - -- Windows 10 +- Windows 10 > [!IMPORTANT] -> The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> +> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed). Microsoft Store for Business and Education has thousands of apps from many different categories. diff --git a/store-for-business/assign-apps-to-employees.md b/store-for-business/assign-apps-to-employees.md index eda2a2947c..db0e139ab0 100644 --- a/store-for-business/assign-apps-to-employees.md +++ b/store-for-business/assign-apps-to-employees.md @@ -11,18 +11,19 @@ author: cmcatee-MSFT manager: scotv ms.topic: conceptual ms.localizationpriority: medium -ms.date: 07/21/2021 +ms.date: 05/27/2023 --- # Assign apps to employees +**Applies to:** -**Applies to** - -- Windows 10 +- Windows 10 > [!IMPORTANT] -> The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> +> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed). Admins, Purchasers, and Basic Purchasers can assign online-licensed apps to employees or students in their organization. diff --git a/store-for-business/billing-payments-overview.md b/store-for-business/billing-payments-overview.md index 20e16f502d..08d60c558e 100644 --- a/store-for-business/billing-payments-overview.md +++ b/store-for-business/billing-payments-overview.md @@ -10,14 +10,15 @@ author: cmcatee-MSFT manager: scotv ms.topic: conceptual ms.localizationpriority: medium -ms.date: 07/21/2021 -ms.reviewer: +ms.date: 05/24/2023 --- # Billing and payments > [!IMPORTANT] -> The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> +> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed). Access invoices and managed your payment methods. diff --git a/store-for-business/billing-profile.md b/store-for-business/billing-profile.md index 4e3c7fe14e..43924342b2 100644 --- a/store-for-business/billing-profile.md +++ b/store-for-business/billing-profile.md @@ -10,18 +10,21 @@ author: cmcatee-MSFT manager: scotv ms.topic: conceptual ms.localizationpriority: medium -ms.date: 07/21/2021 +ms.date: 05/23/2023 ms.reviewer: --- # Understand billing profiles > [!IMPORTANT] -> The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> +> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed). -For commercial customers purchasing software or hardware products from Microsoft using a Microsoft customer agreement, billing profiles let you customize what products are included on your invoice, and how you pay your invoices. +For commercial customers purchasing software or hardware products from Microsoft using a Microsoft customer agreement, billing profiles let you customize what products are included on your invoice, and how you pay your invoices. Billing profiles include: + - **Payment methods** – Credit cards or check/wire transfer - **Contact info** - Billing address and a contact name - **Permissions** – Permissions that allow you to change the billing profile, pay bills, or use the payment method on the billing profile to make purchases diff --git a/store-for-business/billing-understand-your-invoice-msfb.md b/store-for-business/billing-understand-your-invoice-msfb.md index a791f8acf8..ec044296e5 100644 --- a/store-for-business/billing-understand-your-invoice-msfb.md +++ b/store-for-business/billing-understand-your-invoice-msfb.md @@ -9,19 +9,22 @@ author: cmcatee-MSFT manager: scotv ms.topic: conceptual ms.localizationpriority: medium -ms.date: 07/21/2021 +ms.date: 05/24/2023 ms.reviewer: --- # Understand your Microsoft Customer Agreement invoice > [!IMPORTANT] -> The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> +> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed). The invoice provides a summary of your charges and provides instructions for payment. It's available for download in the Portable Document Format (.pdf) for commercial customers from Microsoft Store for Business [Microsoft Store for Business - Invoice](https://businessstore.microsoft.com/manage/payments-billing/invoices) or can be sent via email. This article applies to invoices generated for a Microsoft Customer Agreement billing account. Check if you have a [Microsoft Customer Agreement](https://businessstore.microsoft.com/manage/organization/agreements). ## General invoice information + Invoices are your bill from Microsoft. A few things to note: - **Invoice schedule** - You're invoiced on a monthly basis. You can find out which day of the month you receive invoices by checking invoice date under billing profile overview in [Microsoft Store for Business](https://businessstore.microsoft.com/manage/payments-billing/billing-profiles). Charges that occur between the end of the billing period and the invoice date are included in the next month's invoice, since they are in the next billing period. The billing period start and end dates for each invoice are listed in the invoice PDF above **Billing Summary**. diff --git a/store-for-business/configure-mdm-provider-microsoft-store-for-business.md b/store-for-business/configure-mdm-provider-microsoft-store-for-business.md index 5455d2c9bd..8f2ddc7b24 100644 --- a/store-for-business/configure-mdm-provider-microsoft-store-for-business.md +++ b/store-for-business/configure-mdm-provider-microsoft-store-for-business.md @@ -11,17 +11,19 @@ author: cmcatee-MSFT manager: scotv ms.topic: conceptual ms.localizationpriority: medium -ms.date: 07/21/2021 +ms.date: 05/24/2023 --- # Configure an MDM provider -**Applies to** +**Applies to:** -- Windows 10 +- Windows 10 > [!IMPORTANT] -> The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> +> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed). For companies or organizations using mobile device management (MDM) tools, those tools can synchronize with Microsoft Store for Business inventory to manage apps with offline licenses. Store for Business management tool services work with your third-party management tool to manage content. diff --git a/store-for-business/distribute-apps-from-your-private-store.md b/store-for-business/distribute-apps-from-your-private-store.md index 1e190dcb69..e391ccb12a 100644 --- a/store-for-business/distribute-apps-from-your-private-store.md +++ b/store-for-business/distribute-apps-from-your-private-store.md @@ -11,17 +11,19 @@ author: cmcatee-MSFT manager: scotv ms.topic: conceptual ms.localizationpriority: medium -ms.date: 07/21/2021 +ms.date: 05/24/2023 --- # Distribute apps using your private store -**Applies to** +**Applies to:** -- Windows 10 +- Windows 10 > [!IMPORTANT] -> The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> +> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed). The private store is a feature in Microsoft Store for Business and Education that organizations receive during the signup process. When admins add apps to the private store, all employees in the organization can view and download the apps. Your private store is available as a tab in Microsoft Store app, and is usually named for your company or organization. Only apps with online licenses can be added to the private store. diff --git a/store-for-business/distribute-apps-to-your-employees-microsoft-store-for-business.md b/store-for-business/distribute-apps-to-your-employees-microsoft-store-for-business.md index 8433314401..ed5f058ffe 100644 --- a/store-for-business/distribute-apps-to-your-employees-microsoft-store-for-business.md +++ b/store-for-business/distribute-apps-to-your-employees-microsoft-store-for-business.md @@ -11,18 +11,19 @@ author: cmcatee-MSFT manager: scotv ms.topic: conceptual ms.localizationpriority: medium -ms.date: 07/21/2021 +ms.date: 05/24/2023 --- # Distribute apps to your employees from Microsoft Store for Business and Education +**Applies to:** -**Applies to** - -- Windows 10 +- Windows 10 > [!IMPORTANT] -> The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> +> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed). Distribute apps to your employees from Microsoft Store for Business and Microsoft Store for Education. You can assign apps to employees, or let employees install them from your private store. @@ -34,4 +35,3 @@ Distribute apps to your employees from Microsoft Store for Business and Microsof | [Assign apps to employees](assign-apps-to-employees.md) | Admins can assign online-licensed apps to people in their organization. | | [Distribute apps with a management tool](distribute-apps-with-management-tool.md) | Admins can configure a mobile device management (MDM) tool to synchronize your Microsoft Store inventory. Microsoft Store management tool services work with MDM tools to manage content. | | [Distribute offline apps](distribute-offline-apps.md) | Offline licensing is a new licensing option for Windows 10. With offline licenses, organizations can download apps and their licenses to deploy within their network, or on devices that are not connected to the Internet. This allows organizations to deploy apps to devices without connectivity to the Store. | - diff --git a/store-for-business/distribute-apps-with-management-tool.md b/store-for-business/distribute-apps-with-management-tool.md index acc2c676ee..77faaf7d85 100644 --- a/store-for-business/distribute-apps-with-management-tool.md +++ b/store-for-business/distribute-apps-with-management-tool.md @@ -11,18 +11,19 @@ author: cmcatee-MSFT manager: scotv ms.topic: conceptual ms.localizationpriority: medium -ms.date: 07/21/2021 +ms.date: 05/24/2023 --- # Distribute apps with a management tool +**Applies to:** -**Applies to** - -- Windows 10 +- Windows 10 > [!IMPORTANT] -> The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> +> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed). You can configure a mobile device management (MDM) tool to synchronize your Microsoft Store for Business or Microsoft Store for Education inventory. Microsoft Store management tool services work with MDM tools to manage content. diff --git a/store-for-business/distribute-offline-apps.md b/store-for-business/distribute-offline-apps.md index 2087832b3c..d4049b9caa 100644 --- a/store-for-business/distribute-offline-apps.md +++ b/store-for-business/distribute-offline-apps.md @@ -11,19 +11,20 @@ author: cmcatee-MSFT manager: scotv ms.topic: conceptual ms.localizationpriority: medium -ms.date: 07/21/2021 +ms.date: 05/24/2023 --- # Distribute offline apps - **Applies to:** - Windows 10 > [!IMPORTANT] -> The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). -> +> +> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed). + Offline licensing is a new licensing option for Windows 10 with Microsoft Store for Business and Microsoft Store for Education. With offline licenses, organizations can download apps and their licenses to deploy within their network, or on devices that are not connected to the Internet. ISVs or devs can opt-in their apps for offline licensing when they submit them to the Windows Dev Center. Only apps that are opted in to offline licensing will show that they are available for offline licensing in Microsoft Store for Business and Microsoft Store for Education. This model allows organizations to deploy apps when users or devices do not have connectivity to the Store. ## Why offline-licensed apps? @@ -45,8 +46,9 @@ You can't distribute offline-licensed apps directly from Microsoft Store. Once y - **Create provisioning package**. You can use Windows Imaging and Configuration Designer (ICD) to create a provisioning package for your offline app. Once you have the package, there are options to [apply the provisioning package](/windows/configuration/provisioning-packages/provisioning-apply-package). For more information, see [Provisioning Packages for Windows 10](/windows/configuration/provisioning-packages/provisioning-packages). - **Mobile device management provider or management server.** You can use a mobile device management (MDM) provider or management server to distribute offline apps. For more information, see these topics: - - [Manage apps from Microsoft Store for Business with Microsoft Configuration Manager](/configmgr/apps/deploy-use/manage-apps-from-the-windows-store-for-business) - - [Manage apps from Microsoft Store for Business with Microsoft Intune](/mem/intune/apps/windows-store-for-business)
    + + - [Manage apps from Microsoft Store for Business with Microsoft Configuration Manager](/configmgr/apps/deploy-use/manage-apps-from-the-windows-store-for-business) + - [Manage apps from Microsoft Store for Business with Microsoft Intune](/mem/intune/apps/windows-store-for-business) For third-party MDM providers or management servers, check your product documentation. diff --git a/store-for-business/find-and-acquire-apps-overview.md b/store-for-business/find-and-acquire-apps-overview.md index fddbd6d1a8..0226497186 100644 --- a/store-for-business/find-and-acquire-apps-overview.md +++ b/store-for-business/find-and-acquire-apps-overview.md @@ -11,18 +11,19 @@ author: cmcatee-MSFT manager: scotv ms.topic: conceptual ms.localizationpriority: medium -ms.date: 07/21/2021 +ms.date: 05/24/2023 --- # Find and acquire apps +**Applies to:** -**Applies to** - -- Windows 10 +- Windows 10 > [!IMPORTANT] -> The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> +> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed). Use the Microsoft Store for Business and Education to find apps for your organization. You can also work with developers to create line-of-business apps that are only available to your organization. diff --git a/store-for-business/includes/store-for-business-content-updates.md b/store-for-business/includes/store-for-business-content-updates.md index 99a065dd84..646daa195b 100644 --- a/store-for-business/includes/store-for-business-content-updates.md +++ b/store-for-business/includes/store-for-business-content-updates.md @@ -1,14 +1,34 @@ ---- -ms.date: 10/31/2020 ---- -## Week of April 25, 2022 +## Week of May 22, 2023 | Published On |Topic title | Change | |------|------------|--------| -| 4/28/2022 | [Prerequisites for Microsoft Store for Business and Education (Windows 10)](/microsoft-store/prerequisites-microsoft-store-for-business) | modified | -| 4/28/2022 | [Prerequisites for Microsoft Store for Business and Education (Windows 10)](/microsoft-store/prerequisites-microsoft-store-for-business) | modified | +| 5/25/2023 | [Acquire apps in Microsoft Store for Business (Windows 10)](/microsoft-store/acquire-apps-microsoft-store-for-business) | modified | +| 5/25/2023 | [Manage Windows device deployment with Windows Autopilot Deployment](/microsoft-store/add-profile-to-devices) | modified | +| 5/25/2023 | [App inventory management for Microsoft Store for Business and Microsoft Store for Education (Windows 10)](/microsoft-store/app-inventory-management-microsoft-store-for-business) | modified | +| 5/25/2023 | [Apps in Microsoft Store for Business and Education (Windows 10)](/microsoft-store/apps-in-microsoft-store-for-business) | modified | +| 5/25/2023 | [Assign apps to employees (Windows 10)](/microsoft-store/assign-apps-to-employees) | modified | +| 5/25/2023 | [Configure an MDM provider (Windows 10)](/microsoft-store/configure-mdm-provider-microsoft-store-for-business) | modified | +| 5/25/2023 | [Distribute apps using your private store (Windows 10)](/microsoft-store/distribute-apps-from-your-private-store) | modified | +| 5/25/2023 | [Distribute apps to your employees from the Microsoft Store for Business and Education (Windows 10)](/microsoft-store/distribute-apps-to-your-employees-microsoft-store-for-business) | modified | +| 5/25/2023 | [Distribute apps with a management tool (Windows 10)](/microsoft-store/distribute-apps-with-management-tool) | modified | +| 5/25/2023 | [Distribute offline apps (Windows 10)](/microsoft-store/distribute-offline-apps) | modified | +| 5/25/2023 | [Find and acquire apps (Windows 10)](/microsoft-store/find-and-acquire-apps-overview) | modified | +| 5/25/2023 | [Microsoft Store for Business and Education (Windows 10)](/microsoft-store/index) | modified | +| 5/25/2023 | [Manage access to private store (Windows 10)](/microsoft-store/manage-access-to-private-store) | modified | +| 5/25/2023 | [Manage products and services in Microsoft Store for Business (Windows 10)](/microsoft-store/manage-apps-microsoft-store-for-business-overview) | modified | +| 5/25/2023 | [Manage private store settings (Windows 10)](/microsoft-store/manage-private-store-settings) | modified | +| 5/25/2023 | [Manage settings for Microsoft Store for Business and Microsoft Store for Education (Windows 10)](/microsoft-store/manage-settings-microsoft-store-for-business) | modified | +| 5/25/2023 | [Manage user accounts in Microsoft Store for Business and Microsoft Store for Education (Windows 10)](/microsoft-store/manage-users-and-groups-microsoft-store-for-business) | modified | +| 5/25/2023 | [Microsoft Store for Business and Education PowerShell module - preview](/microsoft-store/microsoft-store-for-business-education-powershell-module) | modified | +| 5/25/2023 | [Microsoft Store for Business and Microsoft Store for Education overview (Windows 10)](/microsoft-store/microsoft-store-for-business-overview) | modified | +| 5/25/2023 | [Notifications in Microsoft Store for Business and Education (Windows 10)](/microsoft-store/notifications-microsoft-store-business) | modified | +| 5/25/2023 | [Prerequisites for Microsoft Store for Business and Education (Windows 10)](/microsoft-store/prerequisites-microsoft-store-for-business) | modified | +| 5/25/2023 | [Roles and permissions in Microsoft Store for Business and Education (Windows 10)](/microsoft-store/roles-and-permissions-microsoft-store-for-business) | modified | +| 5/25/2023 | [Sign up and get started (Windows 10)](/microsoft-store/sign-up-microsoft-store-for-business-overview) | modified | +| 5/25/2023 | [Troubleshoot Microsoft Store for Business (Windows 10)](/microsoft-store/troubleshoot-microsoft-store-for-business) | modified | +| 5/25/2023 | [Update your Billing account settings](/microsoft-store/update-microsoft-store-for-business-account-settings) | modified | diff --git a/store-for-business/index.md b/store-for-business/index.md index ca868bf64c..2d6b07538f 100644 --- a/store-for-business/index.md +++ b/store-for-business/index.md @@ -10,24 +10,27 @@ author: cmcatee-MSFT manager: scotv ms.topic: conceptual ms.localizationpriority: high -ms.date: 07/21/2021 +ms.date: 05/24/2023 --- # Microsoft Store for Business and Education -**Applies to** +**Applies to:** -- Windows 10 +- Windows 10 > [!IMPORTANT] -> The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> +> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed). Welcome to the Microsoft Store for Business and Education! You can use Microsoft Store to find, acquire, distribute, and manage apps for your organization or school. -> [!IMPORTANT] -> Starting April 14, 2021, all apps that charge a base price above free will no longer be available to buy in the Microsoft Store for Business and Education. If you've already bought a paid app, you can still use it, but no new purchases will be possible from businessstore.microsoft.com or educationstore.microsoft.com. Also, you won't be able to buy additional licenses for apps you already bought. You can still assign and reassign licenses for apps that you already own and use the private store. Apps with a base price of "free" will still be available. This change doesn't impact apps in the Microsoft Store on Windows 10. +> [!NOTE] > -> Also starting April 14, 2021, you must sign in with your Azure Active Directory (Azure AD) account before you browse Microsoft Store for Business and Education. +> - As of April 14, 2021, all apps that charge a base price above free are no longer available to buy in the Microsoft Store for Business and Education. If you've already bought a paid app, you can still use it, but no new purchases are possible from businessstore.microsoft.com or educationstore.microsoft.com. Also, you can't buy additional licenses for apps you already bought. You can still assign and reassign licenses for apps that you already own and use from the private store. Apps with a base price of "free" are still available. This change doesn't impact apps in the Microsoft Store on Windows 10. +> +> - Also as of April 14, 2021, you must sign in with your Azure Active Directory (Azure AD) account before you browse Microsoft Store for Business and Education. ## In this section diff --git a/store-for-business/manage-access-to-private-store.md b/store-for-business/manage-access-to-private-store.md index cbf743165b..7ebf151814 100644 --- a/store-for-business/manage-access-to-private-store.md +++ b/store-for-business/manage-access-to-private-store.md @@ -10,64 +10,37 @@ ms.author: cmcatee author: cmcatee-MSFT manager: scotv ms.topic: conceptual -ms.date: 07/21/2021 +ms.date: 05/24/2023 --- # Manage access to private store +**Applies to:** -**Applies to** - -- Windows 10 +- Windows 10 > [!IMPORTANT] > The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +## Microsoft Store for Business tab removed + +In April 2023, the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. The Microsoft Store for Business tab will continue to be available on Hololens devices. Users will no longer be able to see products added to the private store within the Microsoft Store app and will need to go to the [Microsoft Store for Business](https://businessstore.microsoft.com/) website to access the private store. + +The [ApplicationManagement/RequirePrivateStoreOnly](/windows/client-management/mdm/policy-configuration-service-provider#ApplicationManagement_RequirePrivateStoreOnly) MDM policy and **Only display the private store within the Microsoft Store app** Group policy will block access to the Microsoft Store app entirely. With those policies in place, users may see one of the following errors in the Microsoft Store app. + +1. Microsoft Store is blocked + Check with your IT or system administrator + Report this problem + Code 0x700704E +2. Try that again + Page could not be loaded. Please try that again + Refresh the page + Code 0x80131500 +3. This place is off-limits + Not sure how you got here, but there's nothing for you here. + Report this problem + Refresh this Page. + +## Manage private store access + You can manage access to your private store in Microsoft Store for Business and Microsoft Store for Education. You can control the set of apps that are available to your employees and students, and not show the full set of applications that are in Microsoft Store. Using the private store with the Microsoft Store for Business and Education, admins can curate the set of apps that are available. -The private store is a feature in Store for Business that organizations receive during the sign up process. When admins add apps to the private store, all employees in the organization can view and download the apps. Your private store is available as a tab in Microsoft Store, and is usually named for your company or organization. Only apps with online licenses can be added to the private store. Your private store looks something like this: - -![Image showing the Microsoft Store app, with a private store tab highlighted.](images/wsfb-wsappprivatestore.png) - -Organizations can use either an MDM policy, or Group Policy to show only their private store in Microsoft Store. - -## Show private store only using MDM policy - -Organizations using an MDM to manage apps can use a policy to show only the private store. When your MDM supports Microsoft Store for Business, the MDM can use the [Policy CSP](/windows/client-management/mdm/policy-configuration-service-provider). More specifically, the [ApplicationManagement/RequirePrivateStoreOnly](/windows/client-management/mdm/policy-configuration-service-provider#ApplicationManagement_RequirePrivateStoreOnly) policy. - -**ApplicationManagement/RequirePrivateStoreOnly** policy is supported on the following Windows 10 editions: - -- Enterprise -- Education - -For more information on configuring an MDM provider, see [Configure an MDM provider](./configure-mdm-provider-microsoft-store-for-business.md). - -## Show private store only using Group Policy - -If you're using Microsoft Store and you want employees to only see apps you're managing in your private store, you can use Group Policy to show only the private store. Microsoft Store app will still be available, but employees can't view or purchase apps. Employees can view and install apps that the admin has added to your organization's private store. - -**Only display the private store within Microsoft Store app** group policy is supported on the following Windows 10 editions: - -- Enterprise -- Education - -**To show private store only in Microsoft Store app** - -1. Type **gpedit** in the search bar, and then select **Edit group policy (Control panel)** to find and start Group Policy Editor. - -2. In the console tree of the snap-in, go to **User Configuration** or **Computer Configuration** > **Administrative Templates** > **Windows Components**, and then click **Store**. - -3. Right-click **Only display the private store within Microsoft Store app** in the right pane, and click **Edit**. - - This opens the **Only display the private store within the Microsoft Store app** policy settings. - -4. On the **Only display the private store within the Microsoft Store app** setting page, click **Enabled**, and then click **OK**. - -You can also prevent employees from using Microsoft Store. For more information, see [Configure access to Microsoft Store](/windows/configuration/stop-employees-from-using-microsoft-store). +The private store is a feature in Store for Business that organizations receive during the sign up process. When admins add apps to the private store, all employees in the organization can view and download the apps. Your private store is available as a tab on the [Microsoft Store for Business site](https://businessstore.microsoft.com/store/private-store), and is usually named for your company or organization. Only apps with online licenses can be added to the private store. ## Related topics -[Distribute apps using your private store](distribute-apps-from-your-private-store.md) -[Configure access to Microsoft Store](/windows/configuration/stop-employees-from-using-microsoft-store) \ No newline at end of file +[Distribute apps using your private store](distribute-apps-from-your-private-store.md)\ +[Configure access to Microsoft Store](/windows/configuration/stop-employees-from-using-microsoft-store) diff --git a/store-for-business/manage-apps-microsoft-store-for-business-overview.md b/store-for-business/manage-apps-microsoft-store-for-business-overview.md index b8a4cd5717..ead437bd5b 100644 --- a/store-for-business/manage-apps-microsoft-store-for-business-overview.md +++ b/store-for-business/manage-apps-microsoft-store-for-business-overview.md @@ -11,19 +11,21 @@ author: cmcatee-MSFT manager: scotv ms.topic: conceptual ms.localizationpriority: medium -ms.date: 07/21/2021 +ms.date: 05/24/2023 --- # Manage apps in Microsoft Store for Business and Education -**Applies to** +**Applies to:** -- Windows 10 +- Windows 10 > [!IMPORTANT] -> The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> +> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed). -Manage products and services in Microsoft Store for Business and Microsoft Store for Education. This includes apps, software, products, devices, and services available under **Products & services**. +Manage products and services in Microsoft Store for Business and Microsoft Store for Education. This includes apps, software, products, devices, and services available under **Products & services**. ## In this section diff --git a/store-for-business/manage-orders-microsoft-store-for-business.md b/store-for-business/manage-orders-microsoft-store-for-business.md index 39c2d0520f..22ae3cf389 100644 --- a/store-for-business/manage-orders-microsoft-store-for-business.md +++ b/store-for-business/manage-orders-microsoft-store-for-business.md @@ -9,18 +9,21 @@ author: cmcatee-MSFT manager: scotv ms.topic: conceptual ms.localizationpriority: medium -ms.date: 07/21/2021 +ms.date: 05/24/2023 ms.reviewer: --- # Manage app orders in Microsoft Store for Business and Education > [!IMPORTANT] -> The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> +> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed). After you've acquired apps, you can review order information and invoices on **Order history**. On this page, you can view invoices, and request refunds. **Order history** lists orders in chronological order and shows: + - Date ordered - Product name - Product publisher @@ -28,6 +31,7 @@ After you've acquired apps, you can review order information and invoices on **O - Order status. Click to expand an order, and the following info is available: + - Who purchased the app - Order number - Quantity purchased @@ -49,6 +53,7 @@ For free apps, there isn't really a refund to request -- you're removing the app **Refunds for apps that have a price** There are a few requirements for apps that have a price: + - **Timing** - Refunds are available for the first 30 days after you place your order. For example, if your order is placed on June 1, you can self-refund through June 30. - **Available licenses** - You need to have enough available licenses to cover the number of licenses in the order you are refunding. For example, if you purchased 10 copies of an app and you want to request a refund, you must have at least 10 licenses of the app available in your inventory -- those 10 licenses can't be assigned to people in your organization. - **Whole order refunds only** - You must refund the complete amount of apps in an order. You can't refund a part of an order. For example, if you purchased 10 copies of an app, but later found you only needed 5 copies, you'll need to request a refund for the 10 apps, and then make a separate order for 5 apps. If you have had multiple orders of the same app, you can refund one order but still keep the rest of the inventory. diff --git a/store-for-business/manage-private-store-settings.md b/store-for-business/manage-private-store-settings.md index 9774d11faa..fe4d105828 100644 --- a/store-for-business/manage-private-store-settings.md +++ b/store-for-business/manage-private-store-settings.md @@ -10,18 +10,20 @@ ms.author: cmcatee author: cmcatee-MSFT manager: scotv ms.topic: conceptual -ms.date: 07/21/2021 +ms.date: 05/24/2023 ms.localizationpriority: medium --- # Manage private store settings -**Applies to** +**Applies to:** -- Windows 10 +- Windows 10 > [!IMPORTANT] -> The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> +> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed). The private store is a feature in Microsoft Store for Business and Education that organizations receive during the sign up process. When admins add apps to the private store, all people in the organization can view and download the apps. Only online-licensed apps can be distributed from your private store. diff --git a/store-for-business/manage-settings-microsoft-store-for-business.md b/store-for-business/manage-settings-microsoft-store-for-business.md index 2de4be35a0..ad7a735cf4 100644 --- a/store-for-business/manage-settings-microsoft-store-for-business.md +++ b/store-for-business/manage-settings-microsoft-store-for-business.md @@ -11,17 +11,19 @@ author: cmcatee-MSFT manager: scotv ms.topic: conceptual ms.localizationpriority: medium -ms.date: 07/21/2021 +ms.date: 05/24/2023 --- # Manage settings for Microsoft Store for Business and Education -**Applies to** +**Applies to:** -- Windows 10 +- Windows 10 > [!IMPORTANT] -> The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> +> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed). You can add users and groups, as well as update some of the settings associated with the Azure Active Directory (AD) tenant. diff --git a/store-for-business/manage-users-and-groups-microsoft-store-for-business.md b/store-for-business/manage-users-and-groups-microsoft-store-for-business.md index 37984bc540..ab89a344ff 100644 --- a/store-for-business/manage-users-and-groups-microsoft-store-for-business.md +++ b/store-for-business/manage-users-and-groups-microsoft-store-for-business.md @@ -11,18 +11,19 @@ author: cmcatee-MSFT manager: scotv ms.topic: conceptual ms.localizationpriority: medium -ms.date: 07/21/2021 +ms.date: 05/24/2023 --- # Manage user accounts in Microsoft Store for Business and Education +**Applies to:** -**Applies to** - -- Windows 10 +- Windows 10 > [!IMPORTANT] -> The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> +> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed). Microsoft Store for Business and Education manages permissions with a set of roles. Currently, you can [assign these roles to individuals in your organization](roles-and-permissions-microsoft-store-for-business.md), but not to groups. diff --git a/store-for-business/microsoft-store-for-business-education-powershell-module.md b/store-for-business/microsoft-store-for-business-education-powershell-module.md index f0412f4df6..5c9f5e618a 100644 --- a/store-for-business/microsoft-store-for-business-education-powershell-module.md +++ b/store-for-business/microsoft-store-for-business-education-powershell-module.md @@ -9,17 +9,20 @@ author: cmcatee-MSFT manager: scotv ms.topic: conceptual ms.localizationpriority: medium -ms.date: 07/21/2021 +ms.date: 05/24/2023 ms.reviewer: --- # Microsoft Store for Business and Education PowerShell module - preview -**Applies to** -- Windows 10 +**Applies to:** + +- Windows 10 > [!IMPORTANT] -> The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> +> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed). Microsoft Store for Business and Education PowerShell module (preview) is now available on [PowerShell Gallery](https://go.microsoft.com/fwlink/?linkid=853459). diff --git a/store-for-business/microsoft-store-for-business-overview.md b/store-for-business/microsoft-store-for-business-overview.md index 9fcfcf5343..51d26aea04 100644 --- a/store-for-business/microsoft-store-for-business-overview.md +++ b/store-for-business/microsoft-store-for-business-overview.md @@ -11,20 +11,22 @@ author: cmcatee-MSFT manager: scotv ms.topic: conceptual ms.localizationpriority: medium -ms.date: 07/21/2021 +ms.date: 05/24/2023 --- # Microsoft Store for Business and Microsoft Store for Education overview -**Applies to** +**Applies to:** - Windows 10 > [!IMPORTANT] -> The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> +> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed). -> [!IMPORTANT] -> Starting on April 14th, 2021, only free apps will be available in Microsoft Store for Business and Education. For more information, see [Microsoft Store for Business and Education](index.md). +> [!NOTE] +> As of April 14th, 2021, only free apps are available in Microsoft Store for Business and Education. For more information, see [Microsoft Store for Business and Education](index.md). Designed for organizations, Microsoft Store for Business and Microsoft Store for Education give IT decision makers and administrators in businesses or schools a flexible way to find, acquire, manage, and distribute free and paid apps in select markets to Windows 10 devices in volume. IT administrators can manage Microsoft Store apps and private line-of-business apps in one inventory, plus assign and re-use licenses as needed. You can choose the best distribution method for your organization: directly assign apps to individuals and teams, publish apps to private pages in Microsoft Store, or connect with management solutions for more options. There will be no support for Microsoft Store for Business and Education on Windows 11. diff --git a/store-for-business/notifications-microsoft-store-business.md b/store-for-business/notifications-microsoft-store-business.md index a24ce1c761..08a23b9119 100644 --- a/store-for-business/notifications-microsoft-store-business.md +++ b/store-for-business/notifications-microsoft-store-business.md @@ -12,18 +12,19 @@ author: cmcatee-MSFT manager: scotv ms.topic: conceptual ms.localizationpriority: medium -ms.date: 07/21/2021 +ms.date: 05/24/2023 --- # Notifications in Microsoft Store for Business and Education +**Applies to:** -**Applies to** - -- Windows 10 +- Windows 10 > [!IMPORTANT] -> The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> +> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed). Microsoft Store for Business and Microsoft Store for Education use a set of notifications to alert admins if there is an issue or outage with Microsoft Store. diff --git a/store-for-business/payment-methods.md b/store-for-business/payment-methods.md index 385ad90405..876ab4f1df 100644 --- a/store-for-business/payment-methods.md +++ b/store-for-business/payment-methods.md @@ -10,14 +10,16 @@ author: cmcatee-MSFT manager: scotv ms.topic: conceptual ms.localizationpriority: medium -ms.date: 07/21/2021 +ms.date: 05/24/2023 ms.reviewer: --- # Payment methods > [!IMPORTANT] -> The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> +> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed). You can purchase products and services from Microsoft Store for Business using your credit card. You can enter your credit card information on **Payment methods**, or when you purchase an app. We currently accept these credit cards: - VISA @@ -30,6 +32,7 @@ You can purchase products and services from Microsoft Store for Business using y > Not all cards available in all countries. When you add a payment option, Microsoft Store for Business shows which cards are available in your region. ## Add a payment method + **To add a new payment option** 1. Sign in to [Microsoft Store for Business](https://businessstore.microsoft.com) or [Store for Education](https://educationstore.microsoft.com). diff --git a/store-for-business/prerequisites-microsoft-store-for-business.md b/store-for-business/prerequisites-microsoft-store-for-business.md index 2590dfa2e5..3543e2ade4 100644 --- a/store-for-business/prerequisites-microsoft-store-for-business.md +++ b/store-for-business/prerequisites-microsoft-store-for-business.md @@ -11,20 +11,22 @@ author: cmcatee-MSFT manager: scotv ms.topic: conceptual ms.localizationpriority: medium -ms.date: 07/21/2021 +ms.date: 05/24/2023 --- # Prerequisites for Microsoft Store for Business and Education -**Applies to** +**Applies to:** -- Windows 10 +- Windows 10 > [!IMPORTANT] -> The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> +> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed). -> [!IMPORTANT] -> Starting on April 14th, 2021, only free apps will be available in Microsoft Store for Business and Education. For more information, see [Microsoft Store for Business and Education](index.md). +> [!NOTE] +> As of April 14th, 2021, only free apps are available in Microsoft Store for Business and Education. For more information, see [Microsoft Store for Business and Education](index.md). > [!IMPORTANT] > Customers who are in the Office 365 GCC environment or are eligible to buy with government pricing cannot use Microsoft Store for Business. diff --git a/store-for-business/release-history-microsoft-store-business-education.md b/store-for-business/release-history-microsoft-store-business-education.md index 73feb2d130..a9f85a3d50 100644 --- a/store-for-business/release-history-microsoft-store-business-education.md +++ b/store-for-business/release-history-microsoft-store-business-education.md @@ -8,14 +8,16 @@ ms.author: cmcatee author: cmcatee-MSFT manager: scotv ms.topic: conceptual -ms.date: 07/21/2021 +ms.date: 05/24/2023 ms.reviewer: --- # Microsoft Store for Business and Education release history > [!IMPORTANT] -> The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> +> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed). Microsoft Store for Business and Education regularly releases new and improved features. Here's a summary of new or updated features in previous releases. diff --git a/store-for-business/roles-and-permissions-microsoft-store-for-business.md b/store-for-business/roles-and-permissions-microsoft-store-for-business.md index 946185e95a..9ac3ce2446 100644 --- a/store-for-business/roles-and-permissions-microsoft-store-for-business.md +++ b/store-for-business/roles-and-permissions-microsoft-store-for-business.md @@ -12,20 +12,22 @@ author: cmcatee-MSFT manager: scotv ms.topic: conceptual ms.localizationpriority: medium -ms.date: 07/21/2021 +ms.date: 05/24/2023 --- # Roles and permissions in Microsoft Store for Business and Education -**Applies to** +**Applies to:** - Windows 10 > [!IMPORTANT] -> The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> +> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed). -> [!IMPORTANT] -> Starting on April 14th, 2021, only free apps will be available in Microsoft Store for Business and Education. For more information, see [Microsoft Store for Business and Education](index.md). +> [!NOTE] +> As of April 14th, 2021, only free apps are available in Microsoft Store for Business and Education. For more information, see [Microsoft Store for Business and Education](index.md). The first person to sign in to Microsoft Store for Business or Microsoft Store for Education must be a Global Admin of the Azure Active Directory (AD) tenant. Once the Global Admin has signed in, they can give permissions to others employees. diff --git a/store-for-business/settings-reference-microsoft-store-for-business.md b/store-for-business/settings-reference-microsoft-store-for-business.md index ac0d610bae..a5b192031e 100644 --- a/store-for-business/settings-reference-microsoft-store-for-business.md +++ b/store-for-business/settings-reference-microsoft-store-for-business.md @@ -11,14 +11,15 @@ author: cmcatee-MSFT manager: scotv ms.topic: conceptual ms.localizationpriority: medium -ms.date: 07/21/2021 +ms.date: 05/24/2023 --- # Settings reference: Microsoft Store for Business and Education > [!IMPORTANT] -> The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). - +> +> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed). The Microsoft Store for Business and Education has a group of settings that admins use to manage the store. @@ -34,4 +35,4 @@ The Microsoft Store for Business and Education has a group of settings that admi | Management tools | Management tools that are synced with Azure AD are listed on this page. You can choose one to use for managing app updates and distribution. For more information, see [Configure MDM provider](configure-mdm-provider-microsoft-store-for-business.md). | **Settings - Distribute** | | Device Guard signing | Use the Device Guard signing portal to add unsigned apps to a code integrity policy, or to sign code integrity policies. For more information, see [Device Guard signing portal](device-guard-signing-portal.md). | **Settings - Devices** | | Permissions | Manage permissions for your employees. For more information, see [Roles and permissions in the Microsoft Store for Business and Education](roles-and-permissions-microsoft-store-for-business.md). | **Permissions - Roles**, **Permissions - Purchasing roles**, and **Permissions - Blocked basic purchasers** | -| Line-of-business (LOB) publishers | Invite devs to become LOB publishers for your organization. Existing LOB publishers are listed on the page, and you can deactivate or invite them again. For more information, see [Work with line-of-business apps](working-with-line-of-business-apps.md). | **Permissions - Line-of-business apps** | \ No newline at end of file +| Line-of-business (LOB) publishers | Invite devs to become LOB publishers for your organization. Existing LOB publishers are listed on the page, and you can deactivate or invite them again. For more information, see [Work with line-of-business apps](working-with-line-of-business-apps.md). | **Permissions - Line-of-business apps** | diff --git a/store-for-business/sign-up-microsoft-store-for-business-overview.md b/store-for-business/sign-up-microsoft-store-for-business-overview.md index 4f76aa0558..d1139f7ada 100644 --- a/store-for-business/sign-up-microsoft-store-for-business-overview.md +++ b/store-for-business/sign-up-microsoft-store-for-business-overview.md @@ -11,22 +11,24 @@ author: cmcatee-MSFT manager: scotv ms.topic: conceptual ms.localizationpriority: medium -ms.date: 07/21/2021 +ms.date: 05/24/2023 --- # Sign up and get started -**Applies to** +**Applies to:** -- Windows 10 +- Windows 10 > [!IMPORTANT] -> The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> +> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed). IT admins can sign up for Microsoft Store for Business and Education, and get started working with apps. -> [!IMPORTANT] -> Starting on April 14th, 2021, only free apps will be available in Microsoft Store for Business and Education. For more information, see [Microsoft Store for Business and Education](index.md). +> [!NOTE] +> As of April 14th, 2021, only free apps are available in Microsoft Store for Business and Education. For more information, see [Microsoft Store for Business and Education](index.md). ## In this section diff --git a/store-for-business/troubleshoot-microsoft-store-for-business.md b/store-for-business/troubleshoot-microsoft-store-for-business.md index aaca08aa79..80b2786116 100644 --- a/store-for-business/troubleshoot-microsoft-store-for-business.md +++ b/store-for-business/troubleshoot-microsoft-store-for-business.md @@ -11,21 +11,24 @@ author: cmcatee-MSFT manager: scotv ms.topic: conceptual ms.localizationpriority: medium -ms.date: 07/21/2021 +ms.date: 05/24/2023 --- # Troubleshoot Microsoft Store for Business -**Applies to** +**Applies to:** -- Windows 10 +- Windows 10 > [!IMPORTANT] -> The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> +> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed). Troubleshooting topics for Microsoft Store for Business. ## Can't find apps in private store + The private store for your organization is a page in Microsoft Store app that contains apps that are private to your organization. After your organization acquires an app, your Store for Business admin can add it to your organization's private store. Your private store usually has a name that is close to the name of your organization or company. If you can't see your private store, there are a couple of things to check: - **No apps in the private store** - The private store page is only available in Microsoft Store on Windows 10 if there are apps added to your private store. You won't see your private store page with no apps listed on it. If your Microsoft Store for Business admin has added an app to the private store, and the private store page is still not available, they can check the private store status for the app on **Product & services - Apps**. If the status under **Private store** is **Add in progress**, wait and check back. diff --git a/store-for-business/update-microsoft-store-for-business-account-settings.md b/store-for-business/update-microsoft-store-for-business-account-settings.md index f5df17e875..e07e032864 100644 --- a/store-for-business/update-microsoft-store-for-business-account-settings.md +++ b/store-for-business/update-microsoft-store-for-business-account-settings.md @@ -10,18 +10,20 @@ author: cmcatee-MSFT manager: scotv ms.topic: conceptual ms.localizationpriority: medium -ms.date: 07/21/2021 +ms.date: 05/24/2023 --- # Update Billing account settings > [!IMPORTANT] -> The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> +> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed). -A billing account contains defining information about your organization. +A billing account contains defining information about your organization. ->[!NOTE] ->Billing accounts are available in Microsoft Store for Business, and M365 admin center preview. For more information, see [aka.ms/aboutM365preview](/microsoft-365/admin/microsoft-365-admin-center-preview). +> [!NOTE] +> Billing accounts are available in Microsoft Store for Business, and the Microsoft 365 admin center. For more information, see [Understand your Microsoft billing account](/microsoft-365/commerce/manage-billing-accounts). The **Billing account** page allows you to manage organization information, purchasing agreements that you have with Microsoft, and admin approvals. The organization information and payment options are required before you can shop for products that have a price. diff --git a/store-for-business/whats-new-microsoft-store-business-education.md b/store-for-business/whats-new-microsoft-store-business-education.md index 576ecfa0c1..3910147cc2 100644 --- a/store-for-business/whats-new-microsoft-store-business-education.md +++ b/store-for-business/whats-new-microsoft-store-business-education.md @@ -8,14 +8,16 @@ ms.author: cmcatee author: cmcatee-MSFT manager: scotv ms.topic: conceptual -ms.date: 07/21/2021 +ms.date: 05/24/2023 ms.reviewer: --- # What's new in Microsoft Store for Business and Education > [!IMPORTANT] -> The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> +> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed). Microsoft Store for Business and Education regularly releases new and improved features. diff --git a/store-for-business/working-with-line-of-business-apps.md b/store-for-business/working-with-line-of-business-apps.md index 18759b0928..408165a16a 100644 --- a/store-for-business/working-with-line-of-business-apps.md +++ b/store-for-business/working-with-line-of-business-apps.md @@ -11,17 +11,19 @@ author: cmcatee-MSFT manager: scotv ms.topic: conceptual ms.localizationpriority: medium -ms.date: 07/21/2021 +ms.date: 05/24/2023 --- # Working with line-of-business apps -**Applies to** +**Applies to:** - Windows 10 > [!IMPORTANT] -> The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> +> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286). +> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed). Your company or school can make line-of-business (LOB) applications available through Microsoft Store for Business or Microsoft Store for Education. These apps are custom to your school or organization – they might be internal apps, or apps specific to your school, business, or industry. diff --git a/windows/client-management/config-lock.md b/windows/client-management/config-lock.md index 2e86f60f6a..d32bed289c 100644 --- a/windows/client-management/config-lock.md +++ b/windows/client-management/config-lock.md @@ -26,11 +26,9 @@ To summarize, config lock: ## Configuration Flow -After a secured-core PC reaches the desktop, config lock will prevent configuration drift by detecting if the device is a secured-core PC or not. When the device isn't a secured-core PC, the lock won't apply. If the device is a secured-core PC, config lock will lock the policies listed under [List of locked policies](#list-of-locked-policies). +After a [secured-core PCs](/windows-hardware/design/device-experiences/oem-highly-secure) reaches the desktop, config lock will prevent configuration drift by detecting if the device is a secured-core PC or not. When the device isn't a secured-core PC, the lock won't apply. If the device is a secured-core PC, config lock will lock the policies listed under [List of locked policies](#list-of-locked-policies). -## System Requirements - -Config lock will be available for all Windows Professional and Enterprise Editions running on [secured-core PCs](/windows-hardware/design/device-experiences/oem-highly-secure). +[!INCLUDE [secured-core-configuration-lock](../../includes/licensing/secured-core-configuration-lock.md)] ## Enabling config lock using Microsoft Intune diff --git a/windows/client-management/esim-enterprise-management.md b/windows/client-management/esim-enterprise-management.md index 48902df441..1d585aaf8e 100644 --- a/windows/client-management/esim-enterprise-management.md +++ b/windows/client-management/esim-enterprise-management.md @@ -30,6 +30,7 @@ If you're a Mobile Device Management (MDM) Provider and want to support eSIM Man - [HPE Device Entitlement Gateway](https://www.hpe.com/emea_europe/en/solutions/digital-communications-services.html) - [IDEMIA The Smart Connect - Hub](https://www.idemia.com/smart-connect-hub) + - [Nokia IMPACT Mobile Device Manager](https://www.nokia.com/networks/internet-of-things/impact-mobile-device-manager/) - Assess solution type that you would like to provide your customers - Batch/offline solution diff --git a/windows/client-management/mdm-overview.md b/windows/client-management/mdm-overview.md index ecc058a048..65a8d393da 100644 --- a/windows/client-management/mdm-overview.md +++ b/windows/client-management/mdm-overview.md @@ -56,6 +56,8 @@ For more information about the MDM policies defined in the MDM security baseline For information about the MDM policies defined in the Intune security baseline, see [Windows security baseline settings for Intune](/mem/intune/protect/security-baseline-settings-mdm-all). +[!INCLUDE [manage-by-mobile-device-management-mdm-and-group-policy](../../includes/licensing/manage-by-mobile-device-management-mdm-and-group-policy.md)] + ## Frequently Asked Questions ### Can there be more than one MDM server to enroll and manage devices in Windows? diff --git a/windows/client-management/mdm/Language-pack-management-csp.md b/windows/client-management/mdm/Language-pack-management-csp.md index 5c3c9714b8..70081db8ca 100644 --- a/windows/client-management/mdm/Language-pack-management-csp.md +++ b/windows/client-management/mdm/Language-pack-management-csp.md @@ -4,7 +4,7 @@ description: Learn more about the LanguagePackManagement CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 02/28/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,8 +16,7 @@ ms.topic: reference # LanguagePackManagement CSP -> [!IMPORTANT] -> This CSP contains preview policies that are under development and only applicable for [Windows Insider Preview builds](/windows-insider/). These policies are subject to change and may have dependencies on other features or services in preview. +[!INCLUDE [Windows Insider tip](includes/mdm-insider-csp-note.md)] @@ -49,7 +48,7 @@ The following list shows the LanguagePackManagement configuration service provid | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview [99.9.9999] | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview [99.9.9999] | @@ -72,7 +71,7 @@ Language to be installed or being installed. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -88,7 +87,7 @@ Language to be installed or being installed. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview [99.9.9999] | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview [99.9.9999] | @@ -111,7 +110,7 @@ Language tag of the language to be installed or being installed. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | UniqueName: Language tag of the language to be installed or being installed. | @@ -128,7 +127,7 @@ Language tag of the language to be installed or being installed. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview [99.9.9999] | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview [99.9.9999] | @@ -139,7 +138,7 @@ Language tag of the language to be installed or being installed. -Copies the language to the international settings (i.e., locale, input layout, speech recognizer, preferred UI language) of the device immediately after installation if the value is true. Default value is false. +Copies the language to the international settings (that is, locale, input layout, speech recognizer, preferred UI language) of the device immediately after installation if the value is true. Default value is false. @@ -151,7 +150,7 @@ Copies the language to the international settings (i.e., locale, input layout, s | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | false | @@ -177,7 +176,7 @@ Copies the language to the international settings (i.e., locale, input layout, s | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview [99.9.9999] | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview [99.9.9999] | @@ -200,7 +199,7 @@ Enables installations of all available language features when the value is true. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | true | @@ -226,7 +225,7 @@ Enables installations of all available language features when the value is true. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview [99.9.9999] | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview [99.9.9999] | @@ -249,7 +248,7 @@ Error code of queued language installation. 0 if there is no error. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -265,7 +264,7 @@ Error code of queued language installation. 0 if there is no error. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview [99.9.9999] | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview [99.9.9999] | @@ -288,7 +287,7 @@ Execution node to queue a language for installation on the device. | Property name | Property value | |:--|:--| -| Format | null | +| Format | `null` | | Access Type | Exec | @@ -304,7 +303,7 @@ Execution node to queue a language for installation on the device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview [99.9.9999] | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview [99.9.9999] | @@ -327,7 +326,7 @@ Status of the language queued for install. 0 - not started; 1 - in progress; 2 - | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -343,7 +342,7 @@ Status of the language queued for install. 0 - not started; 1 - in progress; 2 - | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview [99.9.9999] | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview [99.9.9999] | @@ -366,7 +365,7 @@ Languages currently installed on the device. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -382,7 +381,7 @@ Languages currently installed on the device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview [99.9.9999] | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview [99.9.9999] | @@ -405,7 +404,7 @@ Language tag of an installed language on the device. Delete to uninstall. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Delete, Get | | Dynamic Node Naming | ClientInventory | @@ -422,7 +421,7 @@ Language tag of an installed language on the device. Delete to uninstall. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview [99.9.9999] | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview [99.9.9999] | @@ -445,7 +444,7 @@ Numeric representation of the language features installed. Basic Typing - 1 (0x1 | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -461,7 +460,7 @@ Numeric representation of the language features installed. Basic Typing - 1 (0x1 | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview [99.9.9999] | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview [99.9.9999] | @@ -484,7 +483,7 @@ Numeric representation of how a language is installed. 1 - The system language p | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -500,7 +499,7 @@ Numeric representation of how a language is installed. 1 - The system language p | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview [99.9.9999] | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview [99.9.9999] | @@ -523,7 +522,7 @@ Language settings of the device. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -539,7 +538,7 @@ Language settings of the device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview [99.9.9999] | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview [99.9.9999] | @@ -562,7 +561,7 @@ System Preferred UI Language of the device. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | diff --git a/windows/client-management/mdm/activesync-csp.md b/windows/client-management/mdm/activesync-csp.md index beefa0c052..685680a0db 100644 --- a/windows/client-management/mdm/activesync-csp.md +++ b/windows/client-management/mdm/activesync-csp.md @@ -4,7 +4,7 @@ description: Learn more about the ActiveSync CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 02/28/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -64,7 +64,7 @@ The following list shows the ActiveSync configuration service provider nodes: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -87,7 +87,7 @@ The parent node group all active sync accounts. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -103,7 +103,7 @@ The parent node group all active sync accounts. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -127,7 +127,7 @@ When managing over OMA DM, make sure to always use a unique GUID. Provisioning w | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | | Dynamic Node Naming | ServerGeneratedUniqueIdentifier | | Allowed Values | Regular Expression: `\{[0-9A-Fa-f]{8}\-[0-9A-Fa-f]{4}\-[0-9A-Fa-f]{4}\-[0-9A-Fa-f]{4}\-[0-9A-Fa-f]{12}\}` | @@ -162,7 +162,7 @@ For OMA DM, you must use the ASCII values of %7B and %7D for the opening and clo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -186,7 +186,7 @@ The account icon can be used as a tile in the Start list or an icon in the appli | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -202,7 +202,7 @@ The account icon can be used as a tile in the Start list or an icon in the appli | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -225,7 +225,7 @@ The name that refers to the account on the device. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -241,7 +241,7 @@ The name that refers to the account on the device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -252,7 +252,7 @@ The name that refers to the account on the device. -Specify the account type. This value is entered during setup and cannot be modified once entered. An Exchange account is indicated by the string value "Exchange". +Specify the account type. This value is entered during setup and can't be modified once entered. An Exchange account is indicated by the string value "Exchange". @@ -264,7 +264,7 @@ Specify the account type. This value is entered during setup and cannot be modif | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -280,7 +280,7 @@ Specify the account type. This value is entered during setup and cannot be modif | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -303,7 +303,7 @@ Domain name of the Exchange server. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -319,7 +319,7 @@ Domain name of the Exchange server. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -330,7 +330,7 @@ Domain name of the Exchange server. -The email address the user entered during setup. This is the email address that is associated with the Exchange ActiveSync account and it is required. +The email address the user entered during setup. This is the email address that's associated with the Exchange ActiveSync account and it's required. @@ -343,7 +343,7 @@ This email address is entered by the user during setup and must be in the fully | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -359,7 +359,7 @@ This email address is entered by the user during setup and must be in the fully | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -382,7 +382,7 @@ Specifies whether email, contacts, and calendar need to synchronize by default, | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | @@ -398,7 +398,7 @@ Specifies whether email, contacts, and calendar need to synchronize by default, | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -421,7 +421,7 @@ Specifies the time window used for syncing calendar items to the phone. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -437,7 +437,7 @@ Specifies the time window used for syncing calendar items to the phone. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -460,7 +460,7 @@ Interior node for Content Types. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | @@ -476,7 +476,7 @@ Interior node for Content Types. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -499,7 +499,7 @@ Enables or disables syncing email, contacts, task, and calendar. Each is represe | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | | Dynamic Node Naming | UniqueName: The GUID values allowed are one of the following: Email: "{c6d47067-6e92-480e-b0fc-4ba82182fac7}". Contacts: "{0dd8685c-e272-4fcb-9ecf-2ead7ea2497b}". Calendar: "{4a5d9fe0-f139-4a63-a5a4-4f31ceea02ad}". Tasks: "{783ae4f6-4c12-4423-8270-66361260d4f1}". | @@ -516,7 +516,7 @@ Enables or disables syncing email, contacts, task, and calendar. Each is represe | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -539,7 +539,7 @@ Enables or disables Sync for Email, contacts, calendar, and Tasks. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -565,7 +565,7 @@ Enables or disables Sync for Email, contacts, calendar, and Tasks. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -588,7 +588,7 @@ The name of the content type. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -604,7 +604,7 @@ The name of the content type. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -627,7 +627,7 @@ Specifies whether diagnostic logging is enabled and at what level. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -654,7 +654,7 @@ Specifies whether diagnostic logging is enabled and at what level. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -677,7 +677,7 @@ Specifies the time window used for syncing email items to the phone. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Default Value | 3 | @@ -708,7 +708,7 @@ Specifies the time window used for syncing email items to the phone. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -731,7 +731,7 @@ Indicates format type of the Email. Supported values are 0 (none), 1 (text), 2 ( | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -759,7 +759,7 @@ Indicates format type of the Email. Supported values are 0 (none), 1 (text), 2 ( | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -770,7 +770,7 @@ Indicates format type of the Email. Supported values are 0 (none), 1 (text), 2 ( -This setting specifies the size beyond which HTML-formatted e-mail messages are truncated when they are synchronized to the mobile phone. The value is specified in KB. A value of -1 disables truncation. +This setting specifies the size beyond which HTML-formatted e-mail messages are truncated when they're synchronized to the mobile phone. The value is specified in KB. A value of -1 disables truncation. @@ -782,7 +782,7 @@ This setting specifies the size beyond which HTML-formatted e-mail messages are | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -798,7 +798,7 @@ This setting specifies the size beyond which HTML-formatted e-mail messages are | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -809,7 +809,7 @@ This setting specifies the size beyond which HTML-formatted e-mail messages are -This setting specifies the size beyond which text-formatted e-mail messages are truncated when they are synchronized to the mobile phone. The value is specified in KB. A value of -1 disables truncation. +This setting specifies the size beyond which text-formatted e-mail messages are truncated when they're synchronized to the mobile phone. The value is specified in KB. A value of -1 disables truncation. @@ -821,7 +821,7 @@ This setting specifies the size beyond which text-formatted e-mail messages are | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -837,7 +837,7 @@ This setting specifies the size beyond which text-formatted e-mail messages are | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -860,7 +860,7 @@ Specifies the time until the next sync is performed in minutes. If -1 is chosen, | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[(-1)-4294967295]` | | Default Value | -1 | @@ -878,7 +878,7 @@ Specifies the time until the next sync is performed in minutes. If -1 is chosen, | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -901,7 +901,7 @@ Specifies whether SSL is used. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -911,7 +911,7 @@ Specifies whether SSL is used. | Value | Description | |:--|:--| -| 0 | SSL is not used. | +| 0 | SSL isn't used. | | 1 (Default) | SSL is used. | @@ -927,7 +927,7 @@ Specifies whether SSL is used. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -950,7 +950,7 @@ A character string that specifies the password for the account. For the Get comm | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -966,7 +966,7 @@ A character string that specifies the password for the account. For the Get comm | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -989,7 +989,7 @@ Specifies the mail body type and email age filter. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | @@ -1005,7 +1005,7 @@ Specifies the mail body type and email age filter. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1028,7 +1028,7 @@ Specifies the email body type. HTML or plain. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1053,7 +1053,7 @@ Specifies the email body type. HTML or plain. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1076,7 +1076,7 @@ Specifies the time window used for syncing mail items to the device. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1092,7 +1092,7 @@ Specifies the time window used for syncing mail items to the device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1115,7 +1115,7 @@ Specifies the server name used by the account. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1131,7 +1131,7 @@ Specifies the server name used by the account. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1142,7 +1142,7 @@ Specifies the server name used by the account. -Specifies the user name for the account. The user name cannot be changed after a sync has been successfully performed. The user name can be in the fully qualified format "`someone@example.com`", or just "username", depending on the type of account created. For most Exchange accounts, the user name format is just "username", whereas for Microsoft, Google, Yahoo, and most POP/IMAP accounts, the user name format is "`someone@example.com`". +Specifies the user name for the account. The user name can't be changed after a sync has been successfully performed. The user name can be in the fully qualified format "`someone@example.com`", or just "username", depending on the type of account created. For most Exchange accounts, the user name format is just "username", whereas for Microsoft, Google, Yahoo, and most POP/IMAP accounts, the user name format is "`someone@example.com`". @@ -1154,7 +1154,7 @@ Specifies the user name for the account. The user name cannot be changed after a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | diff --git a/windows/client-management/mdm/applicationcontrol-csp.md b/windows/client-management/mdm/applicationcontrol-csp.md index f500aff927..0e70e6f96a 100644 --- a/windows/client-management/mdm/applicationcontrol-csp.md +++ b/windows/client-management/mdm/applicationcontrol-csp.md @@ -4,7 +4,7 @@ description: Learn more about the ApplicationControl CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 02/28/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -53,7 +53,7 @@ The following list shows the ApplicationControl configuration service provider n | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -77,7 +77,7 @@ Each policy is identified by their globally unique identifier (GUID). | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -93,7 +93,7 @@ Each policy is identified by their globally unique identifier (GUID). | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -117,7 +117,7 @@ Each Policy GUID node contains a Policy node and a corresponding PolicyInfo node | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | | Dynamic Node Naming | UniqueName: The ApplicationControl CSP enforces that the "ID" segment of a given policy URI is the same GUID as the policy ID in the policy blob. | @@ -134,7 +134,7 @@ Each Policy GUID node contains a Policy node and a corresponding PolicyInfo node | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -158,7 +158,7 @@ Default value is empty. | Property name | Property value | |:--|:--| -| Format | b64 | +| Format | `b64` | | Access Type | Add, Delete, Get, Replace | @@ -174,7 +174,7 @@ Default value is empty. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -197,7 +197,7 @@ Information Describing the Policy indicated by the GUID. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -213,7 +213,7 @@ Information Describing the Policy indicated by the GUID. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -236,7 +236,7 @@ The FriendlyName of the Policy Indicated by the Policy GUID. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -252,7 +252,7 @@ The FriendlyName of the Policy Indicated by the Policy GUID. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -279,7 +279,7 @@ Supported values are as follows: | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get | @@ -295,7 +295,7 @@ Supported values are as follows: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -318,7 +318,7 @@ TRUE/FALSE if the Policy is a Base Policy versus a Supplemental Policy. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get | @@ -334,7 +334,7 @@ TRUE/FALSE if the Policy is a Base Policy versus a Supplemental Policy. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -361,7 +361,7 @@ Supported values are as follows: | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get | @@ -377,7 +377,7 @@ Supported values are as follows: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -404,7 +404,7 @@ Supported values are as follows: | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get | @@ -420,7 +420,7 @@ Supported values are as follows: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -431,7 +431,7 @@ Supported values are as follows: -TRUE/FALSE if the Policy is a System Policy, that is a policy managed by Microsoft as part of the OS. +TRUE/FALSE if the Policy is a System Policy, that's a policy managed by Microsoft as part of the OS. @@ -443,7 +443,7 @@ TRUE/FALSE if the Policy is a System Policy, that is a policy managed by Microso | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get | @@ -459,7 +459,7 @@ TRUE/FALSE if the Policy is a System Policy, that is a policy managed by Microso | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -483,7 +483,7 @@ Default value is 0, which indicates that the policy status is `OK`. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -499,7 +499,7 @@ Default value is 0, which indicates that the policy status is `OK`. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -522,7 +522,7 @@ Version of the Policy indicated by the GUID, as a string. When parsing use a uin | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -538,7 +538,7 @@ Version of the Policy indicated by the GUID, as a string. When parsing use a uin | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -561,7 +561,7 @@ Beginning of a Subtree that contains all tokens. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -577,7 +577,7 @@ Beginning of a Subtree that contains all tokens. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -600,7 +600,7 @@ Arbitrary ID used to differentiate tokens. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | | Dynamic Node Naming | UniqueName: The ApplicationControl CSP enforces that the "ID" segment of a given token URI is unique. | @@ -617,7 +617,7 @@ Arbitrary ID used to differentiate tokens. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -640,7 +640,7 @@ The token binary encoded as base64. Supported value is a binary file, obtained f | Property name | Property value | |:--|:--| -| Format | b64 | +| Format | `b64` | | Access Type | Add, Delete, Get, Replace | @@ -656,7 +656,7 @@ The token binary encoded as base64. Supported value is a binary file, obtained f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -679,7 +679,7 @@ Information Describing the Token indicated by the corresponding ID. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -695,7 +695,7 @@ Information Describing the Token indicated by the corresponding ID. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -718,7 +718,7 @@ The Current Status of the Token Indicated by the Token ID. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -734,7 +734,7 @@ The Current Status of the Token Indicated by the Token ID. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -757,7 +757,7 @@ The Type of Token Indicated by the Token ID. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | diff --git a/windows/client-management/mdm/applocker-csp.md b/windows/client-management/mdm/applocker-csp.md index bfc85fbfa9..608969a753 100644 --- a/windows/client-management/mdm/applocker-csp.md +++ b/windows/client-management/mdm/applocker-csp.md @@ -4,7 +4,7 @@ description: Learn more about the AppLocker CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 02/28/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -76,7 +76,7 @@ The following list shows the AppLocker configuration service provider nodes: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -106,7 +106,7 @@ Defines restrictions for applications. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -122,7 +122,7 @@ Defines restrictions for applications. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -133,7 +133,7 @@ Defines restrictions for applications. -Grouping nodes are dynamic nodes, and there may be any number of them for a given enrollment (or a given context). The actual identifiers are selected by the management endpoint, whose job it is to determine what their purpose is, and to not conflict with other identifiers that they define. Different enrollments and contexts may use the same Authority identifier, even if many such identifiers are active at the same time. +Grouping nodes are dynamic nodes, and there may be any number of them for a given enrollment (or a given context). The actual identifiers are selected by the management endpoint, whose job it's to determine what their purpose is, and to not conflict with other identifiers that they define. Different enrollments and contexts may use the same Authority identifier, even if many such identifiers are active at the same time. @@ -145,7 +145,7 @@ Grouping nodes are dynamic nodes, and there may be any number of them for a give | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | | Dynamic Node Naming | ServerGeneratedUniqueIdentifier | @@ -162,7 +162,7 @@ Grouping nodes are dynamic nodes, and there may be any number of them for a give | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -184,7 +184,7 @@ Grouping nodes are dynamic nodes, and there may be any number of them for a give | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | @@ -200,7 +200,7 @@ Grouping nodes are dynamic nodes, and there may be any number of them for a give | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -225,7 +225,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Property name | Property value | |:--|:--| -| Format | b64 | +| Format | `b64` | | Access Type | Add, Delete, Get, Replace | | Reboot Behavior | Automatic | @@ -242,7 +242,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -265,7 +265,7 @@ Defines restrictions for processing DLL files. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | @@ -281,7 +281,7 @@ Defines restrictions for processing DLL files. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -292,7 +292,7 @@ Defines restrictions for processing DLL files. -The EnforcementMode node for Windows Information Protection (formerly known as Enterprise Data Protection) does not affect the behavior of EnterpriseDataProtection. The EDPEnforcementLevel from Policy CSP should be used to enable and disable Windows Information Protection (formerly known as Enterprise Data Protection). +The EnforcementMode node for Windows Information Protection (formerly known as Enterprise Data Protection) doesn't affect the behavior of EnterpriseDataProtection. The EDPEnforcementLevel from Policy CSP should be used to enable and disable Windows Information Protection (formerly known as Enterprise Data Protection). @@ -304,7 +304,7 @@ The EnforcementMode node for Windows Information Protection (formerly known as E | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -320,7 +320,7 @@ The EnforcementMode node for Windows Information Protection (formerly known as E | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -342,7 +342,7 @@ The EnforcementMode node for Windows Information Protection (formerly known as E | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -358,7 +358,7 @@ The EnforcementMode node for Windows Information Protection (formerly known as E | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -381,7 +381,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Reboot Behavior | Automatic | | Allowed Values | See [Policy XSD Schema](#policy-xsd-schema) | @@ -399,7 +399,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -422,7 +422,7 @@ Defines restrictions for launching executable applications. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | @@ -438,7 +438,7 @@ Defines restrictions for launching executable applications. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -449,7 +449,7 @@ Defines restrictions for launching executable applications. -The EnforcementMode node for Windows Information Protection (formerly known as Enterprise Data Protection) does not affect the behavior of EnterpriseDataProtection. The EDPEnforcementLevel from Policy CSP should be used to enable and disable Windows Information Protection (formerly known as Enterprise Data Protection). +The EnforcementMode node for Windows Information Protection (formerly known as Enterprise Data Protection) doesn't affect the behavior of EnterpriseDataProtection. The EDPEnforcementLevel from Policy CSP should be used to enable and disable Windows Information Protection (formerly known as Enterprise Data Protection). @@ -461,7 +461,7 @@ The EnforcementMode node for Windows Information Protection (formerly known as E | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -477,7 +477,7 @@ The EnforcementMode node for Windows Information Protection (formerly known as E | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -499,7 +499,7 @@ The EnforcementMode node for Windows Information Protection (formerly known as E | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -515,7 +515,7 @@ The EnforcementMode node for Windows Information Protection (formerly known as E | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -538,7 +538,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Reboot Behavior | Automatic | | Allowed Values | See [Policy XSD Schema](#policy-xsd-schema) | @@ -556,7 +556,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -579,7 +579,7 @@ Defines restrictions for executing Windows Installer files. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | @@ -595,7 +595,7 @@ Defines restrictions for executing Windows Installer files. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -606,7 +606,7 @@ Defines restrictions for executing Windows Installer files. -The EnforcementMode node for Windows Information Protection (formerly known as Enterprise Data Protection) does not affect the behavior of EnterpriseDataProtection. The EDPEnforcementLevel from Policy CSP should be used to enable and disable Windows Information Protection (formerly known as Enterprise Data Protection). +The EnforcementMode node for Windows Information Protection (formerly known as Enterprise Data Protection) doesn't affect the behavior of EnterpriseDataProtection. The EDPEnforcementLevel from Policy CSP should be used to enable and disable Windows Information Protection (formerly known as Enterprise Data Protection). @@ -618,7 +618,7 @@ The EnforcementMode node for Windows Information Protection (formerly known as E | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -634,7 +634,7 @@ The EnforcementMode node for Windows Information Protection (formerly known as E | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -657,7 +657,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Reboot Behavior | Automatic | | Allowed Values | See [Policy XSD Schema](#policy-xsd-schema) | @@ -675,7 +675,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -698,7 +698,7 @@ Defines restrictions for running scripts. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | @@ -714,7 +714,7 @@ Defines restrictions for running scripts. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -725,7 +725,7 @@ Defines restrictions for running scripts. -The EnforcementMode node for Windows Information Protection (formerly known as Enterprise Data Protection) does not affect the behavior of EnterpriseDataProtection. The EDPEnforcementLevel from Policy CSP should be used to enable and disable Windows Information Protection (formerly known as Enterprise Data Protection). +The EnforcementMode node for Windows Information Protection (formerly known as Enterprise Data Protection) doesn't affect the behavior of EnterpriseDataProtection. The EDPEnforcementLevel from Policy CSP should be used to enable and disable Windows Information Protection (formerly known as Enterprise Data Protection). @@ -737,7 +737,7 @@ The EnforcementMode node for Windows Information Protection (formerly known as E | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -753,7 +753,7 @@ The EnforcementMode node for Windows Information Protection (formerly known as E | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -776,7 +776,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Reboot Behavior | Automatic | | Allowed Values | See [Policy XSD Schema](#policy-xsd-schema) | @@ -794,7 +794,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -817,7 +817,7 @@ Defines restrictions for running apps from the Microsoft Store. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | @@ -833,7 +833,7 @@ Defines restrictions for running apps from the Microsoft Store. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -844,7 +844,7 @@ Defines restrictions for running apps from the Microsoft Store. -The EnforcementMode node for Windows Information Protection (formerly known as Enterprise Data Protection) does not affect the behavior of EnterpriseDataProtection. The EDPEnforcementLevel from Policy CSP should be used to enable and disable Windows Information Protection (formerly known as Enterprise Data Protection). +The EnforcementMode node for Windows Information Protection (formerly known as Enterprise Data Protection) doesn't affect the behavior of EnterpriseDataProtection. The EDPEnforcementLevel from Policy CSP should be used to enable and disable Windows Information Protection (formerly known as Enterprise Data Protection). @@ -856,7 +856,7 @@ The EnforcementMode node for Windows Information Protection (formerly known as E | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -872,7 +872,7 @@ The EnforcementMode node for Windows Information Protection (formerly known as E | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -895,7 +895,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Reboot Behavior | Automatic | | Allowed Values | See [Policy XSD Schema](#policy-xsd-schema) | @@ -913,7 +913,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -956,7 +956,7 @@ Additional information: | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -972,7 +972,7 @@ Additional information: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -983,7 +983,7 @@ Additional information: -Grouping nodes are dynamic nodes, and there may be any number of them for a given enrollment (or a given context). The actual identifiers are selected by the management endpoint, whose job it is to determine what their purpose is, and to not conflict with other identifiers that they define. Different enrollments and contexts may use the same Authority identifier, even if many such identifiers are active at the same time. +Grouping nodes are dynamic nodes, and there may be any number of them for a given enrollment (or a given context). The actual identifiers are selected by the management endpoint, whose job it's to determine what their purpose is, and to not conflict with other identifiers that they define. Different enrollments and contexts may use the same Authority identifier, even if many such identifiers are active at the same time. @@ -995,7 +995,7 @@ Grouping nodes are dynamic nodes, and there may be any number of them for a give | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | | Dynamic Node Naming | ServerGeneratedUniqueIdentifier | @@ -1012,7 +1012,7 @@ Grouping nodes are dynamic nodes, and there may be any number of them for a give | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1035,7 +1035,7 @@ Defines restrictions for launching executable applications. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | @@ -1051,7 +1051,7 @@ Defines restrictions for launching executable applications. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1074,7 +1074,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Reboot Behavior | Automatic | | Allowed Values | See [Policy XSD Schema](#policy-xsd-schema) | @@ -1092,7 +1092,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1115,7 +1115,7 @@ Defines restrictions for running apps from the Microsoft Store. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | @@ -1131,7 +1131,7 @@ Defines restrictions for running apps from the Microsoft Store. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1154,7 +1154,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Reboot Behavior | Automatic | | Allowed Values | See [Policy XSD Schema](#policy-xsd-schema) | @@ -1172,7 +1172,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1194,7 +1194,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1210,7 +1210,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1232,7 +1232,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | | Dynamic Node Naming | ServerGeneratedUniqueIdentifier | @@ -1249,7 +1249,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1271,7 +1271,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | @@ -1287,7 +1287,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1298,7 +1298,7 @@ Policy nodes define the policy for launching executables, Windows Installer file -The EnforcementMode node for Windows Information Protection (formerly known as Enterprise Data Protection) does not affect the behavior of EnterpriseDataProtection. The EDPEnforcementLevel from Policy CSP should be used to enable and disable Windows Information Protection (formerly known as Enterprise Data Protection). +The EnforcementMode node for Windows Information Protection (formerly known as Enterprise Data Protection) doesn't affect the behavior of EnterpriseDataProtection. The EDPEnforcementLevel from Policy CSP should be used to enable and disable Windows Information Protection (formerly known as Enterprise Data Protection). @@ -1310,7 +1310,7 @@ The EnforcementMode node for Windows Information Protection (formerly known as E | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1326,7 +1326,7 @@ The EnforcementMode node for Windows Information Protection (formerly known as E | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1349,7 +1349,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Reboot Behavior | Automatic | | Allowed Values | See [Policy XSD Schema](#policy-xsd-schema) | @@ -1367,7 +1367,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1389,7 +1389,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | @@ -1405,7 +1405,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1416,7 +1416,7 @@ Policy nodes define the policy for launching executables, Windows Installer file -The EnforcementMode node for Windows Information Protection (formerly known as Enterprise Data Protection) does not affect the behavior of EnterpriseDataProtection. The EDPEnforcementLevel from Policy CSP should be used to enable and disable Windows Information Protection (formerly known as Enterprise Data Protection). +The EnforcementMode node for Windows Information Protection (formerly known as Enterprise Data Protection) doesn't affect the behavior of EnterpriseDataProtection. The EDPEnforcementLevel from Policy CSP should be used to enable and disable Windows Information Protection (formerly known as Enterprise Data Protection). @@ -1428,7 +1428,7 @@ The EnforcementMode node for Windows Information Protection (formerly known as E | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1444,7 +1444,7 @@ The EnforcementMode node for Windows Information Protection (formerly known as E | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1467,7 +1467,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Reboot Behavior | Automatic | | Allowed Values | See [Policy XSD Schema](#policy-xsd-schema) | @@ -1485,7 +1485,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1507,7 +1507,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1523,7 +1523,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1545,7 +1545,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | | Dynamic Node Naming | ServerGeneratedUniqueIdentifier | @@ -1562,7 +1562,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1584,7 +1584,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | @@ -1600,7 +1600,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1611,7 +1611,7 @@ Policy nodes define the policy for launching executables, Windows Installer file -The EnforcementMode node for Windows Information Protection (formerly known as Enterprise Data Protection) does not affect the behavior of EnterpriseDataProtection. The EDPEnforcementLevel from Policy CSP should be used to enable and disable Windows Information Protection (formerly known as Enterprise Data Protection). +The EnforcementMode node for Windows Information Protection (formerly known as Enterprise Data Protection) doesn't affect the behavior of EnterpriseDataProtection. The EDPEnforcementLevel from Policy CSP should be used to enable and disable Windows Information Protection (formerly known as Enterprise Data Protection). @@ -1623,7 +1623,7 @@ The EnforcementMode node for Windows Information Protection (formerly known as E | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -1639,7 +1639,7 @@ The EnforcementMode node for Windows Information Protection (formerly known as E | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1662,7 +1662,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | | Reboot Behavior | Automatic | | Allowed Values | See [Policy XSD Schema](#policy-xsd-schema) | @@ -1680,7 +1680,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1702,7 +1702,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | @@ -1718,7 +1718,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1729,7 +1729,7 @@ Policy nodes define the policy for launching executables, Windows Installer file -The EnforcementMode node for Windows Information Protection (formerly known as Enterprise Data Protection) does not affect the behavior of EnterpriseDataProtection. The EDPEnforcementLevel from Policy CSP should be used to enable and disable Windows Information Protection (formerly known as Enterprise Data Protection). +The EnforcementMode node for Windows Information Protection (formerly known as Enterprise Data Protection) doesn't affect the behavior of EnterpriseDataProtection. The EDPEnforcementLevel from Policy CSP should be used to enable and disable Windows Information Protection (formerly known as Enterprise Data Protection). @@ -1741,7 +1741,7 @@ The EnforcementMode node for Windows Information Protection (formerly known as E | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -1757,7 +1757,7 @@ The EnforcementMode node for Windows Information Protection (formerly known as E | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1780,7 +1780,7 @@ Policy nodes define the policy for launching executables, Windows Installer file | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | | Reboot Behavior | Automatic | | Allowed Values | See [Policy XSD Schema](#policy-xsd-schema) | diff --git a/windows/client-management/mdm/assignedaccess-csp.md b/windows/client-management/mdm/assignedaccess-csp.md index 59a54a27da..3f7964e416 100644 --- a/windows/client-management/mdm/assignedaccess-csp.md +++ b/windows/client-management/mdm/assignedaccess-csp.md @@ -4,7 +4,7 @@ description: Learn more about the AssignedAccess CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 02/28/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -50,7 +50,7 @@ The following list shows the AssignedAccess configuration service provider nodes | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -72,6 +72,8 @@ In **Windows 10, version 1803** the Configuration node introduces single app kio In **Windows 10, version 1909**, Microsoft Edge kiosk mode support was added. This allows Microsoft Edge to be the specified kiosk application. For details about configuring Microsoft Edge kiosk mode, see [Configure a Windows 10 kiosk that runs Microsoft Edge](/DeployEdge/microsoft-edge-configure-kiosk-mode). Windows 10, version 1909 also allows for configuration of the breakout sequence. The breakout sequence specifies the keyboard shortcut that returns a kiosk session to the lock screen. The breakout sequence is defined with the format modifiers + keys. An example breakout sequence would look something like `shift+alt+a`, where `shift` and `alt` are the modifiers and `a` is the key. +In **Windows 11, version 22H2 with [KB5026446](https://support.microsoft.com/kb/5026446)**, AssignedAccessConfiguration schema was updated to add StartPins and TaskbarLayout nodes to support pinning apps to the Start Menu and Taskbar respectively. + - For more information about setting up a multi-app kiosk, see [Create a Windows 10 kiosk that runs multiple apps](/windows/configuration/lock-down-windows-10-to-specific-apps). - For more information on the schema, see [AssignedAccessConfiguration XSD](#assignedaccessconfiguration-xsd). - For examples, see [AssignedAccessConfiguration examples](#assignedaccessconfiguration-examples). @@ -85,7 +87,7 @@ In **Windows 10, version 1909**, Microsoft Edge kiosk mode support was added. Th | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -143,7 +145,7 @@ For more examples, see [AssignedAccessConfiguration examples](#assignedaccesscon | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -175,7 +177,7 @@ This node supports Add, Delete, Replace and Get methods. When there's no configu > [!IMPORTANT] > -> - In Windows 10, version 1803, the Configuration node introduces single app kiosk profile to replace KioskModeApp CSP node. KioskModeApp node will be deprecated soon, so you should use the single app kiosk profile in config xml for Configuration node to configure public-facing single app Kiosk. +> - In Windows 10, version 1803, the Configuration node introduced single app kiosk profile to replace KioskModeApp CSP node. KioskModeApp node will be deprecated soon, so you should use the single app kiosk profile in configuration xml for Configuration node to configure public-facing single app Kiosk. > - Additionally, starting in Windows 10, version 1803, the KioskModeApp node becomes No-Op if Configuration node is configured on the device. Add/Replace/Delete commands on KioskModeApp node always returns SUCCESS to the MDM server if Configuration node is set, but the data of KioskModeApp will not take any effect on the device. Get command on KioskModeApp will return the configured JSON string even it's not effective. > - You can't set both KioskModeApp and ShellLauncher at the same time on the device. @@ -185,7 +187,7 @@ This node supports Add, Delete, Replace and Get methods. When there's no configu | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -282,7 +284,7 @@ This node supports Add, Delete, Replace and Get methods. When there's no configu | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -316,7 +318,7 @@ For more information, see [Shell Launcher](/windows/configuration/kiosk-shelllau | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -718,7 +720,7 @@ For more information, see [Shell Launcher](/windows/configuration/kiosk-shelllau | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -757,7 +759,7 @@ Additionally, the Status payload includes the following fields: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -852,7 +854,7 @@ Additionally, the Status payload includes the following fields: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -891,7 +893,7 @@ By default, the StatusConfiguration node doesn't exist, and it implies this feat | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1043,6 +1045,7 @@ By default, the StatusConfiguration node doesn't exist, and it implies this feat xmlns:rs5="http://schemas.microsoft.com/AssignedAccess/201810/config" xmlns:v3="http://schemas.microsoft.com/AssignedAccess/2020/config" xmlns:v4="http://schemas.microsoft.com/AssignedAccess/2021/config" + xmlns:v5="http://schemas.microsoft.com/AssignedAccess/2022/config" targetNamespace="http://schemas.microsoft.com/AssignedAccess/2017/config" > @@ -1072,7 +1075,9 @@ By default, the StatusConfiguration node doesn't exist, and it implies this feat + + @@ -1229,7 +1234,7 @@ By default, the StatusConfiguration node doesn't exist, and it implies this feat ); ``` -- Schema for features introduced in Windows 10, version 1909 which added support for Microsoft Edge kiosk mode and breakout key sequence customization. +- Schema for features introduced in Windows 10, version 1809 which added support for Microsoft Edge kiosk mode and breakout key sequence customization. ```xml @@ -1351,6 +1356,101 @@ By default, the StatusConfiguration node doesn't exist, and it implies this feat > > ``` +- Example XML configuration for a multi-app kiosk for Windows 11, version 22H2 with [KB5026446](https://support.microsoft.com/kb/5026446). + + > [!NOTE] + > This example demonstrates the use of StartPins and TaskbarLayout elements. For more information, see [Set up a multi-app kiosk on Windows 11 devices](/windows/configuration/lock-down-windows-11-to-specific-apps). + > + > - StartPins element is used to pin apps to the Start menu and uses the [pinnedList JSON](/windows/configuration/customize-start-menu-layout-windows-11#get-the-pinnedlist-json) format. + > - TaskbarLayout element is used to pin apps to the taskbar and uses the [TaskbarLayoutModification XML](/windows/configuration/customize-taskbar-windows-11#create-the-xml-file) format. + + ```xml + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + ]]> + + + + + + + + + + + + + + + + ]]> + + + + + + MultiAppKioskUser + + + + + ``` + - Example XML configuration for a multi-app kiosk for Windows 10. ```xml diff --git a/windows/client-management/mdm/bitlocker-csp.md b/windows/client-management/mdm/bitlocker-csp.md index 16889b4db0..ff28625681 100644 --- a/windows/client-management/mdm/bitlocker-csp.md +++ b/windows/client-management/mdm/bitlocker-csp.md @@ -4,7 +4,7 @@ description: Learn more about the BitLocker CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 05/01/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,13 +16,9 @@ ms.topic: reference # BitLocker CSP -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] -> [!IMPORTANT] -> This CSP contains preview policies that are under development and only applicable for [Windows Insider Preview builds](/windows-insider/). These policies are subject to change and may have dependencies on other features or services in preview. +[!INCLUDE [Windows Insider tip](includes/mdm-insider-csp-note.md)] @@ -80,7 +76,7 @@ The following list shows the BitLocker configuration service provider nodes: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -91,18 +87,17 @@ The following list shows the BitLocker configuration service provider nodes: -Allows Admin to enforce "RequireDeviceEncryption" policy for scenarios where policy is pushed while current logged on user is non-admin/standard user. +Allows Admin to enforce "RequireDeviceEncryption" policy for scenarios where policy is pushed while current logged-on user is non-admin/standard user. + "AllowStandardUserEncryption" policy is tied to "AllowWarningForOtherDiskEncryption" policy being set to "0", i.e, Silent encryption is enforced. -If "AllowWarningForOtherDiskEncryption" is not set, or is set to "1", "RequireDeviceEncryption" policy will not try to encrypt drive(s) if a standard user -is the current logged on user in the system. + +If "AllowWarningForOtherDiskEncryption" isn't set, or is set to "1", "RequireDeviceEncryption" policy won't try to encrypt drive(s) if a standard user is the current logged-on user in the system. The expected values for this policy are: 1 = "RequireDeviceEncryption" policy will try to enable encryption on all fixed drives even if a current logged in user is standard user. -0 = This is the default, when the policy is not set. If current logged on user is a standard user, "RequireDeviceEncryption" policy -will not try to enable encryption on any drive. - +0 = This is the default, when the policy isn't set. If current logged-on user is a standard user, "RequireDeviceEncryption" policy won't try to enable encryption on any drive. @@ -114,7 +109,7 @@ will not try to enable encryption on any drive. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | | Dependency [AllowWarningForOtherDiskEncryptionDependency] | Dependency Type: `DependsOn`
    Dependency URI: `Device/Vendor/MSFT/Bitlocker/AllowWarningForOtherDiskEncryption`
    Dependency Allowed Value: `[0]`
    Dependency Allowed Value Type: `Range`
    | @@ -125,7 +120,7 @@ will not try to enable encryption on any drive. | Value | Description | |:--|:--| -| 0 (Default) | This is the default, when the policy is not set. If current logged on user is a standard user, "RequireDeviceEncryption" policy will not try to enable encryption on any drive. | +| 0 (Default) | This is the default, when the policy isn't set. If current logged-on user is a standard user, "RequireDeviceEncryption" policy won't try to enable encryption on any drive. | | 1 | "RequireDeviceEncryption" policy will try to enable encryption on all fixed drives even if a current logged in user is standard user. | @@ -159,7 +154,7 @@ To disable this policy, use the following SyncML: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -178,7 +173,8 @@ This policy setting allows suspending protection for BitLocker Drive Encryption The expected values for this policy are: 0 = Prevent BitLocker Drive Encryption protection from being suspended. -1 = This is the default, when the policy is not set. Allows suspending BitLocker Drive Encryption protection. + +1 = This is the default, when the policy isn't set. Allows suspending BitLocker Drive Encryption protection. @@ -190,7 +186,7 @@ The expected values for this policy are: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -201,7 +197,7 @@ The expected values for this policy are: | Value | Description | |:--|:--| | 0 | Prevent BitLocker Drive Encryption protection from being suspended. | -| 1 (Default) | This is the default, when the policy is not set. Allows suspending BitLocker Drive Encryption protection. | +| 1 (Default) | This is the default, when the policy isn't set. Allows suspending BitLocker Drive Encryption protection. | @@ -216,7 +212,7 @@ The expected values for this policy are: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -231,20 +227,18 @@ Allows Admin to disable all UI (notification for encryption and warning prompt f and turn on encryption on the user machines silently. > [!WARNING] -> When you enable BitLocker on a device with third party encryption, it may render the device unusable and will -require reinstallation of Windows. +> When you enable BitLocker on a device with third party encryption, it may render the device unusable and will require reinstallation of Windows. > [!NOTE] > This policy takes effect only if "RequireDeviceEncryption" policy is set to 1. The expected values for this policy are: -1 = This is the default, when the policy is not set. **Warning** prompt and encryption notification is allowed. -0 = Disables the warning prompt and encryption notification. Starting in Windows 10, next major update, -the value 0 only takes affect on Azure Active Directory joined devices. +1 = This is the default, when the policy isn't set. Warning prompt and encryption notification is allowed. + +0 = Disables the warning prompt and encryption notification. Starting in Windows 10, next major update, the value 0 only takes effect on Azure Active Directory joined devices. + Windows will attempt to silently enable BitLocker for value 0. - - @@ -266,7 +260,7 @@ Windows will attempt to silently enable BitLocker for value 0. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -307,7 +301,7 @@ Windows will attempt to silently enable BitLocker for value 0. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1909 [10.0.18363] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1909 [10.0.18363] and later | @@ -319,16 +313,17 @@ Windows will attempt to silently enable BitLocker for value 0. Allows Admin to configure Numeric Recovery Password Rotation upon use for OS and fixed drives on AAD and Hybrid domain joined devices. -When not configured, Rotation is turned on by default for AAD only and off on Hybrid. The Policy will be effective only when -Active Directory back up for recovery password is configured to required. -For OS drive: Turn on "Do not enable Bitlocker until recovery information is stored to AD DS for operating system drives" -For Fixed drives: Turn on "Do not enable Bitlocker until recovery information is stored to AD DS for fixed data drives" + +When not configured, Rotation is turned on by default for AAD only and off on Hybrid. The Policy will be effective only when Active Directory back up for recovery password is configured to required. + +For OS drive: Turn on "Do not enable BitLocker until recovery information is stored to AD DS for operating system drives". + +For Fixed drives: Turn on "Do not enable BitLocker until recovery information is stored to AD DS for fixed data drives". Supported Values: 0 - Numeric Recovery Passwords rotation OFF. + 1 - Numeric Recovery Passwords Rotation upon use ON for AAD joined devices. Default value -2 - Numeric Recovery Passwords Rotation upon use ON for both AAD and Hybrid devices - - +2 - Numeric Recovery Passwords Rotation upon use ON for both AAD and Hybrid devices. @@ -340,7 +335,7 @@ Supported Values: 0 - Numeric Recovery Passwords rotation OFF. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -367,7 +362,7 @@ Supported Values: 0 - Numeric Recovery Passwords rotation OFF. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -380,11 +375,11 @@ Supported Values: 0 - Numeric Recovery Passwords rotation OFF. This policy setting configures whether BitLocker protection is required for a computer to be able to write data to a removable data drive. -- If you enable this policy setting, all removable data drives that are not BitLocker-protected will be mounted as read-only. If the drive is protected by BitLocker, it will be mounted with read and write access. +- If you enable this policy setting, all removable data drives that aren't BitLocker-protected will be mounted as read-only. If the drive is protected by BitLocker, it will be mounted with read and write access. If the "Deny write access to devices configured in another organization" option is selected, only drives with identification fields matching the computer's identification fields will be given write access. When a removable data drive is accessed it will be checked for valid identification field and allowed identification fields. These fields are defined by the "Provide the unique identifiers for your organization" policy setting. -- If you disable or do not configure this policy setting, all removable data drives on the computer will be mounted with read and write access. +- If you disable or don't configure this policy setting, all removable data drives on the computer will be mounted with read and write access. > [!NOTE] > This policy setting can be overridden by the policy settings under User Configuration\Administrative Templates\System\Removable Storage Access. If the "Removable Disks: Deny write access" policy setting is enabled this policy setting will be ignored. @@ -423,13 +418,12 @@ Sample value for this node to enable this policy and set the encryption methods | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -474,7 +468,7 @@ To disable this policy, use the following SyncML: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -487,9 +481,9 @@ To disable this policy, use the following SyncML: This policy setting allows you to configure the encryption type used by BitLocker Drive Encryption. This policy setting is applied when you turn on BitLocker. Changing the encryption type has no effect if the drive is already encrypted or if encryption is in progress. Choose full encryption to require that the entire drive be encrypted when BitLocker is turned on. Choose used space only encryption to require that only the portion of the drive used to store data is encrypted when BitLocker is turned on. -- If you enable this policy setting the encryption type that BitLocker will use to encrypt drives is defined by this policy and the encryption type option will not be presented in the BitLocker setup wizard. +- If you enable this policy setting the encryption type that BitLocker will use to encrypt drives is defined by this policy and the encryption type option won't be presented in the BitLocker setup wizard. -- If you disable or do not configure this policy setting, the BitLocker setup wizard will ask the user to select the encryption type before turning on BitLocker. +- If you disable or don't configure this policy setting, the BitLocker setup wizard will ask the user to select the encryption type before turning on BitLocker. @@ -517,13 +511,12 @@ Possible values: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -550,7 +543,7 @@ Possible values: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -567,7 +560,7 @@ The "Allow data recovery agent" check box is used to specify whether a data reco In "Configure user storage of BitLocker recovery information" select whether users are allowed, required, or not allowed to generate a 48-digit recovery password or a 256-bit recovery key. -Select "Omit recovery options from the BitLocker setup wizard" to prevent users from specifying recovery options when they turn on BitLocker on a drive. This means that you will not be able to specify which recovery option to use when you turn on BitLocker, instead BitLocker recovery options for the drive are determined by the policy setting. +Select "Omit recovery options from the BitLocker setup wizard" to prevent users from specifying recovery options when they turn on BitLocker on a drive. This means that you won't be able to specify which recovery option to use when you turn on BitLocker, instead BitLocker recovery options for the drive are determined by the policy setting. In "Save BitLocker recovery information to Active Directory Domain Services" choose which BitLocker recovery information to store in AD DS for fixed data drives. If you select "Backup recovery password and key package", both the BitLocker recovery password and key package are stored in AD DS. Storing the key package supports recovering data from a drive that has been physically corrupted. If you select "Backup recovery password only," only the recovery password is stored in AD DS. @@ -578,7 +571,7 @@ Select the "Do not enable BitLocker until recovery information is stored in AD D - If you enable this policy setting, you can control the methods available to users to recover data from BitLocker-protected fixed data drives. -- If this policy setting is not configured or disabled, the default recovery options are supported for BitLocker recovery. By default a DRA is allowed, the recovery options can be specified by the user including the recovery password and recovery key, and recovery information is not backed up to AD DS. +- If this policy setting isn't configured or disabled, the default recovery options are supported for BitLocker recovery. By default a DRA is allowed, the recovery options can be specified by the user including the recovery password and recovery key, and recovery information isn't backed up to AD DS. @@ -627,13 +620,12 @@ The possible values for 'zz' are: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -678,7 +670,7 @@ To disable this policy, use the following SyncML: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -691,9 +683,9 @@ To disable this policy, use the following SyncML: This policy setting determines whether BitLocker protection is required for fixed data drives to be writable on a computer. -- If you enable this policy setting, all fixed data drives that are not BitLocker-protected will be mounted as read-only. If the drive is protected by BitLocker, it will be mounted with read and write access. +- If you enable this policy setting, all fixed data drives that aren't BitLocker-protected will be mounted as read-only. If the drive is protected by BitLocker, it will be mounted with read and write access. -- If you disable or do not configure this policy setting, all fixed data drives on the computer will be mounted with read and write access. +- If you disable or don't configure this policy setting, all fixed data drives on the computer will be mounted with read and write access. @@ -706,13 +698,12 @@ Sample value for this node to enable this policy is: `` | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -757,7 +748,7 @@ To disable this policy, use hte following SyncML: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -768,9 +759,9 @@ To disable this policy, use hte following SyncML: -This policy setting allows you to associate unique organizational identifiers to a new drive that is enabled with BitLocker. These identifiers are stored as the identification field and allowed identification field. The identification field allows you to associate a unique organizational identifier to BitLocker-protected drives. This identifier is automatically added to new BitLocker-protected drives and can be updated on existing BitLocker-protected drives using the [manage-bde](/windows-server/administration/windows-commands/manage-bde) command-line tool. An identification field is required for management of certificate-based data recovery agents on BitLocker-protected drives and for potential updates to the BitLocker To Go Reader. BitLocker will only manage and update data recovery agents when the identification field on the drive matches the value configured in the identification field. In a similar manner, BitLocker will only update the BitLocker To Go Reader when the identification field on the drive matches the value configured for the identification field. +This policy setting allows you to associate unique organizational identifiers to a new drive that's enabled with BitLocker. These identifiers are stored as the identification field and allowed identification field. The identification field allows you to associate a unique organizational identifier to BitLocker-protected drives. This identifier is automatically added to new BitLocker-protected drives and can be updated on existing BitLocker-protected drives using the [manage-bde](/windows-server/administration/windows-commands/manage-bde) command-line tool. An identification field is required for management of certificate-based data recovery agents on BitLocker-protected drives and for potential updates to the BitLocker To Go Reader. BitLocker will only manage and update data recovery agents when the identification field on the drive matches the value configured in the identification field. In a similar manner, BitLocker will only update the BitLocker To Go Reader when the identification field on the drive matches the value configured for the identification field. -The allowed identification field is used in combination with the "Deny write access to removable drives not protected by BitLocker" policy setting to help control the use of removable drives in your organization. It is a comma separated list of identification fields from your organization or other external organizations. +The allowed identification field is used in combination with the "Deny write access to removable drives not protected by BitLocker" policy setting to help control the use of removable drives in your organization. It's a comma separated list of identification fields from your organization or other external organizations. You can configure the identification fields on existing drives by using [manage-bde](/windows-server/administration/windows-commands/manage-bde).exe. @@ -778,7 +769,7 @@ You can configure the identification fields on existing drives by using [manage- When a BitLocker-protected drive is mounted on another BitLocker-enabled computer the identification field and allowed identification field will be used to determine whether the drive is from an outside organization. -- If you disable or do not configure this policy setting, the identification field is not required. +- If you disable or don't configure this policy setting, the identification field isn't required. > [!NOTE] > Identification fields are required for management of certificate-based data recovery agents on BitLocker-protected drives. BitLocker will only manage and update certificate-based data recovery agents when the identification field is present on a drive and is identical to the value configured on the computer. The identification field can be any value of 260 characters or fewer. @@ -805,13 +796,12 @@ Sample value for this node to enable this policy is: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -838,7 +828,7 @@ Sample value for this node to enable this policy is: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -853,9 +843,9 @@ This policy setting controls the use of BitLocker on removable data drives. This When this policy setting is enabled you can select property settings that control how users can configure BitLocker. Choose "Allow users to apply BitLocker protection on removable data drives" to permit the user to run the BitLocker setup wizard on a removable data drive. Choose "Allow users to suspend and decrypt BitLocker on removable data drives" to permit the user to remove BitLocker Drive encryption from the drive or suspend the encryption while maintenance is performed. For information about suspending BitLocker protection, see [BitLocker Basic Deployment](/windows/security/information-protection/bitlocker/bitlocker-basic-deployment). -- If you do not configure this policy setting, users can use BitLocker on removable disk drives. +- If you don't configure this policy setting, users can use BitLocker on removable disk drives. -- If you disable this policy setting, users cannot use BitLocker on removable disk drives. +- If you disable this policy setting, users can't use BitLocker on removable disk drives. @@ -879,13 +869,12 @@ Sample value for this node to enable this policy is: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -912,7 +901,7 @@ Sample value for this node to enable this policy is: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -925,9 +914,9 @@ Sample value for this node to enable this policy is: This policy setting allows you to configure the encryption type used by BitLocker Drive Encryption. This policy setting is applied when you turn on BitLocker. Changing the encryption type has no effect if the drive is already encrypted or if encryption is in progress. Choose full encryption to require that the entire drive be encrypted when BitLocker is turned on. Choose used space only encryption to require that only the portion of the drive used to store data is encrypted when BitLocker is turned on. -- If you enable this policy setting the encryption type that BitLocker will use to encrypt drives is defined by this policy and the encryption type option will not be presented in the BitLocker setup wizard. +- If you enable this policy setting the encryption type that BitLocker will use to encrypt drives is defined by this policy and the encryption type option won't be presented in the BitLocker setup wizard. -- If you disable or do not configure this policy setting, the BitLocker setup wizard will ask the user to select the encryption type before turning on BitLocker. +- If you disable or don't configure this policy setting, the BitLocker setup wizard will ask the user to select the encryption type before turning on BitLocker. @@ -950,14 +939,13 @@ Possible values: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Dependency [BDEAllowed] | Dependency Type: `DependsOn`
    Dependency URI: `Device/Vendor/MSFT/Bitlocker/RemovableDrivesConfigureBDE`
    Dependency Allowed Value Type: `ADMX`
    | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -984,7 +972,7 @@ Possible values: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -995,7 +983,7 @@ Possible values: -When enabled, allows you to exclude removable drives and devices connected over USB interface from [BitLocker Device Encryption](/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10#bitlocker-device-encryption). Excluded devices cannot be encrypted, even manually. Additionally, if "Deny write access to removable drives not protected by BitLocker" is configured, user will not be prompted for encryption and drive will be mounted in read/write mode. Provide a comma separated list of excluded removable drives\devices, using the Hardware ID of the disk device. Example USBSTOR\SEAGATE_ST39102LW_______0004. +When enabled, allows you to exclude removable drives and devices connected over USB interface from [BitLocker Device Encryption](/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10#bitlocker-device-encryption). Excluded devices can't be encrypted, even manually. Additionally, if "Deny write access to removable drives not protected by BitLocker" is configured, user won't be prompted for encryption and drive will be mounted in read/write mode. Provide a comma separated list of excluded removable drives\devices, using the Hardware ID of the disk device. Example USBSTOR\SEAGATE_ST39102LW_______0004. @@ -1007,7 +995,7 @@ When enabled, allows you to exclude removable drives and devices connected over | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `,`) | @@ -1024,7 +1012,7 @@ When enabled, allows you to exclude removable drives and devices connected over | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1037,11 +1025,11 @@ When enabled, allows you to exclude removable drives and devices connected over This policy setting configures whether BitLocker protection is required for a computer to be able to write data to a removable data drive. -- If you enable this policy setting, all removable data drives that are not BitLocker-protected will be mounted as read-only. If the drive is protected by BitLocker, it will be mounted with read and write access. +- If you enable this policy setting, all removable data drives that aren't BitLocker-protected will be mounted as read-only. If the drive is protected by BitLocker, it will be mounted with read and write access. If the "Deny write access to devices configured in another organization" option is selected, only drives with identification fields matching the computer's identification fields will be given write access. When a removable data drive is accessed it will be checked for valid identification field and allowed identification fields. These fields are defined by the "Provide the unique identifiers for your organization" policy setting. -- If you disable or do not configure this policy setting, all removable data drives on the computer will be mounted with read and write access. +- If you disable or don't configure this policy setting, all removable data drives on the computer will be mounted with read and write access. > [!NOTE] > This policy setting can be overridden by the policy settings under User Configuration\Administrative Templates\System\Removable Storage Access. If the "Removable Disks: Deny write access" policy setting is enabled this policy setting will be ignored. @@ -1070,13 +1058,12 @@ The possible values for 'xx' are: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1121,7 +1108,7 @@ To disable this policy, use the following SyncML: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1135,10 +1122,10 @@ To disable this policy, use the following SyncML: Allows the Admin to require encryption to be turned on using BitLocker\Device Encryption. Sample value for this node to enable this policy: + 1 -Disabling the policy will not turn off the encryption on the system drive. But will stop prompting the user to turn it on. - +Disabling the policy won't turn off the encryption on the system drive. But will stop prompting the user to turn it on. @@ -1163,7 +1150,7 @@ Encryptable fixed data volumes are treated similarly to OS volumes. However, fix | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1173,7 +1160,7 @@ Encryptable fixed data volumes are treated similarly to OS volumes. However, fix | Value | Description | |:--|:--| -| 0 (Default) | Disable. If the policy setting is not set or is set to 0, the device's enforcement status is not checked. The policy does not enforce encryption and it does not decrypt encrypted volumes. | +| 0 (Default) | Disable. If the policy setting isn't set or is set to 0, the device's enforcement status isn't checked. The policy doesn't enforce encryption and it doesn't decrypt encrypted volumes. | | 1 | Enable. The device's enforcement status is checked. Setting this policy to 1 triggers encryption of all drives (silently or non-silently based on AllowWarningForOtherDiskEncryption policy). | @@ -1214,7 +1201,7 @@ To disable RequireDeviceEncryption: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1228,11 +1215,12 @@ To disable RequireDeviceEncryption: Allows the Admin to require storage card encryption on the device. This policy is only valid for mobile SKU. + Sample value for this node to enable this policy: + 1 -Disabling the policy will not turn off the encryption on the storage card. But will stop prompting the user to turn it on. - +Disabling the policy won't turn off the encryption on the storage card. But will stop prompting the user to turn it on. @@ -1244,7 +1232,7 @@ Disabling the policy will not turn off the encryption on the storage card. But w | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1254,7 +1242,7 @@ Disabling the policy will not turn off the encryption on the storage card. But w | Value | Description | |:--|:--| -| 0 (Default) | Storage cards do not need to be encrypted. | +| 0 (Default) | Storage cards don't need to be encrypted. | | 1 | Require storage cards to be encrypted. | @@ -1270,7 +1258,7 @@ Disabling the policy will not turn off the encryption on the storage card. But w | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1909 [10.0.18363] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1909 [10.0.18363] and later | @@ -1282,19 +1270,21 @@ Disabling the policy will not turn off the encryption on the storage card. But w Allows admin to push one-time rotation of all numeric recovery passwords for OS and Fixed Data drives on an Azure Active Directory or hybrid-joined device. + This policy is Execute type and rotates all numeric passwords when issued from MDM tools. -The policy only comes into effect when Active Directory backup for a recovery password is configured to "required." -- For OS drives, enable "Do not enable BitLocker until recovery information is stored to Active Directory Domain Services for operating system drives." -- For fixed drives, enable "Do not enable BitLocker until recovery information is stored to Active Directory Domain Services for fixed data drives." +The policy only comes into effect when Active Directory backup for a recovery password is configured to "required". + +- For OS drives, enable "Do not enable BitLocker until recovery information is stored to Active Directory Domain Services for operating system drives". + +- For fixed drives, enable "Do not enable BitLocker until recovery information is stored to Active Directory Domain Services for fixed data drives". Client returns status DM_S_ACCEPTED_FOR_PROCESSING to indicate the rotation has started. Server can query status with the following status nodes: - status\RotateRecoveryPasswordsStatus -- status\RotateRecoveryPasswordsRequestID - -Supported Values: String form of request ID. Example format of request ID is GUID. Server can choose the format as needed according to the management tools.\ +- status\RotateRecoveryPasswordsRequestID. +Supported Values: String form of request ID. Example format of request ID is GUID. Server can choose the format as needed according to the management tools. @@ -1324,7 +1314,7 @@ Supported Values: String form of request ID. Example format of request ID is GUI | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Exec | @@ -1340,7 +1330,7 @@ Supported Values: String form of request ID. Example format of request ID is GUI | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -1362,7 +1352,7 @@ Supported Values: String form of request ID. Example format of request ID is GUI | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1378,7 +1368,7 @@ Supported Values: String form of request ID. Example format of request ID is GUI | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -1390,6 +1380,7 @@ Supported Values: String form of request ID. Example format of request ID is GUI This node reports compliance state of device encryption on the system. + Value '0' means the device is compliant. Any other value represents a non-compliant device. @@ -1423,7 +1414,7 @@ This value represents a bitmask with each bit and the corresponding error code d | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -1439,7 +1430,7 @@ This value represents a bitmask with each bit and the corresponding error code d | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1462,7 +1453,7 @@ This node reports compliance state of removal drive encryption. "0" Value means | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -1478,7 +1469,7 @@ This node reports compliance state of removal drive encryption. "0" Value means | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1909 [10.0.18363] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1909 [10.0.18363] and later | @@ -1490,8 +1481,8 @@ This node reports compliance state of removal drive encryption. "0" Value means This Node reports the RequestID corresponding to RotateRecoveryPasswordsStatus. -This node needs to be queried in synchronization with RotateRecoveryPasswordsStatus -To ensure the status is correctly matched to the request ID. + +This node needs to be queried in synchronization with RotateRecoveryPasswordsStatus to ensure the status is correctly matched to the request ID. @@ -1503,7 +1494,7 @@ To ensure the status is correctly matched to the request ID. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1519,7 +1510,7 @@ To ensure the status is correctly matched to the request ID. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1909 [10.0.18363] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1909 [10.0.18363] and later | @@ -1531,7 +1522,9 @@ To ensure the status is correctly matched to the request ID. This Node reports the status of RotateRecoveryPasswords request. + Status code can be one of the following: + NotStarted(2), Pending (1), Pass (0), Other error codes in case of failure. @@ -1544,7 +1537,7 @@ NotStarted(2), Pending (1), Pass (0), Other error codes in case of failure. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -1560,7 +1553,7 @@ NotStarted(2), Pending (1), Pass (0), Other error codes in case of failure. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1571,13 +1564,13 @@ NotStarted(2), Pending (1), Pass (0), Other error codes in case of failure. -This policy setting allows you to configure whether or not standard users are allowed to change BitLocker volume PINs, provided they are able to provide the existing PIN first. +This policy setting allows you to configure whether or not standard users are allowed to change BitLocker volume PINs, provided they're able to provide the existing PIN first. This policy setting is applied when you turn on BitLocker. -- If you enable this policy setting, standard users will not be allowed to change BitLocker PINs or passwords. +- If you enable this policy setting, standard users won't be allowed to change BitLocker PINs or passwords. -- If you disable or do not configure this policy setting, standard users will be permitted to change BitLocker PINs and passwords. +- If you disable or don't configure this policy setting, standard users will be permitted to change BitLocker PINs and passwords. @@ -1593,13 +1586,12 @@ Sample value for this node to disable this policy is: `` | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1626,7 +1618,7 @@ Sample value for this node to disable this policy is: `` | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1643,12 +1635,13 @@ The Windows touch keyboard (such as that used by tablets) isn't available in the - If you enable this policy setting, devices must have an alternative means of pre-boot input (such as an attached USB keyboard). -- If this policy is not enabled, the Windows Recovery Environment must be enabled on tablets to support the entry of the BitLocker recovery password. When the Windows Recovery Environment is not enabled and this policy is not enabled, you cannot turn on BitLocker on a device that uses the Windows touch keyboard. +- If this policy isn't enabled, the Windows Recovery Environment must be enabled on tablets to support the entry of the BitLocker recovery password. When the Windows Recovery Environment isn't enabled and this policy isn't enabled, you can't turn on BitLocker on a device that uses the Windows touch keyboard. -**Note** that if you do not enable this policy setting, options in the "Require additional authentication at startup" policy might not be available on such devices. These options include: - - Configure TPM startup PIN: Required/Allowed - - Configure TPM startup key and PIN: Required/Allowed - - Configure use of passwords for operating system drives. +Note that if you don't enable this policy setting, options in the "Require additional authentication at startup" policy might not be available on such devices. These options include: + +- Configure TPM startup PIN: Required/Allowed +- Configure TPM startup key and PIN: Required/Allowed +- Configure use of passwords for operating system drives. @@ -1661,13 +1654,12 @@ Sample value for this node to enable this policy is: `` | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1694,7 +1686,7 @@ Sample value for this node to enable this policy is: `` | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1709,7 +1701,7 @@ This policy setting allows users on devices that are compliant with InstantGo or - If you enable this policy setting, users on InstantGo and HSTI compliant devices will have the choice to turn on BitLocker without pre-boot authentication. -- If this policy is not enabled, the options of "Require additional authentication at startup" policy apply. +- If this policy isn't enabled, the options of "Require additional authentication at startup" policy apply. @@ -1722,13 +1714,12 @@ Sample value for this node to enable this policy is: `` | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1755,7 +1746,7 @@ Sample value for this node to enable this policy is: `` | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1768,9 +1759,9 @@ Sample value for this node to enable this policy is: `` This policy setting allows you to configure the encryption type used by BitLocker Drive Encryption. This policy setting is applied when you turn on BitLocker. Changing the encryption type has no effect if the drive is already encrypted or if encryption is in progress. Choose full encryption to require that the entire drive be encrypted when BitLocker is turned on. Choose used space only encryption to require that only the portion of the drive used to store data is encrypted when BitLocker is turned on. -- If you enable this policy setting the encryption type that BitLocker will use to encrypt drives is defined by this policy and the encryption type option will not be presented in the BitLocker setup wizard. +- If you enable this policy setting the encryption type that BitLocker will use to encrypt drives is defined by this policy and the encryption type option won't be presented in the BitLocker setup wizard. -- If you disable or do not configure this policy setting, the BitLocker setup wizard will ask the user to select the encryption type before turning on BitLocker. +- If you disable or don't configure this policy setting, the BitLocker setup wizard will ask the user to select the encryption type before turning on BitLocker. @@ -1799,13 +1790,12 @@ Possible values: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1832,7 +1822,7 @@ Possible values: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1850,9 +1840,9 @@ Enhanced startup PINs permit the use of characters including uppercase and lower - If you enable this policy setting, all new BitLocker startup PINs set will be enhanced PINs. > [!NOTE] -> Not all computers may support enhanced PINs in the pre-boot environment. It is strongly recommended that users perform a system check during BitLocker setup. +> Not all computers may support enhanced PINs in the pre-boot environment. It's strongly recommended that users perform a system check during BitLocker setup. -- If you disable or do not configure this policy setting, enhanced PINs will not be used. +- If you disable or don't configure this policy setting, enhanced PINs won't be used. @@ -1865,13 +1855,12 @@ Sample value for this node to enable this policy is: `` | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1898,7 +1887,7 @@ Sample value for this node to enable this policy is: `` | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1913,7 +1902,7 @@ This policy setting allows you to configure a minimum length for a Trusted Platf - If you enable this policy setting, you can require a minimum number of digits to be used when setting the startup PIN. -- If you disable or do not configure this policy setting, users can configure a startup PIN of any length between 6 and 20 digits. +- If you disable or don't configure this policy setting, users can configure a startup PIN of any length between 6 and 20 digits. > [!NOTE] > If minimum PIN length is set below 6 digits, Windows will attempt to update the TPM 2.0 lockout period to be greater than the default when a PIN is changed. If successful, Windows will only reset the TPM lockout period back to default if the TPM is reset. @@ -1936,13 +1925,12 @@ Sample value for this node to enable this policy is: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1986,7 +1974,7 @@ To disable this policy, use the following SyncML: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -2006,7 +1994,7 @@ If you select the "Use custom recovery message" option, the message you type in If you select the "Use custom recovery URL" option, the URL you type in the "Custom recovery URL option" text box will replace the default URL in the default recovery message, which will be displayed in the pre-boot key recovery screen. > [!NOTE] -> Not all characters and languages are supported in pre-boot. It is strongly recommended that you test that the characters you use for the custom message or URL appear correctly on the pre-boot recovery screen. +> Not all characters and languages are supported in pre-boot. It's strongly recommended that you test that the characters you use for the custom message or URL appear correctly on the pre-boot recovery screen. @@ -2046,13 +2034,12 @@ The possible value for 'yy' and 'zz' is a string of max length 900 and 500 respe | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2096,7 +2083,7 @@ To disable this policy, use the following SyncML: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -2113,7 +2100,7 @@ The "Allow certificate-based data recovery agent" check box is used to specify w In "Configure user storage of BitLocker recovery information" select whether users are allowed, required, or not allowed to generate a 48-digit recovery password or a 256-bit recovery key. -Select "Omit recovery options from the BitLocker setup wizard" to prevent users from specifying recovery options when they turn on BitLocker on a drive. This means that you will not be able to specify which recovery option to use when you turn on BitLocker, instead BitLocker recovery options for the drive are determined by the policy setting. +Select "Omit recovery options from the BitLocker setup wizard" to prevent users from specifying recovery options when they turn on BitLocker on a drive. This means that you won't be able to specify which recovery option to use when you turn on BitLocker, instead BitLocker recovery options for the drive are determined by the policy setting. In "Save BitLocker recovery information to Active Directory Domain Services", choose which BitLocker recovery information to store in AD DS for operating system drives. If you select "Backup recovery password and key package", both the BitLocker recovery password and key package are stored in AD DS. Storing the key package supports recovering data from a drive that has been physically corrupted. If you select "Backup recovery password only," only the recovery password is stored in AD DS. @@ -2124,7 +2111,7 @@ Select the "Do not enable BitLocker until recovery information is stored in AD D - If you enable this policy setting, you can control the methods available to users to recover data from BitLocker-protected operating system drives. -- If this policy setting is disabled or not configured, the default recovery options are supported for BitLocker recovery. By default a DRA is allowed, the recovery options can be specified by the user including the recovery password and recovery key, and recovery information is not backed up to AD DS. +- If this policy setting is disabled or not configured, the default recovery options are supported for BitLocker recovery. By default a DRA is allowed, the recovery options can be specified by the user including the recovery password and recovery key, and recovery information isn't backed up to AD DS. @@ -2172,13 +2159,12 @@ The possible values for 'zz' are: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2223,7 +2209,7 @@ To disable this policy, use the following SyncML: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -2239,13 +2225,13 @@ This policy setting allows you to configure whether BitLocker requires additiona > [!NOTE] > Only one of the additional authentication options can be required at startup, otherwise a policy error occurs. -If you want to use BitLocker on a computer without a TPM, select the "Allow BitLocker without a compatible TPM" check box. In this mode either a password or a USB drive is required for start-up. When using a startup key, the key information used to encrypt the drive is stored on the USB drive, creating a USB key. When the USB key is inserted the access to the drive is authenticated and the drive is accessible. If the USB key is lost or unavailable or if you have forgotten the password then you will need to use one of the BitLocker recovery options to access the drive. +If you want to use BitLocker on a computer without a TPM, select the "Allow BitLocker without a compatible TPM" check box. In this mode either a password or a USB drive is required for start-up. When using a startup key, the key information used to encrypt the drive is stored on the USB drive, creating a USB key. When the USB key is inserted the access to the drive is authenticated and the drive is accessible. If the USB key is lost or unavailable or if you have forgotten the password then you'll need to use one of the BitLocker recovery options to access the drive. On a computer with a compatible TPM, four types of authentication methods can be used at startup to provide added protection for encrypted data. When the computer starts, it can use only the TPM for authentication, or it can also require insertion of a USB flash drive containing a startup key, the entry of a 6-digit to 20-digit personal identification number (PIN), or both. - If you enable this policy setting, users can configure advanced startup options in the BitLocker setup wizard. -- If you disable or do not configure this policy setting, users can configure only basic options on computers with a TPM. +- If you disable or don't configure this policy setting, users can configure only basic options on computers with a TPM. > [!NOTE] > If you want to require the use of a startup PIN and a USB flash drive, you must configure BitLocker settings using the command-line tool [manage-bde](/windows-server/administration/windows-commands/manage-bde) instead of the BitLocker Drive Encryption setup wizard. @@ -2293,13 +2279,12 @@ The possible values for 'yy' are: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/certificatestore-csp.md b/windows/client-management/mdm/certificatestore-csp.md index 2ea3f57533..bc6a90e378 100644 --- a/windows/client-management/mdm/certificatestore-csp.md +++ b/windows/client-management/mdm/certificatestore-csp.md @@ -4,7 +4,7 @@ description: Learn more about the CertificateStore CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 02/28/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -113,7 +113,7 @@ The following list shows the CertificateStore configuration service provider nod | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -136,7 +136,7 @@ This cryptographic store contains intermediary certification authorities. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -152,7 +152,7 @@ This cryptographic store contains intermediary certification authorities. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -175,7 +175,7 @@ The SHA1 hash for the certificate. The 20-byte SHA1 hash of the certificate is s | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Delete, Get | | Dynamic Node Naming | UniqueName: The SHA1 hash for the certificate. | @@ -192,7 +192,7 @@ The SHA1 hash for the certificate. The 20-byte SHA1 hash of the certificate is s | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -215,7 +215,7 @@ The base64 Encoded X.509 certificate. | Property name | Property value | |:--|:--| -| Format | b64 | +| Format | `b64` | | Access Type | Add, Get, Replace | @@ -231,7 +231,7 @@ The base64 Encoded X.509 certificate. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -254,7 +254,7 @@ The name of the certificate issuer. This node is implicitly created only when th | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -270,7 +270,7 @@ The name of the certificate issuer. This node is implicitly created only when th | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -293,7 +293,7 @@ The name of the certificate subject. This node is implicitly created only when t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -309,7 +309,7 @@ The name of the certificate subject. This node is implicitly created only when t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -332,7 +332,7 @@ Returns the certificate template name. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -348,7 +348,7 @@ Returns the certificate template name. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -371,7 +371,7 @@ The starting date of the certificate's validity. This node is implicitly created | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -387,7 +387,7 @@ The starting date of the certificate's validity. This node is implicitly created | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -410,7 +410,7 @@ The expiration date of the certificate. This node is implicitly created only whe | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -426,7 +426,7 @@ The expiration date of the certificate. This node is implicitly created only whe | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -451,7 +451,7 @@ This store holds the System portion of the CA store. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -467,7 +467,7 @@ This store holds the System portion of the CA store. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -490,7 +490,7 @@ The SHA1 hash for the certificate. The 20-byte SHA1 hash of the certificate is s | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Delete, Get | | Dynamic Node Naming | UniqueName: The SHA1 hash for the certificate. | @@ -507,7 +507,7 @@ The SHA1 hash for the certificate. The 20-byte SHA1 hash of the certificate is s | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -530,7 +530,7 @@ The base64 Encoded X.509 certificate. | Property name | Property value | |:--|:--| -| Format | b64 | +| Format | `b64` | | Access Type | Add, Get, Replace | @@ -546,7 +546,7 @@ The base64 Encoded X.509 certificate. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -569,7 +569,7 @@ The name of the certificate issuer. This node is implicitly created only when th | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -585,7 +585,7 @@ The name of the certificate issuer. This node is implicitly created only when th | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -608,7 +608,7 @@ The name of the certificate subject. This node is implicitly created only when t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -624,7 +624,7 @@ The name of the certificate subject. This node is implicitly created only when t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -647,7 +647,7 @@ Returns the certificate template name. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -663,7 +663,7 @@ Returns the certificate template name. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -686,7 +686,7 @@ The starting date of the certificate's validity. This node is implicitly created | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -702,7 +702,7 @@ The starting date of the certificate's validity. This node is implicitly created | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -725,7 +725,7 @@ The expiration date of the certificate. This node is implicitly created only whe | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -741,7 +741,7 @@ The expiration date of the certificate. This node is implicitly created only whe | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -764,7 +764,7 @@ This store keeps all end-user personal certificates. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -783,7 +783,7 @@ This store keeps all end-user personal certificates. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -808,7 +808,7 @@ This store holds the SCEP portion of the MY store and handle operations related | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -824,7 +824,7 @@ This store holds the SCEP portion of the MY store and handle operations related | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -835,7 +835,7 @@ This store holds the SCEP portion of the MY store and handle operations related -The UniqueID for the SCEP enrollment request. Each client certificate should have different unique ID. +The UniqueID for the SCEP enrollment request. Each client certificate should've different unique ID. @@ -847,7 +847,7 @@ The UniqueID for the SCEP enrollment request. Each client certificate should hav | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | @@ -863,7 +863,7 @@ The UniqueID for the SCEP enrollment request. Each client certificate should hav | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -887,7 +887,7 @@ Specify the current cert's thumbprint. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -903,7 +903,7 @@ Specify the current cert's thumbprint. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -926,7 +926,7 @@ Specify the last hresult in case enroll action failed. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -942,7 +942,7 @@ Specify the last hresult in case enroll action failed. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -967,7 +967,7 @@ The group to represent the install request. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -983,7 +983,7 @@ The group to represent the install request. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1007,7 +1007,7 @@ Specify root CA thumbprint. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get | @@ -1023,7 +1023,7 @@ Specify root CA thumbprint. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1047,7 +1047,7 @@ The value must be base64 encoded. Challenge is deleted shortly after the Exec co | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get | @@ -1063,7 +1063,7 @@ The value must be base64 encoded. Challenge is deleted shortly after the Exec co | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1086,7 +1086,7 @@ Specify extended key usages. The list of OIDs are separated by plus "+". | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get | @@ -1102,7 +1102,7 @@ Specify extended key usages. The list of OIDs are separated by plus "+". | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1126,7 +1126,7 @@ The MDM server can later query the device to find out whether the new certificat | Property name | Property value | |:--|:--| -| Format | null | +| Format | `null` | | Access Type | Exec | @@ -1142,7 +1142,7 @@ The MDM server can later query the device to find out whether the new certificat | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1166,7 +1166,7 @@ Hash algorithm family (SHA-1, SHA-2, SHA-3) specified by the MDM server. If mult | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get | @@ -1182,7 +1182,7 @@ Hash algorithm family (SHA-1, SHA-2, SHA-3) specified by the MDM server. If mult | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1206,7 +1206,7 @@ Valid values are 1024, 2048, 4096. NGC key lengths supported should be specified | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get | @@ -1222,7 +1222,7 @@ Valid values are 1024, 2048, 4096. NGC key lengths supported should be specified | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1250,7 +1250,7 @@ Although the private key is protected by TPM, it isn't protected with TPM PIN. S | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Get | @@ -1266,7 +1266,7 @@ Although the private key is protected by TPM, it isn't protected with TPM PIN. S | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1290,7 +1290,7 @@ The value must be specified in decimal format and should at least have second (0 | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Get | @@ -1306,7 +1306,7 @@ The value must be specified in decimal format and should at least have second (0 | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1330,7 +1330,7 @@ Default value is 3. Max value can't be larger than 30. If it's larger than 30, t | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Get | @@ -1346,7 +1346,7 @@ Default value is 3. Max value can't be larger than 30. If it's larger than 30, t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1370,7 +1370,7 @@ Default value is 5 and the minimum value is 1. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Get | @@ -1386,7 +1386,7 @@ Default value is 5 and the minimum value is 1. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1409,7 +1409,7 @@ Specify the cert enrollment server. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get | @@ -1425,7 +1425,7 @@ Specify the cert enrollment server. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1449,7 +1449,7 @@ or example, multiple subject alternative names are presented in the format ` @@ -1465,7 +1465,7 @@ or example, multiple subject alternative names are presented in the format ` | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1489,7 +1489,7 @@ The SubjectName value is quoted if it contains leading or trailing white space o | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get | @@ -1505,7 +1505,7 @@ The SubjectName value is quoted if it contains leading or trailing white space o | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1528,7 +1528,7 @@ Certificate Template Name OID (As in AD used by PKI infrastructure. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get | @@ -1544,7 +1544,7 @@ Certificate Template Name OID (As in AD used by PKI infrastructure. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1572,7 +1572,7 @@ Valid values are one of the following: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1588,7 +1588,7 @@ Valid values are one of the following: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1611,7 +1611,7 @@ Specify valid period unit type. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get | @@ -1631,7 +1631,7 @@ Default is 0. The period is defined in ValidPeriod node. The valid period specif | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1660,7 +1660,7 @@ Valid values are one of the following values: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -1676,7 +1676,7 @@ Valid values are one of the following values: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1699,7 +1699,7 @@ This store holds the User portion of the MY store. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1715,7 +1715,7 @@ This store holds the User portion of the MY store. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1738,7 +1738,7 @@ The SHA1 hash for the certificate. The 20-byte SHA1 hash of the certificate is s | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Delete, Get | | Dynamic Node Naming | UniqueName: The SHA1 hash for the certificate. | @@ -1755,7 +1755,7 @@ The SHA1 hash for the certificate. The 20-byte SHA1 hash of the certificate is s | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1766,7 +1766,7 @@ The SHA1 hash for the certificate. The 20-byte SHA1 hash of the certificate is s -The base64 Encoded X.509 certificate. **Note** that though during MDM enrollment, enrollment server could use WAP XML format to add public part of MDM client cert via EncodedCertificate node, properly enroll a client certificate including private needs a cert enroll protocol handle it or user installs it manually. In WP, the server cannot purely rely on CertificateStore CSP to install a client certificate including private key. +The base64 Encoded X.509 certificate. Note that though during MDM enrollment, enrollment server could use WAP XML format to add public part of MDM client cert via EncodedCertificate node, properly enroll a client certificate including private needs a cert enroll protocol handle it or user installs it manually. In WP, the server can't purely rely on CertificateStore CSP to install a client certificate including private key. @@ -1778,7 +1778,7 @@ The base64 Encoded X.509 certificate. **Note** that though during MDM enrollment | Property name | Property value | |:--|:--| -| Format | b64 | +| Format | `b64` | | Access Type | Add, Get, Replace | @@ -1794,7 +1794,7 @@ The base64 Encoded X.509 certificate. **Note** that though during MDM enrollment | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1817,7 +1817,7 @@ The name of the certificate issuer. This node is implicitly created only when th | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1833,7 +1833,7 @@ The name of the certificate issuer. This node is implicitly created only when th | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1856,7 +1856,7 @@ The name of the certificate subject. This node is implicitly created only when t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1872,7 +1872,7 @@ The name of the certificate subject. This node is implicitly created only when t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1895,7 +1895,7 @@ Returns the certificate template name. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1911,7 +1911,7 @@ Returns the certificate template name. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1934,7 +1934,7 @@ The starting date of the certificate's validity. This node is implicitly created | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1950,7 +1950,7 @@ The starting date of the certificate's validity. This node is implicitly created | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1973,7 +1973,7 @@ The expiration date of the certificate. This node is implicitly created only whe | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1989,7 +1989,7 @@ The expiration date of the certificate. This node is implicitly created only whe | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2000,7 +2000,7 @@ The expiration date of the certificate. This node is implicitly created only whe -The parent node that hosts client certificate that is enrolled via WSTEP, e.g. the certificate that is enrolled during MDM enrollment. +The parent node that hosts client certificate that's enrolled via WSTEP, e.g. the certificate that's enrolled during MDM enrollment. @@ -2013,7 +2013,7 @@ The nodes under WSTEP are mostly for MDM client certificate renew requests. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -2029,7 +2029,7 @@ The nodes under WSTEP are mostly for MDM client certificate renew requests. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2053,7 +2053,7 @@ If renewal succeeds, it shows the renewed certificate thumbprint. If renewal fai | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2069,7 +2069,7 @@ If renewal succeeds, it shows the renewed certificate thumbprint. If renewal fai | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2092,7 +2092,7 @@ The parent node to group renewal related settings. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | | Atomic Required | True | @@ -2109,7 +2109,7 @@ The parent node to group renewal related settings. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2132,7 +2132,7 @@ If certificate renew fails, this node provide the last hresult code during renew | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -2148,7 +2148,7 @@ If certificate renew fails, this node provide the last hresult code during renew | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -2171,7 +2171,7 @@ Time of last attempted renew. | Property name | Property value | |:--|:--| -| Format | time | +| Format | `time` | | Access Type | Get | @@ -2187,7 +2187,7 @@ Time of last attempted renew. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -2210,7 +2210,7 @@ Initiate a renew now. | Property name | Property value | |:--|:--| -| Format | null | +| Format | `null` | | Access Type | Exec | @@ -2226,7 +2226,7 @@ Initiate a renew now. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2255,7 +2255,7 @@ The default value is 42 and the valid values are 1-1000. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[1-1000]` | | Default Value | 42 | @@ -2273,7 +2273,7 @@ The default value is 42 and the valid values are 1-1000. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -2296,7 +2296,7 @@ How long after the enrollment cert has expiried to keep trying to renew. | Property name | Property value | |:--|:--| -| Format | time | +| Format | `time` | | Access Type | Add, Get, Replace | @@ -2312,7 +2312,7 @@ How long after the enrollment cert has expiried to keep trying to renew. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2337,7 +2337,7 @@ Optional. This parameter specifies retry interval when previous renew failed (in | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[1-1000]` | | Default Value | 7 | @@ -2355,7 +2355,7 @@ Optional. This parameter specifies retry interval when previous renew failed (in | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2380,7 +2380,7 @@ Optional. Notify the client whether enrollment server supports ROBO auto certifi | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | true | @@ -2405,7 +2405,7 @@ Optional. Notify the client whether enrollment server supports ROBO auto certifi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2432,7 +2432,7 @@ If this node doesn't exist, the client uses the initial certificate enrollment U | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2448,7 +2448,7 @@ If this node doesn't exist, the client uses the initial certificate enrollment U | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2471,7 +2471,7 @@ Show the latest action status for this certificate. Supported values are one of | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -2487,7 +2487,7 @@ Show the latest action status for this certificate. Supported values are one of | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2510,7 +2510,7 @@ This store holds only root (self-signed) certificates. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -2526,7 +2526,7 @@ This store holds only root (self-signed) certificates. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2549,7 +2549,7 @@ The SHA1 hash for the certificate. The 20-byte SHA1 hash of the certificate is s | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Delete, Get | | Dynamic Node Naming | UniqueName: The SHA1 hash for the certificate. | @@ -2566,7 +2566,7 @@ The SHA1 hash for the certificate. The 20-byte SHA1 hash of the certificate is s | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2589,7 +2589,7 @@ The base64 Encoded X.509 certificate. | Property name | Property value | |:--|:--| -| Format | b64 | +| Format | `b64` | | Access Type | Add, Get, Replace | @@ -2605,7 +2605,7 @@ The base64 Encoded X.509 certificate. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2628,7 +2628,7 @@ The name of the certificate issuer. This node is implicitly created only when th | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2644,7 +2644,7 @@ The name of the certificate issuer. This node is implicitly created only when th | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2667,7 +2667,7 @@ The name of the certificate subject. This node is implicitly created only when t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2683,7 +2683,7 @@ The name of the certificate subject. This node is implicitly created only when t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2706,7 +2706,7 @@ Returns the certificate template name. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2722,7 +2722,7 @@ Returns the certificate template name. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2745,7 +2745,7 @@ The starting date of the certificate's validity. This node is implicitly created | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2761,7 +2761,7 @@ The starting date of the certificate's validity. This node is implicitly created | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2784,7 +2784,7 @@ The expiration date of the certificate. This node is implicitly created only whe | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2800,7 +2800,7 @@ The expiration date of the certificate. This node is implicitly created only whe | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2823,7 +2823,7 @@ This store holds the System portion of the root store. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -2839,7 +2839,7 @@ This store holds the System portion of the root store. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2862,7 +2862,7 @@ The SHA1 hash for the certificate. The 20-byte SHA1 hash of the certificate is s | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Delete, Get | | Dynamic Node Naming | UniqueName: The SHA1 hash for the certificate. | @@ -2879,7 +2879,7 @@ The SHA1 hash for the certificate. The 20-byte SHA1 hash of the certificate is s | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2902,7 +2902,7 @@ The base64 Encoded X.509 certificate. | Property name | Property value | |:--|:--| -| Format | b64 | +| Format | `b64` | | Access Type | Add, Get, Replace | @@ -2918,7 +2918,7 @@ The base64 Encoded X.509 certificate. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2941,7 +2941,7 @@ The name of the certificate issuer. This node is implicitly created only when th | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2957,7 +2957,7 @@ The name of the certificate issuer. This node is implicitly created only when th | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2980,7 +2980,7 @@ The name of the certificate subject. This node is implicitly created only when t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2996,7 +2996,7 @@ The name of the certificate subject. This node is implicitly created only when t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3019,7 +3019,7 @@ Returns the certificate template name. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -3035,7 +3035,7 @@ Returns the certificate template name. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3058,7 +3058,7 @@ The starting date of the certificate's validity. This node is implicitly created | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -3074,7 +3074,7 @@ The starting date of the certificate's validity. This node is implicitly created | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3097,7 +3097,7 @@ The expiration date of the certificate. This node is implicitly created only whe | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | diff --git a/windows/client-management/mdm/clientcertificateinstall-csp.md b/windows/client-management/mdm/clientcertificateinstall-csp.md index 630acc3431..8e74c3c59e 100644 --- a/windows/client-management/mdm/clientcertificateinstall-csp.md +++ b/windows/client-management/mdm/clientcertificateinstall-csp.md @@ -4,7 +4,7 @@ description: Learn more about the ClientCertificateInstall CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 02/28/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -111,7 +111,7 @@ The following list shows the ClientCertificateInstall configuration service prov | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -134,7 +134,7 @@ Required for PFX certificate installation. The parent node grouping the PFX cert | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -150,7 +150,7 @@ Required for PFX certificate installation. The parent node grouping the PFX cert | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -162,7 +162,9 @@ Required for PFX certificate installation. The parent node grouping the PFX cert Required for PFX certificate installation. A unique ID to differentiate different certificate install requests. + Format is node. + Calling Delete on the this node, should delete the certificates and the keys that were installed by the corresponding PFX blob. @@ -175,7 +177,7 @@ Calling Delete on the this node, should delete the certificates and the keys tha | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | | Atomic Required | True | | Dynamic Node Naming | ServerGeneratedUniqueIdentifier | @@ -193,7 +195,7 @@ Calling Delete on the this node, should delete the certificates and the keys tha | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -205,7 +207,8 @@ Calling Delete on the this node, should delete the certificates and the keys tha Optional. -Specifies the NGC container name (if NGC KSP is chosen for above node). If this node is not specified when NGC KSP is chosen, enrollment will fail. + +Specifies the NGC container name (if NGC KSP is chosen for above node). If this node isn't specified when NGC KSP is chosen, enrollment will fail. @@ -217,7 +220,7 @@ Specifies the NGC container name (if NGC KSP is chosen for above node). If this | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get, Replace | @@ -233,7 +236,7 @@ Specifies the NGC container name (if NGC KSP is chosen for above node). If this | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -256,7 +259,7 @@ Required for PFX certificate installation. Indicates the KeyStorage provider to | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Get, Replace | @@ -283,7 +286,7 @@ Required for PFX certificate installation. Indicates the KeyStorage provider to | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -295,11 +298,14 @@ Required for PFX certificate installation. Indicates the KeyStorage provider to Required. -[CRYPT_DATA_BLOB](/previous-versions/windows/desktop/legacy/aa381414(v=vs.85)) structure that contains a PFX packet with the exported and encrypted certificates and keys. Add on this node will trigger the addition to the PFX certificate. This requires that all the other nodes under UniqueID that are parameters for PFX installation (Container Name, KeyLocation, CertPassword, fKeyExportable) are present before this is called. This will also set the Status node to the current Status of the operation. -If Add is called on this node and a blob already exists, it will fail. If Replace is called on this node, the certificates will be overwritten. -If Add is called on this node for a new PFX, the certificate will be added. If Replace is called on this node when it does not exist, this will fail. -In other words, using Replace or Add will result in the effect of either overwriting the old certificate or adding a new certificate +[CRYPT_DATA_BLOB](/previous-versions/windows/desktop/legacy/aa381414(v=vs.85)) structure that contains a PFX packet with the exported and encrypted certificates and keys. Add on this node will trigger the addition to the PFX certificate. This requires that all the other nodes under UniqueID that are parameters for PFX installation (Container Name, KeyLocation, CertPassword, fKeyExportable) are present before this is called. This will also set the Status node to the current Status of the operation. + +If Add is called on this node and a blob already exists, it will fail. If Replace is called on this node, the certificates will be overwritten. + +If Add is called on this node for a new PFX, the certificate will be added. If Replace is called on this node when it doesn't exist, this will fail. + +In other words, using Replace or Add will result in the effect of either overwriting the old certificate or adding a new certificate @@ -311,7 +317,7 @@ In other words, using Replace or Add will result in the effect of either overwri | Property name | Property value | |:--|:--| -| Format | bin | +| Format | `bin` | | Access Type | Add, Get, Replace | @@ -327,7 +333,7 @@ In other words, using Replace or Add will result in the effect of either overwri | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -350,7 +356,7 @@ Password that protects the PFX blob. This is required if the PFX is password pro | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get, Replace | @@ -366,7 +372,7 @@ Password that protects the PFX blob. This is required if the PFX is password pro | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -378,6 +384,7 @@ Password that protects the PFX blob. This is required if the PFX is password pro Optional. + When a value of "2" is contained iin PFXCertPasswordEncryptionType, specify the store name where the certificate for decrypting the PFXCertPassword is stored. @@ -390,7 +397,7 @@ When a value of "2" is contained iin PFXCertPasswordEncryptionType, specify the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get, Replace | | Dependency [EncryptionTypeDependency] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/ClientCertificateInstall/PFXCertInstall/[UniqueID]/PFXCertPasswordEncryptionType`
    Dependency Allowed Value: `[2]`
    Dependency Allowed Value Type: `Range`
    | @@ -407,7 +414,7 @@ When a value of "2" is contained iin PFXCertPasswordEncryptionType, specify the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -419,8 +426,9 @@ When a value of "2" is contained iin PFXCertPasswordEncryptionType, specify the Optional. Used to specify if the PFX certificate password is encrypted with a certificate. + If the value is -0 - Password is not encrypted +0 - Password isn't encrypted 1- Password is encrypted using the MDM certificate by the MDM server 2 - Password is encrypted by a Custom Certificate by the MDM server. When this value is used here, also specify the custom store name in the PFXCertPasswordEncryptionStore node. @@ -434,7 +442,7 @@ If the value is | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Get, Replace | | Default Value | 0 | @@ -444,7 +452,7 @@ If the value is | Value | Description | |:--|:--| -| 0 (Default) | Password is not encrypted. | +| 0 (Default) | Password isn't encrypted. | | 1 | Password is encrypted with the MDM certificate. | | 2 | Password is encrypted with custom certificate. | @@ -461,7 +469,7 @@ If the value is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -488,7 +496,7 @@ The PFX isn't exportable when it's installed to TPM. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Get, Replace | | Default Value | true | | Dependency [KeyLocationDependency] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/ClientCertificateInstall/PFXCertInstall/[UniqueID]/KeyLocation`
    Dependency Allowed Value: `[3]`
    Dependency Allowed Value Type: `Range`
    | @@ -515,7 +523,7 @@ The PFX isn't exportable when it's installed to TPM. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -538,7 +546,7 @@ Returns the error code of the PFX installation from the GetLastError command cal | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -554,7 +562,7 @@ Returns the error code of the PFX installation from the GetLastError command cal | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -577,7 +585,7 @@ Returns the thumbprint of the PFX certificate installed. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -593,7 +601,7 @@ Returns the thumbprint of the PFX certificate installed. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -616,7 +624,7 @@ Node for SCEP. An alert is sent after the SCEP certificate is installed. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -632,7 +640,7 @@ Node for SCEP. An alert is sent after the SCEP certificate is installed. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -644,6 +652,7 @@ Node for SCEP. An alert is sent after the SCEP certificate is installed. Required for SCEP certificate installation. A unique ID to differentiate different certificate install requests. + Calling Delete on the this node, should delete the corresponding SCEP certificate. @@ -656,7 +665,7 @@ Calling Delete on the this node, should delete the corresponding SCEP certificat | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | | Atomic Required | True | | Dynamic Node Naming | ServerGeneratedUniqueIdentifier | @@ -674,7 +683,7 @@ Calling Delete on the this node, should delete the corresponding SCEP certificat | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -685,7 +694,7 @@ Calling Delete on the this node, should delete the corresponding SCEP certificat -Optional. Specify the current cert's thumbprint if certificate enrollment succeeds. It is a 20-byte value of the SHA1 certificate hash specified as a hexadecimal string value. +Optional. Specify the current cert's thumbprint if certificate enrollment succeeds. It's a 20-byte value of the SHA1 certificate hash specified as a hexadecimal string value. @@ -699,7 +708,7 @@ Optional. Specify the current cert's thumbprint if certificate enrollment succee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -715,7 +724,7 @@ Optional. Specify the current cert's thumbprint if certificate enrollment succee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -738,7 +747,7 @@ Optional. The integer value that indicates the HRESULT of the last enrollment er | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -754,7 +763,7 @@ Optional. The integer value that indicates the HRESULT of the last enrollment er | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -765,7 +774,7 @@ Optional. The integer value that indicates the HRESULT of the last enrollment er -Required for SCEP certificate enrollment. Parent node to group SCEP cert install related request. NOTE: though the children nodes under Install support Replace commands, once the Exec command is sent to the device, the device will take the values which are set when the Exec command is accepted. The server should not expect the node value change after Exec command is accepted will impact the current undergoing enrollment. The server should check the Status node value and make sure the device is not at unknown stage before changing children node values. +Required for SCEP certificate enrollment. Parent node to group SCEP cert install related request. NOTE: though the children nodes under Install support Replace commands, once the Exec command is sent to the device, the device will take the values which are set when the Exec command is accepted. The server shouldn't expect the node value change after Exec command is accepted will impact the current undergoing enrollment. The server should check the Status node value and make sure the device isn't at unknown stage before changing children node values. @@ -777,7 +786,7 @@ Required for SCEP certificate enrollment. Parent node to group SCEP cert install | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | @@ -793,7 +802,7 @@ Required for SCEP certificate enrollment. Parent node to group SCEP cert install | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -816,7 +825,7 @@ Optional. Specify the AAD Key Identifier List as a semicolon separated values. O | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -832,7 +841,7 @@ Optional. Specify the AAD Key Identifier List as a semicolon separated values. O | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -843,7 +852,7 @@ Optional. Specify the AAD Key Identifier List as a semicolon separated values. O -Required. Specify root CA thumbprint. It is a 20-byte value of the SHA1 certificate hash specified as a hexadecimal string value. When client authenticates SCEP server, it checks CA cert from SCEP server whether match with this cert. If no match is found, authentication will fail. +Required. Specify root CA thumbprint. It's a 20-byte value of the SHA1 certificate hash specified as a hexadecimal string value. When client authenticates SCEP server, it checks CA cert from SCEP server whether match with this cert. If no match is found, authentication will fail. @@ -855,7 +864,7 @@ Required. Specify root CA thumbprint. It is a 20-byte value of the SHA1 certific | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -871,7 +880,7 @@ Required. Specify root CA thumbprint. It is a 20-byte value of the SHA1 certific | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -894,7 +903,7 @@ Required for SCEP certificate enrollment. B64 encoded SCEP enrollment challenge. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -910,7 +919,7 @@ Required for SCEP certificate enrollment. B64 encoded SCEP enrollment challenge. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -922,7 +931,8 @@ Required for SCEP certificate enrollment. B64 encoded SCEP enrollment challenge. Optional. -Specifies the NGC container name (if NGC KSP is chosen for above node). If this node is not specified when NGC KSP is chosen, enrollment will fail. + +Specifies the NGC container name (if NGC KSP is chosen for above node). If this node isn't specified when NGC KSP is chosen, enrollment will fail. @@ -934,7 +944,7 @@ Specifies the NGC container name (if NGC KSP is chosen for above node). If this | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -950,7 +960,7 @@ Specifies the NGC container name (if NGC KSP is chosen for above node). If this | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -973,7 +983,7 @@ Optional. Specifies the custom text to show on the NGC PIN prompt during certifi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -989,7 +999,7 @@ Optional. Specifies the custom text to show on the NGC PIN prompt during certifi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1012,7 +1022,7 @@ Required. Specify extended key usages. Subjected to SCEP server configuration. T | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1028,7 +1038,7 @@ Required. Specify extended key usages. Subjected to SCEP server configuration. T | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1039,7 +1049,7 @@ Required. Specify extended key usages. Subjected to SCEP server configuration. T -Required. Trigger the device to start the cert enrollment. The device will not notify MDM server after cert enrollment is done. The MDM server could later query the device to find out whether new cert is added. +Required. Trigger the device to start the cert enrollment. The device won't notify MDM server after cert enrollment is done. The MDM server could later query the device to find out whether new cert is added. @@ -1051,7 +1061,7 @@ Required. Trigger the device to start the cert enrollment. The device will not n | Property name | Property value | |:--|:--| -| Format | null | +| Format | `null` | | Access Type | Exec | @@ -1067,7 +1077,7 @@ Required. Trigger the device to start the cert enrollment. The device will not n | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1092,7 +1102,7 @@ For NGC, only SHA256 is supported as the supported algorithm. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1108,7 +1118,7 @@ For NGC, only SHA256 is supported as the supported algorithm. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1120,6 +1130,7 @@ For NGC, only SHA256 is supported as the supported algorithm. Required for enrollment. Specify private key length (RSA). + Valid value: 1024, 2048, 4096. For NGC, only 2048 is the supported keylength. @@ -1134,7 +1145,7 @@ Valid value: 1024, 2048, 4096. For NGC, only 2048 is the supported keylength. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -1160,7 +1171,7 @@ Valid value: 1024, 2048, 4096. For NGC, only 2048 is the supported keylength. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1171,7 +1182,8 @@ Valid value: 1024, 2048, 4096. For NGC, only 2048 is the supported keylength. -Optional. Specify where to keep the private key. **Note** that even it is protected by TPM, it is not guarded with TPM PIN. +Optional. Specify where to keep the private key. Note that even it's protected by TPM, it isn't guarded with TPM PIN. + SCEP enrolled cert doesn't support TPM PIN protection. @@ -1184,7 +1196,7 @@ SCEP enrolled cert doesn't support TPM PIN protection. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 3 | @@ -1212,7 +1224,7 @@ SCEP enrolled cert doesn't support TPM PIN protection. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1235,7 +1247,7 @@ Required for enrollment. Specify the key usage bits (0x80, 0x20, 0xA0, etc.) for | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -1251,7 +1263,7 @@ Required for enrollment. Specify the key usage bits (0x80, 0x20, 0xA0, etc.) for | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1262,7 +1274,8 @@ Required for enrollment. Specify the key usage bits (0x80, 0x20, 0xA0, etc.) for -Optional. Special to SCEP. Specify device retry times when the SCEP sever sends pending status. Format is int. Default value is 3. Max value: the value cannot be larger than 30. If it is larger than 30, the device will use 30. +Optional. Special to SCEP. Specify device retry times when the SCEP sever sends pending status. Format is int. Default value is 3. Max value: the value can't be larger than 30. If it's larger than 30, the device will use 30. + The min value is 0 which means no retry. @@ -1275,7 +1288,7 @@ The min value is 0 which means no retry. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-30]` | | Default Value | 3 | @@ -1293,7 +1306,7 @@ The min value is 0 which means no retry. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1319,7 +1332,7 @@ The min value is 1. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-4294967295]` | | Default Value | 5 | @@ -1337,7 +1350,7 @@ The min value is 1. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1360,7 +1373,7 @@ Required for SCEP certificate enrollment. Specify the cert enrollment server. Th | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1376,7 +1389,7 @@ Required for SCEP certificate enrollment. Specify the cert enrollment server. Th | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1399,7 +1412,7 @@ Optional. Specify subject alternative name. Multiple alternative names could be | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1415,7 +1428,7 @@ Optional. Specify subject alternative name. Multiple alternative names could be | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1439,7 +1452,7 @@ For more information, see [CertNameToStrA function](/windows/win32/api/wincrypt/ | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1455,7 +1468,7 @@ For more information, see [CertNameToStrA function](/windows/win32/api/wincrypt/ | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1466,7 +1479,7 @@ For more information, see [CertNameToStrA function](/windows/win32/api/wincrypt/ -Optional. OID of certificate template name. **Note** that this name is typically ignored by the SCEP server, therefore the MDM server typically doesn't need to provide it. +Optional. OID of certificate template name. Note that this name is typically ignored by the SCEP server, therefore the MDM server typically doesn't need to provide it. @@ -1478,7 +1491,7 @@ Optional. OID of certificate template name. **Note** that this name is typically | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1494,7 +1507,7 @@ Optional. OID of certificate template name. **Note** that this name is typically | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1506,7 +1519,8 @@ Optional. OID of certificate template name. **Note** that this name is typically Optional. Specify the units for valid period. Valid values are: Days(Default), Months, Years. -MDM server expected certificate validation period (ValidPeriodUnits + ValidPeriod) the SCEP server as part of certificate enrollment request. It is the server's decision on how to use this valid period to create the certificate. + +MDM server expected certificate validation period (ValidPeriodUnits + ValidPeriod) the SCEP server as part of certificate enrollment request. It's the server's decision on how to use this valid period to create the certificate. @@ -1518,7 +1532,7 @@ MDM server expected certificate validation period (ValidPeriodUnits + ValidPerio | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Default Value | Days | @@ -1545,7 +1559,7 @@ MDM server expected certificate validation period (ValidPeriodUnits + ValidPerio | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1556,10 +1570,10 @@ MDM server expected certificate validation period (ValidPeriodUnits + ValidPerio -Optional. Specify desired number of units used in validity period. Subjected to SCEP server configuration. Default is 0. The units are defined in ValidPeriod node. **Note** the valid period specified by MDM will overwrite the valid period specified in cert template. For example, if ValidPeriod is days and ValidPeriodUnits is 30, it means the total valid duration is 30 days. +Optional. Specify desired number of units used in validity period. Subjected to SCEP server configuration. Default is 0. The units are defined in ValidPeriod node. Note the valid period specified by MDM will overwrite the valid period specified in cert template. For example, if ValidPeriod is days and ValidPeriodUnits is 30, it means the total valid duration is 30 days. > [!NOTE] -> The device only sends the MDM server expected certificate validation period (ValidPeriodUnits + ValidPeriod) the SCEP server as part of certificate enrollment request. It is the server's decision on how to use this valid period to create the certificate. +> The device only sends the MDM server expected certificate validation period (ValidPeriodUnits + ValidPeriod) the SCEP server as part of certificate enrollment request. It's the server's decision on how to use this valid period to create the certificate. @@ -1571,7 +1585,7 @@ Optional. Specify desired number of units used in validity period. Subjected to | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1588,7 +1602,7 @@ Optional. Specify desired number of units used in validity period. Subjected to | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1611,7 +1625,7 @@ Required. Returns the URL of the SCEP server that responded to the enrollment re | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1627,7 +1641,7 @@ Required. Returns the URL of the SCEP server that responded to the enrollment re | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1639,7 +1653,9 @@ Required. Returns the URL of the SCEP server that responded to the enrollment re Required. Specify the latest status for the certificate due to enroll request. + Valid values are: + 1 - finished successfully 2 - pending (the device hasn't finished the action but has received the SCEP server pending response) 32 - unknown @@ -1655,7 +1671,7 @@ Valid values are: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -1671,7 +1687,7 @@ Valid values are: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1694,7 +1710,7 @@ Required for PFX certificate installation. The parent node grouping the PFX cert | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1710,7 +1726,7 @@ Required for PFX certificate installation. The parent node grouping the PFX cert | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1722,7 +1738,9 @@ Required for PFX certificate installation. The parent node grouping the PFX cert Required for PFX certificate installation. A unique ID to differentiate different certificate install requests. + Format is node. + Calling Delete on the this node, should delete the certificates and the keys that were installed by the corresponding PFX blob. @@ -1735,7 +1753,7 @@ Calling Delete on the this node, should delete the certificates and the keys tha | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | | Atomic Required | True | | Dynamic Node Naming | ServerGeneratedUniqueIdentifier | @@ -1753,7 +1771,7 @@ Calling Delete on the this node, should delete the certificates and the keys tha | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1765,7 +1783,8 @@ Calling Delete on the this node, should delete the certificates and the keys tha Optional. -Specifies the NGC container name (if NGC KSP is chosen for above node). If this node is not specified when NGC KSP is chosen, enrollment will fail. + +Specifies the NGC container name (if NGC KSP is chosen for above node). If this node isn't specified when NGC KSP is chosen, enrollment will fail. @@ -1777,7 +1796,7 @@ Specifies the NGC container name (if NGC KSP is chosen for above node). If this | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get, Replace | @@ -1793,7 +1812,7 @@ Specifies the NGC container name (if NGC KSP is chosen for above node). If this | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1816,7 +1835,7 @@ Required for PFX certificate installation. Indicates the KeyStorage provider to | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Get, Replace | @@ -1843,7 +1862,7 @@ Required for PFX certificate installation. Indicates the KeyStorage provider to | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1855,11 +1874,14 @@ Required for PFX certificate installation. Indicates the KeyStorage provider to Required. -[CRYPT_DATA_BLOB](/previous-versions/windows/desktop/legacy/aa381414(v=vs.85)) structure that contains a PFX packet with the exported and encrypted certificates and keys. Add on this node will trigger the addition to the PFX certificate. This requires that all the other nodes under UniqueID that are parameters for PFX installation (Container Name, KeyLocation, CertPassword, fKeyExportable) are present before this is called. This will also set the Status node to the current Status of the operation. -If Add is called on this node and a blob already exists, it will fail. If Replace is called on this node, the certificates will be overwritten. -If Add is called on this node for a new PFX, the certificate will be added. If Replace is called on this node when it does not exist, this will fail. -In other words, using Replace or Add will result in the effect of either overwriting the old certificate or adding a new certificate +[CRYPT_DATA_BLOB](/previous-versions/windows/desktop/legacy/aa381414(v=vs.85)) structure that contains a PFX packet with the exported and encrypted certificates and keys. Add on this node will trigger the addition to the PFX certificate. This requires that all the other nodes under UniqueID that are parameters for PFX installation (Container Name, KeyLocation, CertPassword, fKeyExportable) are present before this is called. This will also set the Status node to the current Status of the operation. + +If Add is called on this node and a blob already exists, it will fail. If Replace is called on this node, the certificates will be overwritten. + +If Add is called on this node for a new PFX, the certificate will be added. If Replace is called on this node when it doesn't exist, this will fail. + +In other words, using Replace or Add will result in the effect of either overwriting the old certificate or adding a new certificate @@ -1871,7 +1893,7 @@ In other words, using Replace or Add will result in the effect of either overwri | Property name | Property value | |:--|:--| -| Format | bin | +| Format | `bin` | | Access Type | Add, Get, Replace | @@ -1887,7 +1909,7 @@ In other words, using Replace or Add will result in the effect of either overwri | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1910,7 +1932,7 @@ Password that protects the PFX blob. This is required if the PFX is password pro | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get, Replace | @@ -1926,7 +1948,7 @@ Password that protects the PFX blob. This is required if the PFX is password pro | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1938,6 +1960,7 @@ Password that protects the PFX blob. This is required if the PFX is password pro Optional. + When a value of "2" is contained iin PFXCertPasswordEncryptionType, specify the store name where the certificate for decrypting the PFXCertPassword is stored. @@ -1950,7 +1973,7 @@ When a value of "2" is contained iin PFXCertPasswordEncryptionType, specify the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get, Replace | | Dependency [EncryptionTypeDependency] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/ClientCertificateInstall/PFXCertInstall/[UniqueID]/PFXCertPasswordEncryptionType`
    Dependency Allowed Value: `[2]`
    Dependency Allowed Value Type: `Range`
    | @@ -1967,7 +1990,7 @@ When a value of "2" is contained iin PFXCertPasswordEncryptionType, specify the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1979,8 +2002,9 @@ When a value of "2" is contained iin PFXCertPasswordEncryptionType, specify the Optional. Used to specify if the PFX certificate password is encrypted with a certificate. + If the value is -0 - Password is not encrypted +0 - Password isn't encrypted 1- Password is encrypted using the MDM certificate by the MDM server 2 - Password is encrypted by a Custom Certificate by the MDM server. When this value is used here, also specify the custom store name in the PFXCertPasswordEncryptionStore node. @@ -1994,7 +2018,7 @@ If the value is | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Get, Replace | | Default Value | 0 | @@ -2004,7 +2028,7 @@ If the value is | Value | Description | |:--|:--| -| 0 (Default) | Password is not encrypted. | +| 0 (Default) | Password isn't encrypted. | | 1 | Password is encrypted with the MDM certificate. | | 2 | Password is encrypted with custom certificate. | @@ -2021,7 +2045,7 @@ If the value is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2046,7 +2070,7 @@ Optional. Used to specify if the private key installed is exportable (can be exp | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Get, Replace | | Default Value | true | | Dependency [KeyLocationDependency] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/ClientCertificateInstall/PFXCertInstall/[UniqueID]/KeyLocation`
    Dependency Allowed Value: `[3]`
    Dependency Allowed Value Type: `Range`
    | @@ -2073,7 +2097,7 @@ Optional. Used to specify if the private key installed is exportable (can be exp | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2096,7 +2120,7 @@ Returns the error code of the PFX installation from the GetLastError command cal | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -2112,7 +2136,7 @@ Returns the error code of the PFX installation from the GetLastError command cal | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2135,7 +2159,7 @@ Returns the thumbprint of the PFX certificate installed. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2151,7 +2175,7 @@ Returns the thumbprint of the PFX certificate installed. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2174,7 +2198,7 @@ Node for SCEP. An alert is sent after the SCEP certificate is installed. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -2190,7 +2214,7 @@ Node for SCEP. An alert is sent after the SCEP certificate is installed. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2202,6 +2226,7 @@ Node for SCEP. An alert is sent after the SCEP certificate is installed. Required for SCEP certificate installation. A unique ID to differentiate different certificate install requests. + Calling Delete on the this node, should delete the corresponding SCEP certificate. @@ -2214,7 +2239,7 @@ Calling Delete on the this node, should delete the corresponding SCEP certificat | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | | Atomic Required | True | | Dynamic Node Naming | ServerGeneratedUniqueIdentifier | @@ -2232,7 +2257,7 @@ Calling Delete on the this node, should delete the corresponding SCEP certificat | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2243,7 +2268,7 @@ Calling Delete on the this node, should delete the corresponding SCEP certificat -Optional. Specify the current cert's thumbprint if certificate enrollment succeeds. It is a 20-byte value of the SHA1 certificate hash specified as a hexadecimal string value. +Optional. Specify the current cert's thumbprint if certificate enrollment succeeds. It's a 20-byte value of the SHA1 certificate hash specified as a hexadecimal string value. @@ -2257,7 +2282,7 @@ Optional. Specify the current cert's thumbprint if certificate enrollment succee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2273,7 +2298,7 @@ Optional. Specify the current cert's thumbprint if certificate enrollment succee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2296,7 +2321,7 @@ Optional. The integer value that indicates the HRESULT of the last enrollment er | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -2312,7 +2337,7 @@ Optional. The integer value that indicates the HRESULT of the last enrollment er | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2323,7 +2348,7 @@ Optional. The integer value that indicates the HRESULT of the last enrollment er -Required for SCEP certificate enrollment. Parent node to group SCEP cert install related request. NOTE: though the children nodes under Install support Replace commands, once the Exec command is sent to the device, the device will take the values which are set when the Exec command is accepted. The server should not expect the node value change after Exec command is accepted will impact the current undergoing enrollment. The server should check the Status node value and make sure the device is not at unknown stage before changing children node values. +Required for SCEP certificate enrollment. Parent node to group SCEP cert install related request. NOTE: though the children nodes under Install support Replace commands, once the Exec command is sent to the device, the device will take the values which are set when the Exec command is accepted. The server shouldn't expect the node value change after Exec command is accepted will impact the current undergoing enrollment. The server should check the Status node value and make sure the device isn't at unknown stage before changing children node values. @@ -2335,7 +2360,7 @@ Required for SCEP certificate enrollment. Parent node to group SCEP cert install | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | @@ -2351,7 +2376,7 @@ Required for SCEP certificate enrollment. Parent node to group SCEP cert install | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -2374,7 +2399,7 @@ Optional. Specify the AAD Key Identifier List as a semicolon separated values. O | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2390,7 +2415,7 @@ Optional. Specify the AAD Key Identifier List as a semicolon separated values. O | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2401,7 +2426,7 @@ Optional. Specify the AAD Key Identifier List as a semicolon separated values. O -Required. Specify root CA thumbprint. It is a 20-byte value of the SHA1 certificate hash specified as a hexadecimal string value. When client authenticates SCEP server, it checks CA cert from SCEP server whether match with this cert. If no match is found, authentication will fail. +Required. Specify root CA thumbprint. It's a 20-byte value of the SHA1 certificate hash specified as a hexadecimal string value. When client authenticates SCEP server, it checks CA cert from SCEP server whether match with this cert. If no match is found, authentication will fail. @@ -2413,7 +2438,7 @@ Required. Specify root CA thumbprint. It is a 20-byte value of the SHA1 certific | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2429,7 +2454,7 @@ Required. Specify root CA thumbprint. It is a 20-byte value of the SHA1 certific | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2452,7 +2477,7 @@ Required for SCEP certificate enrollment. B64 encoded SCEP enrollment challenge. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2468,7 +2493,7 @@ Required for SCEP certificate enrollment. B64 encoded SCEP enrollment challenge. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2480,7 +2505,8 @@ Required for SCEP certificate enrollment. B64 encoded SCEP enrollment challenge. Optional. -Specifies the NGC container name (if NGC KSP is chosen for above node). If this node is not specified when NGC KSP is chosen, enrollment will fail. + +Specifies the NGC container name (if NGC KSP is chosen for above node). If this node isn't specified when NGC KSP is chosen, enrollment will fail. @@ -2492,7 +2518,7 @@ Specifies the NGC container name (if NGC KSP is chosen for above node). If this | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2508,7 +2534,7 @@ Specifies the NGC container name (if NGC KSP is chosen for above node). If this | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2531,7 +2557,7 @@ Optional. Specifies the custom text to show on the NGC PIN prompt during certifi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2547,7 +2573,7 @@ Optional. Specifies the custom text to show on the NGC PIN prompt during certifi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2570,7 +2596,7 @@ Required. Specify extended key usages. Subjected to SCEP server configuration. T | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2586,7 +2612,7 @@ Required. Specify extended key usages. Subjected to SCEP server configuration. T | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2597,7 +2623,7 @@ Required. Specify extended key usages. Subjected to SCEP server configuration. T -Required. Trigger the device to start the cert enrollment. The device will not notify MDM server after cert enrollment is done. The MDM server could later query the device to find out whether new cert is added. +Required. Trigger the device to start the cert enrollment. The device won't notify MDM server after cert enrollment is done. The MDM server could later query the device to find out whether new cert is added. @@ -2609,7 +2635,7 @@ Required. Trigger the device to start the cert enrollment. The device will not n | Property name | Property value | |:--|:--| -| Format | null | +| Format | `null` | | Access Type | Exec | @@ -2625,7 +2651,7 @@ Required. Trigger the device to start the cert enrollment. The device will not n | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2650,7 +2676,7 @@ For NGC, only SHA256 is supported as the supported algorithm. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2666,7 +2692,7 @@ For NGC, only SHA256 is supported as the supported algorithm. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2678,6 +2704,7 @@ For NGC, only SHA256 is supported as the supported algorithm. Required for enrollment. Specify private key length (RSA). + Valid value: 1024, 2048, 4096. For NGC, only 2048 is the supported keylength. @@ -2692,7 +2719,7 @@ Valid value: 1024, 2048, 4096. For NGC, only 2048 is the supported keylength. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -2718,7 +2745,7 @@ Valid value: 1024, 2048, 4096. For NGC, only 2048 is the supported keylength. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2729,7 +2756,8 @@ Valid value: 1024, 2048, 4096. For NGC, only 2048 is the supported keylength. -Optional. Specify where to keep the private key. **Note** that even it is protected by TPM, it is not guarded with TPM PIN. +Optional. Specify where to keep the private key. Note that even it's protected by TPM, it isn't guarded with TPM PIN. + SCEP enrolled cert doesn't support TPM PIN protection. @@ -2742,7 +2770,7 @@ SCEP enrolled cert doesn't support TPM PIN protection. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 3 | @@ -2770,7 +2798,7 @@ SCEP enrolled cert doesn't support TPM PIN protection. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2793,7 +2821,7 @@ Required for enrollment. Specify the key usage bits (0x80, 0x20, 0xA0, etc.) for | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -2809,7 +2837,7 @@ Required for enrollment. Specify the key usage bits (0x80, 0x20, 0xA0, etc.) for | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2820,7 +2848,8 @@ Required for enrollment. Specify the key usage bits (0x80, 0x20, 0xA0, etc.) for -Optional. Special to SCEP. Specify device retry times when the SCEP sever sends pending status. Format is int. Default value is 3. Max value: the value cannot be larger than 30. If it is larger than 30, the device will use 30. +Optional. Special to SCEP. Specify device retry times when the SCEP sever sends pending status. Format is int. Default value is 3. Max value: the value can't be larger than 30. If it's larger than 30, the device will use 30. + The min value is 0 which means no retry. @@ -2833,7 +2862,7 @@ The min value is 0 which means no retry. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-30]` | | Default Value | 3 | @@ -2851,7 +2880,7 @@ The min value is 0 which means no retry. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2877,7 +2906,7 @@ The min value is 1. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-4294967295]` | | Default Value | 5 | @@ -2895,7 +2924,7 @@ The min value is 1. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2918,7 +2947,7 @@ Required for SCEP certificate enrollment. Specify the cert enrollment server. Th | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2934,7 +2963,7 @@ Required for SCEP certificate enrollment. Specify the cert enrollment server. Th | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2957,7 +2986,7 @@ Optional. Specify subject alternative name. Multiple alternative names could be | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2973,7 +3002,7 @@ Optional. Specify subject alternative name. Multiple alternative names could be | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2997,7 +3026,7 @@ For more information, see [CertNameToStrA function](/windows/win32/api/wincrypt/ | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -3013,7 +3042,7 @@ For more information, see [CertNameToStrA function](/windows/win32/api/wincrypt/ | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3024,7 +3053,7 @@ For more information, see [CertNameToStrA function](/windows/win32/api/wincrypt/ -Optional. OID of certificate template name. **Note** that this name is typically ignored by the SCEP server, therefore the MDM server typically doesn't need to provide it. +Optional. OID of certificate template name. Note that this name is typically ignored by the SCEP server, therefore the MDM server typically doesn't need to provide it. @@ -3036,7 +3065,7 @@ Optional. OID of certificate template name. **Note** that this name is typically | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -3052,7 +3081,7 @@ Optional. OID of certificate template name. **Note** that this name is typically | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3064,7 +3093,8 @@ Optional. OID of certificate template name. **Note** that this name is typically Optional. Specify the units for valid period. Valid values are: Days(Default), Months, Years. -MDM server expected certificate validation period (ValidPeriodUnits + ValidPeriod) the SCEP server as part of certificate enrollment request. It is the server's decision on how to use this valid period to create the certificate. + +MDM server expected certificate validation period (ValidPeriodUnits + ValidPeriod) the SCEP server as part of certificate enrollment request. It's the server's decision on how to use this valid period to create the certificate. @@ -3076,7 +3106,7 @@ MDM server expected certificate validation period (ValidPeriodUnits + ValidPerio | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Default Value | Days | @@ -3103,7 +3133,7 @@ MDM server expected certificate validation period (ValidPeriodUnits + ValidPerio | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3114,10 +3144,10 @@ MDM server expected certificate validation period (ValidPeriodUnits + ValidPerio -Optional. Specify desired number of units used in validity period. Subjected to SCEP server configuration. Default is 0. The units are defined in ValidPeriod node. **Note** the valid period specified by MDM will overwrite the valid period specified in cert template. For example, if ValidPeriod is days and ValidPeriodUnits is 30, it means the total valid duration is 30 days. +Optional. Specify desired number of units used in validity period. Subjected to SCEP server configuration. Default is 0. The units are defined in ValidPeriod node. Note the valid period specified by MDM will overwrite the valid period specified in cert template. For example, if ValidPeriod is days and ValidPeriodUnits is 30, it means the total valid duration is 30 days. > [!NOTE] -> The device only sends the MDM server expected certificate validation period (ValidPeriodUnits + ValidPeriod) the SCEP server as part of certificate enrollment request. It is the server's decision on how to use this valid period to create the certificate. +> The device only sends the MDM server expected certificate validation period (ValidPeriodUnits + ValidPeriod) the SCEP server as part of certificate enrollment request. It's the server's decision on how to use this valid period to create the certificate. @@ -3129,7 +3159,7 @@ Optional. Specify desired number of units used in validity period. Subjected to | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -3146,7 +3176,7 @@ Optional. Specify desired number of units used in validity period. Subjected to | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3169,7 +3199,7 @@ Required. Returns the URL of the SCEP server that responded to the enrollment re | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -3185,7 +3215,7 @@ Required. Returns the URL of the SCEP server that responded to the enrollment re | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3197,7 +3227,9 @@ Required. Returns the URL of the SCEP server that responded to the enrollment re Required. Specify the latest status for the certificate due to enroll request. + Valid values are: + 1 - finished successfully 2 - pending (the device hasn't finished the action but has received the SCEP server pending response) 32 - unknown @@ -3213,7 +3245,7 @@ Valid values are: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | diff --git a/windows/client-management/mdm/defender-csp.md b/windows/client-management/mdm/defender-csp.md index 9ec146c353..72fb71fe7b 100644 --- a/windows/client-management/mdm/defender-csp.md +++ b/windows/client-management/mdm/defender-csp.md @@ -4,7 +4,7 @@ description: Learn more about the Defender CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 05/01/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -118,7 +118,7 @@ The following list shows the Defender configuration service provider nodes: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -141,7 +141,7 @@ An interior node to group Windows Defender configuration information. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -157,7 +157,7 @@ An interior node to group Windows Defender configuration information. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -180,7 +180,7 @@ This settings controls whether Network Protection is allowed to enable datagram | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -206,7 +206,7 @@ This settings controls whether Network Protection is allowed to enable datagram | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -229,7 +229,7 @@ This settings controls whether Network Protection is allowed to be configured in | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -255,7 +255,7 @@ This settings controls whether Network Protection is allowed to be configured in | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -278,7 +278,7 @@ This settings controls whether Network Protection is allowed to be configured in | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -304,7 +304,7 @@ This settings controls whether Network Protection is allowed to be configured in | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -327,7 +327,7 @@ Apply ASR only per rule exclusions. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -343,7 +343,7 @@ Apply ASR only per rule exclusions. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -366,7 +366,7 @@ Define data duplication directory for device control. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -382,7 +382,7 @@ Define data duplication directory for device control. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -405,7 +405,7 @@ Define the retention period in days of how much time the evidence data will be k | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[1-120]` | | Default Value | 60 | @@ -423,7 +423,7 @@ Define the retention period in days of how much time the evidence data will be k | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -446,7 +446,7 @@ Define data duplication remote location for device control. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -462,7 +462,7 @@ Define data duplication remote location for device control. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -485,7 +485,7 @@ Control Device Control default enforcement. This is the enforcement applied if t | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -511,7 +511,7 @@ Control Device Control default enforcement. This is the enforcement applied if t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -533,7 +533,7 @@ Control Device Control default enforcement. This is the enforcement applied if t | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -549,7 +549,7 @@ Control Device Control default enforcement. This is the enforcement applied if t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -571,7 +571,7 @@ Control Device Control default enforcement. This is the enforcement applied if t | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -587,7 +587,7 @@ Control Device Control default enforcement. This is the enforcement applied if t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -609,7 +609,7 @@ Control Device Control default enforcement. This is the enforcement applied if t | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | @@ -625,7 +625,7 @@ Control Device Control default enforcement. This is the enforcement applied if t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -648,7 +648,7 @@ For more information, see [Microsoft Defender for Endpoint Device Control Remova | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -664,7 +664,7 @@ For more information, see [Microsoft Defender for Endpoint Device Control Remova | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -686,7 +686,7 @@ For more information, see [Microsoft Defender for Endpoint Device Control Remova | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -702,7 +702,7 @@ For more information, see [Microsoft Defender for Endpoint Device Control Remova | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -724,7 +724,7 @@ For more information, see [Microsoft Defender for Endpoint Device Control Remova | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | @@ -740,7 +740,7 @@ For more information, see [Microsoft Defender for Endpoint Device Control Remova | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -763,7 +763,7 @@ For more information, see [Microsoft Defender for Endpoint Device Control Remova | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -779,7 +779,7 @@ For more information, see [Microsoft Defender for Endpoint Device Control Remova | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -802,7 +802,7 @@ Control Device Control feature. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -828,7 +828,7 @@ Control Device Control feature. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -839,7 +839,7 @@ Control Device Control feature. -Indicates whether the CPU will be throttled for scheduled scans while the device is idle. This feature is enabled by default and will not throttle the CPU for scheduled scans performed when the device is otherwise idle, regardless of what ScanAvgCPULoadFactor is set to. For all other scheduled scans this flag will have no impact and normal throttling will occur. +Indicates whether the CPU will be throttled for scheduled scans while the device is idle. This feature is enabled by default and won't throttle the CPU for scheduled scans performed when the device is otherwise idle, regardless of what ScanAvgCPULoadFactor is set to. For all other scheduled scans this flag will have no impact and normal throttling will occur. @@ -851,7 +851,7 @@ Indicates whether the CPU will be throttled for scheduled scans while the device | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -877,7 +877,7 @@ Indicates whether the CPU will be throttled for scheduled scans while the device | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -900,7 +900,7 @@ This setting disables DNS over TCP Parsing for Network Protection. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -926,7 +926,7 @@ This setting disables DNS over TCP Parsing for Network Protection. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -949,7 +949,7 @@ This setting disables DNS Parsing for Network Protection. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -975,7 +975,7 @@ This setting disables DNS Parsing for Network Protection. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -998,7 +998,7 @@ This setting disables FTP Parsing for Network Protection. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1024,7 +1024,7 @@ This setting disables FTP Parsing for Network Protection. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1047,7 +1047,7 @@ Enable this policy to disable gradual rollout of Defender updates. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1073,7 +1073,7 @@ Enable this policy to disable gradual rollout of Defender updates. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1096,7 +1096,7 @@ This setting disables HTTP Parsing for Network Protection. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1122,7 +1122,7 @@ This setting disables HTTP Parsing for Network Protection. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1145,7 +1145,7 @@ This setting disables Inbound connection filtering for Network Protection. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1171,7 +1171,7 @@ This setting disables Inbound connection filtering for Network Protection. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1194,7 +1194,7 @@ When this value is set to false, it allows a local admin the ability to specify | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1220,7 +1220,7 @@ When this value is set to false, it allows a local admin the ability to specify | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1243,7 +1243,7 @@ This setting disables the gathering and send of performance telemetry from Netwo | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1269,7 +1269,7 @@ This setting disables the gathering and send of performance telemetry from Netwo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1292,7 +1292,7 @@ This setting disables RDP Parsing for Network Protection. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1318,7 +1318,7 @@ This setting disables RDP Parsing for Network Protection. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1341,7 +1341,7 @@ This setting disables SMTP Parsing for Network Protection. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1367,7 +1367,7 @@ This setting disables SMTP Parsing for Network Protection. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1390,7 +1390,7 @@ This setting disables SSH Parsing for Network Protection. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1416,7 +1416,7 @@ This setting disables SSH Parsing for Network Protection. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1439,7 +1439,7 @@ This setting disables TLS Parsing for Network Protection. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1465,7 +1465,7 @@ This setting disables TLS Parsing for Network Protection. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1488,7 +1488,7 @@ This setting enables the DNS Sinkhole feature for Network Protection, respecting | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1514,7 +1514,7 @@ This setting enables the DNS Sinkhole feature for Network Protection, respecting | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -1537,7 +1537,7 @@ Enables or disables file hash computation feature. When this feature is enabled | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1563,7 +1563,7 @@ Enables or disables file hash computation feature. When this feature is enabled | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1586,7 +1586,7 @@ Enable this policy to specify when devices receive Microsoft Defender engine upd | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1616,7 +1616,7 @@ Enable this policy to specify when devices receive Microsoft Defender engine upd | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -1641,7 +1641,7 @@ This policy setting controls whether or not exclusions are visible to local admi | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1652,7 +1652,7 @@ This policy setting controls whether or not exclusions are visible to local admi | Value | Description | |:--|:--| | 1 | If you enable this setting, local admins will no longer be able to see the exclusion list in Windows Security App or via PowerShell. | -| 0 (Default) | If you disable or do not configure this setting, local admins will be able to see exclusions in the Windows Security App and via PowerShell. | +| 0 (Default) | If you disable or don't configure this setting, local admins will be able to see exclusions in the Windows Security App and via PowerShell. | @@ -1667,7 +1667,7 @@ This policy setting controls whether or not exclusions are visible to local admi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -1690,7 +1690,7 @@ This policy setting controls whether or not exclusions are visible to local user | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1701,7 +1701,7 @@ This policy setting controls whether or not exclusions are visible to local user | Value | Description | |:--|:--| | 1 | If you enable this setting, local users will no longer be able to see the exclusion list in Windows Security App or via PowerShell. | -| 0 (Default) | If you disable or do not configure this setting, local users will be able to see exclusions in the Windows Security App and via PowerShell. | +| 0 (Default) | If you disable or don't configure this setting, local users will be able to see exclusions in the Windows Security App and via PowerShell. | @@ -1716,7 +1716,7 @@ This policy setting controls whether or not exclusions are visible to local user | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -1739,7 +1739,7 @@ This policy setting configures the Intel TDT integration level for Intel TDT-cap | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1749,7 +1749,7 @@ This policy setting configures the Intel TDT integration level for Intel TDT-cap | Value | Description | |:--|:--| -| 0 (Default) | If you do not configure this setting, the default value will be applied. The default value is controlled by Microsoft security intelligence updates. Microsoft will enable Intel TDT if there is a known threat. | +| 0 (Default) | If you don't configure this setting, the default value will be applied. The default value is controlled by Microsoft security intelligence updates. Microsoft will enable Intel TDT if there is a known threat. | | 1 | If you configure this setting to enabled, Intel TDT integration will turn on. | | 2 | If you configure this setting to disabled, Intel TDT integration will turn off. | @@ -1766,7 +1766,7 @@ This policy setting configures the Intel TDT integration level for Intel TDT-cap | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1789,7 +1789,7 @@ Allow managed devices to update through metered connections. Default is 0 - not | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1815,7 +1815,7 @@ Allow managed devices to update through metered connections. Default is 0 - not | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1838,7 +1838,7 @@ This setting allows you to configure whether real-time protection and Security I | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1849,7 +1849,7 @@ This setting allows you to configure whether real-time protection and Security I | Value | Description | |:--|:--| | 1 | If you enable this setting, real-time protection and Security Intelligence Updates are enabled during OOBE. | -| 0 (Default) | If you either disable or do not configure this setting, real-time protection and Security Intelligence Updates during OOBE is not enabled. | +| 0 (Default) | If you either disable or don't configure this setting, real-time protection and Security Intelligence Updates during OOBE isn't enabled. | @@ -1864,7 +1864,7 @@ This setting allows you to configure whether real-time protection and Security I | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1887,7 +1887,7 @@ Setting to control automatic remediation for Sense scans. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1914,7 +1914,7 @@ Setting to control automatic remediation for Sense scans. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1937,7 +1937,7 @@ Enable this policy to specify when devices receive Microsoft Defender platform u | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1967,7 +1967,7 @@ Enable this policy to specify when devices receive Microsoft Defender platform u | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1990,7 +1990,7 @@ In Microsoft Defender Antivirus, randomize the start time of the scan to any int | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -2016,7 +2016,7 @@ In Microsoft Defender Antivirus, randomize the start time of the scan to any int | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -2039,7 +2039,7 @@ In Microsoft Defender Antivirus, this setting will run scheduled scans only if t | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -2065,7 +2065,7 @@ In Microsoft Defender Antivirus, this setting will run scheduled scans only if t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -2088,7 +2088,7 @@ This setting allows you to configure the scheduler randomization in hours. The r | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[1-23]` | | Default Value | 4 | @@ -2106,7 +2106,7 @@ This setting allows you to configure the scheduler randomization in hours. The r | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -2117,7 +2117,7 @@ This setting allows you to configure the scheduler randomization in hours. The r -Defines what are the devices primary ids that should be secured by Defender Device Control. The primary id values should be pipe (|) separated. Example: RemovableMediaDevices|CdRomDevices. If this configuration is not set the default value will be applied, meaning all of the supported devices will be secured. +Defines what are the devices primary ids that should be secured by Defender Device Control. The primary id values should be pipe (|) separated. Example: RemovableMediaDevices|CdRomDevices. If this configuration isn't set the default value will be applied, meaning all of the supported devices will be secured. @@ -2129,7 +2129,7 @@ Defines what are the devices primary ids that should be secured by Defender Devi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2145,7 +2145,7 @@ Defines what are the devices primary ids that should be secured by Defender Devi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -2168,7 +2168,7 @@ Enable this policy to specify when devices receive Microsoft Defender security i | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2195,7 +2195,7 @@ Enable this policy to specify when devices receive Microsoft Defender security i | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -2230,7 +2230,7 @@ More details: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2246,7 +2246,7 @@ More details: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -2262,6 +2262,8 @@ Tamper protection helps protect important security features from unwanted change +> [!NOTE] +> Changes to this setting are not applied when [tamper protection][TAMPER-1] is enabled. @@ -2269,7 +2271,7 @@ Tamper protection helps protect important security features from unwanted change | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2286,7 +2288,7 @@ Tamper protection helps protect important security features from unwanted change | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -2309,7 +2311,7 @@ A CPU usage limit can be applied to scheduled scans only, or to scheduled and cu | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -2335,7 +2337,7 @@ A CPU usage limit can be applied to scheduled scans only, or to scheduled and cu | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2358,7 +2360,7 @@ An interior node to group all threats detected by Windows Defender. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -2374,7 +2376,7 @@ An interior node to group all threats detected by Windows Defender. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2397,7 +2399,7 @@ The ID of a threat that has been detected by Windows Defender. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | | Dynamic Node Naming | ClientInventory | @@ -2414,7 +2416,7 @@ The ID of a threat that has been detected by Windows Defender. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2427,57 +2429,108 @@ The ID of a threat that has been detected by Windows Defender. Threat category ID. Supported values: -| Value | Description | -|:--|:--| -| 0 | Invalid | -| 1 | Adware | -| 2 | Spyware | -| 3 | Password stealer | -| 4 | Trojan downloader | -| 5 | Worm | -| 6 | Backdoor | -| 7 | Remote access Trojan | -| 8 | Trojan | -| 9 | Email flooder | -| 10 | Keylogger | -| 11 | Dialer | -| 12 | Monitoring software | -| 13 | Browser modifier | -| 14 | Cookie | -| 15 | Browser plugin | -| 16 | AOL exploit | -| 17 | Nuker | -| 18 | Security disabler | -| 19 | Joke program | -| 20 | Hostile ActiveX control | -| 21 | Software bundler | -| 22 | Stealth modifier | -| 23 | Settings modifier | -| 24 | Toolbar | -| 25 | Remote control software | -| 26 | Trojan FTP | -| 27 | Potential unwanted software | -| 28 | ICQ exploit | -| 29 | Trojan telnet | -| 30 | Exploit | -| 31 | File sharing program | -| 32 | Malware creation tool | -| 33 | Remote control software | -| 34 | Tool | -| 36 | Trojan denial of service | -| 37 | Trojan dropper | -| 38 | Trojan mass mailer | -| 39 | Trojan monitoring software | -| 40 | Trojan proxy server | -| 42 | Virus | -| 43 | Known | -| 44 | Unknown | -| 45 | SPP | -| 46 | Behavior | -| 47 | Vulnerability | -| 48 | Policy | -| 49 | EUS (Enterprise Unwanted Software) | -| 50 | Ransomware | +| Value | Description |. + +|:--|:--|. + +| 0 | Invalid |. + +| 1 | Adware |. + +| 2 | Spyware |. + +| 3 | Password stealer |. + +| 4 | Trojan downloader |. + +| 5 | Worm |. + +| 6 | Backdoor |. + +| 7 | Remote access Trojan |. + +| 8 | Trojan |. + +| 9 | Email flooder |. + +| 10 | Keylogger |. + +| 11 | Dialer |. + +| 12 | Monitoring software |. + +| 13 | Browser modifier |. + +| 14 | Cookie |. + +| 15 | Browser plugin |. + +| 16 | AOL exploit |. + +| 17 | Nuker |. + +| 18 | Security disabler |. + +| 19 | Joke program |. + +| 20 | Hostile ActiveX control |. + +| 21 | Software bundler |. + +| 22 | Stealth modifier |. + +| 23 | Settings modifier |. + +| 24 | Toolbar |. + +| 25 | Remote control software |. + +| 26 | Trojan FTP |. + +| 27 | Potential unwanted software |. + +| 28 | ICQ exploit |. + +| 29 | Trojan telnet |. + +| 30 | Exploit |. + +| 31 | File sharing program |. + +| 32 | Malware creation tool |. + +| 33 | Remote control software |. + +| 34 | Tool |. + +| 36 | Trojan denial of service |. + +| 37 | Trojan dropper |. + +| 38 | Trojan mass mailer |. + +| 39 | Trojan monitoring software |. + +| 40 | Trojan proxy server |. + +| 42 | Virus |. + +| 43 | Known |. + +| 44 | Unknown |. + +| 45 | SPP |. + +| 46 | Behavior |. + +| 47 | Vulnerability |. + +| 48 | Policy |. + +| 49 | EUS (Enterprise Unwanted Software) |. + +| 50 | Ransomware |. + | 51 | ASR Rule | @@ -2490,7 +2543,7 @@ Threat category ID. Supported values: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -2506,7 +2559,7 @@ Threat category ID. Supported values: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2519,18 +2572,30 @@ Threat category ID. Supported values: Information about the current status of the threat. The following list shows the supported values: -| Value | Description | -|:--|:--| -| 0 | Active | -| 1 | Action failed | -| 2 | Manual steps required | -| 3 | Full scan required | -| 4 | Reboot required | -| 5 | Remediated with noncritical failures | -| 6 | Quarantined | -| 7 | Removed | -| 8 | Cleaned | -| 9 | Allowed | +| Value | Description |. + +|:--|:--|. + +| 0 | Active |. + +| 1 | Action failed |. + +| 2 | Manual steps required |. + +| 3 | Full scan required |. + +| 4 | Reboot required |. + +| 5 | Remediated with noncritical failures |. + +| 6 | Quarantined |. + +| 7 | Removed |. + +| 8 | Cleaned |. + +| 9 | Allowed |. + | 10 | No Status ( Cleared) | @@ -2543,7 +2608,7 @@ Information about the current status of the threat. The following list shows the | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -2559,7 +2624,7 @@ Information about the current status of the threat. The following list shows the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2582,7 +2647,7 @@ Information about the execution status of the threat. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -2598,7 +2663,7 @@ Information about the execution status of the threat. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2621,7 +2686,7 @@ The first time this particular threat was detected. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2637,7 +2702,7 @@ The first time this particular threat was detected. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2660,7 +2725,7 @@ The last time this particular threat was changed. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2676,7 +2741,7 @@ The last time this particular threat was changed. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2699,7 +2764,7 @@ The name of the specific threat. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2715,7 +2780,7 @@ The name of the specific threat. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2738,7 +2803,7 @@ Number of times this threat has been detected on a particular client. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -2754,7 +2819,7 @@ Number of times this threat has been detected on a particular client. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2767,12 +2832,18 @@ Number of times this threat has been detected on a particular client. Threat severity ID. The following list shows the supported values: -| Value | Description | -|:--|:--| -| 0 | Unknown | -| 1 | Low | -| 2 | Moderate | -| 4 | High | +| Value | Description |. + +|:--|:--|. + +| 0 | Unknown |. + +| 1 | Low |. + +| 2 | Moderate |. + +| 4 | High |. + | 5 | Severe | @@ -2785,7 +2856,7 @@ Threat severity ID. The following list shows the supported values: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -2801,7 +2872,7 @@ Threat severity ID. The following list shows the supported values: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2824,7 +2895,7 @@ URL link for additional threat information. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2840,7 +2911,7 @@ URL link for additional threat information. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2863,7 +2934,7 @@ An interior node to group information about Windows Defender health status. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -2879,7 +2950,7 @@ An interior node to group information about Windows Defender health status. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2892,13 +2963,20 @@ An interior node to group information about Windows Defender health status. Provide the current state of the device. The following list shows the supported values: -| Value | Description | -|:--|:--| -| 0 | Clean | -| 1 | Pending full scan | -| 2 | Pending reboot | -| 4 | Pending manual steps (Windows Defender is waiting for the user to take some action, such as restarting the computer or running a full scan) | -| 8 | Pending offline scan | +| Value | Description |. + +|:--|:--|. + +| 0 | Clean |. + +| 1 | Pending full scan |. + +| 2 | Pending reboot |. + +| 4 | Pending manual steps (Windows Defender is waiting for the user to take some action, such as restarting the computer or running a full scan) |. + +| 8 | Pending offline scan |. + | 16 | Pending critical failure (Windows Defender has failed critically and an Administrator needs to investigate and take some action, such as restarting the computer or reinstalling Windows Defender) | @@ -2911,7 +2989,7 @@ Provide the current state of the device. The following list shows the supported | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -2927,7 +3005,7 @@ Provide the current state of the device. The following list shows the supported | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2950,7 +3028,7 @@ Indicates whether the Windows Defender service is running. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get | @@ -2966,7 +3044,7 @@ Indicates whether the Windows Defender service is running. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2989,7 +3067,7 @@ Version number of Windows Defender on the device. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -3005,7 +3083,7 @@ Version number of Windows Defender on the device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3028,7 +3106,7 @@ Version number of the current Windows Defender engine on the device. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -3044,7 +3122,7 @@ Version number of the current Windows Defender engine on the device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3055,7 +3133,7 @@ Version number of the current Windows Defender engine on the device. -Indicates whether a Windows Defender full scan is overdue for the device. A Full scan is overdue when a scheduled Full scan did not complete successfully for 2 weeks and catchup Full scans are disabled (default). +Indicates whether a Windows Defender full scan is overdue for the device. A Full scan is overdue when a scheduled Full scan didn't complete successfully for 2 weeks and catchup Full scans are disabled (default). @@ -3067,7 +3145,7 @@ Indicates whether a Windows Defender full scan is overdue for the device. A Full | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get | @@ -3083,7 +3161,7 @@ Indicates whether a Windows Defender full scan is overdue for the device. A Full | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3106,7 +3184,7 @@ Indicates whether a Windows Defender full scan is required. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get | @@ -3122,7 +3200,7 @@ Indicates whether a Windows Defender full scan is required. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3145,7 +3223,7 @@ Signature version used for the last full scan of the device. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -3161,7 +3239,7 @@ Signature version used for the last full scan of the device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3184,7 +3262,7 @@ Time of the last Windows Defender full scan of the device. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -3200,7 +3278,7 @@ Time of the last Windows Defender full scan of the device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -3223,7 +3301,7 @@ Indicates whether the device is a virtual machine. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get | @@ -3239,7 +3317,7 @@ Indicates whether the device is a virtual machine. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3262,7 +3340,7 @@ Indicates whether network protection is running. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get | @@ -3278,7 +3356,7 @@ Indicates whether network protection is running. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -3291,33 +3369,60 @@ Indicates whether network protection is running. Provide the current state of the product. This is a bitmask flag value that can represent one or multiple product states from below list. Supported product status values: -| Value | Description | -|:--|:--| -| 0 | No status | -| 1 (1 << 0) | Service not running | -| 2 (1 << 1) | Service started without any malware protection engine | -| 4 (1 << 2) | Pending full scan due to threat action | -| 8 (1 << 3) | Pending reboot due to threat action | -| 16 (1 << 4) | ending manual steps due to threat action | -| 32 (1 << 5) | AV signatures out of date | -| 64 (1 << 6) | AS signatures out of date | -| 128 (1 << 7) | No quick scan has happened for a specified period | -| 256 (1 << 8) | No full scan has happened for a specified period | -| 512 (1 << 9) | System initiated scan in progress | -| 1024 (1 << 10) | System initiated clean in progress | -| 2048 (1 << 11) | There are samples pending submission | -| 4096 (1 << 12) | Product running in evaluation mode | -| 8192 (1 << 13) | Product running in non-genuine Windows mode | -| 16384 (1 << 14) | Product expired | -| 32768 (1 << 15) | Off-line scan required | -| 65536 (1 << 16) | Service is shutting down as part of system shutdown | -| 131072 (1 << 17) | Threat remediation failed critically | -| 262144 (1 << 18) | Threat remediation failed non-critically | -| 524288 (1 << 19) | No status flags set (well initialized state) | -| 1048576 (1 << 20) | Platform is out of date | -| 2097152 (1 << 21) | Platform update is in progress | -| 4194304 (1 << 22) | Platform is about to be outdated | -| 8388608 (1 << 23) | Signature or platform end of life is past or is impending | +| Value | Description |. + +|:--|:--|. + +| 0 | No status |. + +| 1 (1 << 0) | Service not running |. + +| 2 (1 << 1) | Service started without any malware protection engine |. + +| 4 (1 << 2) | Pending full scan due to threat action |. + +| 8 (1 << 3) | Pending reboot due to threat action |. + +| 16 (1 << 4) | ending manual steps due to threat action |. + +| 32 (1 << 5) | AV signatures out of date |. + +| 64 (1 << 6) | AS signatures out of date |. + +| 128 (1 << 7) | No quick scan has happened for a specified period |. + +| 256 (1 << 8) | No full scan has happened for a specified period |. + +| 512 (1 << 9) | System initiated scan in progress |. + +| 1024 (1 << 10) | System initiated clean in progress |. + +| 2048 (1 << 11) | There are samples pending submission |. + +| 4096 (1 << 12) | Product running in evaluation mode |. + +| 8192 (1 << 13) | Product running in non-genuine Windows mode |. + +| 16384 (1 << 14) | Product expired |. + +| 32768 (1 << 15) | Off-line scan required |. + +| 65536 (1 << 16) | Service is shutting down as part of system shutdown |. + +| 131072 (1 << 17) | Threat remediation failed critically |. + +| 262144 (1 << 18) | Threat remediation failed non-critically |. + +| 524288 (1 << 19) | No status flags set (well initialized state) |. + +| 1048576 (1 << 20) | Platform is out of date |. + +| 2097152 (1 << 21) | Platform update is in progress |. + +| 4194304 (1 << 22) | Platform is about to be outdated |. + +| 8388608 (1 << 23) | Signature or platform end of life is past or is impending |. + | 16777216 (1 << 24) | Windows SMode signatures still in use on non-Win10S install | @@ -3330,7 +3435,7 @@ Provide the current state of the product. This is a bitmask flag value that can | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -3363,7 +3468,7 @@ Provide the current state of the product. This is a bitmask flag value that can | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3374,7 +3479,7 @@ Provide the current state of the product. This is a bitmask flag value that can -Indicates whether a Windows Defender quick scan is overdue for the device. A Quick scan is overdue when a scheduled Quick scan did not complete successfully for 2 weeks and catchup Quick scans are disabled (default). +Indicates whether a Windows Defender quick scan is overdue for the device. A Quick scan is overdue when a scheduled Quick scan didn't complete successfully for 2 weeks and catchup Quick scans are disabled (default). @@ -3386,7 +3491,7 @@ Indicates whether a Windows Defender quick scan is overdue for the device. A Qui | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get | @@ -3402,7 +3507,7 @@ Indicates whether a Windows Defender quick scan is overdue for the device. A Qui | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3425,7 +3530,7 @@ Signature version used for the last quick scan of the device. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -3441,7 +3546,7 @@ Signature version used for the last quick scan of the device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3464,7 +3569,7 @@ Time of the last Windows Defender quick scan of the device. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -3480,7 +3585,7 @@ Time of the last Windows Defender quick scan of the device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3503,7 +3608,7 @@ Indicates whether a device reboot is needed. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get | @@ -3519,7 +3624,7 @@ Indicates whether a device reboot is needed. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3542,7 +3647,7 @@ Indicates whether real-time protection is running. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get | @@ -3558,7 +3663,7 @@ Indicates whether real-time protection is running. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3581,7 +3686,7 @@ Indicates whether the Windows Defender signature is outdated. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get | @@ -3597,7 +3702,7 @@ Indicates whether the Windows Defender signature is outdated. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3620,7 +3725,7 @@ Version number of the current Windows Defender signatures on the device. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -3636,7 +3741,7 @@ Version number of the current Windows Defender signatures on the device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -3659,7 +3764,7 @@ Indicates whether the Windows Defender tamper protection feature is enabled. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get | @@ -3675,7 +3780,7 @@ Indicates whether the Windows Defender tamper protection feature is enabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -3698,7 +3803,7 @@ OfflineScan action starts a Microsoft Defender Offline scan on the computer wher | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Exec, Get | | Reboot Behavior | ServerInitiated | @@ -3715,7 +3820,7 @@ OfflineScan action starts a Microsoft Defender Offline scan on the computer wher | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -3738,7 +3843,7 @@ RollbackEngine action rolls back Microsoft Defender engine to it's last known go | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Exec, Get | | Reboot Behavior | ServerInitiated | @@ -3755,7 +3860,7 @@ RollbackEngine action rolls back Microsoft Defender engine to it's last known go | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -3778,7 +3883,7 @@ RollbackPlatform action rolls back Microsoft Defender to it's last known good in | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Exec, Get | | Reboot Behavior | ServerInitiated | @@ -3795,7 +3900,7 @@ RollbackPlatform action rolls back Microsoft Defender to it's last known good in | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3818,7 +3923,7 @@ Node that can be used to start a Windows Defender scan on a device. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Exec, Get | @@ -3843,7 +3948,7 @@ Node that can be used to start a Windows Defender scan on a device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3866,7 +3971,7 @@ Node that can be used to perform signature updates for Windows Defender. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Exec, Get | @@ -3878,6 +3983,8 @@ Node that can be used to perform signature updates for Windows Defender. + +[TAMPER-1]: /microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection diff --git a/windows/client-management/mdm/devdetail-csp.md b/windows/client-management/mdm/devdetail-csp.md index 4b35dd3c12..76ba715582 100644 --- a/windows/client-management/mdm/devdetail-csp.md +++ b/windows/client-management/mdm/devdetail-csp.md @@ -4,7 +4,7 @@ description: Learn more about the DevDetail CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 02/28/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -73,7 +73,7 @@ The following list shows the DevDetail configuration service provider nodes: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -96,7 +96,7 @@ Returns the device model name /SystemProductName as a string. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -112,7 +112,7 @@ Returns the device model name /SystemProductName as a string. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -135,7 +135,7 @@ Subtree to hold vendor-specific parameters. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -151,7 +151,7 @@ Subtree to hold vendor-specific parameters. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -176,7 +176,7 @@ Added in Windows 10 version 1703. Returns a base64 encoded string of the hardwar | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -192,7 +192,7 @@ Added in Windows 10 version 1703. Returns a base64 encoded string of the hardwar | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -215,7 +215,7 @@ Subtree to hold vendor-specific parameters. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -231,7 +231,7 @@ Subtree to hold vendor-specific parameters. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -254,7 +254,7 @@ Returns the name of the mobile operator if it exists; otherwise it returns 404. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -270,7 +270,7 @@ Returns the name of the mobile operator if it exists; otherwise it returns 404. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -281,7 +281,7 @@ Returns the name of the mobile operator if it exists; otherwise it returns 404. -Contains the user-specified device name. Support for Replace operation for Windows 10 Mobile was added in Windows 10, version 1511. Replace operation is not supported in the desktop or IoT Core. When you change the device name using this node, it triggers a dialog on the device asking the user to reboot. The new device name does not take effect until the device is restarted. If the user cancels the dialog, it will show again until a reboot occurs. +Contains the user-specified device name. Support for Replace operation for Windows 10 Mobile was added in Windows 10, version 1511. Replace operation isn't supported in the desktop or IoT Core. When you change the device name using this node, it triggers a dialog on the device asking the user to reboot. The new device name doesn't take effect until the device is restarted. If the user cancels the dialog, it will show again until a reboot occurs. @@ -293,7 +293,7 @@ Contains the user-specified device name. Support for Replace operation for Windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | | Reboot Behavior | Automatic | @@ -310,7 +310,7 @@ Contains the user-specified device name. Support for Replace operation for Windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -339,7 +339,7 @@ On desktop PCs, this setting specifies the DNS hostname of the computer (Compute | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | | Reboot Behavior | ServerInitiated | @@ -356,7 +356,7 @@ On desktop PCs, this setting specifies the DNS hostname of the computer (Compute | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -379,7 +379,7 @@ Total free storage in MB from first internal drive on the device. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -395,7 +395,7 @@ Total free storage in MB from first internal drive on the device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -418,7 +418,7 @@ Returns the client local time in ISO 8601 format. Example: 2003-06-16. T18:37:44 | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -434,7 +434,7 @@ Returns the client local time in ISO 8601 format. Example: 2003-06-16. T18:37:44 | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -445,7 +445,7 @@ Returns the client local time in ISO 8601 format. Example: 2003-06-16. T18:37:44 -Returns the mobile device ID associated with the cellular network. Returns 404 for devices that do not have a cellular network support. The IMSI value is returned for GSM and UMTS networks. CDMA and worldwide phones will return a 404 Not Found status code error if queried for this element. +Returns the mobile device ID associated with the cellular network. Returns 404 for devices that don't have a cellular network support. The IMSI value is returned for GSM and UMTS networks. CDMA and worldwide phones will return a 404 Not Found status code error if queried for this element. @@ -457,7 +457,7 @@ Returns the mobile device ID associated with the cellular network. Returns 404 f | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -473,7 +473,7 @@ Returns the mobile device ID associated with the cellular network. Returns 404 f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -496,7 +496,7 @@ Returns the OS platform of the device. For Windows 10 for desktop editions, it r | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -512,7 +512,7 @@ Returns the OS platform of the device. For Windows 10 for desktop editions, it r | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -535,7 +535,7 @@ Returns the processor architecture of the device as "arm" or "x86". | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -551,7 +551,7 @@ Returns the processor architecture of the device as "arm" or "x86". | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -574,7 +574,7 @@ Returns the processor type of the device as documented in SYSTEM_INFO. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -590,7 +590,7 @@ Returns the processor type of the device as documented in SYSTEM_INFO. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -613,7 +613,7 @@ Returns the radio stack software version number. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -629,7 +629,7 @@ Returns the radio stack software version number. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -652,7 +652,7 @@ Resolution of the device in the format of WidthxLength (e.g., "400x800"). | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -668,7 +668,7 @@ Resolution of the device in the format of WidthxLength (e.g., "400x800"). | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -691,7 +691,7 @@ SMBIOS Serial Number of the device. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -707,7 +707,7 @@ SMBIOS Serial Number of the device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1387] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1387] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1387] and later
    :heavy_check_mark: Windows 10, version 21H2 [10.0.19044.1387] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1387] and later
    ✅ Windows 10, version 2009 [10.0.19042.1387] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1387] and later
    ✅ Windows 10, version 21H2 [10.0.19044.1387] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -730,7 +730,7 @@ SMBIOS version of the device. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -746,7 +746,7 @@ SMBIOS version of the device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -769,7 +769,7 @@ Returns the System SKU, as defined in the registry key HKEY_LOCAL_MACHINE\HARDWA | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -785,7 +785,7 @@ Returns the System SKU, as defined in the registry key HKEY_LOCAL_MACHINE\HARDWA | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -808,7 +808,7 @@ Total available memory in MB on the device (may be less than total physical memo | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -824,7 +824,7 @@ Total available memory in MB on the device (may be less than total physical memo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -847,7 +847,7 @@ Total available storage in MB from first internal drive on the device (may be le | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -863,7 +863,7 @@ Total available storage in MB from first internal drive on the device (may be le | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -886,7 +886,7 @@ The VoLTE service setting on or off. Only exposed to Mobile Operator-based OMA-D | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get | @@ -902,7 +902,7 @@ The VoLTE service setting on or off. Only exposed to Mobile Operator-based OMA-D | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -925,7 +925,7 @@ The DNS suffix of the active WiFi connection. Only exposed to Enterprise-based O | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -941,7 +941,7 @@ The DNS suffix of the active WiFi connection. Only exposed to Enterprise-based O | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -964,7 +964,7 @@ The IPv4 address of the active WiFi connection. Only exposed to Enterprise-based | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -980,7 +980,7 @@ The IPv4 address of the active WiFi connection. Only exposed to Enterprise-based | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1003,7 +1003,7 @@ The IPv6 address of the active WiFi connection. Only exposed to Enterprise-based | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1019,7 +1019,7 @@ The IPv6 address of the active WiFi connection. Only exposed to Enterprise-based | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1044,7 +1044,7 @@ The MAC address of the active WiFi connection. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1060,7 +1060,7 @@ The MAC address of the active WiFi connection. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1083,7 +1083,7 @@ The subnet mask for the active WiFi connection. Only exposed to Enterprise-based | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1099,7 +1099,7 @@ The subnet mask for the active WiFi connection. Only exposed to Enterprise-based | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1122,7 +1122,7 @@ Returns the firmware version, as defined in the registry key HKEY_LOCAL_MACHINE\ | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1138,7 +1138,7 @@ Returns the firmware version, as defined in the registry key HKEY_LOCAL_MACHINE\ | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1161,7 +1161,7 @@ Returns the hardware version, as defined in the registry key HKEY_LOCAL_MACHINE\ | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1177,7 +1177,7 @@ Returns the hardware version, as defined in the registry key HKEY_LOCAL_MACHINE\ | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1200,7 +1200,7 @@ Returns whether the device uses OMA DM Large Object Handling, as defined in the | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get | @@ -1216,7 +1216,7 @@ Returns whether the device uses OMA DM Large Object Handling, as defined in the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1239,7 +1239,7 @@ Returns the name of the Original Equipment Manufacturer (OEM) as a string, as de | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1255,7 +1255,7 @@ Returns the name of the Original Equipment Manufacturer (OEM) as a string, as de | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1278,7 +1278,7 @@ Returns the Windows 10 OS software version in the format MajorVersion. MinorVers | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1294,7 +1294,7 @@ Returns the Windows 10 OS software version in the format MajorVersion. MinorVers | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1316,7 +1316,7 @@ Returns the Windows 10 OS software version in the format MajorVersion. MinorVers | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1332,7 +1332,7 @@ Returns the Windows 10 OS software version in the format MajorVersion. MinorVers | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1355,7 +1355,7 @@ Returns the maximum depth of the management tree that the device supports. The d | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1371,7 +1371,7 @@ Returns the maximum depth of the management tree that the device supports. The d | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1394,7 +1394,7 @@ Returns the total length of any URI segment in a URI that addresses a node or no | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1410,7 +1410,7 @@ Returns the total length of any URI segment in a URI that addresses a node or no | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1433,7 +1433,7 @@ Returns the maximum total length of any URI used to address a node or node prope | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | diff --git a/windows/client-management/mdm/devicemanageability-csp.md b/windows/client-management/mdm/devicemanageability-csp.md index 8ce716e6e3..4052d4cdeb 100644 --- a/windows/client-management/mdm/devicemanageability-csp.md +++ b/windows/client-management/mdm/devicemanageability-csp.md @@ -4,7 +4,7 @@ description: Learn more about the DeviceManageability CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 02/28/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -42,7 +42,7 @@ The following list shows the DeviceManageability configuration service provider | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -64,7 +64,7 @@ The following list shows the DeviceManageability configuration service provider | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -80,7 +80,7 @@ The following list shows the DeviceManageability configuration service provider | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -103,7 +103,7 @@ Returns the versions of all configuration service providers (CSP) for MDM. | Property name | Property value | |:--|:--| -| Format | xml | +| Format | `xml` | | Access Type | Get | @@ -119,7 +119,7 @@ Returns the versions of all configuration service providers (CSP) for MDM. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -141,7 +141,7 @@ Returns the versions of all configuration service providers (CSP) for MDM. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -157,7 +157,7 @@ Returns the versions of all configuration service providers (CSP) for MDM. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -181,7 +181,7 @@ Provider ID should be unique among the different config sources. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | UniqueName: Provider ID String of the Configuration Source | @@ -198,7 +198,7 @@ Provider ID should be unique among the different config sources. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -221,7 +221,7 @@ Configuration Info string value set by the config source. Recommended to be used | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -237,7 +237,7 @@ Configuration Info string value set by the config source. Recommended to be used | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -260,7 +260,7 @@ Enrollment Info string value set by the config source. Recommended to sent to se | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -276,7 +276,7 @@ Enrollment Info string value set by the config source. Recommended to sent to se | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2009 [10.0.19042.2193] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.2193] and later
    :heavy_check_mark: Windows 10, version 21H2 [10.0.19044.2193] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.918] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2009 [10.0.19042.2193] and later
    ✅ Windows 10, version 21H1 [10.0.19043.2193] and later
    ✅ Windows 10, version 21H2 [10.0.19044.2193] and later
    ✅ Windows 11, version 21H2 [10.0.22000.918] and later
    ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -299,7 +299,7 @@ Payload Transfer string value set by the config source. Recommended to be used d | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | diff --git a/windows/client-management/mdm/devicepreparation-csp.md b/windows/client-management/mdm/devicepreparation-csp.md index a6be4ec54b..540f8617fd 100644 --- a/windows/client-management/mdm/devicepreparation-csp.md +++ b/windows/client-management/mdm/devicepreparation-csp.md @@ -4,7 +4,7 @@ description: Learn more about the DevicePreparation CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 05/01/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,8 +16,7 @@ ms.topic: reference # DevicePreparation CSP -> [!IMPORTANT] -> This CSP contains preview policies that are under development and only applicable for [Windows Insider Preview builds](/windows-insider/). These policies are subject to change and may have dependencies on other features or services in preview. +[!INCLUDE [Windows Insider tip](includes/mdm-insider-csp-note.md)] @@ -45,7 +44,7 @@ The following list shows the DevicePreparation configuration service provider no | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -68,7 +67,7 @@ The subnodes configure settings for the Bootstrapper Agent. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -84,7 +83,7 @@ The subnodes configure settings for the Bootstrapper Agent. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -107,7 +106,7 @@ This node stores the class ID for the Bootstrapper Agent WinRT object. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -123,7 +122,7 @@ This node stores the class ID for the Bootstrapper Agent WinRT object. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -134,7 +133,7 @@ This node stores the class ID for the Bootstrapper Agent WinRT object. -This node holds opaque data that will be passed to the Bootstrapper Agent as a parameter when it is invoked to execute. +This node holds opaque data that will be passed to the Bootstrapper Agent as a parameter when it's invoked to execute. @@ -146,7 +145,7 @@ This node holds opaque data that will be passed to the Bootstrapper Agent as a p | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -162,7 +161,7 @@ This node holds opaque data that will be passed to the Bootstrapper Agent as a p | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -185,7 +184,7 @@ This node holds a URI that can be queried for the status of the Bootstrapper Age | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -201,7 +200,7 @@ This node holds a URI that can be queried for the status of the Bootstrapper Age | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -224,7 +223,7 @@ This node indicates whether the MDM agent was installed or not. When set to true | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | false | @@ -241,7 +240,7 @@ This node indicates whether the MDM agent was installed or not. When set to true | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -264,7 +263,7 @@ The subnode configures the settings for the MDMProvider. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -280,7 +279,7 @@ The subnode configures the settings for the MDMProvider. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -291,7 +290,7 @@ The subnode configures the settings for the MDMProvider. -Noode for reporting progress status as opaque data. +Node for reporting progress status as opaque data. @@ -303,7 +302,7 @@ Noode for reporting progress status as opaque data. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -319,7 +318,7 @@ Noode for reporting progress status as opaque data. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -342,7 +341,7 @@ This node determines whether to enable or show the Device Preparation page. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | false | @@ -352,7 +351,7 @@ This node determines whether to enable or show the Device Preparation page. | Value | Description | |:--|:--| -| false (Default) | The page is not enabled. | +| false (Default) | The page isn't enabled. | | true | The page is enabled. | @@ -368,7 +367,7 @@ This node determines whether to enable or show the Device Preparation page. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -391,7 +390,7 @@ This node configures specific settings for the Device Preparation page. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -407,7 +406,7 @@ This node configures specific settings for the Device Preparation page. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -430,7 +429,7 @@ This node provides status of the Device Preparation page. Values are an enum: 0 | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | diff --git a/windows/client-management/mdm/devicestatus-csp.md b/windows/client-management/mdm/devicestatus-csp.md index dc7f201767..9878cc510b 100644 --- a/windows/client-management/mdm/devicestatus-csp.md +++ b/windows/client-management/mdm/devicestatus-csp.md @@ -4,7 +4,7 @@ description: Learn more about the DeviceStatus CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 02/28/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -82,7 +82,7 @@ The following list shows the DeviceStatus configuration service provider nodes: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -105,7 +105,7 @@ Node for the antispyware query. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -121,7 +121,7 @@ Node for the antispyware query. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -132,7 +132,7 @@ Node for the antispyware query. -Integer that specifies the status of the antispyware signature. Valid values: 0 - The security software reports that it is not the most recent version. 1 - The security software reports that it is the most recent version. 2 - Not applicable. This is returned for devices like the phone that do not have an antivirus (where the API doesn't exist.) If more than one antispyware provider is active, this node returns: 1 - If every active antispyware provider has a valid signature status. 0 - If any of the active antispyware providers has an invalid signature status. +Integer that specifies the status of the antispyware signature. Valid values: 0 - The security software reports that it isn't the most recent version. 1 - The security software reports that it's the most recent version. 2 - Not applicable. This is returned for devices like the phone that don't have an antivirus (where the API doesn't exist). If more than one antispyware provider is active, this node returns: 1 - If every active antispyware provider has a valid signature status. 0 - If any of the active antispyware providers has an invalid signature status. @@ -145,7 +145,7 @@ This node also returns 0 when no anti-spyware provider is active. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | | Default Value | 1 | @@ -162,7 +162,7 @@ This node also returns 0 when no anti-spyware provider is active. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -173,7 +173,7 @@ This node also returns 0 when no anti-spyware provider is active. -Integer that specifies the status of the antispyware. Valid values: 0 - The status of the security provider category is good and does not need user attention. 1 - The status of the security provider category is not monitored by Windows Security Center (WSC). 2 - The status of the security provider category is poor and the computer may be at risk. 3 - The security provider category is in snooze state. Snooze indicates that WSC is not actively protecting the computer. +Integer that specifies the status of the antispyware. Valid values: 0 - The status of the security provider category is good and doesn't need user attention. 1 - The status of the security provider category isn't monitored by Windows Security Center (WSC). 2 - The status of the security provider category is poor and the computer may be at risk. 3 - The security provider category is in snooze state. Snooze indicates that WSC isn't actively protecting the computer. @@ -185,7 +185,7 @@ Integer that specifies the status of the antispyware. Valid values: 0 - The stat | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | | Default Value | 3 | @@ -202,7 +202,7 @@ Integer that specifies the status of the antispyware. Valid values: 0 - The stat | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -225,7 +225,7 @@ Node for the antivirus query. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -241,7 +241,7 @@ Node for the antivirus query. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -252,7 +252,7 @@ Node for the antivirus query. -Integer that specifies the status of the antivirus signature. Valid values: 0 - The security software reports that it is not the most recent version. 1 (default) - The security software reports that it is the most recent version. 2 - Not applicable. This is returned for devices like the phone that do not have an antivirus (where the API doesn't exist.) If more than one antivirus provider is active, this node returns: 1 - If every active antivirus provider has a valid signature status. 0 - If any of the active antivirus providers has an invalid signature status. +Integer that specifies the status of the antivirus signature. Valid values: 0 - The security software reports that it isn't the most recent version. 1 (default) - The security software reports that it's the most recent version. 2 - Not applicable. This is returned for devices like the phone that don't have an antivirus (where the API doesn't exist). If more than one antivirus provider is active, this node returns: 1 - If every active antivirus provider has a valid signature status. 0 - If any of the active antivirus providers has an invalid signature status. @@ -265,7 +265,7 @@ This node also returns 0 when no antivirus provider is active. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | | Default Value | 1 | @@ -282,7 +282,7 @@ This node also returns 0 when no antivirus provider is active. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -293,7 +293,7 @@ This node also returns 0 when no antivirus provider is active. -Integer that specifies the status of the antivirus. Valid values: 0 - Antivirus is on and monitoring, 1 - Antivirus is disabled, 2 - Antivirus is not monitoring the device/PC or some options have been turned off, 3 (default) - Antivirus is temporarily not completely monitoring the device/PC, 4 - Antivirus not applicable for this device. This is returned for devices like the phone that do not have an antivirus (where the API doesn't exist.) +Integer that specifies the status of the antivirus. Valid values: 0 - Antivirus is on and monitoring, 1 - Antivirus is disabled, 2 - Antivirus isn't monitoring the device/PC or some options have been turned off, 3 (default) - Antivirus is temporarily not completely monitoring the device/PC, 4 - Antivirus not applicable for this device. This is returned for devices like the phone that don't have an antivirus (where the API doesn't exist). @@ -305,7 +305,7 @@ Integer that specifies the status of the antivirus. Valid values: 0 - Antivirus | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | | Default Value | 3 | @@ -322,7 +322,7 @@ Integer that specifies the status of the antivirus. Valid values: 0 - Antivirus | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -345,7 +345,7 @@ Node for the battery query. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -361,7 +361,7 @@ Node for the battery query. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -372,7 +372,7 @@ Node for the battery query. -Integer that specifies the estimated battery charge remaining. This is the value returned in BatteryLifeTime in SYSTEM_POWER_STATUS structure. The value is the number of seconds of battery life remaining when the device is not connected to an AC power source. When it is connected to a power source, the value is -1. When the estimation is unknown, the value is -1. +Integer that specifies the estimated battery charge remaining. This is the value returned in BatteryLifeTime in SYSTEM_POWER_STATUS structure. The value is the number of seconds of battery life remaining when the device isn't connected to an AC power source. When it's connected to a power source, the value is -1. When the estimation is unknown, the value is -1. @@ -384,7 +384,7 @@ Integer that specifies the estimated battery charge remaining. This is the value | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | | Default Value | 0 | @@ -401,7 +401,7 @@ Integer that specifies the estimated battery charge remaining. This is the value | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -412,7 +412,7 @@ Integer that specifies the estimated battery charge remaining. This is the value -Integer that specifies the estimated runtime of the battery. This is the value returned in BatteryLifeTime in SYSTEM_POWER_STATUS structure. The value is the number of seconds of battery life remaining when the device is not connected to an AC power source. When it is connected to a power source, the value is -1. When the estimation is unknown, the value is -1. +Integer that specifies the estimated runtime of the battery. This is the value returned in BatteryLifeTime in SYSTEM_POWER_STATUS structure. The value is the number of seconds of battery life remaining when the device isn't connected to an AC power source. When it's connected to a power source, the value is -1. When the estimation is unknown, the value is -1. @@ -424,7 +424,7 @@ Integer that specifies the estimated runtime of the battery. This is the value r | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | | Default Value | 0 | @@ -441,7 +441,7 @@ Integer that specifies the estimated runtime of the battery. This is the value r | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -464,7 +464,7 @@ Integer that specifies the status of the battery. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | | Default Value | 0 | @@ -481,7 +481,7 @@ Integer that specifies the status of the battery. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -506,7 +506,7 @@ Node for queries on the SIM cards. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -522,7 +522,7 @@ Node for queries on the SIM cards. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -545,7 +545,7 @@ The unique International Mobile Station Equipment Identity (IMEI) number of the | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | | Dynamic Node Naming | ClientInventory | @@ -562,7 +562,7 @@ The unique International Mobile Station Equipment Identity (IMEI) number of the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -585,7 +585,7 @@ The mobile service provider or mobile operator associated with the specific IMEI | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -601,7 +601,7 @@ The mobile service provider or mobile operator associated with the specific IMEI | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -624,7 +624,7 @@ The Integrated Circuit Card ID (ICCID) of the SIM card associated with the speci | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -640,7 +640,7 @@ The Integrated Circuit Card ID (ICCID) of the SIM card associated with the speci | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -663,7 +663,7 @@ The International Mobile Subscriber Identity (IMSI) associated with the IMEI num | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -679,7 +679,7 @@ The International Mobile Subscriber Identity (IMSI) associated with the IMEI num | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -702,7 +702,7 @@ Phone number associated with the specific IMEI number. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -718,7 +718,7 @@ Phone number associated with the specific IMEI number. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -741,7 +741,7 @@ Boolean value that indicates compliance with the enforced enterprise roaming pol | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get | @@ -757,7 +757,7 @@ Boolean value that indicates compliance with the enforced enterprise roaming pol | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -780,7 +780,7 @@ Indicates whether the SIM card associated with the specific IMEI number is roami | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get | @@ -796,7 +796,7 @@ Indicates whether the SIM card associated with the specific IMEI number is roami | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.1165] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000.1165] and later
    ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -819,7 +819,7 @@ Node for Certificate Attestation. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -835,7 +835,7 @@ Node for Certificate Attestation. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.1165] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000.1165] and later
    ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -858,7 +858,7 @@ MDM Certificate attestation information. This will return an XML blob containing | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -874,7 +874,7 @@ MDM Certificate attestation information. This will return an XML blob containing | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -897,7 +897,7 @@ Node for the compliance query. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -913,7 +913,7 @@ Node for the compliance query. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -936,7 +936,7 @@ Boolean value that indicates compliance with the enterprise encryption policy fo | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get | @@ -952,7 +952,7 @@ Boolean value that indicates compliance with the enterprise encryption policy fo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -975,7 +975,7 @@ Node for Device Guard query. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -991,7 +991,7 @@ Node for Device Guard query. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1014,7 +1014,7 @@ Hypervisor Enforced Code Integrity (HVCI) status. 0 - Running, 1 - Reboot requir | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -1030,7 +1030,7 @@ Hypervisor Enforced Code Integrity (HVCI) status. 0 - Running, 1 - Reboot requir | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1053,7 +1053,7 @@ Local System Authority (LSA) credential guard status. 0 - Running, 1 - Reboot re | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -1069,7 +1069,7 @@ Local System Authority (LSA) credential guard status. 0 - Running, 1 - Reboot re | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1092,7 +1092,7 @@ System Guard status. 0 - Running, 1 - Reboot required, 2 - Not configured, 3 - S | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -1108,7 +1108,7 @@ System Guard status. 0 - Running, 1 - Reboot required, 2 - Not configured, 3 - S | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1119,7 +1119,7 @@ System Guard status. 0 - Running, 1 - Reboot required, 2 - Not configured, 3 - S -Virtualization-based security hardware requirement status. The value is a 256 value bitmask. 0x0: System meets hardware configuration requirements, 0x1: SecureBoot required, 0x2: DMA Protection required, 0x4: HyperV not supported for Guest VM, 0x8: HyperV feature is not available. +Virtualization-based security hardware requirement status. The value is a 256 value bitmask. 0x0: System meets hardware configuration requirements, 0x1: SecureBoot required, 0x2: DMA Protection required, 0x4: HyperV not supported for Guest VM, 0x8: HyperV feature isn't available. @@ -1131,7 +1131,7 @@ Virtualization-based security hardware requirement status. The value is a 256 va | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -1147,7 +1147,7 @@ Virtualization-based security hardware requirement status. The value is a 256 va | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1170,7 +1170,7 @@ Virtualization-based security status. Value is one of the following: 0 - Running | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -1186,7 +1186,7 @@ Virtualization-based security status. Value is one of the following: 0 - Running | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1209,7 +1209,7 @@ Node for DMA query. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1225,7 +1225,7 @@ Node for DMA query. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1248,7 +1248,7 @@ Boot DMA Protection status. 1 - Enabled, 2 - Disabled. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -1264,7 +1264,7 @@ Boot DMA Protection status. 1 - Enabled, 2 - Disabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1287,7 +1287,7 @@ Returns the fully qualified domain name of the device(if any). | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1303,7 +1303,7 @@ Returns the fully qualified domain name of the device(if any). | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1326,7 +1326,7 @@ Node for the firewall query. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1342,7 +1342,7 @@ Node for the firewall query. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1353,7 +1353,7 @@ Node for the firewall query. -Integer that specifies the status of the firewall. Valid values: 0 - Firewall is on and monitoring, 1 - Firewall has been disabled, 2 - Firewall is not monitoring all networks or some rules have been turned off, 3 (default) - Firewall is temporarily not monitoring all networks, 4 - Not applicable. This is returned for devices like the phone that do not have an antivirus (where the API doesn't exist.) +Integer that specifies the status of the firewall. Valid values: 0 - Firewall is on and monitoring, 1 - Firewall has been disabled, 2 - Firewall isn't monitoring all networks or some rules have been turned off, 3 (default) - Firewall is temporarily not monitoring all networks, 4 - Not applicable. This is returned for devices like the phone that don't have an antivirus (where the API doesn't exist). @@ -1365,7 +1365,7 @@ Integer that specifies the status of the firewall. Valid values: 0 - Firewall is | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | | Default Value | 3 | @@ -1382,7 +1382,7 @@ Integer that specifies the status of the firewall. Valid values: 0 - Firewall is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1405,7 +1405,7 @@ Node for queries on network and device properties. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1421,7 +1421,7 @@ Node for queries on network and device properties. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1444,7 +1444,7 @@ MAC address of the wireless network card. A MAC address is present for each netw | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | | Dynamic Node Naming | ClientInventory | @@ -1461,7 +1461,7 @@ MAC address of the wireless network card. A MAC address is present for each netw | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1484,7 +1484,7 @@ IPv4 address of the network card associated with the MAC address. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1500,7 +1500,7 @@ IPv4 address of the network card associated with the MAC address. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1523,7 +1523,7 @@ IPv6 address of the network card associated with the MAC address. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1539,7 +1539,7 @@ IPv6 address of the network card associated with the MAC address. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1562,7 +1562,7 @@ Boolean value that indicates whether the network card associated with the MAC ad | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get | @@ -1578,7 +1578,7 @@ Boolean value that indicates whether the network card associated with the MAC ad | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1601,7 +1601,7 @@ Type of network connection. The value is one of the following: 2 - WLAN (or othe | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -1617,7 +1617,7 @@ Type of network connection. The value is one of the following: 2 - WLAN (or othe | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1640,7 +1640,7 @@ Node for the OS query. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1656,7 +1656,7 @@ Node for the OS query. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1679,7 +1679,7 @@ String that specifies the OS edition. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | | Default Value | Not available | @@ -1696,7 +1696,7 @@ String that specifies the OS edition. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1719,7 +1719,7 @@ Read only node that specifies the device mode. Valid values: 0 - the device is i | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | | Default Value | Not available | @@ -1736,7 +1736,7 @@ Read only node that specifies the device mode. Valid values: 0 - the device is i | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1759,7 +1759,7 @@ Indicates whether secure boot is enabled. The value is one of the following: 0 - | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -1775,7 +1775,7 @@ Indicates whether secure boot is enabled. The value is one of the following: 0 - | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1798,7 +1798,7 @@ Node for the TPM query. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1814,7 +1814,7 @@ Node for the TPM query. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1387] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1387] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1387] and later
    :heavy_check_mark: Windows 10, version 21H2 [10.0.19044.1387] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1387] and later
    ✅ Windows 10, version 2009 [10.0.19042.1387] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1387] and later
    ✅ Windows 10, version 21H2 [10.0.19044.1387] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1837,7 +1837,7 @@ String that specifies the TPM manufacturer ID as a number. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | | Default Value | Not available | @@ -1854,7 +1854,7 @@ String that specifies the TPM manufacturer ID as a number. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1387] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1387] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1387] and later
    :heavy_check_mark: Windows 10, version 21H2 [10.0.19044.1387] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1387] and later
    ✅ Windows 10, version 2009 [10.0.19042.1387] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1387] and later
    ✅ Windows 10, version 21H2 [10.0.19044.1387] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1877,7 +1877,7 @@ String that specifies the TPM manufacturer ID as text. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | | Default Value | Not available | @@ -1894,7 +1894,7 @@ String that specifies the TPM manufacturer ID as text. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1387] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1387] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1387] and later
    :heavy_check_mark: Windows 10, version 21H2 [10.0.19044.1387] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1387] and later
    ✅ Windows 10, version 2009 [10.0.19042.1387] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1387] and later
    ✅ Windows 10, version 21H2 [10.0.19044.1387] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1917,7 +1917,7 @@ String that specifies the manufacturer version. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | | Default Value | Not available | @@ -1934,7 +1934,7 @@ String that specifies the manufacturer version. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1957,7 +1957,7 @@ String that specifies the specification version. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | | Default Value | Not available | @@ -1974,7 +1974,7 @@ String that specifies the specification version. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1997,7 +1997,7 @@ Node for the UAC query. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -2013,7 +2013,7 @@ Node for the UAC query. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -2036,7 +2036,7 @@ Integer that specifies the status of the UAC. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | diff --git a/windows/client-management/mdm/devinfo-csp.md b/windows/client-management/mdm/devinfo-csp.md index 8f4dd5b955..b7c8a992e9 100644 --- a/windows/client-management/mdm/devinfo-csp.md +++ b/windows/client-management/mdm/devinfo-csp.md @@ -4,7 +4,7 @@ description: Learn more about the DevInfo CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 02/28/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -45,7 +45,7 @@ The following list shows the DevInfo configuration service provider nodes: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -74,7 +74,7 @@ An unique device identifier. An application-specific global unique device identi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -90,7 +90,7 @@ An unique device identifier. An application-specific global unique device identi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -113,7 +113,7 @@ The current management client revision of the device. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -129,7 +129,7 @@ The current management client revision of the device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -152,7 +152,7 @@ Parent node for nodes extended by Microsoft. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -168,7 +168,7 @@ Parent node for nodes extended by Microsoft. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -191,7 +191,7 @@ Retrieves the ICCID of the first adapter. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -207,7 +207,7 @@ Retrieves the ICCID of the first adapter. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -230,7 +230,7 @@ Returns the current user interface (UI) language setting of the device as define | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -246,7 +246,7 @@ Returns the current user interface (UI) language setting of the device as define | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -269,7 +269,7 @@ Returns the name of the OEM. For Windows 10 for desktop editions, it returns the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -285,7 +285,7 @@ Returns the name of the OEM. For Windows 10 for desktop editions, it returns the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -308,7 +308,7 @@ Returns the name of the hardware device model as specified by the mobile operato | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | diff --git a/windows/client-management/mdm/diagnosticlog-csp.md b/windows/client-management/mdm/diagnosticlog-csp.md index 19f240cd0e..91047e273f 100644 --- a/windows/client-management/mdm/diagnosticlog-csp.md +++ b/windows/client-management/mdm/diagnosticlog-csp.md @@ -4,7 +4,7 @@ description: Learn more about the DiagnosticLog CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 02/28/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -70,7 +70,7 @@ The following list shows the DiagnosticLog configuration service provider nodes: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -94,7 +94,7 @@ The DeviceStateData functionality within the DiagnosticLog CSP provides extra de | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -110,7 +110,7 @@ The DeviceStateData functionality within the DiagnosticLog CSP provides extra de | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -133,7 +133,7 @@ This node is to trigger snapping of the Device Management state data with "SNAP" | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Exec, Get | @@ -171,7 +171,7 @@ This node is to trigger snapping of the Device Management state data with "SNAP" | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -200,7 +200,7 @@ DiagnosticArchive is designed for ad-hoc troubleshooting scenarios, such as an I | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -216,7 +216,7 @@ DiagnosticArchive is designed for ad-hoc troubleshooting scenarios, such as an I | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -323,7 +323,7 @@ Additionally, the XML may include **One or more data gathering directives, which | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Exec, Get, Replace | @@ -339,7 +339,7 @@ Additionally, the XML may include **One or more data gathering directives, which | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -362,7 +362,7 @@ Pull up the results of the last archive run. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -427,7 +427,7 @@ To learn how to read the resulting data, see [How to review ArchiveResults](#how | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -456,7 +456,7 @@ The ETW log feature is designed for advanced usage, and assumes developers' fami | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -472,7 +472,7 @@ The ETW log feature is designed for advanced usage, and assumes developers' fami | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -506,7 +506,7 @@ For more information about using DiagnosticLog to collect logs remotely from a P | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -522,7 +522,7 @@ For more information about using DiagnosticLog to collect logs remotely from a P | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -545,7 +545,7 @@ Each dynamic node represents a registered 'Channel' node. The node name must be | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | UniqueName: The node name must be a valid Windows event log channel name, such as "Microsoft-Client-Licensing-Platform%2FAdmin" | @@ -604,7 +604,7 @@ Each dynamic node represents a registered 'Channel' node. The node name must be | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -627,7 +627,7 @@ This node is to trigger exporting events into a log file from this node's associ | Property name | Property value | |:--|:--| -| Format | null | +| Format | `null` | | Access Type | Exec, Get | @@ -661,7 +661,7 @@ This node is to trigger exporting events into a log file from this node's associ | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -684,7 +684,7 @@ This node is used for setting or getting the xpath query string to filter the ev | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | | Default Value | "" | @@ -719,7 +719,7 @@ This node is used for setting or getting the xpath query string to filter the ev | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -742,7 +742,7 @@ This node is used for setting or getting the 'Enabled' state of this node's asso | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | @@ -810,7 +810,7 @@ This node is used for setting or getting the 'Enabled' state of this node's asso | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -858,7 +858,7 @@ The changes on **State**, **Keywords**, and **TraceLevel** takes effect immediat | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -890,7 +890,7 @@ To gather diagnostics using this CSP: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -901,7 +901,7 @@ To gather diagnostics using this CSP: -Each dynamic node represents a registered 'Collector' node. CSP will maintain an ETW trace session for this collector with its name used as a unique identifier. In a collector, a valid ETW provider can be registered and unregistered. The collector's associated trace session will enable the registered providers in it if the provider's state is 'Enabled'. Each provider's state, trace level and keywords can be controlled separately. The name of this node must not be a valid Windows event channel name. It can be a etw provider guid as long as it is not equal to an already registered 'Provider' node name. +Each dynamic node represents a registered 'Collector' node. CSP will maintain an ETW trace session for this collector with its name used as a unique identifier. In a collector, a valid ETW provider can be registered and unregistered. The collector's associated trace session will enable the registered providers in it if the provider's state is 'Enabled'. Each provider's state, trace level and keywords can be controlled separately. The name of this node mustn't be a valid Windows event channel name. It can be a etw provider guid as long as it isn't equal to an already registered 'Provider' node name. @@ -913,7 +913,7 @@ Each dynamic node represents a registered 'Collector' node. CSP will maintain an | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | ServerGeneratedUniqueIdentifier | @@ -972,7 +972,7 @@ Each dynamic node represents a registered 'Collector' node. CSP will maintain an | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -995,7 +995,7 @@ This node is used for setting or getting the trace log file size limit(in Megaby | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Allowed Values | Range: `[1-2048]` | | Default Value | 4 | @@ -1013,7 +1013,7 @@ This node is used for setting or getting the trace log file size limit(in Megaby | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1036,7 +1036,7 @@ Root node of all providers registered in this collector node. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1052,7 +1052,7 @@ Root node of all providers registered in this collector node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1075,7 +1075,7 @@ Each dynamic node represents an ETW provider registered in this collector node. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | UniqueName: The node name must be a valid provider GUID. | @@ -1134,7 +1134,7 @@ Each dynamic node represents an ETW provider registered in this collector node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1157,7 +1157,7 @@ This node is used for setting or getting the keywords of the event provider in t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | | Default Value | "0" | @@ -1220,7 +1220,7 @@ This node is used for setting or getting the keywords of the event provider in t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1243,7 +1243,7 @@ This node is used for setting or getting the state of the event provider in this | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | true | @@ -1293,7 +1293,7 @@ Set provider State: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1316,7 +1316,7 @@ This node is used for setting or getting the trace level of this event provider | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 5 | @@ -1369,7 +1369,7 @@ Set provider TraceLevel: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1392,7 +1392,7 @@ This node is to trigger "start" and "stop" of this collector node's associated t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Exec, Get | @@ -1466,7 +1466,7 @@ After you've added a logging task, you can start/stop a trace by running an Exec | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1489,7 +1489,7 @@ This node is used for setting or getting the trace log file mode of this collect | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 1 | @@ -1515,7 +1515,7 @@ This node is used for setting or getting the trace log file mode of this collect | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1538,7 +1538,7 @@ This node is used for getting the status of this collector node's associated tra | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -1554,7 +1554,7 @@ This node is used for getting the status of this collector node's associated tra | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1589,7 +1589,7 @@ The FileDownload feature of the DiagnosticLog CSP enables a management server to | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1605,7 +1605,7 @@ The FileDownload feature of the DiagnosticLog CSP enables a management server to | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1628,7 +1628,7 @@ Root node of all csp nodes that are used for controlling file download for their | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1644,7 +1644,7 @@ Root node of all csp nodes that are used for controlling file download for their | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1667,7 +1667,7 @@ Each dynamic node represents a 'FileContext' node corresponding to a log file ge | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | | Dynamic Node Naming | UniqueName: The node name must be the name of a registered 'Provider', 'Collector' or 'Channel' node. | @@ -1684,7 +1684,7 @@ Each dynamic node represents a 'FileContext' node corresponding to a log file ge | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1707,7 +1707,7 @@ This node is used for getting the total number of blocks for the associated log | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -1741,7 +1741,7 @@ This node is used for getting the total number of blocks for the associated log | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1764,7 +1764,7 @@ This node is used to get the binary data of the block that 'BlockIndexToRead' no | Property name | Property value | |:--|:--| -| Format | b64 | +| Format | `b64` | | Access Type | Get | @@ -1798,7 +1798,7 @@ This node is used to get the binary data of the block that 'BlockIndexToRead' no | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1868,7 +1868,7 @@ This node is used for setting and getting the block index that points to the dat | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | @@ -1884,7 +1884,7 @@ This node is used for setting and getting the block index that points to the dat | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1907,7 +1907,7 @@ This node is used for setting or getting the block size (in Kilobytes) for the d | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Allowed Values | Range: `[1-16]` | | Default Value | 4 | @@ -1968,7 +1968,7 @@ This node is used for setting or getting the block size (in Kilobytes) for the d | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1991,7 +1991,7 @@ Root node of all 'BlockNumber' nodes for the associated log file. The number of | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -2007,7 +2007,7 @@ Root node of all 'BlockNumber' nodes for the associated log file. The number of | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2030,7 +2030,7 @@ Each dynamic node represents a 'BlockNumber' node. The node name is an integer e | Property name | Property value | |:--|:--| -| Format | b64 | +| Format | `b64` | | Access Type | Get | | Dynamic Node Naming | ClientInventory | @@ -2047,7 +2047,7 @@ Each dynamic node represents a 'BlockNumber' node. The node name is an integer e | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -2071,7 +2071,7 @@ This can be used to configure Windows event log policies, such as maximum log si | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -2087,7 +2087,7 @@ This can be used to configure Windows event log policies, such as maximum log si | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -2110,7 +2110,7 @@ Contains policy for Event Log channel settings. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -2126,7 +2126,7 @@ Contains policy for Event Log channel settings. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -2149,7 +2149,7 @@ Each dynamic node represents a registered 'Channel' node. The node name must be | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | UniqueName: The node name must be a valid Windows event log channel name, such as Microsoft-Client-Licensing-Platform%2FAdmin. When specifying the name in the LocURI, it must be URL encoded, otherwise it may unexpectedly translate into a different URI. | @@ -2231,7 +2231,7 @@ Each dynamic node represents a registered 'Channel' node. The node name must be | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -2255,7 +2255,7 @@ If you disable or don't configure this policy setting, the locally configured va | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2264,9 +2264,9 @@ If you disable or don't configure this policy setting, the locally configured va | Value | Description | |:--|:--| -| Truncate | When the log file reaches its maximum file size, new events are not written to the log and are lost. | +| Truncate | When the log file reaches its maximum file size, new events aren't written to the log and are lost. | | Overwrite | When the log file reaches its maximum file size, new events overwrite old events. | -| Archive | When the log file reaches its maximum size, the log file is saved to the location specified by the "Archive Location" policy setting. If archive location value is not set, the new file is saved in the same directory as current log file. | +| Archive | When the log file reaches its maximum size, the log file is saved to the location specified by the "Archive Location" policy setting. If archive location value isn't set, the new file is saved in the same directory as current log file. | @@ -2372,7 +2372,7 @@ If you disable or don't configure this policy setting, the locally configured va | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -2396,7 +2396,7 @@ If you disable or don't configure this policy setting, the locally configured va | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | @@ -2512,7 +2512,7 @@ If you disable or don't configure this policy setting, the locally configured va | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -2537,7 +2537,7 @@ Maximum size of the channel log file in MB. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[1-2000000]` | | Default Value | 1 | @@ -2646,7 +2646,7 @@ Maximum size of the channel log file in MB. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -2669,7 +2669,7 @@ SDDL String controlling access to the channel. For more information, see [Channe | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Case Sensitive | True | diff --git a/windows/client-management/mdm/dmacc-csp.md b/windows/client-management/mdm/dmacc-csp.md index 488633b587..ce77f658d1 100644 --- a/windows/client-management/mdm/dmacc-csp.md +++ b/windows/client-management/mdm/dmacc-csp.md @@ -4,7 +4,7 @@ description: Learn more about the DMAcc CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 02/28/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -73,7 +73,7 @@ The following list shows the DMAcc configuration service provider nodes: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -97,7 +97,7 @@ node is generated from the 256-bit version of SHA-2 hash of the w7 PROVIDER-ID p | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | | Dynamic Node Naming | ClientInventory | @@ -114,7 +114,7 @@ node is generated from the 256-bit version of SHA-2 hash of the w7 PROVIDER-ID p | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -125,7 +125,7 @@ node is generated from the 256-bit version of SHA-2 hash of the w7 PROVIDER-ID p -Specifies the application authentication preference. Supported values: BASIC, DIGEST. If this value is empty, the client attempts to use the authentication mechanism negotiated in the previous session if one exists. If the value is empty, no previous session exists, and MD5 credentials exist, clients try MD5 authorization first. If the criteria are not met then the client tries BASIC authorization first. +Specifies the application authentication preference. Supported values: BASIC, DIGEST. If this value is empty, the client attempts to use the authentication mechanism negotiated in the previous session if one exists. If the value is empty, no previous session exists, and MD5 credentials exist, clients try MD5 authorization first. If the criteria aren't met then the client tries BASIC authorization first. @@ -137,7 +137,7 @@ Specifies the application authentication preference. Supported values: BASIC, DI | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get, Replace | @@ -162,7 +162,7 @@ Specifies the application authentication preference. Supported values: BASIC, DI | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -185,7 +185,7 @@ Interior node for DM server address. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Get | @@ -201,7 +201,7 @@ Interior node for DM server address. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -224,7 +224,7 @@ Defines the OMA DM server address. Only one server address can be configured. Wh | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Get | | Dynamic Node Naming | ClientInventory | @@ -241,7 +241,7 @@ Defines the OMA DM server address. Only one server address can be configured. Wh | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -264,7 +264,7 @@ Specifies the address of the OMA DM account. The type of address stored is speci | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get, Replace | @@ -280,7 +280,7 @@ Specifies the address of the OMA DM account. The type of address stored is speci | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -303,7 +303,7 @@ Specifies the format and interpretation of the Addr node value. The default is " | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get, Replace | | Default Value | URI | @@ -329,7 +329,7 @@ Specifies the format and interpretation of the Addr node value. The default is " | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -352,7 +352,7 @@ Interior node for port information. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Get | @@ -368,7 +368,7 @@ Interior node for port information. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -391,7 +391,7 @@ Only one port number can be configured. When mapping the [w7 APPLICATION](w7-app | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Get, Replace | | Dynamic Node Naming | ClientInventory | @@ -408,7 +408,7 @@ Only one port number can be configured. When mapping the [w7 APPLICATION](w7-app | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -431,7 +431,7 @@ Specifies the port number of the OMA MD account address. This must be a decimal | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get, Replace | @@ -447,7 +447,7 @@ Specifies the port number of the OMA MD account address. This must be a decimal | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -470,7 +470,7 @@ Defines authentication settings. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Get | @@ -486,7 +486,7 @@ Defines authentication settings. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -509,7 +509,7 @@ Defines one set of authentication settings. When mapping the [w7 APPLICATION](w7 | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Get | | Dynamic Node Naming | ClientInventory | @@ -526,7 +526,7 @@ Defines one set of authentication settings. When mapping the [w7 APPLICATION](w7 | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -537,7 +537,7 @@ Defines one set of authentication settings. When mapping the [w7 APPLICATION](w7 -Specifies the next nonce used for authentication. "Nonce" refers to a number used once. It is often a random or pseudo-random number issued in an authentication protocol to ensure that old communications cannot be reused in repeat attacks. +Specifies the next nonce used for authentication. "Nonce" refers to a number used once. It's often a random or pseudo-random number issued in an authentication protocol to ensure that old communications can't be reused in repeat attacks. @@ -549,7 +549,7 @@ Specifies the next nonce used for authentication. "Nonce" refers to a number use | Property name | Property value | |:--|:--| -| Format | bin | +| Format | `bin` | | Access Type | Add, Replace | @@ -565,7 +565,7 @@ Specifies the next nonce used for authentication. "Nonce" refers to a number use | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -588,7 +588,7 @@ Specifies the application authentication level. A value of "CLCRED" indicates th | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get, Replace | @@ -613,7 +613,7 @@ Specifies the application authentication level. A value of "CLCRED" indicates th | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -636,7 +636,7 @@ Specifies the authentication name. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get, Replace | @@ -652,7 +652,7 @@ Specifies the authentication name. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -675,7 +675,7 @@ Specifies the password or secret used for authentication. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Replace | @@ -691,7 +691,7 @@ Specifies the password or secret used for authentication. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -714,7 +714,7 @@ Specifies the authentication type. If AAuthLevel is CLCRED, the supported types | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get, Replace | | Dependency [AAuthlevelDependency] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/DMAcc/[AccountUID]/AppAuth/[ObjectName]/AAuthLevel`
    Dependency Allowed Value: `SRVCRED`
    Dependency Allowed Value Type: `ENUM`
    | @@ -740,7 +740,7 @@ Specifies the authentication type. If AAuthLevel is CLCRED, the supported types | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -763,7 +763,7 @@ Specifies the application identifier for the OMA DM account.. The only supported | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get, Replace | | Default Value | w7 | @@ -788,7 +788,7 @@ Specifies the application identifier for the OMA DM account.. The only supported | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -811,7 +811,7 @@ Defines a set of extended parameters. This element holds vendor-specific informa | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -827,7 +827,7 @@ Defines a set of extended parameters. This element holds vendor-specific informa | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -850,7 +850,7 @@ Defines a set of Microsoft-specific extended parameters. This element is created | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -866,7 +866,7 @@ Defines a set of Microsoft-specific extended parameters. This element is created | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -878,9 +878,10 @@ Defines a set of Microsoft-specific extended parameters. This element is created This node specifies whether to disable the ability of the DM client to communicate with a down-level server. + Possible Values: -false (default) -- Compatibility with down-level servers is enabled -true -- Compatibility with down-level servers is disabled. + +false (default) -- Compatibility with down-level servers is enabled true -- Compatibility with down-level servers is disabled. @@ -892,7 +893,7 @@ true -- Compatibility with down-level servers is disabled. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Get, Replace | | Default Value | 0 | @@ -918,7 +919,7 @@ true -- Compatibility with down-level servers is disabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -941,7 +942,7 @@ This node specifies how many times DM client will retry a connection to the serv | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Get, Replace | | Default Value | 3 | @@ -958,7 +959,7 @@ This node specifies how many times DM client will retry a connection to the serv | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -981,7 +982,7 @@ Allows connection to the DM server to check the Certificate Revocation List (CRL | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Get, Replace | @@ -1006,7 +1007,7 @@ Allows connection to the DM server to check the Certificate Revocation List (CRL | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1030,7 +1031,7 @@ This node specifies the encoding that the OMA-DM client will use to encode its f | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get, Replace | @@ -1055,7 +1056,7 @@ This node specifies the encoding that the OMA-DM client will use to encode its f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1078,7 +1079,7 @@ Determines whether the OMA DM client should be launched when roaming. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Get, Replace | @@ -1103,7 +1104,7 @@ Determines whether the OMA DM client should be launched when roaming. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1127,7 +1128,7 @@ time grows exponentially. The default value is 16000 milliseconds. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Get, Replace | | Default Value | 16000 | @@ -1144,7 +1145,7 @@ time grows exponentially. The default value is 16000 milliseconds. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1167,7 +1168,7 @@ When this node is added, a session is started with the MDM server. | Property name | Property value | |:--|:--| -| Format | null | +| Format | `null` | | Access Type | Add, Replace | @@ -1183,7 +1184,7 @@ When this node is added, a session is started with the MDM server. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1206,7 +1207,7 @@ This node specifies the maximum number of milliseconds to wait before attempting | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Get, Replace | | Default Value | 86400000 | @@ -1223,7 +1224,7 @@ This node specifies the maximum number of milliseconds to wait before attempting | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1248,7 +1249,7 @@ The protocol version set by this element will match the protocol version that th | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get, Replace | @@ -1273,7 +1274,7 @@ The protocol version set by this element will match the protocol version that th | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1298,7 +1299,7 @@ The acceptable access roles for this node can't be more than the roles assigned | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | @@ -1325,7 +1326,7 @@ The acceptable access roles for this node can't be more than the roles assigned | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1336,7 +1337,7 @@ The acceptable access roles for this node can't be more than the roles assigned -The SSLCLIENTCERTSEARCHCRITERIA parameter is used to specify the client certificate search criteria. This parameter supports search by subject attribute and certificate stores. If any other criteria are provided, it is ignored. The string is a concatenation of name/value pairs, each member of the pair delimited by the "&" character. The name and values are delimited by the "=" character. If there are multiple values, each value is delimited by the Unicode character "U+F000". If the name or value contains characters not in the UNRESERVED set (as specified in RFC2396), then those characters are URI-escaped per the RFC. The supported names are Subject and Stores; wildcard certificate search is not supported. Stores specifies which certificate stores the DM client will search to find the SSL client certificate. The valid store value is My%5CUser. The store name is not case sensitive. Subject specifies the certificate to search for. For example, to specify that you want a certificate with a particular Subject attribute ("CN=Tester,O=Microsoft"), use the following: +The SSLCLIENTCERTSEARCHCRITERIA parameter is used to specify the client certificate search criteria. This parameter supports search by subject attribute and certificate stores. If any other criteria are provided, it's ignored. The string is a concatenation of name/value pairs, each member of the pair delimited by the "&" character. The name and values are delimited by the "=" character. If there are multiple values, each value is delimited by the Unicode character "U+F000". If the name or value contains characters not in the UNRESERVED set (as specified in RFC2396), then those characters are URI-escaped per the RFC. The supported names are Subject and Stores; wildcard certificate search isn't supported. Stores specifies which certificate stores the DM client will search to find the SSL client certificate. The valid store value is My%5CUser. The store name isn't case sensitive. Subject specifies the certificate to search for. For example, to specify that you want a certificate with a particular Subject attribute ("CN=Tester,O=Microsoft"), use the following: @@ -1352,7 +1353,7 @@ The SSLCLIENTCERTSEARCHCRITERIA parameter is used to specify the client certific | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get, Replace | @@ -1368,7 +1369,7 @@ The SSLCLIENTCERTSEARCHCRITERIA parameter is used to specify the client certific | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1393,7 +1394,7 @@ the UUID of the device. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Get, Replace | | Default Value | 0 | @@ -1404,7 +1405,7 @@ the UUID of the device. | Value | Description | |:--|:--| | 0 (Default) | An application-specific GUID is returned for the ./DevInfo/DevID rather than the hardware device ID. | -| 1 | The hardware device ID will be provided for the ./DevInfo/DevID element and the Source LocURI for the OMA DM package that is sent to the server. | +| 1 | The hardware device ID will be provided for the ./DevInfo/DevID element and the Source LocURI for the OMA DM package that's sent to the server. | @@ -1419,7 +1420,7 @@ the UUID of the device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1432,9 +1433,12 @@ the UUID of the device. This node specifies whether the DM client can use the nonce resynchronization protocol when authentication of a server notification fails. If nonce resynchronization is disabled and authentication of the server notification fails, the notification is dropped. + Possible Values: + false (default) : Nonce resynchronization is disabled. -true : Nonce resynchronization is enabled. + +true: Nonce resynchronization is enabled. @@ -1446,7 +1450,7 @@ true : Nonce resynchronization is enabled. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Get, Replace | | Default Value | 0 | @@ -1456,7 +1460,7 @@ true : Nonce resynchronization is enabled. | Value | Description | |:--|:--| -| 0 (Default) | The client does not try to authenticate the notification with the backup server nonce if authentication to the stored nonce fails. | +| 0 (Default) | The client doesn't try to authenticate the notification with the backup server nonce if authentication to the stored nonce fails. | | 1 | The client initiates a DM session if the backup server nonce is received after authentication failed. | @@ -1472,7 +1476,7 @@ true : Nonce resynchronization is enabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1495,7 +1499,7 @@ Specifies the display name of the application. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get, Replace | @@ -1511,7 +1515,7 @@ Specifies the display name of the application. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1535,7 +1539,7 @@ will use the default connection provided by connection manager. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get, Replace | @@ -1551,7 +1555,7 @@ will use the default connection provided by connection manager. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1574,7 +1578,7 @@ Specifies the OMA DM server's unique identifier for the current OMA DM account. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get, Replace | diff --git a/windows/client-management/mdm/dmclient-csp.md b/windows/client-management/mdm/dmclient-csp.md index ff2a647808..6bf14c7333 100644 --- a/windows/client-management/mdm/dmclient-csp.md +++ b/windows/client-management/mdm/dmclient-csp.md @@ -4,7 +4,7 @@ description: Learn more about the DMClient CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 05/01/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,8 +16,7 @@ ms.topic: reference # DMClient CSP -> [!IMPORTANT] -> This CSP contains preview policies that are under development and only applicable for [Windows Insider Preview builds](/windows-insider/). These policies are subject to change and may have dependencies on other features or services in preview. +[!INCLUDE [Windows Insider tip](includes/mdm-insider-csp-note.md)] @@ -144,7 +143,7 @@ The following list shows the DMClient configuration service provider nodes: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -167,7 +166,7 @@ Returns the hardware device ID. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -183,7 +182,7 @@ Returns the hardware device ID. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -206,7 +205,7 @@ The root node for all settings that belong to a single management server. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -222,7 +221,7 @@ The root node for all settings that belong to a single management server. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -245,7 +244,7 @@ This node contains the URI-encoded value of the bootstrapped device management a | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | ServerGeneratedUniqueIdentifier | @@ -262,7 +261,7 @@ This node contains the URI-encoded value of the bootstrapped device management a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -285,7 +284,7 @@ Device ID used for AAD device registration. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -301,7 +300,7 @@ Device ID used for AAD device registration. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -325,7 +324,7 @@ For more information about Azure AD enrollment, see [Azure Active Directory inte | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get, Replace | @@ -341,7 +340,7 @@ For more information about Azure AD enrollment, see [Azure Active Directory inte | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -352,7 +351,7 @@ For more information about Azure AD enrollment, see [Azure Active Directory inte -For Azure AD backed enrollments, this will cause the client to send a Device Token if the User Token cannot be obtained. +For Azure AD backed enrollments, this will cause the client to send a Device Token if the User Token can't be obtained. @@ -364,7 +363,7 @@ For Azure AD backed enrollments, this will cause the client to send a Device Tok | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | @@ -373,8 +372,8 @@ For Azure AD backed enrollments, this will cause the client to send a Device Tok | Value | Description | |:--|:--| -| false | Do not send Device Token if User Token cannot be obtained. | -| true | Send Device Token if User Token cannot be obtained. | +| false | Don't send Device Token if User Token can't be obtained. | +| true | Send Device Token if User Token can't be obtained. | @@ -389,7 +388,7 @@ For Azure AD backed enrollments, this will cause the client to send a Device Tok | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -412,7 +411,7 @@ The time in OMA DM standard time format. This node is designed to reduce the ris | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -428,7 +427,7 @@ The time in OMA DM standard time format. This node is designed to reduce the ris | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -439,7 +438,7 @@ The time in OMA DM standard time format. This node is designed to reduce the ris -Configures the identifier used to uniquely associate this diagnostic data of this device as belonging to a given organization. If your organization is participating in a program that requires this device to be identified as belonging to your organization then use this setting to provide that identification. The value for this setting will be provided by Microsoft as part of the onboarding process for the program. If you disable or do not configure this policy setting, then Microsoft will not be able to use this identifier to associate this machine and its diagnostic data with your organization. +Configures the identifier used to uniquely associate this diagnostic data of this device as belonging to a given organization. If your organization is participating in a program that requires this device to be identified as belonging to your organization then use this setting to provide that identification. The value for this setting will be provided by Microsoft as part of the onboarding process for the program. If you disable or don't configure this policy setting, then Microsoft won't be able to use this identifier to associate this machine and its diagnostic data with your organization. @@ -451,7 +450,7 @@ Configures the identifier used to uniquely associate this diagnostic data of thi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -467,7 +466,7 @@ Configures the identifier used to uniquely associate this diagnostic data of thi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -493,7 +492,7 @@ This node enables [Config Lock](../config-lock.md) feature. If enabled, policies | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -509,7 +508,7 @@ This node enables [Config Lock](../config-lock.md) feature. If enabled, policies | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -532,7 +531,7 @@ This node specifies how the client will perform the lock mode for SecureCore PC. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -558,7 +557,7 @@ This node specifies how the client will perform the lock mode for SecureCore PC. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -581,7 +580,7 @@ The node returns the boolean value whether the device is a SecureCore PC. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get | @@ -597,7 +596,7 @@ The node returns the boolean value whether the device is a SecureCore PC. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -608,7 +607,7 @@ The node returns the boolean value whether the device is a SecureCore PC. -This node, when it is set, tells the client to set how many minutes the device should be temporarily unlocked from SecureCore settings protection. The default value is 480. +This node, when it's set, tells the client to set how many minutes the device should be temporarily unlocked from SecureCore settings protection. The default value is 480. @@ -620,7 +619,7 @@ This node, when it is set, tells the client to set how many minutes the device s | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 480 | @@ -637,7 +636,7 @@ This node, when it is set, tells the client to set how many minutes the device s | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -660,7 +659,7 @@ Parent node for ConfigRefresh nodes. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | @@ -676,7 +675,7 @@ Parent node for ConfigRefresh nodes. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -699,7 +698,7 @@ This node determines the number of minutes between refreshes. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[30-1440]` | | Default Value | 90 | @@ -717,7 +716,7 @@ This node determines the number of minutes between refreshes. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -740,7 +739,7 @@ This node determines whether or not a periodic settings refresh for MDM policies | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | false | @@ -766,7 +765,7 @@ This node determines whether or not a periodic settings refresh for MDM policies | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -789,7 +788,7 @@ This node determines the number of minutes ConfigRefresh should be paused for. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-1440]` | | Default Value | 0 | @@ -807,7 +806,7 @@ This node determines the number of minutes ConfigRefresh should be paused for. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -830,7 +829,7 @@ These nodes provision custom text for the enrollment page. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | @@ -846,7 +845,7 @@ These nodes provision custom text for the enrollment page. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -869,7 +868,7 @@ Specifies the body text of the all done page that appears at the end of the MDM | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -885,7 +884,7 @@ Specifies the body text of the all done page that appears at the end of the MDM | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -896,7 +895,7 @@ Specifies the body text of the all done page that appears at the end of the MDM -Specifies the URL that is shown at the end of the MDM enrollment flow. +Specifies the URL that's shown at the end of the MDM enrollment flow. @@ -908,7 +907,7 @@ Specifies the URL that is shown at the end of the MDM enrollment flow. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -924,7 +923,7 @@ Specifies the URL that is shown at the end of the MDM enrollment flow. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -935,7 +934,7 @@ Specifies the URL that is shown at the end of the MDM enrollment flow. -Specifies the display text for the URL that is shown at the end of the MDM enrollment flow. +Specifies the display text for the URL that's shown at the end of the MDM enrollment flow. @@ -947,7 +946,7 @@ Specifies the display text for the URL that is shown at the end of the MDM enrol | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -963,7 +962,7 @@ Specifies the display text for the URL that is shown at the end of the MDM enrol | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -986,7 +985,7 @@ Specifies the title of the all done page that appears at the end of the MDM enro | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1002,7 +1001,7 @@ Specifies the title of the all done page that appears at the end of the MDM enro | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1013,7 +1012,7 @@ Specifies the title of the all done page that appears at the end of the MDM enro -A boolean value that specifies whether the DM client should send out a request pending alert in case the device response to a DM request is too slow. When the server sends a configuration request, sometimes it takes the client longer than the HTTP timeout to get all information together and then the session ends unexpectedly due to timeout. By default, the MDM client does not send an alert that a DM request is pending. To work around the timeout, you can use this setting to keep the session alive by sending a heartbeat message back to the server. This is achieved by sending a SyncML message with a specific device alert element in the body until the client is able to respond back to the server with the requested information. +A boolean value that specifies whether the DM client should send out a request pending alert in case the device response to a DM request is too slow. When the server sends a configuration request, sometimes it takes the client longer than the HTTP timeout to get all information together and then the session ends unexpectedly due to timeout. By default, the MDM client doesn't send an alert that a DM request is pending. To work around the timeout, you can use this setting to keep the session alive by sending a heartbeat message back to the server. This is achieved by sending a SyncML message with a specific device alert element in the body until the client is able to respond back to the server with the requested information. @@ -1025,7 +1024,7 @@ A boolean value that specifies whether the DM client should send out a request p | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | false | @@ -1083,7 +1082,7 @@ Here's an example of DM message sent by the device when it's in pending state: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1105,7 +1104,7 @@ Here's an example of DM message sent by the device when it's in pending state: | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1121,7 +1120,7 @@ Here's an example of DM message sent by the device when it's in pending state: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1144,7 +1143,7 @@ The node contains the primary certificate - the public key to use. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1160,7 +1159,7 @@ The node contains the primary certificate - the public key to use. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1183,7 +1182,7 @@ The node contains the secondary certificate - the public key to use. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1199,7 +1198,7 @@ The node contains the secondary certificate - the public key to use. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1222,7 +1221,7 @@ This node specifies how the client will perform the app layer signing and encryp | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1250,7 +1249,7 @@ This node specifies how the client will perform the app layer signing and encryp | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1261,7 +1260,7 @@ This node specifies how the client will perform the app layer signing and encryp -This node, when it is set, tells the client to use the certificate even when the client cannot check the certificate's revocation status because the device is offline. The default value is set. +This node, when it's set, tells the client to use the certificate even when the client can't check the certificate's revocation status because the device is offline. The default value is set. @@ -1273,7 +1272,7 @@ This node, when it is set, tells the client to use the certificate even when the | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | false | @@ -1299,7 +1298,7 @@ This node, when it is set, tells the client to use the certificate even when the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1322,7 +1321,7 @@ Type of MDM enrollment (Device or Full). | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1338,7 +1337,7 @@ Type of MDM enrollment (Device or Full). | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1361,7 +1360,7 @@ Character string that contains the user-friendly device name used by the IT admi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1377,7 +1376,7 @@ Character string that contains the user-friendly device name used by the IT admi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1402,7 +1401,7 @@ Character string that contains the unique enterprise device ID. The value is set | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1418,7 +1417,7 @@ Character string that contains the unique enterprise device ID. The value is set | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1429,7 +1428,7 @@ Character string that contains the unique enterprise device ID. The value is set -Character string that contains the unique Exchange device ID used by the Outlook account of the user the session is running against. This is useful for the enterprise management server to correlate and merge records for a device that is managed by exchange and natively managed by a dedicated management server. +Character string that contains the unique Exchange device ID used by the Outlook account of the user the session is running against. This is useful for the enterprise management server to correlate and merge records for a device that's managed by exchange and natively managed by a dedicated management server. @@ -1443,7 +1442,7 @@ Character string that contains the unique Exchange device ID used by the Outlook | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1471,7 +1470,7 @@ Character string that contains the unique Exchange device ID used by the Outlook | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1493,7 +1492,7 @@ Character string that contains the unique Exchange device ID used by the Outlook | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | @@ -1509,7 +1508,7 @@ Character string that contains the unique Exchange device ID used by the Outlook | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1532,7 +1531,7 @@ This node decides whether or not the MDM progress page displays the Collect Logs | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | false | @@ -1542,7 +1541,7 @@ This node decides whether or not the MDM progress page displays the Collect Logs | Value | Description | |:--|:--| -| false (Default) | Do not show the Collect Logs button on the progress page. | +| false (Default) | Don't show the Collect Logs button on the progress page. | | true | Show the Collect Logs button on the progress page. | @@ -1558,7 +1557,7 @@ This node decides whether or not the MDM progress page displays the Collect Logs | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1581,7 +1580,7 @@ Device Only. This node determines whether or not the MDM progress page is blocki | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 0 | @@ -1609,7 +1608,7 @@ Device Only. This node determines whether or not the MDM progress page is blocki | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1632,7 +1631,7 @@ This node allows the MDM to set custom error text, detailing what the user needs | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1648,7 +1647,7 @@ This node allows the MDM to set custom error text, detailing what the user needs | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1659,7 +1658,7 @@ This node allows the MDM to set custom error text, detailing what the user needs -This node contains a list of LocURIs that refer to App Packages the ISV expects to provision via EnterpriseModernAppManagement CSP, delimited by the character L"\xF000". The LocURI will be followed by a semicolon and a number, representing the amount of apps included in the App Package. We will not verify that number. E. G. ./Vendor/MSFT/EnterpriseModernAppManagement/AppManagement/AppStore/PackageFamilyName/PackageFullName/Name;4"\xF000" ./Vendor/MSFT/EnterpriseModernAppManagement/AppManagement/AppStore/PackageFamilyName/PackageFullName2/Name;2 Which will represent that App Package PackageFullName contains 4 apps, whereas PackageFullName2 contains 2 apps. +This node contains a list of LocURIs that refer to App Packages the ISV expects to provision via EnterpriseModernAppManagement CSP, delimited by the character L"\xF000". The LocURI will be followed by a semicolon and a number, representing the number of apps included in the App Package. We won't verify that number. E. G. ./Vendor/MSFT/EnterpriseModernAppManagement/AppManagement/AppStore/PackageFamilyName/PackageFullName/Name;4"\xF000" ./Vendor/MSFT/EnterpriseModernAppManagement/AppManagement/AppStore/PackageFamilyName/PackageFullName2/Name;2 Which will represent that App Package PackageFullName contains 4 apps, whereas PackageFullName2 contains 2 apps. @@ -1671,7 +1670,7 @@ This node contains a list of LocURIs that refer to App Packages the ISV expects | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `\xF000`) | @@ -1688,7 +1687,7 @@ This node contains a list of LocURIs that refer to App Packages the ISV expects | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1699,7 +1698,7 @@ This node contains a list of LocURIs that refer to App Packages the ISV expects -This node contains a list of LocURIs that refer to App Packages the ISV expects to provision via EnterpriseDesktopAppManagement CSP, delimited by the character L"\xF000". The LocURI will be followed by a semicolon and a number, representing the amount of apps included in the App Package. We will not verify that number. E. G. ./User/Vendor/MSFT/EnterpriseDesktopAppManagement/MSI/ProductID1/Status;4"\xF000" ./User/Vendor/MSFT/EnterpriseDesktopAppManagement/MSI/ProductID2/Status;2 Which will represent that App Package ProductID1 contains 4 apps, whereas ProductID2 contains 2 apps. +This node contains a list of LocURIs that refer to App Packages the ISV expects to provision via EnterpriseDesktopAppManagement CSP, delimited by the character L"\xF000". The LocURI will be followed by a semicolon and a number, representing the number of apps included in the App Package. We won't verify that number. E. G. ./User/Vendor/MSFT/EnterpriseDesktopAppManagement/MSI/ProductID1/Status;4"\xF000" ./User/Vendor/MSFT/EnterpriseDesktopAppManagement/MSI/ProductID2/Status;2 Which will represent that App Package ProductID1 contains 4 apps, whereas ProductID2 contains 2 apps. @@ -1711,7 +1710,7 @@ This node contains a list of LocURIs that refer to App Packages the ISV expects | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `\xF000`) | @@ -1728,7 +1727,7 @@ This node contains a list of LocURIs that refer to App Packages the ISV expects | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1751,7 +1750,7 @@ This node contains a list of LocURIs that refer to Wi-Fi profiles and VPN profil | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `\xF000`) | @@ -1768,7 +1767,7 @@ This node contains a list of LocURIs that refer to Wi-Fi profiles and VPN profil | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1791,7 +1790,7 @@ This node contains a list of LocURIs that refer to certs the ISV expects to prov | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `\xF000`) | @@ -1808,7 +1807,7 @@ This node contains a list of LocURIs that refer to certs the ISV expects to prov | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1831,7 +1830,7 @@ This node contains a list of LocURIs that refer to Policies the ISV expects to p | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `\xF000`) | @@ -1848,7 +1847,7 @@ This node contains a list of LocURIs that refer to Policies the ISV expects to p | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1871,7 +1870,7 @@ This node contains a list of LocURIs that refer to SCEP certs the ISV expects to | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `\xF000`) | @@ -1888,7 +1887,7 @@ This node contains a list of LocURIs that refer to SCEP certs the ISV expects to | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1899,7 +1898,7 @@ This node contains a list of LocURIs that refer to SCEP certs the ISV expects to -This node, when doing a get, tells the server if the "First Syncs" are done and the device is fully provisioned. When doing a Set, this triggers the UX to override whatever state it is in and tell the user that the device is provisioned. It cannot be set from True to False (it will not change its mind on whether or not the sync is done), and it cannot be set from True to True (to prevent notifications from firing multiple times). This node only applies to the user MDM status page (on a per user basis). +This node, when doing a get, tells the server if the "First Syncs" are done and the device is fully provisioned. When doing a Set, this triggers the UX to override whatever state it's in and tell the user that the device is provisioned. It can't be set from True to False (it won't change its mind on whether or not the sync is done), and it can't be set from True to True (to prevent notifications from firing multiple times). This node only applies to the user MDM status page (on a per user basis). @@ -1911,7 +1910,7 @@ This node, when doing a get, tells the server if the "First Syncs" are done and | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | @@ -1920,8 +1919,8 @@ This node, when doing a get, tells the server if the "First Syncs" are done and | Value | Description | |:--|:--| -| false | The device is not finished provisioning. | -| true | The device has finished provisoining. | +| false | The device isn't finished provisioning. | +| true | The device has finished provisioning. | @@ -1936,7 +1935,7 @@ This node, when doing a get, tells the server if the "First Syncs" are done and | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1947,7 +1946,7 @@ This node, when doing a get, tells the server if the "First Syncs" are done and -This node is set by the server to inform the UX that the server has finished provisioning the device. This was added so that the server can "change its mind" about what it needs to provision on the device. When this node is set, many other DM Client nodes will no longer be able to be changed. If this node is not True, the UX will consider the provisioning a failure. Once set to true, it would reject attempts to change it back to false with CFGMGR_E_COMMANDNOTALLOWED. This node applies to the per user expected policies and resources lists. +This node is set by the server to inform the UX that the server has finished provisioning the device. This was added so that the server can "change its mind" about what it needs to provision on the device. When this node is set, many other DM Client nodes will no longer be able to be changed. If this node isn't True, the UX will consider the provisioning a failure. Once set to true, it would reject attempts to change it back to false with CFGMGR_E_COMMANDNOTALLOWED. This node applies to the per user expected policies and resources lists. @@ -1959,7 +1958,7 @@ This node is set by the server to inform the UX that the server has finished pro | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | @@ -1968,7 +1967,7 @@ This node is set by the server to inform the UX that the server has finished pro | Value | Description | |:--|:--| -| false | Server has not finished provisioning. | +| false | Server hasn't finished provisioning. | | true | Server has finished provisioning. | @@ -1984,7 +1983,7 @@ This node is set by the server to inform the UX that the server has finished pro | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -2007,7 +2006,7 @@ Device only. This node decides whether or not the MDM device progress page skips | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | true | @@ -2017,7 +2016,7 @@ Device only. This node decides whether or not the MDM device progress page skips | Value | Description | |:--|:--| -| false | Do not skip the device progress page after Azure AD joined or Hybrid Azure AD joined in OOBE. | +| false | Don't skip the device progress page after Azure AD joined or Hybrid Azure AD joined in OOBE. | | true (Default) | Skip the device progress page after Azure AD joined or Hybrid Azure AD joined in OOBE. | @@ -2033,7 +2032,7 @@ Device only. This node decides whether or not the MDM device progress page skips | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -2056,7 +2055,7 @@ Device only. This node decides whether or not the MDM user progress page skips a | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | true | @@ -2066,7 +2065,7 @@ Device only. This node decides whether or not the MDM user progress page skips a | Value | Description | |:--|:--| -| false | Do not skip the MGM user progress page after Azure AD joined or Hybrid Azure AD joined in OOBE. | +| false | Don't skip the MGM user progress page after Azure AD joined or Hybrid Azure AD joined in OOBE. | | true (Default) | Skip the MGM user progress page after Azure AD joined or Hybrid Azure AD joined in OOBE. | @@ -2082,7 +2081,7 @@ Device only. This node decides whether or not the MDM user progress page skips a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2105,7 +2104,7 @@ This node determines how long we will poll until we surface an error message to | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Allowed Values | Range: `[1-1440]` | | Default Value | 60 | @@ -2123,7 +2122,7 @@ This node determines how long we will poll until we surface an error message to | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2134,7 +2133,7 @@ This node determines how long we will poll until we surface an error message to -Integer node determining if a Device was Successfully provisioned. 0 is failure, 1 is success, 2 is in progress. Once the value is changed to 0 or 1, the value cannot be changed again. The client will change the value of success or failure and update the node. The server can, however, force a failure or success message to appear on the device by setting this value and then setting the IsSyncDone node to true. This node only applies to the user MDM status page (on a per user basis). +Integer node determining if a Device was Successfully provisioned. 0 is failure, 1 is success, 2 is in progress. Once the value is changed to 0 or 1, the value can't be changed again. The client will change the value of success or failure and update the node. The server can, however, force a failure or success message to appear on the device by setting this value and then setting the IsSyncDone node to true. This node only applies to the user MDM status page (on a per user basis). @@ -2146,7 +2145,7 @@ Integer node determining if a Device was Successfully provisioned. 0 is failure, | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | @@ -2172,7 +2171,7 @@ Integer node determining if a Device was Successfully provisioned. 0 is failure, | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1766] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1766] and later
    :heavy_check_mark: Windows 10, version 21H2 [10.0.19044.1766] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.739] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2009 [10.0.19042.1766] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1766] and later
    ✅ Windows 10, version 21H2 [10.0.19044.1766] and later
    ✅ Windows 11, version 21H2 [10.0.22000.739] and later
    ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -2195,7 +2194,7 @@ Force device to send device AAD token during check-in as a separate header. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | @@ -2204,9 +2203,9 @@ Force device to send device AAD token during check-in as a separate header. | Value | Description | |:--|:--| -| 0 | ForceAadTokenNotDefined: the value is not defined(default). | +| 0 | ForceAadTokenNotDefined: the value isn't defined(default). | | 1 | AlwaysSendAadDeviceTokenCheckIn: always send AAD device token during check-in as a separate header section(not as Bearer token). | -| 2 | Reserved for future. AlwaysSendAadUserTokenCheckin: always send AAD user token during check-in as a separate header section(not as Bearer toekn). | +| 2 | Reserved for future. AlwaysSendAadUserTokenCheckin: always send AAD user token during check-in as a separate header section(not as Bearer token). | | 4 | SendAadDeviceTokenForAuth: to replace AADSendDeviceToken, send AAD Device token for auth as Bearer token. | | 8 | Reserved for future. ForceAadTokenMaxAllowed: max value allowed. | @@ -2223,7 +2222,7 @@ Force device to send device AAD token during check-in as a separate header. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -2246,7 +2245,7 @@ The character string that allows the user experience to include a customized hel | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2262,7 +2261,7 @@ The character string that allows the user experience to include a customized hel | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -2285,7 +2284,7 @@ The character string that allows the user experience to include a customized hel | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2301,7 +2300,7 @@ The character string that allows the user experience to include a customized hel | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -2324,7 +2323,7 @@ The character string that allows the user experience to include a customized hel | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2340,7 +2339,7 @@ The character string that allows the user experience to include a customized hel | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -2363,7 +2362,7 @@ Returns the hardware device ID. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2379,7 +2378,7 @@ Returns the hardware device ID. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2009 [10.0.19042.2193] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.2193] and later
    :heavy_check_mark: Windows 10, version 21H2 [10.0.19044.2193] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.918] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2009 [10.0.19042.2193] and later
    ✅ Windows 10, version 21H1 [10.0.19043.2193] and later
    ✅ Windows 10, version 21H2 [10.0.19044.2193] and later
    ✅ Windows 11, version 21H2 [10.0.22000.918] and later
    ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -2402,7 +2401,7 @@ The interior node for linked enrollment. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -2418,7 +2417,7 @@ The interior node for linked enrollment. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2009 [10.0.19042.2193] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.2193] and later
    :heavy_check_mark: Windows 10, version 21H2 [10.0.19044.2193] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.918] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2009 [10.0.19042.2193] and later
    ✅ Windows 10, version 21H1 [10.0.19043.2193] and later
    ✅ Windows 10, version 21H2 [10.0.19044.2193] and later
    ✅ Windows 11, version 21H2 [10.0.22000.918] and later
    ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -2442,7 +2441,7 @@ This is an execution node and will trigger a silent MMP-C enrollment, using the | Property name | Property value | |:--|:--| -| Format | null | +| Format | `null` | | Access Type | Exec | @@ -2458,7 +2457,7 @@ This is an execution node and will trigger a silent MMP-C enrollment, using the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2009 [10.0.19042.2193] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.2193] and later
    :heavy_check_mark: Windows 10, version 21H2 [10.0.19044.2193] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.918] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2009 [10.0.19042.2193] and later
    ✅ Windows 10, version 21H1 [10.0.19043.2193] and later
    ✅ Windows 10, version 21H2 [10.0.19044.2193] and later
    ✅ Windows 11, version 21H2 [10.0.22000.918] and later
    ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -2481,7 +2480,7 @@ Returns the current enrollment or un-enrollment status of the linked enrollment. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -2513,7 +2512,7 @@ Returns the current enrollment or un-enrollment status of the linked enrollment. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2009 [10.0.19042.2193] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.2193] and later
    :heavy_check_mark: Windows 10, version 21H2 [10.0.19044.2193] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.918] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2009 [10.0.19042.2193] and later
    ✅ Windows 10, version 21H1 [10.0.19043.2193] and later
    ✅ Windows 10, version 21H2 [10.0.19044.2193] and later
    ✅ Windows 11, version 21H2 [10.0.22000.918] and later
    ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -2536,7 +2535,7 @@ return the last error for enroll/unenroll. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -2552,7 +2551,7 @@ return the last error for enroll/unenroll. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2009 [10.0.19042.2193] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.2193] and later
    :heavy_check_mark: Windows 10, version 21H2 [10.0.19044.2193] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.918] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2009 [10.0.19042.2193] and later
    ✅ Windows 10, version 21H1 [10.0.19043.2193] and later
    ✅ Windows 10, version 21H2 [10.0.19044.2193] and later
    ✅ Windows 11, version 21H2 [10.0.22000.918] and later
    ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -2563,7 +2562,7 @@ return the last error for enroll/unenroll. -Optional. Allowed value is 0 or 1. 0 means the main enrollment has authority for mdm settings and resources, 1 means the linked enrollment has authority. +Optional. Allowed value is 0 or 1. 0 means the main enrollment has authority for MDM settings and resources, 1 means the linked enrollment has authority. @@ -2575,7 +2574,7 @@ Optional. Allowed value is 0 or 1. 0 means the main enrollment has authority for | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -2600,7 +2599,7 @@ Optional. Allowed value is 0 or 1. 0 means the main enrollment has authority for | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2009 [10.0.19042.2193] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.2193] and later
    :heavy_check_mark: Windows 10, version 21H2 [10.0.19044.2193] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.918] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2009 [10.0.19042.2193] and later
    ✅ Windows 10, version 21H1 [10.0.19043.2193] and later
    ✅ Windows 10, version 21H2 [10.0.19044.2193] and later
    ✅ Windows 11, version 21H2 [10.0.22000.918] and later
    ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -2624,7 +2623,7 @@ This is an execution node and will trigger a silent MMP-C unenroll, there is no | Property name | Property value | |:--|:--| -| Format | null | +| Format | `null` | | Access Type | Exec | @@ -2640,7 +2639,7 @@ This is an execution node and will trigger a silent MMP-C unenroll, there is no | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -2651,7 +2650,7 @@ This is an execution node and will trigger a silent MMP-C unenroll, there is no -The list of management server URLs in the format `` `` ``, and so on. If there is only one, the angle brackets (<>) are not required. The < and > should be escaped. If ManagementServerAddressList node is set, the device will only use the server URL configured in this node and ignore the ManagementServiceAddress value. When the server is not responding after a specified number of retries, the device tries to use the next server URL in the list until it gets a successful connection. After the server list is updated, the client uses the updated list at the next session starting with the first on in the list. +The list of management server URLs in the format `` `` ``, and so on. If there is only one, the angle brackets (<>) aren't required. The `< and >` should be escaped. If ManagementServerAddressList node is set, the device will only use the server URL configured in this node and ignore the ManagementServiceAddress value. When the server isn't responding after a specified number of retries, the device tries to use the next server URL in the list until it gets a successful connection. After the server list is updated, the client uses the updated list at the next session starting with the first on in the list. @@ -2663,7 +2662,7 @@ The list of management server URLs in the format `` `` ``, and | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -2694,7 +2693,7 @@ The list of management server URLs in the format `` `` ``, and | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -2717,7 +2716,7 @@ Specify the Discovery server URL of the MDM server to upgrade to for a MAM enrol | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2733,7 +2732,7 @@ Specify the Discovery server URL of the MDM server to upgrade to for a MAM enrol | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -2744,7 +2743,7 @@ Specify the Discovery server URL of the MDM server to upgrade to for a MAM enrol -The character string that contains the device management server address. It can be updated during an OMA DM session by the management server to allow the server to load balance to another server in situations where too many devices are connected to the server. The DMClient CSP will save the address to the same location as the w7 and DMS CSPs to ensure the management client has a single place to retrieve the current server address. The initial value for this node is the same server address value as bootstrapped via the [w7 APPLICATION](w7-application-csp.md) configuration service provider. Starting in Windows 10, version 1511, this node supports multiple server addresses in the format `` `` ``. If there is only a single URL, then the <> are not required. This is supported for both desktop and mobile devices. During a DM session, the device will use the first address on the list and then keep going down the list until a successful connection is achieved. The DM client should cache the successfully connected server URL for the next session. +The character string that contains the device management server address. It can be updated during an OMA DM session by the management server to allow the server to load balance to another server in situations where too many devices are connected to the server. The DMClient CSP will save the address to the same location as the w7 and DMS CSPs to ensure the management client has a single place to retrieve the current server address. The initial value for this node is the same server address value as bootstrapped via the [w7 APPLICATION](w7-application-csp.md) configuration service provider. Starting in Windows 10, version 1511, this node supports multiple server addresses in the format `` `` ``. If there is only a single URL, then the <> aren't required. This is supported for both desktop and mobile devices. During a DM session, the device will use the first address on the list and then keep going down the list until a successful connection is achieved. The DM client should cache the successfully connected server URL for the next session. @@ -2758,7 +2757,7 @@ The character string that contains the device management server address. It can | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | | Dependency [ManageServerAddressListBlock] | Dependency Type: `Not`
    Dependency URI: `Device/Vendor/MSFT/DMClient/Provider/[ProviderID]/ManagementServerAddressList`
    Dependency Allowed Value Type: `None`
    | @@ -2775,7 +2774,7 @@ The character string that contains the device management server address. It can | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -2798,7 +2797,7 @@ Used by the client to indicate the latest DM session version that it supports. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2814,7 +2813,7 @@ Used by the client to indicate the latest DM session version that it supports. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2838,7 +2837,7 @@ Used by the client to indicate the latest DM session version that it supports. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -2854,7 +2853,7 @@ Used by the client to indicate the latest DM session version that it supports. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2865,7 +2864,7 @@ Used by the client to indicate the latest DM session version that it supports. -The waiting time (in minutes) for the initial set of retries as specified by the number of retries in NumberOfScheduledRetriesForUserSession. If IntervalForScheduledRetriesForUserSession is not set, then the default value is used. Default value is 1440. If the value is 0, this schedule is disabled. +The waiting time (in minutes) for the initial set of retries as specified by the number of retries in NumberOfScheduledRetriesForUserSession. If IntervalForScheduledRetriesForUserSession isn't set, then the default value is used. Default value is 1440. If the value is 0, this schedule is disabled. @@ -2879,7 +2878,7 @@ The waiting time (in minutes) for the initial set of retries as specified by the | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -2895,7 +2894,7 @@ The waiting time (in minutes) for the initial set of retries as specified by the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2920,7 +2919,7 @@ Optional. Maximum number of concurrent user sync sessions at User Login. Default | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -2936,7 +2935,7 @@ Optional. Maximum number of concurrent user sync sessions at User Login. Default | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2961,7 +2960,7 @@ Optional. Maximum number of concurrent user sync sessions in background. Default | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -2977,7 +2976,7 @@ Optional. Maximum number of concurrent user sync sessions in background. Default | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2988,7 +2987,7 @@ Optional. Maximum number of concurrent user sync sessions in background. Default -The number of times the DM client should retry connecting to the server when the client is initially configured/enrolled to communicate with the server. Default value is 0. If the value is 0 and IntervalForScheduledRetriesForUserSession is not 0, then the schedule will be set to repeat for an infinite number of times. +The number of times the DM client should retry connecting to the server when the client is initially configured/enrolled to communicate with the server. Default value is 0. If the value is 0 and IntervalForScheduledRetriesForUserSession isn't 0, then the schedule will be set to repeat for an infinite number of times. @@ -3002,7 +3001,7 @@ The number of times the DM client should retry connecting to the server when the | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -3018,7 +3017,7 @@ The number of times the DM client should retry connecting to the server when the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -3041,7 +3040,7 @@ Number of days after last successful sync to unenroll. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -3057,7 +3056,7 @@ Number of days after last successful sync to unenroll. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -3080,7 +3079,7 @@ Polling schedules must utilize the DMClient CSP. The Registry paths previously a | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | @@ -3096,7 +3095,7 @@ Polling schedules must utilize the DMClient CSP. The Registry paths previously a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -3107,7 +3106,7 @@ Polling schedules must utilize the DMClient CSP. The Registry paths previously a -Boolean value that allows the IT admin to require the device to start a management session on first user login for all NT users. A session is only kicked off the first time a user logs in to the system; subsequent logins will not trigger an MDM session. Login is not the same as device unlock. Default value is false, where polling is disabled on first login. Supported values are true or false. +Boolean value that allows the IT admin to require the device to start a management session on first user login for all NT users. A session is only kicked off the first time a user logs in to the system; subsequent logins won't trigger an MDM session. Login isn't the same as device unlock. Default value is false, where polling is disabled on first login. Supported values are true or false. @@ -3119,7 +3118,7 @@ Boolean value that allows the IT admin to require the device to start a manageme | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | false | @@ -3145,7 +3144,7 @@ Boolean value that allows the IT admin to require the device to start a manageme | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -3156,7 +3155,7 @@ Boolean value that allows the IT admin to require the device to start a manageme -The waiting time (in minutes) for the initial set of retries as specified by the number of retries in /``/Poll/NumberOfFirstRetries. If IntervalForFirstSetOfRetries is not set, then the default value is used. The default value is 15. If the value is set to 0, this schedule is disabled. +The waiting time (in minutes) for the initial set of retries as specified by the number of retries in /``/Poll/NumberOfFirstRetries. If IntervalForFirstSetOfRetries isn't set, then the default value is used. The default value is 15. If the value is set to 0, this schedule is disabled. @@ -3168,7 +3167,7 @@ The waiting time (in minutes) for the initial set of retries as specified by the | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -3184,7 +3183,7 @@ The waiting time (in minutes) for the initial set of retries as specified by the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -3207,7 +3206,7 @@ The waiting time (in minutes) for the initial set of retries as specified by the | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -3223,7 +3222,7 @@ The waiting time (in minutes) for the initial set of retries as specified by the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -3246,7 +3245,7 @@ The waiting time (in minutes) for the second set of retries as specified by the | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -3262,7 +3261,7 @@ The waiting time (in minutes) for the second set of retries as specified by the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -3273,7 +3272,7 @@ The waiting time (in minutes) for the second set of retries as specified by the -The number of times the DM client should retry to connect to the server when the client is initially configured or enrolled to communicate with the server. If the value is set to 0 and the IntervalForFirstSetOfRetries value is not 0, then the schedule will be set to repeat an infinite number of times and second set and this set of schedule will not set in this case. The default value is 10. The first set of retries is intended to give the management server some buffered time to be ready to send policies and settings configuration to the device. The total time for first set of retries should not be more than a few hours. The server should not set NumberOfFirstRetries to be 0. RemainingScheduledRetries is used for the long run device polling schedule. +The number of times the DM client should retry to connect to the server when the client is initially configured or enrolled to communicate with the server. If the value is set to 0 and the IntervalForFirstSetOfRetries value isn't 0, then the schedule will be set to repeat an infinite number of times and second set and this set of schedule won't set in this case. The default value is 10. The first set of retries is intended to give the management server some buffered time to be ready to send policies and settings configuration to the device. The total time for first set of retries shouldn't be more than a few hours. The server shouldn't set NumberOfFirstRetries to be 0. RemainingScheduledRetries is used for the long run device polling schedule. @@ -3285,7 +3284,7 @@ The number of times the DM client should retry to connect to the server when the | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -3301,7 +3300,7 @@ The number of times the DM client should retry to connect to the server when the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -3312,7 +3311,7 @@ The number of times the DM client should retry to connect to the server when the -The number of times the DM client should retry connecting to the server when the client is initially configured/enrolled to communicate with the server. Default value is 0. If the value is set to 0 and IntervalForRemainingScheduledRetries AND the first and second set of retries are not set as infinite retries, then the schedule will be set to repeat for an infinite number of times. However, if either or both of the first and second set of retries are set as infinite, then this schedule will be disabled. The RemainingScheduledRetries is used for the long run device polling schedule. IntervalForRemainingScheduledRetries should not be set smaller than 1440 minutes (24 hours) in Windows Phone 8.1 device. Windows Phone 8.1 supports MDM server push. +The number of times the DM client should retry connecting to the server when the client is initially configured/enrolled to communicate with the server. Default value is 0. If the value is set to 0 and IntervalForRemainingScheduledRetries AND the first and second set of retries aren't set as infinite retries, then the schedule will be set to repeat for an infinite number of times. However, if either or both of the first and second set of retries are set as infinite, then this schedule will be disabled. The RemainingScheduledRetries is used for the long run device polling schedule. IntervalForRemainingScheduledRetries shouldn't be set smaller than 1440 minutes (24 hours) in Windows Phone 8.1 device. Windows Phone 8.1 supports MDM server push. @@ -3324,7 +3323,7 @@ The number of times the DM client should retry connecting to the server when the | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -3340,7 +3339,7 @@ The number of times the DM client should retry connecting to the server when the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -3351,7 +3350,7 @@ The number of times the DM client should retry connecting to the server when the -The number of times the DM client should retry a second round of connecting to the server when the client is initially configured/enrolled to communicate with the server. Default value is 0. If the value is set to 0 and IntervalForSecondSetOfRetries is not set to 0 AND the first set of retries is not set as infinite retries, then the schedule repeats an infinite number of times. However, if the first set of retries is set at infinite, then this schedule is disabled. The second set of retries is also optional and temporarily retries that the total duration should be last for more than a day. And the IntervalForSecondSetOfRetries should be longer than IntervalForFirstSetOfRetries. RemainingScheduledRetries is used for the long run device polling schedule. +The number of times the DM client should retry a second round of connecting to the server when the client is initially configured/enrolled to communicate with the server. Default value is 0. If the value is set to 0 and IntervalForSecondSetOfRetries isn't set to 0 AND the first set of retries isn't set as infinite retries, then the schedule repeats an infinite number of times. However, if the first set of retries is set at infinite, then this schedule is disabled. The second set of retries is also optional and temporarily retries that the total duration should be last for more than a day. And the IntervalForSecondSetOfRetries should be longer than IntervalForFirstSetOfRetries. RemainingScheduledRetries is used for the long run device polling schedule. @@ -3363,7 +3362,7 @@ The number of times the DM client should retry a second round of connecting to t | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -3379,7 +3378,7 @@ The number of times the DM client should retry a second round of connecting to t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -3390,7 +3389,7 @@ The number of times the DM client should retry a second round of connecting to t -Boolean value that allows the IT admin to require the device to start a management session on any user login, regardless of if the user has preciously logged in. Login is not the same as device unlock. Default value is false, where polling is disabled on first login. Supported values are true or false. +Boolean value that allows the IT admin to require the device to start a management session on any user login, regardless of if the user has preciously logged in. Login isn't the same as device unlock. Default value is false, where polling is disabled on first login. Supported values are true or false. @@ -3402,7 +3401,7 @@ Boolean value that allows the IT admin to require the device to start a manageme | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | false | @@ -3428,7 +3427,7 @@ Boolean value that allows the IT admin to require the device to start a manageme | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -3439,7 +3438,7 @@ Boolean value that allows the IT admin to require the device to start a manageme -The PublisherDeviceID is a device-unique ID created based on the enterprise Publisher ID. Publisher ID is created based on the enterprise application token and enterprise ID via ./Vendor/MSFT/EnterpriseAppManagement/``/EnrollmentToken. It is to ensure that for one enterprise, each device has a unique ID associated with it. For the same device, if it has multiple enterprises' applications, each enterprise is identified differently. +The PublisherDeviceID is a device-unique ID created based on the enterprise Publisher ID. Publisher ID is created based on the enterprise application token and enterprise ID via ./Vendor/MSFT/EnterpriseAppManagement/``/EnrollmentToken. It's to ensure that for one enterprise, each device has a unique ID associated with it. For the same device, if it has multiple enterprises' applications, each enterprise is identified differently. @@ -3451,7 +3450,7 @@ The PublisherDeviceID is a device-unique ID created based on the enterprise Publ | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -3467,7 +3466,7 @@ The PublisherDeviceID is a device-unique ID created based on the enterprise Publ | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -3490,7 +3489,7 @@ Not configurable during WAP Provisioning XML. If removed, DM sessions triggered | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | @@ -3506,7 +3505,7 @@ Not configurable during WAP Provisioning XML. If removed, DM sessions triggered | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -3529,7 +3528,7 @@ A string that contains the channel that the WNS client has negotiated for the OM | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -3545,7 +3544,7 @@ A string that contains the channel that the WNS client has negotiated for the OM | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -3556,7 +3555,7 @@ A string that contains the channel that the WNS client has negotiated for the OM -A string provided by the Windows 10 ecosystem for an MDM solution. Used to register a device for Push Notifications. The server must use the same PFN as the devices it is managing. +A string provided by the Windows 10 ecosystem for an MDM solution. Used to register a device for Push Notifications. The server must use the same PFN as the devices it's managing. @@ -3568,7 +3567,7 @@ A string provided by the Windows 10 ecosystem for an MDM solution. Used to regis | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -3584,7 +3583,7 @@ A string provided by the Windows 10 ecosystem for an MDM solution. Used to regis | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -3607,7 +3606,7 @@ An integer that maps to a known error state or condition on the system. Valid va | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -3623,7 +3622,7 @@ An integer that maps to a known error state or condition on the system. Valid va | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.1165] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000.1165] and later
    ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -3646,7 +3645,7 @@ Parent node for Recovery nodes. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -3662,7 +3661,7 @@ Parent node for Recovery nodes. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.1165] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000.1165] and later
    ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -3685,7 +3684,7 @@ This node determines whether or not the client will automatically initiate a MDM | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 0 | @@ -3696,7 +3695,7 @@ This node determines whether or not the client will automatically initiate a MDM | Value | Description | |:--|:--| | 1 | MDM Recovery is allowed. | -| 0 (Default) | MDM Recovery is not allowed. | +| 0 (Default) | MDM Recovery isn't allowed. | @@ -3711,7 +3710,7 @@ This node determines whether or not the client will automatically initiate a MDM | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.1165] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000.1165] and later
    ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -3734,7 +3733,7 @@ This node initiates a recovery action. The server can specify prerequisites befo | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Exec | | Default Value | 0 | @@ -3745,7 +3744,7 @@ This node initiates a recovery action. The server can specify prerequisites befo | Value | Description | |:--|:--| | 0 (Default) | Initiate MDM Recovery. | -| 1 | Initiate Recovery if Keys are not already protected by the TPM, there is a TPM to put the keys into, AAD keys are protected by TPM, and the TPM is ready for attestation. | +| 1 | Initiate Recovery if Keys aren't already protected by the TPM, there is a TPM to put the keys into, AAD keys are protected by TPM, and the TPM is ready for attestation. | @@ -3760,7 +3759,7 @@ This node initiates a recovery action. The server can specify prerequisites befo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.1165] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000.1165] and later
    ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -3771,7 +3770,7 @@ This node initiates a recovery action. The server can specify prerequisites befo -This node tracks the status of a Recovery request from the InitiateRecovery node. 0 - No Recovery request has been processed. 1 - Recovery is in Process. 2 - Recovery has finished successfully. 3 - Recovery has failed to start because TPM is not available. 4 - Recovery has failed to start because AAD keys are not protected by the TPM. 5 - Recovery has failed to start because the MDM keys are already protected by the TPM. 6 - Recovery has failed to start because the TPM is not ready for attestation. 7 - Recovery has failed because the client cannot authenticate to the server. 8 - Recovery has failed because the server has rejected the client's request. +This node tracks the status of a Recovery request from the InitiateRecovery node. 0 - No Recovery request has been processed. 1 - Recovery is in Process. 2 - Recovery has finished successfully. 3 - Recovery has failed to start because TPM isn't available. 4 - Recovery has failed to start because AAD keys aren't protected by the TPM. 5 - Recovery has failed to start because the MDM keys are already protected by the TPM. 6 - Recovery has failed to start because the TPM isn't ready for attestation. 7 - Recovery has failed because the client can't authenticate to the server. 8 - Recovery has failed because the server has rejected the client's request. @@ -3783,7 +3782,7 @@ This node tracks the status of a Recovery request from the InitiateRecovery node | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | | Default Value | 0 | @@ -3800,7 +3799,7 @@ This node tracks the status of a Recovery request from the InitiateRecovery node | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -3823,7 +3822,7 @@ Primarily used for SSL bridging mode where firewalls and proxies are deployed an | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | false | @@ -3833,7 +3832,7 @@ Primarily used for SSL bridging mode where firewalls and proxies are deployed an | Value | Description | |:--|:--| -| false (Default) | The device management client does not include authentication information in the management session HTTP header. | +| false (Default) | The device management client doesn't include authentication information in the management session HTTP header. | | true | The client authentication information is provided in the management session HTTP header. | @@ -3849,7 +3848,7 @@ Primarily used for SSL bridging mode where firewalls and proxies are deployed an | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -3872,7 +3871,7 @@ Character string that contains the device ID. This node and the nodes CertRenewT | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -3888,7 +3887,7 @@ Character string that contains the device ID. This node and the nodes CertRenewT | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -3913,7 +3912,7 @@ Used by the management server to set the DM session version that the server and | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Regular Expression: `^(\d\.)?(\d)$` | | Default Value | 1.0 | @@ -3931,7 +3930,7 @@ Used by the management server to set the DM session version that the server and | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -3956,7 +3955,7 @@ The node accepts unenrollment requests by way of the OMA DM Exec command and cal | Property name | Property value | |:--|:--| -| Format | null | +| Format | `null` | | Access Type | Exec, Get | @@ -3991,7 +3990,7 @@ The following SyncML shows how to remotely unenroll the device. This command sho | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -4014,7 +4013,7 @@ Allows the management server to update the User Principal Name (UPN) of the enro | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get, Replace | @@ -4030,7 +4029,7 @@ Allows the management server to update the User Principal Name (UPN) of the enro | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -4053,7 +4052,7 @@ The node accepts unenrollment requests by way of the OMA DM Exec command and cal | Property name | Property value | |:--|:--| -| Format | null | +| Format | `null` | | Access Type | Exec, Get | @@ -4069,7 +4068,7 @@ The node accepts unenrollment requests by way of the OMA DM Exec command and cal | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -4080,7 +4079,7 @@ The node accepts unenrollment requests by way of the OMA DM Exec command and cal -For provisioning packages only. Specifies the list of servers (semicolon delimited). The first server in the semicolon-delimited list is the server that will be used to instantiate MDM sessions. The list can be a permutation or a subset of the existing server list. You cannot add new servers to the list using this node. +For provisioning packages only. Specifies the list of servers (semicolon delimited). The first server in the semicolon-delimited list is the server that will be used to instantiate MDM sessions. The list can be a permutation or a subset of the existing server list. You can't add new servers to the list using this node. @@ -4092,7 +4091,7 @@ For provisioning packages only. Specifies the list of servers (semicolon delimit | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -4109,7 +4108,7 @@ For provisioning packages only. Specifies the list of servers (semicolon delimit | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -4132,7 +4131,7 @@ The root node for all settings that belong to a single management server. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -4148,7 +4147,7 @@ The root node for all settings that belong to a single management server. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -4171,7 +4170,7 @@ This node contains the URI-encoded value of the bootstrapped device management a | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | ServerGeneratedUniqueIdentifier | @@ -4188,7 +4187,7 @@ This node contains the URI-encoded value of the bootstrapped device management a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -4210,7 +4209,7 @@ This node contains the URI-encoded value of the bootstrapped device management a | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | @@ -4226,7 +4225,7 @@ This node contains the URI-encoded value of the bootstrapped device management a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -4249,7 +4248,7 @@ This node decides whether or not the MDM progress page displays the Collect Logs | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | false | @@ -4259,7 +4258,7 @@ This node decides whether or not the MDM progress page displays the Collect Logs | Value | Description | |:--|:--| -| false (Default) | Do not show the Collect Logs button on the progress page. | +| false (Default) | Don't show the Collect Logs button on the progress page. | | true | Show the Collect Logs button on the progress page. | @@ -4275,7 +4274,7 @@ This node decides whether or not the MDM progress page displays the Collect Logs | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -4298,7 +4297,7 @@ This node allows the MDM to set custom error text, detailing what the user needs | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -4314,7 +4313,7 @@ This node allows the MDM to set custom error text, detailing what the user needs | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -4325,7 +4324,7 @@ This node allows the MDM to set custom error text, detailing what the user needs -This node contains a list of LocURIs that refer to App Packages the ISV expects to provision via EnterpriseModernAppManagement CSP, delimited by the character L"\xF000". The LocURI will be followed by a semicolon and a number, representing the amount of apps included in the App Package. We will not verify that number. E. G. ./Vendor/MSFT/EnterpriseModernAppManagement/AppManagement/AppStore/PackageFamilyName/PackageFullName/Name;4"\xF000" ./Vendor/MSFT/EnterpriseModernAppManagement/AppManagement/AppStore/PackageFamilyName/PackageFullName2/Name;2 Which will represent that App Package PackageFullName contains 4 apps, whereas PackageFullName2 contains 2 apps. This is per user. +This node contains a list of LocURIs that refer to App Packages the ISV expects to provision via EnterpriseModernAppManagement CSP, delimited by the character L"\xF000". The LocURI will be followed by a semicolon and a number, representing the number of apps included in the App Package. We won't verify that number. E. G. ./Vendor/MSFT/EnterpriseModernAppManagement/AppManagement/AppStore/PackageFamilyName/PackageFullName/Name;4"\xF000" ./Vendor/MSFT/EnterpriseModernAppManagement/AppManagement/AppStore/PackageFamilyName/PackageFullName2/Name;2 Which will represent that App Package PackageFullName contains 4 apps, whereas PackageFullName2 contains 2 apps. This is per user. @@ -4337,7 +4336,7 @@ This node contains a list of LocURIs that refer to App Packages the ISV expects | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `\xF000`) | @@ -4354,7 +4353,7 @@ This node contains a list of LocURIs that refer to App Packages the ISV expects | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -4365,7 +4364,7 @@ This node contains a list of LocURIs that refer to App Packages the ISV expects -This node contains a list of LocURIs that refer to App Packages the ISV expects to provision via EnterpriseDesktopAppManagement CSP, delimited by the character L"\xF000". The LocURI will be followed by a semicolon and a number, representing the amount of apps included in the App Package. We will not verify that number. E. G. ./User/Vendor/MSFT/EnterpriseDesktopAppManagement/MSI/ProductID1/Status;4"\xF000" ./User/Vendor/MSFT/EnterpriseDesktopAppManagement/MSI/ProductID2/Status;2 Which will represent that App Package ProductID1 contains 4 apps, whereas ProductID2 contains 2 apps. This is per user. +This node contains a list of LocURIs that refer to App Packages the ISV expects to provision via EnterpriseDesktopAppManagement CSP, delimited by the character L"\xF000". The LocURI will be followed by a semicolon and a number, representing the number of apps included in the App Package. We won't verify that number. E. G. ./User/Vendor/MSFT/EnterpriseDesktopAppManagement/MSI/ProductID1/Status;4"\xF000" ./User/Vendor/MSFT/EnterpriseDesktopAppManagement/MSI/ProductID2/Status;2 Which will represent that App Package ProductID1 contains 4 apps, whereas ProductID2 contains 2 apps. This is per user. @@ -4377,7 +4376,7 @@ This node contains a list of LocURIs that refer to App Packages the ISV expects | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `\xF000`) | @@ -4394,7 +4393,7 @@ This node contains a list of LocURIs that refer to App Packages the ISV expects | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -4417,7 +4416,7 @@ This node contains a list of LocURIs that refer to Wi-Fi profiles and VPN profil | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `\xF000`) | @@ -4434,7 +4433,7 @@ This node contains a list of LocURIs that refer to Wi-Fi profiles and VPN profil | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -4457,7 +4456,7 @@ This node contains a list of LocURIs that refer to certs the ISV expects to prov | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `\xF000`) | @@ -4474,7 +4473,7 @@ This node contains a list of LocURIs that refer to certs the ISV expects to prov | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -4497,7 +4496,7 @@ This node contains a list of LocURIs that refer to Policies the ISV expects to p | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `\xF000`) | @@ -4514,7 +4513,7 @@ This node contains a list of LocURIs that refer to Policies the ISV expects to p | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -4537,7 +4536,7 @@ This node contains a list of LocURIs that refer to SCEP certs the ISV expects to | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `\xF000`) | @@ -4554,7 +4553,7 @@ This node contains a list of LocURIs that refer to SCEP certs the ISV expects to | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -4565,7 +4564,7 @@ This node contains a list of LocURIs that refer to SCEP certs the ISV expects to -This node, when doing a get, tells the server if the "First Syncs" are done and the device is fully provisioned. When doing a Set, this triggers the UX to override whatever state it is in and tell the user that the device is provisioned. It cannot be set from True to False (it will not change its mind on whether or not the sync is done), and it cannot be set from True to True (to prevent notifications from firing multiple times). This node only applies to the user MDM status page (on a per user basis). +This node, when doing a get, tells the server if the "First Syncs" are done and the device is fully provisioned. When doing a Set, this triggers the UX to override whatever state it's in and tell the user that the device is provisioned. It can't be set from True to False (it won't change its mind on whether or not the sync is done), and it can't be set from True to True (to prevent notifications from firing multiple times). This node only applies to the user MDM status page (on a per user basis). @@ -4577,7 +4576,7 @@ This node, when doing a get, tells the server if the "First Syncs" are done and | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | @@ -4586,8 +4585,8 @@ This node, when doing a get, tells the server if the "First Syncs" are done and | Value | Description | |:--|:--| -| false | The user is not finished provisioning. | -| true | The user has finished provisoining. | +| false | The user isn't finished provisioning. | +| true | The user has finished provisioning. | @@ -4602,7 +4601,7 @@ This node, when doing a get, tells the server if the "First Syncs" are done and | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -4613,7 +4612,7 @@ This node, when doing a get, tells the server if the "First Syncs" are done and -This node is set by the server to inform the UX that the server has finished provisioning the device. This was added so that the server can "change its mind" about what it needs to provision on the device. When this node is set, many other DM Client nodes will no longer be able to be changed. If this node is not True, the UX will consider the provisioning a failure. Once set to true, it would reject attempts to change it back to false with CFGMGR_E_COMMANDNOTALLOWED. This node applies to the per user expected policies and resources lists. +This node is set by the server to inform the UX that the server has finished provisioning the device. This was added so that the server can "change its mind" about what it needs to provision on the device. When this node is set, many other DM Client nodes will no longer be able to be changed. If this node isn't True, the UX will consider the provisioning a failure. Once set to true, it would reject attempts to change it back to false with CFGMGR_E_COMMANDNOTALLOWED. This node applies to the per user expected policies and resources lists. @@ -4625,7 +4624,7 @@ This node is set by the server to inform the UX that the server has finished pro | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | @@ -4634,7 +4633,7 @@ This node is set by the server to inform the UX that the server has finished pro | Value | Description | |:--|:--| -| false | Server has not finished provisioning. | +| false | Server hasn't finished provisioning. | | true | Server has finished provisioning. | @@ -4650,7 +4649,7 @@ This node is set by the server to inform the UX that the server has finished pro | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -4661,7 +4660,7 @@ This node is set by the server to inform the UX that the server has finished pro -Integer node determining if a Device was Successfully provisioned. 0 is failure, 1 is success, 2 is in progress. Once the value is changed to 0 or 1, the value cannot be changed again. The client will change the value of success or failure and update the node. The server can, however, force a failure or success message to appear on the device by setting this value and then setting the IsSyncDone node to true. This node only applies to the user MDM status page (on a per user basis). +Integer node determining if a Device was Successfully provisioned. 0 is failure, 1 is success, 2 is in progress. Once the value is changed to 0 or 1, the value can't be changed again. The client will change the value of success or failure and update the node. The server can, however, force a failure or success message to appear on the device by setting this value and then setting the IsSyncDone node to true. This node only applies to the user MDM status page (on a per user basis). @@ -4673,7 +4672,7 @@ Integer node determining if a Device was Successfully provisioned. 0 is failure, | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | diff --git a/windows/client-management/mdm/email2-csp.md b/windows/client-management/mdm/email2-csp.md index 877d121472..ddb612ea0c 100644 --- a/windows/client-management/mdm/email2-csp.md +++ b/windows/client-management/mdm/email2-csp.md @@ -4,7 +4,7 @@ description: Learn more about the EMAIL2 CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 02/28/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -72,7 +72,7 @@ The following list shows the EMAIL2 configuration service provider nodes: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -101,7 +101,7 @@ The braces {} around the GUID are required in the EMAIL2 configuration service p | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | | Dynamic Node Naming | ServerGeneratedUniqueIdentifier | | Allowed Values | Regular Expression: `\{[0-9A-Fa-f]{8}\-[0-9A-Fa-f]{4}\-[0-9A-Fa-f]{4}\-[0-9A-Fa-f]{4}\-[0-9A-Fa-f]{12}\}` | @@ -119,7 +119,7 @@ The braces {} around the GUID are required in the EMAIL2 configuration service p | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -142,7 +142,7 @@ The location of the icon associated with the account. The account icon can be us | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -158,7 +158,7 @@ The location of the icon associated with the account. The account icon can be us | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -181,7 +181,7 @@ Specifies the type of account. Valid values are: Email - normal email, VVM - vis | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -206,7 +206,7 @@ Specifies the type of account. Valid values are: Email - normal email, VVM - vis | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -229,7 +229,7 @@ Character string that specifies the name used to authorize the user to a specifi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -245,7 +245,7 @@ Character string that specifies the name used to authorize the user to a specifi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -257,11 +257,12 @@ Character string that specifies the name used to authorize the user to a specifi Character string that specifies whether the outgoing server requires authentication. + 1 for TRUE 0 for FALSE(default). > [!NOTE] -> If this is not specified then SMTP authentication will not be done. Also, this is different from the SMTPALTENABLED. That is to specify different set of credentials for SMTP. +> If this isn't specified then SMTP authentication won't be done. Also, this is different from the SMTPALTENABLED. That is to specify different set of credentials for SMTP. @@ -273,7 +274,7 @@ Character string that specifies whether the outgoing server requires authenticat | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -282,7 +283,7 @@ Character string that specifies whether the outgoing server requires authenticat | Value | Description | |:--|:--| -| 0 | Server authentication is not required. | +| 0 | Server authentication isn't required. | | 1 | Server authentication is required. | @@ -298,7 +299,7 @@ Character string that specifies whether the outgoing server requires authenticat | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -321,7 +322,7 @@ Character string that specifies the user's password. The same password is used f | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -337,7 +338,7 @@ Character string that specifies the user's password. The same password is used f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -348,7 +349,7 @@ Character string that specifies the user's password. The same password is used f -Server for calendar sync if it is different from the email server. +Server for calendar sync if it's different from the email server. @@ -360,7 +361,7 @@ Server for calendar sync if it is different from the email server. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -376,7 +377,7 @@ Server for calendar sync if it is different from the email server. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -399,7 +400,7 @@ Indicates if the connection to the calendar server requires SSL. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -415,7 +416,7 @@ Indicates if the connection to the calendar server requires SSL. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -438,7 +439,7 @@ Sets the schedule for syncing calendar items. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -454,7 +455,7 @@ Sets the schedule for syncing calendar items. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -477,7 +478,7 @@ If this flag is set, the account only uses the cellular network and not Wi-Fi. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -493,7 +494,7 @@ If this flag is set, the account only uses the cellular network and not Wi-Fi. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -504,7 +505,7 @@ If this flag is set, the account only uses the cellular network and not Wi-Fi. -Server for contact sync if it is different from the email server. +Server for contact sync if it's different from the email server. @@ -516,7 +517,7 @@ Server for contact sync if it is different from the email server. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -532,7 +533,7 @@ Server for contact sync if it is different from the email server. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -555,7 +556,7 @@ Indicates if the connection to the contact server requires SSL. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -571,7 +572,7 @@ Indicates if the connection to the contact server requires SSL. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -594,7 +595,7 @@ Sets the schedule for syncing contact items. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -610,7 +611,7 @@ Sets the schedule for syncing contact items. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -633,7 +634,7 @@ Character string that specifies the incoming server credentials domain. Limited | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -649,7 +650,7 @@ Character string that specifies the incoming server credentials domain. Limited | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -672,7 +673,7 @@ Character string that specifies how many days' worth of email should be download | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -700,7 +701,7 @@ Character string that specifies how many days' worth of email should be download | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -723,7 +724,7 @@ Character string that specifies how many days' worth of email should be download | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -739,7 +740,7 @@ Character string that specifies how many days' worth of email should be download | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -750,7 +751,7 @@ Character string that specifies how many days' worth of email should be download -Specifies the maximum size for a message attachment. Attachments beyond this size will not be downloaded but it will remain on the server. The message itself will be downloaded. This value can be set only for IMAP4 accounts. The limit is specified in KB. +Specifies the maximum size for a message attachment. Attachments beyond this size won't be downloaded but it will remain on the server. The message itself will be downloaded. This value can be set only for IMAP4 accounts. The limit's specified in KB. @@ -762,7 +763,7 @@ Specifies the maximum size for a message attachment. Attachments beyond this siz | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -771,7 +772,7 @@ Specifies the maximum size for a message attachment. Attachments beyond this siz | Value | Description | |:--|:--| -| -1 | No limit is enforced. | +| -1 | No limit's enforced. | | 0 | No attachment is downloaded. | | 25 | 25 KB. | | 50 | 50 KB. | @@ -791,7 +792,7 @@ Specifies the maximum size for a message attachment. Attachments beyond this siz | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -814,7 +815,7 @@ Character string that specifies the length of time between email send/receive up | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[(-1)-2147483647]` | | Default Value | 15 | @@ -832,7 +833,7 @@ Character string that specifies the length of time between email send/receive up | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -855,7 +856,7 @@ Character string that specifies the name of the sender displayed on a sent email | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -871,7 +872,7 @@ Character string that specifies the name of the sender displayed on a sent email | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -894,7 +895,7 @@ Character string that specifies the name of the messaging service's outgoing ema | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -910,7 +911,7 @@ Character string that specifies the name of the messaging service's outgoing ema | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -933,7 +934,7 @@ Character string that specifies the reply email address of the user (usually the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -949,7 +950,7 @@ Character string that specifies the reply email address of the user (usually the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -972,7 +973,7 @@ Specifies the maximum size in bytes for messages retrieved from the incoming ema | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[(-1)-2147483647]` | @@ -989,7 +990,7 @@ Specifies the maximum size in bytes for messages retrieved from the incoming ema | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1012,7 +1013,7 @@ Character string that specifies how message is deleted on server. The default ac | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1037,7 +1038,7 @@ Character string that specifies how message is deleted on server. The default ac | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1060,7 +1061,7 @@ Character string that specifies the name of the email service to create or edit | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1078,7 +1079,7 @@ Character string that specifies the name of the email service to create or edit | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1103,7 +1104,7 @@ Character string that specifies the type of email service to create or edit (for | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1119,7 +1120,7 @@ Character string that specifies the type of email service to create or edit (for | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1142,7 +1143,7 @@ Character string that specifies the display name associated with the user's alte | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1158,7 +1159,7 @@ Character string that specifies the display name associated with the user's alte | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1181,7 +1182,7 @@ Character string that specifies the domain name for the user's alternative SMTP | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1197,7 +1198,7 @@ Character string that specifies the domain name for the user's alternative SMTP | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1220,7 +1221,7 @@ Character string that specifies if the user's alternate SMTP account is enabled. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1245,7 +1246,7 @@ Character string that specifies if the user's alternate SMTP account is enabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1268,7 +1269,7 @@ Character string that specifies the password for the user's alternate SMTP accou | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1284,7 +1285,7 @@ Character string that specifies the password for the user's alternate SMTP accou | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1307,7 +1308,7 @@ Specifies a bitmask for which content types are supported for syncing (eg: Mail, | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1343,7 +1344,7 @@ Specifies a bitmask for which content types are supported for syncing (eg: Mail, | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1366,7 +1367,7 @@ Specifies that stated parameter element name attributes is nonstandard tag prope | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | @@ -1382,7 +1383,7 @@ Specifies that stated parameter element name attributes is nonstandard tag prope | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1405,7 +1406,7 @@ Character string that specifies if the incoming email server requires SSL. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1414,7 +1415,7 @@ Character string that specifies if the incoming email server requires SSL. | Value | Description | |:--|:--| -| 0 | SSL is not required. | +| 0 | SSL isn't required. | | 1 | SSL is required. | @@ -1430,7 +1431,7 @@ Character string that specifies if the incoming email server requires SSL. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1453,7 +1454,7 @@ Character string that specifies if the outgoing email server requires SSL. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1462,7 +1463,7 @@ Character string that specifies if the outgoing email server requires SSL. | Value | Description | |:--|:--| -| 0 | SSL is not required. | +| 0 | SSL isn't required. | | 1 | SSL is required. | diff --git a/windows/client-management/mdm/enterprisedesktopappmanagement-csp.md b/windows/client-management/mdm/enterprisedesktopappmanagement-csp.md index 394eabf465..b3c89c489f 100644 --- a/windows/client-management/mdm/enterprisedesktopappmanagement-csp.md +++ b/windows/client-management/mdm/enterprisedesktopappmanagement-csp.md @@ -4,7 +4,7 @@ description: Learn more about the EnterpriseDesktopAppManagement CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 02/27/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -62,7 +62,7 @@ The following list shows the EnterpriseDesktopAppManagement configuration servic | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -85,7 +85,7 @@ Product Type is MSI. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -101,7 +101,7 @@ Product Type is MSI. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -124,7 +124,7 @@ The MSI product code for the application. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Atomic Required | True | | Dynamic Node Naming | UniqueName: The MSI product code for the application. | @@ -142,7 +142,7 @@ The MSI product code for the application. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -153,7 +153,7 @@ The MSI product code for the application. -Executes the download and installation of the application. In Windows 10, version 1703 service release, a new tag `` was added to the `` section of the XML. The default value is 0 (do not send token). This tag is optional and needs to be set to 1 in case the server wants the download URL to get the AADUserToken. +Executes the download and installation of the application. In Windows 10, version 1703 service release, a new tag `` was added to the `` section of the XML. The default value is 0 (don't send token). This tag is optional and needs to be set to 1 in case the server wants the download URL to get the AADUserToken. @@ -178,7 +178,7 @@ For more information, see [DownloadInstall XSD Schema](#downloadinstall-xsd-sche | Property name | Property value | |:--|:--| -| Format | xml | +| Format | `xml` | | Access Type | Add, Delete, Exec, Get | @@ -194,7 +194,7 @@ For more information, see [DownloadInstall XSD Schema](#downloadinstall-xsd-sche | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -217,7 +217,7 @@ Installation date of the application. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -233,7 +233,7 @@ Installation date of the application. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -256,7 +256,7 @@ Installation path of the application. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -272,7 +272,7 @@ Installation path of the application. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -295,7 +295,7 @@ The last error code during the application installation process. This is typical | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -311,7 +311,7 @@ The last error code during the application installation process. This is typical | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -334,7 +334,7 @@ Contains the last error code description. The LastErrorDesc value is looked up f | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -350,7 +350,7 @@ Contains the last error code description. The LastErrorDesc value is looked up f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -373,7 +373,7 @@ Name of the application. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -389,7 +389,7 @@ Name of the application. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -412,7 +412,7 @@ Publisher of application. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -428,7 +428,7 @@ Publisher of application. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -451,7 +451,7 @@ Status of the application. Valid values: 10-Initialized, 20-Download In Progress | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -467,7 +467,7 @@ Status of the application. Valid values: 10-Initialized, 20-Download In Progress | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -490,7 +490,7 @@ MSI Product Version. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -506,7 +506,7 @@ MSI Product Version. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -528,7 +528,7 @@ MSI Product Version. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | | Case Sensitive | True | @@ -545,7 +545,7 @@ MSI Product Version. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -568,7 +568,7 @@ A gateway (or device management server) uses this method to detect matching upgr | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | | Dynamic Node Naming | ClientInventory | @@ -585,7 +585,7 @@ A gateway (or device management server) uses this method to detect matching upgr | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -608,7 +608,7 @@ Product Type is MSI. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -624,7 +624,7 @@ Product Type is MSI. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -647,7 +647,7 @@ The MSI product code for the application. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Atomic Required | True | | Dynamic Node Naming | UniqueName: The MSI product code for the application. | @@ -665,7 +665,7 @@ The MSI product code for the application. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -676,7 +676,7 @@ The MSI product code for the application. -Executes the download and installation of the application. In Windows 10, version 1703 service release, a new tag `` was added to the `` section of the XML. The default value is 0 (do not send token). This tag is optional and needs to be set to 1 in case the server wants the download URL to get the AADUserToken. +Executes the download and installation of the application. In Windows 10, version 1703 service release, a new tag `` was added to the `` section of the XML. The default value is 0 (don't send token). This tag is optional and needs to be set to 1 in case the server wants the download URL to get the AADUserToken. @@ -701,7 +701,7 @@ For more information, see [DownloadInstall XSD Schema](#downloadinstall-xsd-sche | Property name | Property value | |:--|:--| -| Format | xml | +| Format | `xml` | | Access Type | Add, Delete, Exec, Get | @@ -717,7 +717,7 @@ For more information, see [DownloadInstall XSD Schema](#downloadinstall-xsd-sche | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -740,7 +740,7 @@ Installation date of the application. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -756,7 +756,7 @@ Installation date of the application. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -779,7 +779,7 @@ Installation path of the application. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -795,7 +795,7 @@ Installation path of the application. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -818,7 +818,7 @@ The last error code during the application installation process. This is typical | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -834,7 +834,7 @@ The last error code during the application installation process. This is typical | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -857,7 +857,7 @@ Contains the last error code description. The LastErrorDesc value is looked up f | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -873,7 +873,7 @@ Contains the last error code description. The LastErrorDesc value is looked up f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -896,7 +896,7 @@ Name of the application. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -912,7 +912,7 @@ Name of the application. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -935,7 +935,7 @@ Publisher of application. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -951,7 +951,7 @@ Publisher of application. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -974,7 +974,7 @@ Status of the application. Valid values: 10-Initialized, 20-Download In Progress | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -990,7 +990,7 @@ Status of the application. Valid values: 10-Initialized, 20-Download In Progress | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1013,7 +1013,7 @@ MSI Product Version. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1029,7 +1029,7 @@ MSI Product Version. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1051,7 +1051,7 @@ MSI Product Version. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | | Case Sensitive | True | @@ -1068,7 +1068,7 @@ MSI Product Version. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1091,7 +1091,7 @@ A gateway (or device management server) uses this method to detect matching upgr | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | | Dynamic Node Naming | ClientInventory | diff --git a/windows/client-management/mdm/enterprisemodernappmanagement-csp.md b/windows/client-management/mdm/enterprisemodernappmanagement-csp.md index 9d5ec3342a..c1f8d41e72 100644 --- a/windows/client-management/mdm/enterprisemodernappmanagement-csp.md +++ b/windows/client-management/mdm/enterprisemodernappmanagement-csp.md @@ -4,7 +4,7 @@ description: Learn more about the EnterpriseModernAppManagement CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 04/26/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -259,7 +259,7 @@ The following list shows the EnterpriseModernAppManagement configuration service | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -283,7 +283,7 @@ This is a required node. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -299,7 +299,7 @@ This is a required node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -326,7 +326,7 @@ This is an optional node. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | | Dynamic Node Naming | UniqueName: Package family name (PFN) of the app. | @@ -363,7 +363,7 @@ Here's an example for uninstalling an app: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -398,7 +398,7 @@ This is a required node. The following list shows the supported deployment optio | Property name | Property value | |:--|:--| -| Format | xml | +| Format | `xml` | | Access Type | Add, Delete, Exec, Get | @@ -414,7 +414,7 @@ This is a required node. The following list shows the supported deployment optio | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -439,7 +439,7 @@ Last error relating to the app installation. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -455,7 +455,7 @@ Last error relating to the app installation. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -480,7 +480,7 @@ Description of last error relating to the app installation. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -496,7 +496,7 @@ Description of last error relating to the app installation. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -507,7 +507,7 @@ Description of last error relating to the app installation. -An integer the indicates the progress of the app installation. For https locations, this indicates the download progress. ProgressStatus is not available for provisioning and it is only for user-based installations. In provisioning, the value is always 0 (zero). +An integer that indicates the progress of the app installation. For https locations, this indicates the download progress. ProgressStatus isn't available for provisioning and it's only for user-based installations. In provisioning, the value is always 0 (zero). @@ -521,7 +521,7 @@ An integer the indicates the progress of the app installation. For https locatio | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -537,7 +537,7 @@ An integer the indicates the progress of the app installation. For https locatio | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -548,7 +548,7 @@ An integer the indicates the progress of the app installation. For https locatio -Status of app installation. The following values are returned: NOT_INSTALLED (0) - The node was added, but the execution has not completed. INSTALLING (1) - Execution has started, but the deployment has not completed. If the deployment completes regardless of success, this value is updated. FAILED (2) - Installation failed. The details of the error can be found under LastError and LastErrorDescription. INSTALLED (3) - Once an install is successful this node is cleaned up, however in the event the clean up action has not completed, this state may briefly appear. +Status of app installation. The following values are returned: NOT_INSTALLED (0) - The node was added, but the execution hasn't completed. INSTALLING (1) - Execution has started, but the deployment hasn't completed. If the deployment completes regardless of success, this value is updated. FAILED (2) - Installation failed. The details of the error can be found under LastError and LastErrorDescription. INSTALLED (3) - Once an install is successful this node is cleaned up, however in the event the clean up action hasn't completed, this state may briefly appear. @@ -562,7 +562,7 @@ Status of app installation. The following values are returned: NOT_INSTALLED (0) | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -578,7 +578,7 @@ Status of app installation. The following values are returned: NOT_INSTALLED (0) | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -601,7 +601,7 @@ Command to perform an install of an app and a license from the Microsoft Store. | Property name | Property value | |:--|:--| -| Format | xml | +| Format | `xml` | | Access Type | Add, Delete, Exec, Get | @@ -617,7 +617,7 @@ Command to perform an install of an app and a license from the Microsoft Store. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -640,7 +640,7 @@ Used to manage licenses for app scenarios. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -656,7 +656,7 @@ Used to manage licenses for app scenarios. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -680,7 +680,7 @@ This is a required node. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -696,7 +696,7 @@ This is a required node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -720,7 +720,7 @@ This is an optional node. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | UniqueName: License ID for a store installed app. The license ID is generally the PFN of the app. | @@ -737,7 +737,7 @@ This is an optional node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -761,7 +761,7 @@ This is a required node. | Property name | Property value | |:--|:--| -| Format | xml | +| Format | `xml` | | Access Type | Exec | @@ -777,7 +777,7 @@ This is a required node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -801,7 +801,7 @@ This is a required node. | Property name | Property value | |:--|:--| -| Format | xml | +| Format | `xml` | | Access Type | Exec | @@ -817,7 +817,7 @@ This is a required node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -828,7 +828,7 @@ This is a required node. -Category of license that is used to classify various license sources. Valid value: Unknown - unknown license category. Retail - license sold through retail channels, typically from the Microsoft Store. Enterprise - license sold through the enterprise sales channel, typically from the Store for Business. OEM - license issued to an OEM. Developer - developer license, typically installed during the app development or side-loading scenarios. +Category of license that's used to classify various license sources. Valid value: Unknown - unknown license category. Retail - license sold through retail channels, typically from the Microsoft Store. Enterprise - license sold through the enterprise sales channel, typically from the Store for Business. OEM - license issued to an OEM. Developer - developer license, typically installed during the app development or side-loading scenarios. @@ -840,7 +840,7 @@ Category of license that is used to classify various license sources. Valid valu | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -856,7 +856,7 @@ Category of license that is used to classify various license sources. Valid valu | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -879,7 +879,7 @@ Indicates the allowed usage for the license. Valid values: Unknown - usage is un | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -895,7 +895,7 @@ Indicates the allowed usage for the license. Valid values: Unknown - usage is un | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -918,7 +918,7 @@ Identifier for the entity that requested the license, such as the client who acq | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -934,7 +934,7 @@ Identifier for the entity that requested the license, such as the client who acq | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -958,7 +958,7 @@ This is a required node. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -974,7 +974,7 @@ This is a required node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1026,7 +1026,7 @@ This is a required node. Query parameters: | Property name | Property value | |:--|:--| -| Format | xml | +| Format | `xml` | | Access Type | Get, Replace | @@ -1058,7 +1058,7 @@ The following example sets the inventory query for the package names and checks | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1082,7 +1082,7 @@ This is a required node. | Property name | Property value | |:--|:--| -| Format | xml | +| Format | `xml` | | Access Type | Get | @@ -1112,7 +1112,7 @@ Here's an example of AppInventoryResults operation. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1135,7 +1135,7 @@ This is a required node. Used for managing apps from the Microsoft Store. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | @@ -1151,7 +1151,7 @@ This is a required node. Used for managing apps from the Microsoft Store. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1176,7 +1176,7 @@ Package family name (PFN) of the app. There is one for each PFN on the device wh | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | ClientInventory | @@ -1213,7 +1213,7 @@ Here's an example for uninstalling an app: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1236,7 +1236,7 @@ Full name of the package installed. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | ClientInventory | @@ -1253,7 +1253,7 @@ Full name of the package installed. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1278,7 +1278,7 @@ Architecture of installed package. Value type is string. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1294,7 +1294,7 @@ Architecture of installed package. Value type is string. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1318,7 +1318,7 @@ This is a required node. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1334,7 +1334,7 @@ This is a required node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1359,7 +1359,7 @@ Install location of the app on the device. Value type is string. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1375,7 +1375,7 @@ Install location of the app on the device. Value type is string. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1398,7 +1398,7 @@ The value is 1 if the package is an app bundle and 0 (zero) for all other cases. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -1414,7 +1414,7 @@ The value is 1 if the package is an app bundle and 0 (zero) for all other cases. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1439,7 +1439,7 @@ Whether or not the app is a framework package. Value type is int. The value is 1 | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -1455,7 +1455,7 @@ Whether or not the app is a framework package. Value type is int. The value is 1 | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1478,7 +1478,7 @@ The value is 0 or 1 that indicates if the app is provisioned on the device. The | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -1494,7 +1494,7 @@ The value is 0 or 1 that indicates if the app is provisioned on the device. The | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -1518,7 +1518,7 @@ The value is 1 if the package is a stub package and 0 (zero) for all other cases | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -1534,7 +1534,7 @@ The value is 1 if the package is a stub package and 0 (zero) for all other cases | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1557,7 +1557,7 @@ Name of the app. Value type is string. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1573,7 +1573,7 @@ Name of the app. Value type is string. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1584,7 +1584,7 @@ Name of the app. Value type is string. -Provides information about the status of the package. Value type is int. Valid values are: OK (0) - The package is usable. LicenseIssue (1) - The license of the package is not valid. Modified (2) - The package payload was modified by an unknown source. Tampered (4) - The package payload was tampered intentionally. Disabled (8) - The package is not available for use. It can still be serviced. +Provides information about the status of the package. Value type is int. Valid values are: OK (0) - The package is usable. LicenseIssue (1) - The license of the package isn't valid. Modified (2) - The package payload was modified by an unknown source. Tampered (4) - The package payload was tampered intentionally. Disabled (8) - The package isn't available for use. It can still be serviced. @@ -1598,7 +1598,7 @@ Provides information about the status of the package. Value type is int. Valid v | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -1614,7 +1614,7 @@ Provides information about the status of the package. Value type is int. Valid v | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1637,7 +1637,7 @@ Publisher name of the app. Value type is string. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1653,7 +1653,7 @@ Publisher name of the app. Value type is string. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1680,7 +1680,7 @@ This is a required node. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -1696,7 +1696,7 @@ This is a required node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1721,7 +1721,7 @@ Resource ID of the app. This is null for the main app, ~ for a bundle, and conta | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1737,7 +1737,7 @@ Resource ID of the app. This is null for the main app, ~ for a bundle, and conta | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1766,7 +1766,7 @@ This is a required node. Possible values: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1782,7 +1782,7 @@ This is a required node. Possible values: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1805,7 +1805,7 @@ Version of the app. Value type is string. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1821,7 +1821,7 @@ Version of the app. Value type is string. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1845,7 +1845,7 @@ This is a required node. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -1870,7 +1870,7 @@ This is a required node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -1881,7 +1881,7 @@ This is a required node. -Specify whether on a AMD64 device, across an app update, the architecture of the installed app must not change. For example if you have the x86 flavor of a Windows app installed, with this setting enabled, across an update, the x86 flavor will be installed even when x64 flavor is available. +Specify whether on a AMD64 device, across an app update, the architecture of the installed app mustn't change. For example if you have the x86 flavor of a Windows app installed, with this setting enabled, across an update, the x86 flavor will be installed even when x64 flavor is available. @@ -1901,7 +1901,7 @@ Expected Behavior on an AMD64 machine that has x86 flavor of an app installed (M | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -1926,7 +1926,7 @@ Expected Behavior on an AMD64 machine that has x86 flavor of an app installed (M | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -1950,7 +1950,7 @@ NonRemovable requires admin permission. This setting can only be defined per dev | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Get, Replace | @@ -1959,7 +1959,7 @@ NonRemovable requires admin permission. This setting can only be defined per dev | Value | Description | |:--|:--| -| 0 | App is not in the nonremovable app policy list. | +| 0 | App isn't in the nonremovable app policy list. | | 1 | App is included in the nonremovable app policy list. | @@ -2038,7 +2038,7 @@ NonRemovable requires admin permission. This setting can only be defined per dev | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2063,7 +2063,7 @@ Interior node for the managing updates through the Microsoft Store. These settin | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get, Replace | @@ -2079,7 +2079,7 @@ Interior node for the managing updates through the Microsoft Store. These settin | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2090,7 +2090,7 @@ Interior node for the managing updates through the Microsoft Store. These settin -Identifier for the app or set of apps. If there is only one app, it is the PackageFamilyName. If it is for a set of apps, it is the PackageFamilyName of the main app. +Identifier for the app or set of apps. If there is only one app, it's the PackageFamilyName. If it's for a set of apps, it's the PackageFamilyName of the main app. @@ -2102,7 +2102,7 @@ Identifier for the app or set of apps. If there is only one app, it is the Packa | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get, Replace | | Dynamic Node Naming | UniqueName: If there is only one app, the name is the PackageFamilyName. If it is for a set of apps, the name is the PackageFamilyName of the main app. | @@ -2119,7 +2119,7 @@ Identifier for the app or set of apps. If there is only one app, it is the Packa | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2142,7 +2142,7 @@ Specifies the app channel ID. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2158,7 +2158,7 @@ Specifies the app channel ID. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2181,7 +2181,7 @@ Interior node used to specify the effective app release to use when multiple use | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -2197,7 +2197,7 @@ Interior node used to specify the effective app release to use when multiple use | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2220,7 +2220,7 @@ Returns the last user channel ID on the device. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2236,7 +2236,7 @@ Returns the last user channel ID on the device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2259,7 +2259,7 @@ Returns the last user release ID on the device. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2275,7 +2275,7 @@ Returns the last user release ID on the device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2298,7 +2298,7 @@ The IT admin can specify a release ID to indicate a specific release that they w | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2314,7 +2314,7 @@ The IT admin can specify a release ID to indicate a specific release that they w | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2338,7 +2338,7 @@ This is a required node. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -2354,7 +2354,7 @@ This is a required node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2377,7 +2377,7 @@ Used to manage enterprise apps or developer apps that weren't acquired from the | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | @@ -2393,7 +2393,7 @@ Used to manage enterprise apps or developer apps that weren't acquired from the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2418,7 +2418,7 @@ Package family name (PFN) of the app. There is one for each PFN on the device wh | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | ClientInventory | @@ -2455,7 +2455,7 @@ Here's an example for uninstalling an app: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2478,7 +2478,7 @@ Full name of the package installed. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | ClientInventory | @@ -2495,7 +2495,7 @@ Full name of the package installed. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2520,7 +2520,7 @@ Architecture of installed package. Value type is string. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2536,7 +2536,7 @@ Architecture of installed package. Value type is string. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2560,7 +2560,7 @@ This is a required node. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2576,7 +2576,7 @@ This is a required node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2601,7 +2601,7 @@ Install location of the app on the device. Value type is string. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2617,7 +2617,7 @@ Install location of the app on the device. Value type is string. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2640,7 +2640,7 @@ The value is 1 if the package is an app bundle and 0 (zero) for all other cases. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -2656,7 +2656,7 @@ The value is 1 if the package is an app bundle and 0 (zero) for all other cases. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2681,7 +2681,7 @@ Whether or not the app is a framework package. Value type is int. The value is 1 | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -2697,7 +2697,7 @@ Whether or not the app is a framework package. Value type is int. The value is 1 | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2720,7 +2720,7 @@ The value is 0 or 1 that indicates if the app is provisioned on the device. The | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -2736,7 +2736,7 @@ The value is 0 or 1 that indicates if the app is provisioned on the device. The | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -2760,7 +2760,7 @@ The value is 1 if the package is a stub package and 0 (zero) for all other cases | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -2776,7 +2776,7 @@ The value is 1 if the package is a stub package and 0 (zero) for all other cases | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2799,7 +2799,7 @@ Name of the app. Value type is string. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2815,7 +2815,7 @@ Name of the app. Value type is string. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2826,7 +2826,7 @@ Name of the app. Value type is string. -Provides information about the status of the package. Value type is int. Valid values are: OK (0) - The package is usable. LicenseIssue (1) - The license of the package is not valid. Modified (2) - The package payload was modified by an unknown source. Tampered (4) - The package payload was tampered intentionally. Disabled (8) - The package is not available for use. It can still be serviced. +Provides information about the status of the package. Value type is int. Valid values are: OK (0) - The package is usable. LicenseIssue (1) - The license of the package isn't valid. Modified (2) - The package payload was modified by an unknown source. Tampered (4) - The package payload was tampered intentionally. Disabled (8) - The package isn't available for use. It can still be serviced. @@ -2840,7 +2840,7 @@ Provides information about the status of the package. Value type is int. Valid v | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -2856,7 +2856,7 @@ Provides information about the status of the package. Value type is int. Valid v | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2879,7 +2879,7 @@ Publisher name of the app. Value type is string. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2895,7 +2895,7 @@ Publisher name of the app. Value type is string. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2922,7 +2922,7 @@ This is a required node. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -2938,7 +2938,7 @@ This is a required node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2963,7 +2963,7 @@ Resource ID of the app. This is null for the main app, ~ for a bundle, and conta | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2979,7 +2979,7 @@ Resource ID of the app. This is null for the main app, ~ for a bundle, and conta | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3008,7 +3008,7 @@ This is a required node. Possible values: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -3024,7 +3024,7 @@ This is a required node. Possible values: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3047,7 +3047,7 @@ Version of the app. Value type is string. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -3063,7 +3063,7 @@ Version of the app. Value type is string. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3087,7 +3087,7 @@ This is a required node. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -3112,7 +3112,7 @@ This is a required node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -3123,7 +3123,7 @@ This is a required node. -Specify whether on a AMD64 device, across an app update, the architecture of the installed app must not change. For example if you have the x86 flavor of a Windows app installed, with this setting enabled, across an update, the x86 flavor will be installed even when x64 flavor is available. +Specify whether on a AMD64 device, across an app update, the architecture of the installed app mustn't change. For example if you have the x86 flavor of a Windows app installed, with this setting enabled, across an update, the x86 flavor will be installed even when x64 flavor is available. @@ -3143,7 +3143,7 @@ Expected Behavior on an AMD64 machine that has x86 flavor of an app installed (M | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -3168,7 +3168,7 @@ Expected Behavior on an AMD64 machine that has x86 flavor of an app installed (M | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -3192,7 +3192,7 @@ NonRemovable requires admin permission. This setting can only be defined per dev | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Get, Replace | @@ -3201,7 +3201,7 @@ NonRemovable requires admin permission. This setting can only be defined per dev | Value | Description | |:--|:--| -| 0 | App is not in the nonremovable app policy list. | +| 0 | App isn't in the nonremovable app policy list. | | 1 | App is included in the nonremovable app policy list. | @@ -3280,7 +3280,7 @@ NonRemovable requires admin permission. This setting can only be defined per dev | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3303,7 +3303,7 @@ Interior node for the managing updates through the Microsoft Store. These settin | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get, Replace | @@ -3319,7 +3319,7 @@ Interior node for the managing updates through the Microsoft Store. These settin | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3330,7 +3330,7 @@ Interior node for the managing updates through the Microsoft Store. These settin -Identifier for the app or set of apps. If there is only one app, it is the PackageFamilyName. If it is for a set of apps, it is the PackageFamilyName of the main app. +Identifier for the app or set of apps. If there is only one app, it's the PackageFamilyName. If it's for a set of apps, it's the PackageFamilyName of the main app. @@ -3342,7 +3342,7 @@ Identifier for the app or set of apps. If there is only one app, it is the Packa | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get, Replace | | Dynamic Node Naming | UniqueName: If there is only one app, the name is the PackageFamilyName. If it is for a set of apps, the name is the PackageFamilyName of the main app. | @@ -3359,7 +3359,7 @@ Identifier for the app or set of apps. If there is only one app, it is the Packa | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3382,7 +3382,7 @@ Specifies the app channel ID. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -3398,7 +3398,7 @@ Specifies the app channel ID. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3421,7 +3421,7 @@ Interior node used to specify the effective app release to use when multiple use | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -3437,7 +3437,7 @@ Interior node used to specify the effective app release to use when multiple use | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3460,7 +3460,7 @@ Returns the last user channel ID on the device. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -3476,7 +3476,7 @@ Returns the last user channel ID on the device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3499,7 +3499,7 @@ Returns the last user release ID on the device. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -3515,7 +3515,7 @@ Returns the last user release ID on the device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3538,7 +3538,7 @@ The IT admin can specify a release ID to indicate a specific release that they w | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -3554,7 +3554,7 @@ The IT admin can specify a release ID to indicate a specific release that they w | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3577,7 +3577,7 @@ Used to restore the Windows app to its initial configuration. | Property name | Property value | |:--|:--| -| Format | xml | +| Format | `xml` | | Access Type | Exec, Get | @@ -3593,7 +3593,7 @@ Used to restore the Windows app to its initial configuration. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3616,7 +3616,7 @@ Reports apps installed as part of the operating system. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | @@ -3632,7 +3632,7 @@ Reports apps installed as part of the operating system. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3657,7 +3657,7 @@ Package family name (PFN) of the app. There is one for each PFN on the device wh | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | ClientInventory | @@ -3674,7 +3674,7 @@ Package family name (PFN) of the app. There is one for each PFN on the device wh | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3697,7 +3697,7 @@ Full name of the package installed. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | ClientInventory | @@ -3714,7 +3714,7 @@ Full name of the package installed. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3739,7 +3739,7 @@ Architecture of installed package. Value type is string. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -3755,7 +3755,7 @@ Architecture of installed package. Value type is string. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3779,7 +3779,7 @@ This is a required node. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -3795,7 +3795,7 @@ This is a required node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3820,7 +3820,7 @@ Install location of the app on the device. Value type is string. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -3836,7 +3836,7 @@ Install location of the app on the device. Value type is string. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3859,7 +3859,7 @@ The value is 1 if the package is an app bundle and 0 (zero) for all other cases. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -3875,7 +3875,7 @@ The value is 1 if the package is an app bundle and 0 (zero) for all other cases. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3900,7 +3900,7 @@ Whether or not the app is a framework package. Value type is int. The value is 1 | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -3916,7 +3916,7 @@ Whether or not the app is a framework package. Value type is int. The value is 1 | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3939,7 +3939,7 @@ The value is 0 or 1 that indicates if the app is provisioned on the device. The | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -3955,7 +3955,7 @@ The value is 0 or 1 that indicates if the app is provisioned on the device. The | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -3979,7 +3979,7 @@ The value is 1 if the package is a stub package and 0 (zero) for all other cases | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -3995,7 +3995,7 @@ The value is 1 if the package is a stub package and 0 (zero) for all other cases | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -4018,7 +4018,7 @@ Name of the app. Value type is string. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -4034,7 +4034,7 @@ Name of the app. Value type is string. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -4045,7 +4045,7 @@ Name of the app. Value type is string. -Provides information about the status of the package. Value type is int. Valid values are: OK (0) - The package is usable. LicenseIssue (1) - The license of the package is not valid. Modified (2) - The package payload was modified by an unknown source. Tampered (4) - The package payload was tampered intentionally. Disabled (8) - The package is not available for use. It can still be serviced. +Provides information about the status of the package. Value type is int. Valid values are: OK (0) - The package is usable. LicenseIssue (1) - The license of the package isn't valid. Modified (2) - The package payload was modified by an unknown source. Tampered (4) - The package payload was tampered intentionally. Disabled (8) - The package isn't available for use. It can still be serviced. @@ -4059,7 +4059,7 @@ Provides information about the status of the package. Value type is int. Valid v | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -4075,7 +4075,7 @@ Provides information about the status of the package. Value type is int. Valid v | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -4098,7 +4098,7 @@ Publisher name of the app. Value type is string. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -4114,7 +4114,7 @@ Publisher name of the app. Value type is string. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -4141,7 +4141,7 @@ This is a required node. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -4157,7 +4157,7 @@ This is a required node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -4182,7 +4182,7 @@ Resource ID of the app. This is null for the main app, ~ for a bundle, and conta | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -4198,7 +4198,7 @@ Resource ID of the app. This is null for the main app, ~ for a bundle, and conta | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -4227,7 +4227,7 @@ This is a required node. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -4243,7 +4243,7 @@ This is a required node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -4266,7 +4266,7 @@ Version of the app. Value type is string. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -4282,7 +4282,7 @@ Version of the app. Value type is string. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4305,7 +4305,7 @@ AppUpdateSettings nodes to support the auto-update and auto-repair feature for a | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | @@ -4321,7 +4321,7 @@ AppUpdateSettings nodes to support the auto-update and auto-repair feature for a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4344,7 +4344,7 @@ AutoRepair node to support auto-repair feature for a specific package. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | @@ -4360,7 +4360,7 @@ AutoRepair node to support auto-repair feature for a specific package. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4383,7 +4383,7 @@ PackageSource node that points the update location for a specific package. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | | Allowed Values | Regular Expression: `^(([^;]+(?i)(\.appx|\.eappx|\.appxbundle|\.eappxbundle|\.msix|\.emsix|\.msixbundle|\.emsixbundle)([;]|$)){0,10}|([^;]+(?i)(\.appinstaller)([;]|$)){0,10})$` | @@ -4400,7 +4400,7 @@ PackageSource node that points the update location for a specific package. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4423,7 +4423,7 @@ AutoUpdateSettings nodes to support the auto-updates for a specific package. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | @@ -4439,7 +4439,7 @@ AutoUpdateSettings nodes to support the auto-updates for a specific package. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4462,7 +4462,7 @@ Specifies whether AutomaticBackgroundTask is enabled/disabled for a specific pac | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | False | @@ -4488,7 +4488,7 @@ Specifies whether AutomaticBackgroundTask is enabled/disabled for a specific pac | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4511,7 +4511,7 @@ Specifies whether the auto-update settings is enabled/disabled for a specific pa | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | False | @@ -4537,7 +4537,7 @@ Specifies whether the auto-update settings is enabled/disabled for a specific pa | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4560,7 +4560,7 @@ Specifies whether the auto-update setting ForceUpdateFromAnyVersion is enabled/d | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | False | @@ -4586,7 +4586,7 @@ Specifies whether the auto-update setting ForceUpdateFromAnyVersion is enabled/d | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4609,7 +4609,7 @@ Specifies HoursBetweenUpdateChecks for a specific package. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Allowed Values | Range: `[8-10000]` | | Default Value | 8 | @@ -4627,7 +4627,7 @@ Specifies HoursBetweenUpdateChecks for a specific package. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4650,7 +4650,7 @@ Specifies whether OnLaunchUpdateCheck is enabled/disabled for a specific package | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | False | @@ -4676,7 +4676,7 @@ Specifies whether OnLaunchUpdateCheck is enabled/disabled for a specific package | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4699,7 +4699,7 @@ PackageSource node that points the update location for a specific package. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | | Allowed Values | Regular Expression: `^(([^;]+(?i)(\.appinstaller)([;]|$)){1,11})$` | @@ -4716,7 +4716,7 @@ PackageSource node that points the update location for a specific package. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4739,7 +4739,7 @@ Specifies whether the auto-update setting ShowPrompt is enabled/disabled for a s | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | False | @@ -4765,7 +4765,7 @@ Specifies whether the auto-update setting ShowPrompt is enabled/disabled for a s | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4788,7 +4788,7 @@ Specifies whether the auto-update setting UpdateBlocksActivation is enabled/disa | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | False | @@ -4814,7 +4814,7 @@ Specifies whether the auto-update setting UpdateBlocksActivation is enabled/disa | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -4838,7 +4838,7 @@ This is a required node. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -4863,7 +4863,7 @@ This is a required node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -4874,7 +4874,7 @@ This is a required node. -Specify whether on a AMD64 device, across an app update, the architecture of the installed app must not change. For example if you have the x86 flavor of a Windows app installed, with this setting enabled, across an update, the x86 flavor will be installed even when x64 flavor is available. +Specify whether on a AMD64 device, across an app update, the architecture of the installed app mustn't change. For example if you have the x86 flavor of a Windows app installed, with this setting enabled, across an update, the x86 flavor will be installed even when x64 flavor is available. @@ -4894,7 +4894,7 @@ Expected Behavior on an AMD64 machine that has x86 flavor of an app installed (M | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -4919,7 +4919,7 @@ Expected Behavior on an AMD64 machine that has x86 flavor of an app installed (M | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -4943,7 +4943,7 @@ NonRemovable requires admin permission. This setting can only be defined per dev | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Get, Replace | @@ -4952,7 +4952,7 @@ NonRemovable requires admin permission. This setting can only be defined per dev | Value | Description | |:--|:--| -| 0 | App is not in the nonremovable app policy list. | +| 0 | App isn't in the nonremovable app policy list. | | 1 | App is included in the nonremovable app policy list. | @@ -5031,7 +5031,7 @@ NonRemovable requires admin permission. This setting can only be defined per dev | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5054,7 +5054,7 @@ Interior node for the managing updates through the Microsoft Store. These settin | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get, Replace | @@ -5070,7 +5070,7 @@ Interior node for the managing updates through the Microsoft Store. These settin | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5081,7 +5081,7 @@ Interior node for the managing updates through the Microsoft Store. These settin -Identifier for the app or set of apps. If there is only one app, it is the PackageFamilyName. If it is for a set of apps, it is the PackageFamilyName of the main app. +Identifier for the app or set of apps. If there is only one app, it's the PackageFamilyName. If it's for a set of apps, it's the PackageFamilyName of the main app. @@ -5093,7 +5093,7 @@ Identifier for the app or set of apps. If there is only one app, it is the Packa | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get, Replace | | Dynamic Node Naming | UniqueName: If there is only one app, the name is the PackageFamilyName. If it is for a set of apps, the name is the PackageFamilyName of the main app. | @@ -5110,7 +5110,7 @@ Identifier for the app or set of apps. If there is only one app, it is the Packa | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5133,7 +5133,7 @@ Specifies the app channel ID. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -5149,7 +5149,7 @@ Specifies the app channel ID. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5172,7 +5172,7 @@ Interior node used to specify the effective app release to use when multiple use | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -5188,7 +5188,7 @@ Interior node used to specify the effective app release to use when multiple use | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5211,7 +5211,7 @@ Returns the last user channel ID on the device. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -5227,7 +5227,7 @@ Returns the last user channel ID on the device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5250,7 +5250,7 @@ Returns the last user release ID on the device. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -5266,7 +5266,7 @@ Returns the last user release ID on the device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5289,7 +5289,7 @@ The IT admin can specify a release ID to indicate a specific release that they w | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -5305,7 +5305,7 @@ The IT admin can specify a release ID to indicate a specific release that they w | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5329,7 +5329,7 @@ This is a required node. | Property name | Property value | |:--|:--| -| Format | null | +| Format | `null` | | Access Type | Exec | @@ -5345,7 +5345,7 @@ This is a required node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5368,7 +5368,7 @@ Used to perform app installation. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -5384,7 +5384,7 @@ Used to perform app installation. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5409,7 +5409,7 @@ Package family name (PFN) of the app. There is one for each PFN on the device wh | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | | Dynamic Node Naming | UniqueName: Package family name (PFN) of the app. | @@ -5446,7 +5446,7 @@ Here's an example for uninstalling an app: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5481,7 +5481,7 @@ This is a required node. The following list shows the supported deployment optio | Property name | Property value | |:--|:--| -| Format | xml | +| Format | `xml` | | Access Type | Add, Delete, Exec, Get | @@ -5497,7 +5497,7 @@ This is a required node. The following list shows the supported deployment optio | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5522,7 +5522,7 @@ Last error relating to the app installation. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -5538,7 +5538,7 @@ Last error relating to the app installation. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5563,7 +5563,7 @@ Description of last error relating to the app installation. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -5579,7 +5579,7 @@ Description of last error relating to the app installation. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5590,7 +5590,7 @@ Description of last error relating to the app installation. -An integer the indicates the progress of the app installation. For https locations, this indicates the download progress. ProgressStatus is not available for provisioning and it is only for user-based installations. In provisioning, the value is always 0 (zero). +An integer that indicates the progress of the app installation. For https locations, this indicates the download progress. ProgressStatus isn't available for provisioning and it's only for user-based installations. In provisioning, the value is always 0 (zero). @@ -5604,7 +5604,7 @@ An integer the indicates the progress of the app installation. For https locatio | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -5620,7 +5620,7 @@ An integer the indicates the progress of the app installation. For https locatio | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5631,7 +5631,7 @@ An integer the indicates the progress of the app installation. For https locatio -Status of app installation. The following values are returned: NOT_INSTALLED (0) - The node was added, but the execution has not completed. INSTALLING (1) - Execution has started, but the deployment has not completed. If the deployment completes regardless of success, this value is updated. FAILED (2) - Installation failed. The details of the error can be found under LastError and LastErrorDescription. INSTALLED (3) - Once an install is successful this node is cleaned up, however in the event the clean up action has not completed, this state may briefly appear. +Status of app installation. The following values are returned: NOT_INSTALLED (0) - The node was added, but the execution hasn't completed. INSTALLING (1) - Execution has started, but the deployment hasn't completed. If the deployment completes regardless of success, this value is updated. FAILED (2) - Installation failed. The details of the error can be found under LastError and LastErrorDescription. INSTALLED (3) - Once an install is successful this node is cleaned up, however in the event the clean up action hasn't completed, this state may briefly appear. @@ -5645,7 +5645,7 @@ Status of app installation. The following values are returned: NOT_INSTALLED (0) | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -5661,7 +5661,7 @@ Status of app installation. The following values are returned: NOT_INSTALLED (0) | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5684,7 +5684,7 @@ Command to perform an install of an app and a license from the Microsoft Store. | Property name | Property value | |:--|:--| -| Format | xml | +| Format | `xml` | | Access Type | Add, Delete, Exec, Get | @@ -5700,7 +5700,7 @@ Command to perform an install of an app and a license from the Microsoft Store. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5723,7 +5723,7 @@ Used to manage licenses for app scenarios. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -5739,7 +5739,7 @@ Used to manage licenses for app scenarios. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5762,7 +5762,7 @@ Used to manage licenses for store apps. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -5778,7 +5778,7 @@ Used to manage licenses for store apps. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5802,7 +5802,7 @@ This is an optional node. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | UniqueName: License ID for a store installed app. The license ID is generally the PFN of the app. | @@ -5819,7 +5819,7 @@ This is an optional node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5843,7 +5843,7 @@ This is a required node. | Property name | Property value | |:--|:--| -| Format | xml | +| Format | `xml` | | Access Type | Exec | @@ -5859,7 +5859,7 @@ This is a required node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5883,7 +5883,7 @@ This is a required node. | Property name | Property value | |:--|:--| -| Format | xml | +| Format | `xml` | | Access Type | Exec | @@ -5899,7 +5899,7 @@ This is a required node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5910,7 +5910,7 @@ This is a required node. -Category of license that is used to classify various license sources. Valid value: Unknown - unknown license category. Retail - license sold through retail channels, typically from the Microsoft Store. Enterprise - license sold through the enterprise sales channel, typically from the Store for Business. OEM - license issued to an OEM. Developer - developer license, typically installed during the app development or side-loading scenarios. +Category of license that's used to classify various license sources. Valid value: Unknown - unknown license category. Retail - license sold through retail channels, typically from the Microsoft Store. Enterprise - license sold through the enterprise sales channel, typically from the Store for Business. OEM - license issued to an OEM. Developer - developer license, typically installed during the app development or side-loading scenarios. @@ -5922,7 +5922,7 @@ Category of license that is used to classify various license sources. Valid valu | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -5938,7 +5938,7 @@ Category of license that is used to classify various license sources. Valid valu | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5961,7 +5961,7 @@ Indicates the allowed usage for the license. Valid values: Unknown - usage is un | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -5977,7 +5977,7 @@ Indicates the allowed usage for the license. Valid values: Unknown - usage is un | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6000,7 +6000,7 @@ Identifier for the entity that requested the license, such as the client who acq | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -6016,7 +6016,7 @@ Identifier for the entity that requested the license, such as the client who acq | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6039,7 +6039,7 @@ Used for inventory and app management (post-install). | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -6055,7 +6055,7 @@ Used for inventory and app management (post-install). | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6105,7 +6105,7 @@ This is a required node. Query parameters: | Property name | Property value | |:--|:--| -| Format | xml | +| Format | `xml` | | Access Type | Get, Replace | @@ -6137,7 +6137,7 @@ The following example sets the inventory query for the package names and checks | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6161,7 +6161,7 @@ This is a required node. | Property name | Property value | |:--|:--| -| Format | xml | +| Format | `xml` | | Access Type | Get | @@ -6191,7 +6191,7 @@ Here's an example of AppInventoryResults operation. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6214,7 +6214,7 @@ This is a required node. Used for managing apps from the Microsoft Store. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | @@ -6230,7 +6230,7 @@ This is a required node. Used for managing apps from the Microsoft Store. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6255,7 +6255,7 @@ Package family name (PFN) of the app. There is one for each PFN on the device wh | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | ClientInventory | @@ -6292,7 +6292,7 @@ Here's an example for uninstalling an app: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6315,7 +6315,7 @@ Full name of the package installed. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | ClientInventory | @@ -6332,7 +6332,7 @@ Full name of the package installed. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6357,7 +6357,7 @@ Architecture of installed package. Value type is string. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -6373,7 +6373,7 @@ Architecture of installed package. Value type is string. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6397,7 +6397,7 @@ This is a required node. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -6413,7 +6413,7 @@ This is a required node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6438,7 +6438,7 @@ Install location of the app on the device. Value type is string. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -6454,7 +6454,7 @@ Install location of the app on the device. Value type is string. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6477,7 +6477,7 @@ The value is 1 if the package is an app bundle and 0 (zero) for all other cases. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -6493,7 +6493,7 @@ The value is 1 if the package is an app bundle and 0 (zero) for all other cases. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6518,7 +6518,7 @@ Whether or not the app is a framework package. Value type is int. The value is 1 | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -6534,7 +6534,7 @@ Whether or not the app is a framework package. Value type is int. The value is 1 | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6557,7 +6557,7 @@ The value is 0 or 1 that indicates if the app is provisioned on the device. The | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -6573,7 +6573,7 @@ The value is 0 or 1 that indicates if the app is provisioned on the device. The | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -6597,7 +6597,7 @@ The value is 1 if the package is a stub package and 0 (zero) for all other cases | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -6613,7 +6613,7 @@ The value is 1 if the package is a stub package and 0 (zero) for all other cases | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6636,7 +6636,7 @@ Name of the app. Value type is string. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -6652,7 +6652,7 @@ Name of the app. Value type is string. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6663,7 +6663,7 @@ Name of the app. Value type is string. -Provides information about the status of the package. Value type is int. Valid values are: OK (0) - The package is usable. LicenseIssue (1) - The license of the package is not valid. Modified (2) - The package payload was modified by an unknown source. Tampered (4) - The package payload was tampered intentionally. Disabled (8) - The package is not available for use. It can still be serviced. +Provides information about the status of the package. Value type is int. Valid values are: OK (0) - The package is usable. LicenseIssue (1) - The license of the package isn't valid. Modified (2) - The package payload was modified by an unknown source. Tampered (4) - The package payload was tampered intentionally. Disabled (8) - The package isn't available for use. It can still be serviced. @@ -6677,7 +6677,7 @@ Provides information about the status of the package. Value type is int. Valid v | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -6693,7 +6693,7 @@ Provides information about the status of the package. Value type is int. Valid v | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6716,7 +6716,7 @@ Publisher name of the app. Value type is string. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -6732,7 +6732,7 @@ Publisher name of the app. Value type is string. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6759,7 +6759,7 @@ This is a required node. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -6775,7 +6775,7 @@ This is a required node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6800,7 +6800,7 @@ Resource ID of the app. This is null for the main app, ~ for a bundle, and conta | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -6816,7 +6816,7 @@ Resource ID of the app. This is null for the main app, ~ for a bundle, and conta | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6845,7 +6845,7 @@ This is a required node. Possible values: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -6861,7 +6861,7 @@ This is a required node. Possible values: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6884,7 +6884,7 @@ Version of the app. Value type is string. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -6900,7 +6900,7 @@ Version of the app. Value type is string. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6925,7 +6925,7 @@ Interior node for all managed app setting values. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | @@ -6941,7 +6941,7 @@ Interior node for all managed app setting values. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6965,7 +6965,7 @@ This setting only works for apps that support the feature and it's only supporte | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Dynamic Node Naming | UniqueName: SettingValue represents a Key in a Key Value Pair. Values can be found in LocalSettings in the Managed.App.Settings container. | @@ -7015,7 +7015,7 @@ This setting only works for apps that support the feature and it's only supporte | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7039,7 +7039,7 @@ This is a required node. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -7064,7 +7064,7 @@ This is a required node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -7075,7 +7075,7 @@ This is a required node. -Specify whether on a AMD64 device, across an app update, the architecture of the installed app must not change. For example if you have the x86 flavor of a Windows app installed, with this setting enabled, across an update, the x86 flavor will be installed even when x64 flavor is available. +Specify whether on a AMD64 device, across an app update, the architecture of the installed app mustn't change. For example if you have the x86 flavor of a Windows app installed, with this setting enabled, across an update, the x86 flavor will be installed even when x64 flavor is available. @@ -7095,7 +7095,7 @@ Expected Behavior on an AMD64 machine that has x86 flavor of an app installed (M | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -7120,7 +7120,7 @@ Expected Behavior on an AMD64 machine that has x86 flavor of an app installed (M | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7145,7 +7145,7 @@ Interior node for the managing updates through the Microsoft Store. These settin | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get, Replace | @@ -7161,7 +7161,7 @@ Interior node for the managing updates through the Microsoft Store. These settin | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7172,7 +7172,7 @@ Interior node for the managing updates through the Microsoft Store. These settin -Identifier for the app or set of apps. If there is only one app, it is the PackageFamilyName. If it is for a set of apps, it is the PackageFamilyName of the main app. +Identifier for the app or set of apps. If there is only one app, it's the PackageFamilyName. If it's for a set of apps, it's the PackageFamilyName of the main app. @@ -7184,7 +7184,7 @@ Identifier for the app or set of apps. If there is only one app, it is the Packa | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get, Replace | | Dynamic Node Naming | UniqueName: If there is only one app, the name is the PackageFamilyName. If it is for a set of apps, the name is the PackageFamilyName of the main app. | @@ -7201,7 +7201,7 @@ Identifier for the app or set of apps. If there is only one app, it is the Packa | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7224,7 +7224,7 @@ Specifies the app channel ID. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -7240,7 +7240,7 @@ Specifies the app channel ID. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7263,7 +7263,7 @@ Interior node used to specify the effective app release to use when multiple use | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -7279,7 +7279,7 @@ Interior node used to specify the effective app release to use when multiple use | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7302,7 +7302,7 @@ Returns the last user channel ID on the device. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -7318,7 +7318,7 @@ Returns the last user channel ID on the device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7341,7 +7341,7 @@ Returns the last user release ID on the device. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -7357,7 +7357,7 @@ Returns the last user release ID on the device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7380,7 +7380,7 @@ The IT admin can specify a release ID to indicate a specific release that they w | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -7396,7 +7396,7 @@ The IT admin can specify a release ID to indicate a specific release that they w | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7420,7 +7420,7 @@ This is a required node. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -7436,7 +7436,7 @@ This is a required node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7459,7 +7459,7 @@ Used to manage enterprise apps or developer apps that weren't acquired from the | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | @@ -7475,7 +7475,7 @@ Used to manage enterprise apps or developer apps that weren't acquired from the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7500,7 +7500,7 @@ Package family name (PFN) of the app. There is one for each PFN on the device wh | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | ClientInventory | @@ -7533,7 +7533,7 @@ Package family name (PFN) of the app. There is one for each PFN on the device wh | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7556,7 +7556,7 @@ Full name of the package installed. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | ClientInventory | @@ -7573,7 +7573,7 @@ Full name of the package installed. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7598,7 +7598,7 @@ Architecture of installed package. Value type is string. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -7614,7 +7614,7 @@ Architecture of installed package. Value type is string. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7638,7 +7638,7 @@ This is a required node. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -7654,7 +7654,7 @@ This is a required node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7679,7 +7679,7 @@ Install location of the app on the device. Value type is string. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -7695,7 +7695,7 @@ Install location of the app on the device. Value type is string. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7718,7 +7718,7 @@ The value is 1 if the package is an app bundle and 0 (zero) for all other cases. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -7734,7 +7734,7 @@ The value is 1 if the package is an app bundle and 0 (zero) for all other cases. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7759,7 +7759,7 @@ Whether or not the app is a framework package. Value type is int. The value is 1 | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -7775,7 +7775,7 @@ Whether or not the app is a framework package. Value type is int. The value is 1 | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7798,7 +7798,7 @@ The value is 0 or 1 that indicates if the app is provisioned on the device. The | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -7814,7 +7814,7 @@ The value is 0 or 1 that indicates if the app is provisioned on the device. The | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -7840,7 +7840,7 @@ Value type is int. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -7856,7 +7856,7 @@ Value type is int. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7879,7 +7879,7 @@ Name of the app. Value type is string. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -7895,7 +7895,7 @@ Name of the app. Value type is string. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7906,7 +7906,7 @@ Name of the app. Value type is string. -Provides information about the status of the package. Value type is int. Valid values are: OK (0) - The package is usable. LicenseIssue (1) - The license of the package is not valid. Modified (2) - The package payload was modified by an unknown source. Tampered (4) - The package payload was tampered intentionally. Disabled (8) - The package is not available for use. It can still be serviced. +Provides information about the status of the package. Value type is int. Valid values are: OK (0) - The package is usable. LicenseIssue (1) - The license of the package isn't valid. Modified (2) - The package payload was modified by an unknown source. Tampered (4) - The package payload was tampered intentionally. Disabled (8) - The package isn't available for use. It can still be serviced. @@ -7920,7 +7920,7 @@ Provides information about the status of the package. Value type is int. Valid v | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -7936,7 +7936,7 @@ Provides information about the status of the package. Value type is int. Valid v | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7959,7 +7959,7 @@ Publisher name of the app. Value type is string. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -7975,7 +7975,7 @@ Publisher name of the app. Value type is string. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8002,7 +8002,7 @@ This is a required node. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -8018,7 +8018,7 @@ This is a required node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8043,7 +8043,7 @@ Resource ID of the app. This is null for the main app, ~ for a bundle, and conta | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -8059,7 +8059,7 @@ Resource ID of the app. This is null for the main app, ~ for a bundle, and conta | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8088,7 +8088,7 @@ Requried. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -8104,7 +8104,7 @@ Requried. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8127,7 +8127,7 @@ Version of the app. Value type is string. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -8143,7 +8143,7 @@ Version of the app. Value type is string. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8167,7 +8167,7 @@ This node is only supported in the user context. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | @@ -8183,7 +8183,7 @@ This node is only supported in the user context. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8207,7 +8207,7 @@ This setting only works for apps that support the feature and it's only supporte | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Dynamic Node Naming | UniqueName: SettingValue represents a Key in a Key Value Pair. Values can be found in LocalSettings in the Managed.App.Settings container. | @@ -8255,7 +8255,7 @@ The following example gets all managed app settings for a specific app. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8279,7 +8279,7 @@ This is a required node. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -8304,7 +8304,7 @@ This is a required node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -8315,7 +8315,7 @@ This is a required node. -Specify whether on a AMD64 device, across an app update, the architecture of the installed app must not change. For example if you have the x86 flavor of a Windows app installed, with this setting enabled, across an update, the x86 flavor will be installed even when x64 flavor is available. +Specify whether on a AMD64 device, across an app update, the architecture of the installed app mustn't change. For example if you have the x86 flavor of a Windows app installed, with this setting enabled, across an update, the x86 flavor will be installed even when x64 flavor is available. @@ -8335,7 +8335,7 @@ Expected Behavior on an AMD64 machine that has x86 flavor of an app installed (M | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -8360,7 +8360,7 @@ Expected Behavior on an AMD64 machine that has x86 flavor of an app installed (M | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8383,7 +8383,7 @@ Interior node for the managing updates through the Microsoft Store. These settin | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get, Replace | @@ -8399,7 +8399,7 @@ Interior node for the managing updates through the Microsoft Store. These settin | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8410,7 +8410,7 @@ Interior node for the managing updates through the Microsoft Store. These settin -Identifier for the app or set of apps. If there is only one app, it is the PackageFamilyName. If it is for a set of apps, it is the PackageFamilyName of the main app. +Identifier for the app or set of apps. If there is only one app, it's the PackageFamilyName. If it's for a set of apps, it's the PackageFamilyName of the main app. @@ -8422,7 +8422,7 @@ Identifier for the app or set of apps. If there is only one app, it is the Packa | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get, Replace | | Dynamic Node Naming | UniqueName: If there is only one app, the name is the PackageFamilyName. If it is for a set of apps, the name is the PackageFamilyName of the main app. | @@ -8439,7 +8439,7 @@ Identifier for the app or set of apps. If there is only one app, it is the Packa | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8462,7 +8462,7 @@ Specifies the app channel ID. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -8478,7 +8478,7 @@ Specifies the app channel ID. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8501,7 +8501,7 @@ Interior node used to specify the effective app release to use when multiple use | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -8517,7 +8517,7 @@ Interior node used to specify the effective app release to use when multiple use | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8540,7 +8540,7 @@ Returns the last user channel ID on the device. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -8556,7 +8556,7 @@ Returns the last user channel ID on the device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8579,7 +8579,7 @@ Returns the last user release ID on the device. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -8595,7 +8595,7 @@ Returns the last user release ID on the device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8618,7 +8618,7 @@ The IT admin can specify a release ID to indicate a specific release that they w | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -8634,7 +8634,7 @@ The IT admin can specify a release ID to indicate a specific release that they w | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -8665,7 +8665,7 @@ Parameters: | Property name | Property value | |:--|:--| -| Format | xml | +| Format | `xml` | | Access Type | Exec, Get | @@ -8699,7 +8699,7 @@ The following example removes a package for all users: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -8722,7 +8722,7 @@ Used to restore the Windows app to its initial configuration. | Property name | Property value | |:--|:--| -| Format | xml | +| Format | `xml` | | Access Type | Exec, Get | @@ -8738,7 +8738,7 @@ Used to restore the Windows app to its initial configuration. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8761,7 +8761,7 @@ Reports apps installed as part of the operating system. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | @@ -8777,7 +8777,7 @@ Reports apps installed as part of the operating system. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8802,7 +8802,7 @@ Package family name (PFN) of the app. There is one for each PFN on the device wh | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | ClientInventory | @@ -8837,7 +8837,7 @@ Package family name (PFN) of the app. There is one for each PFN on the device wh | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8860,7 +8860,7 @@ Full name of the package installed. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | ClientInventory | @@ -8877,7 +8877,7 @@ Full name of the package installed. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8902,7 +8902,7 @@ Architecture of installed package. Value type is string. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -8918,7 +8918,7 @@ Architecture of installed package. Value type is string. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8942,7 +8942,7 @@ This is a required node. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -8958,7 +8958,7 @@ This is a required node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8983,7 +8983,7 @@ Install location of the app on the device. Value type is string. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -8999,7 +8999,7 @@ Install location of the app on the device. Value type is string. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -9022,7 +9022,7 @@ The value is 1 if the package is an app bundle and 0 (zero) for all other cases. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -9038,7 +9038,7 @@ The value is 1 if the package is an app bundle and 0 (zero) for all other cases. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -9063,7 +9063,7 @@ Whether or not the app is a framework package. Value type is int. The value is 1 | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -9079,7 +9079,7 @@ Whether or not the app is a framework package. Value type is int. The value is 1 | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -9102,7 +9102,7 @@ The value is 0 or 1 that indicates if the app is provisioned on the device. The | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -9118,7 +9118,7 @@ The value is 0 or 1 that indicates if the app is provisioned on the device. The | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -9142,7 +9142,7 @@ The value is 1 if the package is a stub package and 0 (zero) for all other cases | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -9158,7 +9158,7 @@ The value is 1 if the package is a stub package and 0 (zero) for all other cases | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -9181,7 +9181,7 @@ Name of the app. Value type is string. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -9197,7 +9197,7 @@ Name of the app. Value type is string. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -9208,7 +9208,7 @@ Name of the app. Value type is string. -Provides information about the status of the package. Value type is int. Valid values are: OK (0) - The package is usable. LicenseIssue (1) - The license of the package is not valid. Modified (2) - The package payload was modified by an unknown source. Tampered (4) - The package payload was tampered intentionally. Disabled (8) - The package is not available for use. It can still be serviced. +Provides information about the status of the package. Value type is int. Valid values are: OK (0) - The package is usable. LicenseIssue (1) - The license of the package isn't valid. Modified (2) - The package payload was modified by an unknown source. Tampered (4) - The package payload was tampered intentionally. Disabled (8) - The package isn't available for use. It can still be serviced. @@ -9222,7 +9222,7 @@ Provides information about the status of the package. Value type is int. Valid v | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -9238,7 +9238,7 @@ Provides information about the status of the package. Value type is int. Valid v | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -9261,7 +9261,7 @@ Publisher name of the app. Value type is string. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -9277,7 +9277,7 @@ Publisher name of the app. Value type is string. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -9304,7 +9304,7 @@ This is a required node. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -9320,7 +9320,7 @@ This is a required node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -9345,7 +9345,7 @@ Resource ID of the app. This is null for the main app, ~ for a bundle, and conta | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -9361,7 +9361,7 @@ Resource ID of the app. This is null for the main app, ~ for a bundle, and conta | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -9390,7 +9390,7 @@ This is a required node. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -9406,7 +9406,7 @@ This is a required node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -9429,7 +9429,7 @@ Version of the app. Value type is string. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -9445,7 +9445,7 @@ Version of the app. Value type is string. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -9469,7 +9469,7 @@ This node is only supported in the user context. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | @@ -9485,7 +9485,7 @@ This node is only supported in the user context. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -9509,7 +9509,7 @@ This setting only works for apps that support the feature and it's only supporte | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Dynamic Node Naming | UniqueName: SettingValue represents a Key in a Key Value Pair. Values can be found in LocalSettings in the Managed.App.Settings container. | @@ -9559,7 +9559,7 @@ This setting only works for apps that support the feature and it's only supporte | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -9583,7 +9583,7 @@ This is a required node. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -9608,7 +9608,7 @@ This is a required node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -9619,7 +9619,7 @@ This is a required node. -Specify whether on a AMD64 device, across an app update, the architecture of the installed app must not change. For example if you have the x86 flavor of a Windows app installed, with this setting enabled, across an update, the x86 flavor will be installed even when x64 flavor is available. +Specify whether on a AMD64 device, across an app update, the architecture of the installed app mustn't change. For example if you have the x86 flavor of a Windows app installed, with this setting enabled, across an update, the x86 flavor will be installed even when x64 flavor is available. @@ -9639,7 +9639,7 @@ Expected Behavior on an AMD64 machine that has x86 flavor of an app installed (M | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -9664,7 +9664,7 @@ Expected Behavior on an AMD64 machine that has x86 flavor of an app installed (M | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -9687,7 +9687,7 @@ Interior node for the managing updates through the Microsoft Store. These settin | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get, Replace | @@ -9703,7 +9703,7 @@ Interior node for the managing updates through the Microsoft Store. These settin | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -9714,7 +9714,7 @@ Interior node for the managing updates through the Microsoft Store. These settin -Identifier for the app or set of apps. If there is only one app, it is the PackageFamilyName. If it is for a set of apps, it is the PackageFamilyName of the main app. +Identifier for the app or set of apps. If there is only one app, it's the PackageFamilyName. If it's for a set of apps, it's the PackageFamilyName of the main app. @@ -9726,7 +9726,7 @@ Identifier for the app or set of apps. If there is only one app, it is the Packa | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get, Replace | | Dynamic Node Naming | UniqueName: If there is only one app, the name is the PackageFamilyName. If it is for a set of apps, the name is the PackageFamilyName of the main app. | @@ -9743,7 +9743,7 @@ Identifier for the app or set of apps. If there is only one app, it is the Packa | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -9766,7 +9766,7 @@ Specifies the app channel ID. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -9782,7 +9782,7 @@ Specifies the app channel ID. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -9805,7 +9805,7 @@ Interior node used to specify the effective app release to use when multiple use | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -9821,7 +9821,7 @@ Interior node used to specify the effective app release to use when multiple use | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -9844,7 +9844,7 @@ Returns the last user channel ID on the device. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -9860,7 +9860,7 @@ Returns the last user channel ID on the device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -9883,7 +9883,7 @@ Returns the last user release ID on the device. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -9899,7 +9899,7 @@ Returns the last user release ID on the device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -9922,7 +9922,7 @@ The IT admin can specify a release ID to indicate a specific release that they w | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -9938,7 +9938,7 @@ The IT admin can specify a release ID to indicate a specific release that they w | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -9962,7 +9962,7 @@ This is a required node. | Property name | Property value | |:--|:--| -| Format | null | +| Format | `null` | | Access Type | Exec | diff --git a/windows/client-management/mdm/euiccs-csp.md b/windows/client-management/mdm/euiccs-csp.md index bbd1a859ce..f8230b10e8 100644 --- a/windows/client-management/mdm/euiccs-csp.md +++ b/windows/client-management/mdm/euiccs-csp.md @@ -4,7 +4,7 @@ description: Learn more about the eUICCs CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 02/28/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -57,7 +57,7 @@ The following list shows the eUICCs configuration service provider nodes: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -80,7 +80,7 @@ Represents information associated with an eUICC. There is one subtree for each k | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | | Dynamic Node Naming | UniqueName: The eUICC ID (EID) associated with the device. | @@ -97,7 +97,7 @@ Represents information associated with an eUICC. There is one subtree for each k | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -108,7 +108,7 @@ Represents information associated with an eUICC. There is one subtree for each k -Actions that can be performed on the eUICC as a whole (when it is active). +Actions that can be performed on the eUICC as a whole (when it's active). @@ -120,7 +120,7 @@ Actions that can be performed on the eUICC as a whole (when it is active). | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -136,7 +136,7 @@ Actions that can be performed on the eUICC as a whole (when it is active). | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -159,7 +159,7 @@ An EXECUTE on this node triggers the LPA to perform an eUICC Memory Reset. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Exec | @@ -175,7 +175,7 @@ An EXECUTE on this node triggers the LPA to perform an eUICC Memory Reset. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -198,7 +198,7 @@ Status of most recent operation, as an HRESULT. S_OK indicates success, S_FALSE | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | | Default Value | 0 | @@ -215,7 +215,7 @@ Status of most recent operation, as an HRESULT. S_OK indicates success, S_FALSE | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -238,7 +238,7 @@ Represents default SM-DP+ discovery requests. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -254,7 +254,7 @@ Represents default SM-DP+ discovery requests. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -277,7 +277,7 @@ Node representing the discovery operation for a server name. The node name is th | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | | Dynamic Node Naming | UniqueName: ServerName used for the discovery operation. | @@ -294,7 +294,7 @@ Node representing the discovery operation for a server name. The node name is th | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -317,7 +317,7 @@ Indicates whether the discovered profile must be enabled automatically after ins | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Get, Replace | @@ -342,7 +342,7 @@ Indicates whether the discovered profile must be enabled automatically after ins | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -365,7 +365,7 @@ Current state of the discovery operation for the parent ServerName (Requested = | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | | Default Value | 1 | @@ -382,7 +382,7 @@ Current state of the discovery operation for the parent ServerName (Requested = | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -405,7 +405,7 @@ Indicates whether the server is a discovery server. Optional, default value is f | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Get, Replace | | Default Value | false | @@ -431,7 +431,7 @@ Indicates whether the server is a discovery server. Optional, default value is f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -455,7 +455,7 @@ Identifies an eUICC in an implementation-specific manner, for example, this iden | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -471,7 +471,7 @@ Identifies an eUICC in an implementation-specific manner, for example, this iden | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -494,7 +494,7 @@ Indicates whether this eUICC is physically present and active. Updated only by t | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get | @@ -510,7 +510,7 @@ Indicates whether this eUICC is physically present and active. Updated only by t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -533,7 +533,7 @@ Device policies associated with the eUICC as a whole (not per-profile). | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -549,7 +549,7 @@ Device policies associated with the eUICC as a whole (not per-profile). | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -572,7 +572,7 @@ Determines whether the local user interface of the LUI is available (true if ava | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | true | @@ -598,7 +598,7 @@ Determines whether the local user interface of the LUI is available (true if ava | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -609,7 +609,7 @@ Determines whether the local user interface of the LUI is available (true if ava -Indicates whether the download of a profile with PPR1 is allowed. If the eUICC has already a profile (regardless of its origin and policy rules associated with it), then the download of a profile with PPR1 is not allowed. +Indicates whether the download of a profile with PPR1 is allowed. If the eUICC has already a profile (regardless of its origin and policy rules associated with it), then the download of a profile with PPR1 isn't allowed. @@ -621,7 +621,7 @@ Indicates whether the download of a profile with PPR1 is allowed. If the eUICC h | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get | @@ -637,7 +637,7 @@ Indicates whether the download of a profile with PPR1 is allowed. If the eUICC h | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -660,7 +660,7 @@ Indicates whether the eUICC has already a profile with PPR1. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get | @@ -676,7 +676,7 @@ Indicates whether the eUICC has already a profile with PPR1. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -699,7 +699,7 @@ Represents all enterprise-owned profiles. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -715,7 +715,7 @@ Represents all enterprise-owned profiles. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -738,7 +738,7 @@ Node representing an enterprise-owned eUICC profile. The node name is the ICCID | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | | Dynamic Node Naming | UniqueName: ICCID of the profile. | @@ -755,7 +755,7 @@ Node representing an enterprise-owned eUICC profile. The node name is the ICCID | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -778,7 +778,7 @@ Detailed error if the profile download and install procedure failed (None = 0, C | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | | Default Value | 0 | @@ -795,7 +795,7 @@ Detailed error if the profile download and install procedure failed (None = 0, C | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -818,7 +818,7 @@ Indicates whether this profile is enabled. Can be set by the MDM when the ICCID | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Get, Replace | @@ -843,7 +843,7 @@ Indicates whether this profile is enabled. Can be set by the MDM when the ICCID | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -866,7 +866,7 @@ Matching ID (activation code token) for profile download. Must be set by the MDM | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get, Replace | | Allowed Values | Regular Expression: `^([0-9a-fA-F]{5}-){3}[0-9a-fA-F]{5}$` | @@ -883,7 +883,7 @@ Matching ID (activation code token) for profile download. Must be set by the MDM | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -894,7 +894,7 @@ Matching ID (activation code token) for profile download. Must be set by the MDM -This profile policy rule indicates whether disabling of this profile is not allowed (true if not allowed, false otherwise). +This profile policy rule indicates whether disabling of this profile isn't allowed (true if not allowed, false otherwise). @@ -906,7 +906,7 @@ This profile policy rule indicates whether disabling of this profile is not allo | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get | @@ -922,7 +922,7 @@ This profile policy rule indicates whether disabling of this profile is not allo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -933,7 +933,7 @@ This profile policy rule indicates whether disabling of this profile is not allo -This profile policy rule indicates whether deletion of this profile is not allowed (true if not allowed, false otherwise). +This profile policy rule indicates whether deletion of this profile isn't allowed (true if not allowed, false otherwise). @@ -945,7 +945,7 @@ This profile policy rule indicates whether deletion of this profile is not allow | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get | @@ -961,7 +961,7 @@ This profile policy rule indicates whether deletion of this profile is not allow | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -984,7 +984,7 @@ Fully qualified domain name of the SM-DP+ that can download this profile. Must b | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get, Replace | @@ -1000,7 +1000,7 @@ Fully qualified domain name of the SM-DP+ that can download this profile. Must b | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1023,7 +1023,7 @@ Current state of the profile (Installing = 1, Installed = 2, Deleting = 3, Error | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | | Default Value | 1 | diff --git a/windows/client-management/mdm/firewall-csp.md b/windows/client-management/mdm/firewall-csp.md index dd6206ae17..c89f214241 100644 --- a/windows/client-management/mdm/firewall-csp.md +++ b/windows/client-management/mdm/firewall-csp.md @@ -4,7 +4,7 @@ description: Learn more about the Firewall CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 05/01/2023 +ms.date: 05/15/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -22,6 +22,10 @@ The Firewall configuration service provider (CSP) allows the mobile device manag > [!NOTE] > Firewall rules in the FirewallRules section must be wrapped in an Atomic block in SyncML, either individually or collectively. +> +> Atomic blocks are "all or nothing." If a firewall rule or firewall setting in an Atomic block fails to be applied, the entire Atomic block fails to be applied. +> +> If an Atomic block contains a firewall rule or firewall setting that is not supported on a particular Windows OS version, the entire Atomic block fails to be applied on that Windows version. For example, firewall rules with IcmpTypesAndCodes are only supported on Windows 11, applying an Atomic block that contains a rule with IcmpTypesAndCodes on Windows 10 fails. For detailed information on some of the fields below, see [[MS-FASP]: Firewall and Advanced Security Protocol documentation](/openspecs/windows_protocols/ms-winerrata/6521c5c4-1f76-4003-9ade-5cccfc27c8ac). @@ -174,7 +178,7 @@ The following list shows the Firewall configuration service provider nodes: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -197,7 +201,7 @@ Interior node. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -213,7 +217,7 @@ Interior node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -235,7 +239,7 @@ Interior node. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -251,7 +255,7 @@ Interior node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -274,7 +278,7 @@ This value is an on/off switch. If this value is false, connection security rule | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | true | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/DomainProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -301,7 +305,7 @@ This value is an on/off switch. If this value is false, connection security rule | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -324,7 +328,7 @@ This value is used as an on/off switch. If this value is false, firewall rules f | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | true | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/DomainProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -351,7 +355,7 @@ This value is used as an on/off switch. If this value is false, firewall rules f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -362,7 +366,7 @@ This value is used as an on/off switch. If this value is false, firewall rules f -This value is used as an on/off switch. If this value is false, authorized application firewall rules in the local store are ignored and not enforced. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured; otherwise, the local store value is used. +This value is used as an on/off switch. If this value is false, authorized application firewall rules in the local store are ignored and not enforced. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it's configured; otherwise, the local store value is used. @@ -374,7 +378,7 @@ This value is used as an on/off switch. If this value is false, authorized appli | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | true | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/DomainProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -401,7 +405,7 @@ This value is used as an on/off switch. If this value is false, authorized appli | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -412,7 +416,7 @@ This value is used as an on/off switch. If this value is false, authorized appli -This value is the action that the firewall does by default (and evaluates at the very end) on inbound connections. The allow action is represented by 0x00000000; 0x00000001 represents a block action. Default value is 1 [Block]. The merge law for this option is to let the value of the GroupPolicyRSoPStore.win if it is configured; otherwise, the local store value is used. +This value is the action that the firewall does by default (and evaluates at the very end) on inbound connections. The allow action is represented by 0x00000000; 0x00000001 represents a block action. Default value is 1 [Block]. The merge law for this option is to let the value of the GroupPolicyRSoPStore.win if it's configured; otherwise, the local store value is used. @@ -424,7 +428,7 @@ This value is the action that the firewall does by default (and evaluates at the | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 1 | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/DomainProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -451,7 +455,7 @@ This value is the action that the firewall does by default (and evaluates at the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -462,7 +466,7 @@ This value is the action that the firewall does by default (and evaluates at the -This value is the action that the firewall does by default (and evaluates at the very end) on outbound connections. The allow action is represented by 0x00000000; 0x00000001 represents a block action. Default value is 0 [Allow]. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured; otherwise, the local store value is used. +This value is the action that the firewall does by default (and evaluates at the very end) on outbound connections. The allow action is represented by 0x00000000; 0x00000001 represents a block action. Default value is 0 [Allow]. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it's configured; otherwise, the local store value is used. @@ -474,7 +478,7 @@ This value is the action that the firewall does by default (and evaluates at the | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 0 | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/DomainProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -524,7 +528,7 @@ This value is the action that the firewall does by default (and evaluates at the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -535,7 +539,7 @@ This value is the action that the firewall does by default (and evaluates at the -This value is an on/off switch. If this value is false, the firewall MAY display a notification to the user when an application is blocked from listening on a port. If this value is on, the firewall MUST NOT display such a notification. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured; otherwise, the local store value is used. +This value is an on/off switch. If this value is false, the firewall MAY display a notification to the user when an application is blocked from listening on a port. If this value is on, the firewall MUST NOT display such a notification. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it's configured; otherwise, the local store value is used. @@ -547,7 +551,7 @@ This value is an on/off switch. If this value is false, the firewall MAY display | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | false | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/DomainProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -574,7 +578,7 @@ This value is an on/off switch. If this value is false, the firewall MAY display | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -585,7 +589,7 @@ This value is an on/off switch. If this value is false, the firewall MAY display -This value is an on/off switch. When this option is false, the server operates in stealth mode. The firewall rules used to enforce stealth mode are implementation-specific. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured; otherwise, the local store value is used. +This value is an on/off switch. When this option is false, the server operates in stealth mode. The firewall rules used to enforce stealth mode are implementation-specific. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it's configured; otherwise, the local store value is used. @@ -597,7 +601,7 @@ This value is an on/off switch. When this option is false, the server operates i | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | false | | Dependency [EnableFirewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/DomainProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -624,7 +628,7 @@ This value is an on/off switch. When this option is false, the server operates i | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -635,7 +639,7 @@ This value is an on/off switch. When this option is false, the server operates i -This value is an on/off switch. This option is ignored if DisableStealthMode is on. Otherwise, when this option is true, the firewall's stealth mode rules MUST NOT prevent the host computer from responding to unsolicited network traffic if that traffic is secured by IPsec. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured; otherwise, the local store value is used. For schema versions 0x0200, 0x0201, and 0x020A, this value is invalid and MUST NOT be used. +This value is an on/off switch. This option is ignored if DisableStealthMode is on. Otherwise, when this option is true, the firewall's stealth mode rules MUST NOT prevent the host computer from responding to unsolicited network traffic if that traffic is secured by IPsec. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it's configured; otherwise, the local store value is used. For schema versions 0x0200, 0x0201, and 0x020A, this value is invalid and MUST NOT be used. @@ -647,7 +651,7 @@ This value is an on/off switch. This option is ignored if DisableStealthMode is | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | true | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/DomainProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -674,7 +678,7 @@ This value is an on/off switch. This option is ignored if DisableStealthMode is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -685,7 +689,7 @@ This value is an on/off switch. This option is ignored if DisableStealthMode is -This value is used as an on/off switch. If it is true, unicast responses to multicast broadcast traffic is blocked. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured; otherwise, the local store value is used. +This value is used as an on/off switch. If it's true, unicast responses to multicast broadcast traffic is blocked. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it's configured; otherwise, the local store value is used. @@ -697,7 +701,7 @@ This value is used as an on/off switch. If it is true, unicast responses to mult | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | false | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/DomainProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -724,7 +728,7 @@ This value is used as an on/off switch. If it is true, unicast responses to mult | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -735,7 +739,7 @@ This value is used as an on/off switch. If it is true, unicast responses to mult -This value is an on/off switch for the firewall and advanced security enforcement. If this value is false, the server MUST NOT block any network traffic, regardless of other policy settings. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured; otherwise, the local store value is used. +This value is an on/off switch for the firewall and advanced security enforcement. If this value is false, the server MUST NOT block any network traffic, regardless of other policy settings. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it's configured; otherwise, the local store value is used. @@ -747,7 +751,7 @@ This value is an on/off switch for the firewall and advanced security enforcemen | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Replace | | Default Value | true | @@ -773,7 +777,7 @@ This value is an on/off switch for the firewall and advanced security enforcemen | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -796,7 +800,7 @@ This value is used as an on/off switch. If this value is on, the firewall logs a | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | false | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/DomainProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -823,7 +827,7 @@ This value is used as an on/off switch. If this value is on, the firewall logs a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -834,7 +838,7 @@ This value is used as an on/off switch. If this value is on, the firewall logs a -This value is used as an on/off switch. The server MAY use this value in an implementation-specific way to control logging of events if a rule is not enforced for any reason. The merge law for this option is to let "on" values win. +This value is used as an on/off switch. The server MAY use this value in an implementation-specific way to control logging of events if a rule isn't enforced for any reason. The merge law for this option is to let "on" values win. @@ -846,7 +850,7 @@ This value is used as an on/off switch. The server MAY use this value in an impl | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | false | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/DomainProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -873,7 +877,7 @@ This value is used as an on/off switch. The server MAY use this value in an impl | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -896,7 +900,7 @@ This value is used as an on/off switch. If this value is on, the firewall logs a | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | false | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/DomainProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -923,7 +927,7 @@ This value is used as an on/off switch. If this value is on, the firewall logs a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -934,7 +938,7 @@ This value is used as an on/off switch. If this value is on, the firewall logs a -This value is used as an on/off switch. If this value is false, global port firewall rules in the local store are ignored and not enforced. The setting only has meaning if it is set or enumerated in the Group Policy store or if it is enumerated from the GroupPolicyRSoPStore. The merge law for this option is to let the value GroupPolicyRSoPStore win if it is configured; otherwise, the local store value is used. +This value is used as an on/off switch. If this value is false, global port firewall rules in the local store are ignored and not enforced. The setting only has meaning if it's set or enumerated in the Group Policy store or if it's enumerated from the GroupPolicyRSoPStore. The merge law for this option is to let the value GroupPolicyRSoPStore win if it's configured; otherwise, the local store value is used. @@ -946,7 +950,7 @@ This value is used as an on/off switch. If this value is false, global port fire | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | true | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/DomainProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -973,7 +977,7 @@ This value is used as an on/off switch. If this value is false, global port fire | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -984,7 +988,7 @@ This value is used as an on/off switch. If this value is false, global port fire -This value is a string that represents a file path to the log where the firewall logs dropped packets and successful connections. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured, otherwise the MdmStore value wins if it is configured, otherwise the local store value is used. +This value is a string that represents a file path to the log where the firewall logs dropped packets and successful connections. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it's configured, otherwise the MdmStore value wins if it's configured, otherwise the local store value is used. @@ -996,7 +1000,7 @@ This value is a string that represents a file path to the log where the firewall | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | | Default Value | %systemroot%\system32\LogFiles\Firewall\pfirewall.log | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/DomainProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -1014,7 +1018,7 @@ This value is a string that represents a file path to the log where the firewall | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -1025,7 +1029,7 @@ This value is a string that represents a file path to the log where the firewall -This value specifies the size, in kilobytes, of the log file where dropped packets and successful connections are logged. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured, otherwise the MdmStore value wins if it is configured, otherwise the local store value is used. +This value specifies the size, in kilobytes, of the log file where dropped packets and successful connections are logged. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it's configured, otherwise the MdmStore value wins if it's configured, otherwise the local store value is used. @@ -1037,7 +1041,7 @@ This value specifies the size, in kilobytes, of the log file where dropped packe | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Allowed Values | Range: `[0-4294967295]` | | Default Value | 1024 | @@ -1056,7 +1060,7 @@ This value specifies the size, in kilobytes, of the log file where dropped packe | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1079,7 +1083,7 @@ This value is used as an on/off switch. If this value is on and EnableFirewall i | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Replace | | Default Value | false | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/DomainProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -1106,7 +1110,7 @@ This value is used as an on/off switch. If this value is on and EnableFirewall i | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1706] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1706] and later
    :heavy_check_mark: Windows 10, version 21H2 [10.0.19044.1706] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2009 [10.0.19042.1706] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1706] and later
    ✅ Windows 10, version 21H2 [10.0.19044.1706] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1128,7 +1132,7 @@ This value is used as an on/off switch. If this value is on and EnableFirewall i | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1144,7 +1148,7 @@ This value is used as an on/off switch. If this value is on and EnableFirewall i | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1706] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1706] and later
    :heavy_check_mark: Windows 10, version 21H2 [10.0.19044.1706] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2009 [10.0.19042.1706] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1706] and later
    ✅ Windows 10, version 21H2 [10.0.19044.1706] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1155,7 +1159,7 @@ This value is used as an on/off switch. If this value is on and EnableFirewall i -A list of dynamic keyword addresses for use within firewall rules. Dynamic keyword addresses can either be a simple alias object or fully-qualified domain names which will be auto-resolved in the presence of the Microsoft Defender Advanced Threat Protection Service. +A list of dynamic keyword addresses for use within firewall rules. Dynamic keyword addresses can either be a simple alias object or fully qualified domain names which will be auto-resolved in the presence of the Microsoft Defender Advanced Threat Protection Service. @@ -1167,7 +1171,7 @@ A list of dynamic keyword addresses for use within firewall rules. Dynamic keywo | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1183,7 +1187,7 @@ A list of dynamic keyword addresses for use within firewall rules. Dynamic keywo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1706] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1706] and later
    :heavy_check_mark: Windows 10, version 21H2 [10.0.19044.1706] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2009 [10.0.19042.1706] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1706] and later
    ✅ Windows 10, version 21H2 [10.0.19044.1706] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1206,7 +1210,7 @@ A unique GUID string identifier for this dynamic keyword address. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Atomic Required | True | | Dynamic Node Naming | ServerGeneratedUniqueIdentifier | @@ -1225,7 +1229,7 @@ A unique GUID string identifier for this dynamic keyword address. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1706] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1706] and later
    :heavy_check_mark: Windows 10, version 21H2 [10.0.19044.1706] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2009 [10.0.19042.1706] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1706] and later
    ✅ Windows 10, version 21H2 [10.0.19044.1706] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1236,11 +1240,16 @@ A unique GUID string identifier for this dynamic keyword address. -Consists of one or more comma-delimited tokens specifying the addresses covered by this keyword. This value should not be set if AutoResolve is true. +Consists of one or more comma-delimited tokens specifying the addresses covered by this keyword. This value shouldn't be set if AutoResolve is true. + Valid tokens include: + A subnet can be specified using either the subnet mask or network prefix notation. If neither a subnet mask not a network prefix is specified, the subnet mask defaults to 255.255.255.255. + A valid IPv6 address. + An IPv4 address range in the format of "start address - end address" with no spaces included. + An IPv6 address range in the format of "start address - end address" with no spaces included. @@ -1253,7 +1262,7 @@ An IPv6 address range in the format of "start address - end address" with no spa | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `,`) | | Dependency [AutoResolve False] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/DynamicKeywords/Addresses/[Id]/AutoResolve`
    Dependency Allowed Value: `false`
    Dependency Allowed Value Type: `ENUM`
    | @@ -1271,7 +1280,7 @@ An IPv6 address range in the format of "start address - end address" with no spa | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1706] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1706] and later
    :heavy_check_mark: Windows 10, version 21H2 [10.0.19044.1706] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2009 [10.0.19042.1706] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1706] and later
    ✅ Windows 10, version 21H2 [10.0.19044.1706] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1294,7 +1303,7 @@ If this flag is set to TRUE, then the 'keyword' field of this object is expected | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get | | Default Value | false | @@ -1320,7 +1329,7 @@ If this flag is set to TRUE, then the 'keyword' field of this object is expected | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1706] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1706] and later
    :heavy_check_mark: Windows 10, version 21H2 [10.0.19044.1706] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2009 [10.0.19042.1706] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1706] and later
    ✅ Windows 10, version 21H2 [10.0.19044.1706] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1343,7 +1352,7 @@ A String representing keyword. If the AutoResolve value is true, this should be | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get | @@ -1359,7 +1368,7 @@ A String representing keyword. If the AutoResolve value is true, this should be | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1382,7 +1391,7 @@ A list of rules controlling traffic through the Windows Firewall. Each Rule ID i | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1398,7 +1407,7 @@ A list of rules controlling traffic through the Windows Firewall. Each Rule ID i | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1409,7 +1418,7 @@ A list of rules controlling traffic through the Windows Firewall. Each Rule ID i -Unique alpha numeric identifier for the rule. The rule name must not include a forward slash (/). +Unique alpha numeric identifier for the rule. The rule name mustn't include a forward slash (/). @@ -1421,7 +1430,7 @@ Unique alpha numeric identifier for the rule. The rule name must not include a f | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | | Atomic Required | True | | Dynamic Node Naming | ServerGeneratedUniqueIdentifier | @@ -1440,7 +1449,7 @@ Unique alpha numeric identifier for the rule. The rule name must not include a f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1463,7 +1472,7 @@ Specifies the action for the rule. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1479,7 +1488,7 @@ Specifies the action for the rule. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1491,6 +1500,7 @@ Specifies the action for the rule. Specifies the action the rule enforces: + 0 - Block 1 - Allow. @@ -1504,7 +1514,7 @@ Specifies the action the rule enforces: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 1 | @@ -1530,7 +1540,7 @@ Specifies the action the rule enforces: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1545,9 +1555,12 @@ Rules that control connections for an app, program or service. Specified based on the intersection of the following nodes. -PackageFamilyName -FilePath -FQBN +PackageFamilyName. + +FilePath. + +FQBN. + ServiceName. @@ -1560,7 +1573,7 @@ ServiceName. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1576,7 +1589,7 @@ ServiceName. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1599,7 +1612,7 @@ FilePath - This App/Id value represents the full file path of the app. For examp | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1615,7 +1628,7 @@ FilePath - This App/Id value represents the full file path of the app. For examp | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1638,7 +1651,7 @@ Fully Qualified Binary Name. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1654,7 +1667,7 @@ Fully Qualified Binary Name. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1677,7 +1690,7 @@ PackageFamilyName - This App/Id value represents the PackageFamilyName of the ap | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1693,7 +1706,7 @@ PackageFamilyName - This App/Id value represents the PackageFamilyName of the ap | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1716,7 +1729,7 @@ This is a service name, and is used in cases when a service, not an application, | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1732,7 +1745,7 @@ This is a service name, and is used in cases when a service, not an application, | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1755,7 +1768,7 @@ Specifies the description of the rule. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1771,7 +1784,7 @@ Specifies the description of the rule. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1785,6 +1798,7 @@ Specifies the description of the rule. The rule is enabled based on the traffic direction as following. IN - the rule applies to inbound traffic. + OUT - the rule applies to outbound traffic. If not specified the default is OUT. @@ -1799,7 +1813,7 @@ If not specified the default is OUT. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | | Default Value | OUT | @@ -1825,7 +1839,7 @@ If not specified the default is OUT. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1852,7 +1866,7 @@ New rules have the EdgeTraversal property disabled by default. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | @@ -1877,7 +1891,7 @@ New rules have the EdgeTraversal property disabled by default. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1889,6 +1903,7 @@ New rules have the EdgeTraversal property disabled by default. Indicates whether the rule is enabled or disabled. If the rule must be enabled, this value must be set to true. + If not specified - a new rule is disabled by default. @@ -1901,7 +1916,7 @@ If not specified - a new rule is disabled by default. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | @@ -1926,7 +1941,7 @@ If not specified - a new rule is disabled by default. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20348] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20348] and later | @@ -1936,12 +1951,19 @@ If not specified - a new rule is disabled by default. - + +String value. Multiple ICMP type+code pairs can be included in the string by separating each value with a ",". If more than one ICMP type+code pair is specified, the strings must be separated by a comma. + +To specify all ICMP types and codes, use the "\*" character. For specific ICMP types and codes, use the ":" to separate the type and code. + +The following are valid examples: 3:4 or 1:\*. The "\*" character can be used to represent any code. The "\*" character can't be used to specify any type, examples such as "\*:4" or "\*:\*" are invalid. + +When setting this field in a firewall rule, the protocol field must also be set, to either 1 (ICMP) or 58 (IPv6-ICMP). -Comma separated list of ICMP types and codes applicable to the firewall rule. To specify all ICMP types and codes, use the "\*" character. For specific ICMP types and codes, use the ":" character to separate the type and code, for example, 3:4, 1:\*. The "\*" character can be used to represent any code. The "\*" character cannot be used to specify any type; examples such as "\*:4" or "\*:\*" are invalid. If not specified, the default is All. +If not specified, the default is All. @@ -1949,7 +1971,7 @@ Comma separated list of ICMP types and codes applicable to the firewall rule. To | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `,`) | @@ -1966,7 +1988,7 @@ Comma separated list of ICMP types and codes applicable to the firewall rule. To | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1978,6 +2000,7 @@ Comma separated list of ICMP types and codes applicable to the firewall rule. To String value. Multiple interface types can be included in the string by separating each value with a ",". Acceptable values are "RemoteAccess", "Wireless", "Lan", "MBB", and "All". + If more than one interface type is specified, the strings must be separated by a comma. @@ -1990,7 +2013,7 @@ If more than one interface type is specified, the strings must be separated by a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Default Value | All | @@ -2019,7 +2042,7 @@ If more than one interface type is specified, the strings must be separated by a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2030,13 +2053,18 @@ If more than one interface type is specified, the strings must be separated by a -Consists of one or more comma-delimited tokens specifying the local addresses covered by the rule. "*" is the default value. +Consists of one or more comma-delimited tokens specifying the local addresses covered by the rule. "\*" is the default value. + Valid tokens include: -"*" indicates any local address. If present, this must be the only token included. + +"\*" indicates any local address. If present, this must be the only token included. A subnet can be specified using either the subnet mask or network prefix notation. If neither a subnet mask not a network prefix is specified, the subnet mask defaults to 255.255.255.255. + A valid IPv6 address. + An IPv4 address range in the format of "start address - end address" with no spaces included. + An IPv6 address range in the format of "start address - end address" with no spaces included. If not specified the default is All. @@ -2049,7 +2077,7 @@ An IPv6 address range in the format of "start address - end address" with no spa | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `,`) | @@ -2066,7 +2094,7 @@ An IPv6 address range in the format of "start address - end address" with no spa | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2078,6 +2106,7 @@ An IPv6 address range in the format of "start address - end address" with no spa Comma Separated list of ranges for eg. 100-120,200,300-320. If not specified the default is All. + When setting this field in a firewall rule, the protocol field must also be set, to either 6 (TCP) or 17 (UDP). @@ -2090,7 +2119,7 @@ When setting this field in a firewall rule, the protocol field must also be set, | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Regular Expression: `^[0-9,-]+$` | @@ -2107,7 +2136,7 @@ When setting this field in a firewall rule, the protocol field must also be set, | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2119,7 +2148,8 @@ When setting this field in a firewall rule, the protocol field must also be set, Specifies the list of authorized local users for the app container. -This is a string in Security Descriptor Definition Language (SDDL) format.. + +This is a string in Security Descriptor Definition Language (SDDL) format\. @@ -2131,7 +2161,7 @@ This is a string in Security Descriptor Definition Language (SDDL) format.. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | `` | @@ -2148,7 +2178,7 @@ This is a string in Security Descriptor Definition Language (SDDL) format.. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2171,7 +2201,7 @@ Specifies the friendly name of the firewall rule. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2187,7 +2217,7 @@ Specifies the friendly name of the firewall rule. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 22H2 [10.0.19045.2913] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.1880] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621.1635] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 22H2 [10.0.19045.2913] and later
    ✅ Windows 11, version 21H2 [10.0.22000.1880] and later
    ✅ Windows 11, version 22H2 [10.0.22621.1635] and later | @@ -2198,7 +2228,7 @@ Specifies the friendly name of the firewall rule. -Specifies one WDAC tag. This is a string that can contain any alphanumeric character and any of the characters ":", "/", ".", and "_". A PolicyAppId and ServiceName cannot be specified in the same rule. +Specifies one WDAC tag. This is a string that can contain any alphanumeric character and any of the characters ":", "/", ""., and "_". A PolicyAppId and ServiceName can't be specified in the same rule. @@ -2210,7 +2240,7 @@ Specifies one WDAC tag. This is a string that can contain any alphanumeric chara | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Regular Expression: `^[A-Za-z0-9_.:/]+$` | @@ -2227,7 +2257,7 @@ Specifies one WDAC tag. This is a string that can contain any alphanumeric chara | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2250,7 +2280,7 @@ Specifies the profiles to which the rule belongs: Domain, Private, Public. See [ | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | @@ -2260,10 +2290,10 @@ Specifies the profiles to which the rule belongs: Domain, Private, Public. See [ | Flag | Description | |:--|:--| | 0x1 | FW_PROFILE_TYPE_DOMAIN: This value represents the profile for networks that are connected to domains. | -| 0x2 | FW_PROFILE_TYPE_STANDARD: This value represents the standard profile for networks. These networks are classified as private by the administrators in the server host. The classification happens the first time the host connects to the network. Usually these networks are behind Network Address Translation (NAT) devices, routers, and other edge devices, and they are in a private location, such as a home or an office. AND FW_PROFILE_TYPE_PRIVATE: This value represents the profile for private networks, which is represented by the same value as that used for FW_PROFILE_TYPE_STANDARD. | -| 0x4 | FW_PROFILE_TYPE_PUBLIC: This value represents the profile for public networks. These networks are classified as public by the administrators in the server host. The classification happens the first time the host connects to the network. Usually these networks are those at airports, coffee shops, and other public places where the peers in the network or the network administrator are not trusted. | +| 0x2 | FW_PROFILE_TYPE_STANDARD: This value represents the standard profile for networks. These networks are classified as private by the administrators in the server host. The classification happens the first time the host connects to the network. Usually these networks are behind Network Address Translation (NAT) devices, routers, and other edge devices, and they're in a private location, such as a home or an office. AND FW_PROFILE_TYPE_PRIVATE: This value represents the profile for private networks, which is represented by the same value as that used for FW_PROFILE_TYPE_STANDARD. | +| 0x4 | FW_PROFILE_TYPE_PUBLIC: This value represents the profile for public networks. These networks are classified as public by the administrators in the server host. The classification happens the first time the host connects to the network. Usually these networks are those at airports, coffee shops, and other public places where the peers in the network or the network administrator aren't trusted. | | 0x7FFFFFFF | FW_PROFILE_TYPE_ALL: This value represents all these network sets and any future network sets. | -| 0x80000000 | FW_PROFILE_TYPE_CURRENT: This value represents the current profiles to which the firewall and advanced security components determine the host is connected at the moment of the call. This value can be specified only in method calls, and it cannot be combined with other flags. | +| 0x80000000 | FW_PROFILE_TYPE_CURRENT: This value represents the current profiles to which the firewall and advanced security components determine the host is connected at the moment of the call. This value can be specified only in method calls, and it can't be combined with other flags. | @@ -2278,7 +2308,7 @@ Specifies the profiles to which the rule belongs: Domain, Private, Public. See [ | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2301,7 +2331,7 @@ Specifies the profiles to which the rule belongs: Domain, Private, Public. See [ | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-255]` | @@ -2318,7 +2348,7 @@ Specifies the profiles to which the rule belongs: Domain, Private, Public. See [ | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1706] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1706] and later
    :heavy_check_mark: Windows 10, version 21H2 [10.0.19044.1706] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2009 [10.0.19042.1706] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1706] and later
    ✅ Windows 10, version 21H2 [10.0.19044.1706] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2341,7 +2371,7 @@ Comma separated list of Dynamic Keyword Address Ids (GUID strings) specifying th | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Regular Expression: `\{[0-9A-Fa-f]{8}\-[0-9A-Fa-f]{4}\-[0-9A-Fa-f]{4}\-[0-9A-Fa-f]{4}\-[0-9A-Fa-f]{12}\}` | @@ -2358,7 +2388,7 @@ Comma separated list of Dynamic Keyword Address Ids (GUID strings) specifying th | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2369,8 +2399,10 @@ Comma separated list of Dynamic Keyword Address Ids (GUID strings) specifying th -Consists of one or more comma-delimited tokens specifying the remote addresses covered by the rule. The default value is "*". Valid tokens include: -"*" indicates any remote address. If present, this must be the only token included. +Consists of one or more comma-delimited tokens specifying the remote addresses covered by the rule. The default value is "\*". Valid tokens include: + +"\*" indicates any remote address. If present, this must be the only token included. + "Defaultgateway" "DHCP" "DNS" @@ -2379,10 +2411,14 @@ Consists of one or more comma-delimited tokens specifying the remote addresses c "RemoteCorpNetwork" "Internet" "PlayToRenderers" -"LocalSubnet" indicates any local address on the local subnet. This token is not case-sensitive. +"LocalSubnet" indicates any local address on the local subnet. This token isn't case-sensitive. + A subnet can be specified using either the subnet mask or network prefix notation. If neither a subnet mask not a network prefix is specified, the subnet mask defaults to 255.255.255.255. + A valid IPv6 address. + An IPv4 address range in the format of "start address - end address" with no spaces included. + An IPv6 address range in the format of "start address - end address" with no spaces included. If not specified the default is All. @@ -2395,7 +2431,7 @@ An IPv6 address range in the format of "start address - end address" with no spa | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `,`) | @@ -2412,7 +2448,7 @@ An IPv6 address range in the format of "start address - end address" with no spa | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2424,6 +2460,7 @@ An IPv6 address range in the format of "start address - end address" with no spa Comma Separated list of ranges for eg. 100-120,200,300-320. If not specified the default is All. + When setting this field in a firewall rule, the protocol field must also be set, to either 6 (TCP) or 17 (UDP). @@ -2436,7 +2473,7 @@ When setting this field in a firewall rule, the protocol field must also be set, | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Regular Expression: `^[0-9,-]+$` | @@ -2453,7 +2490,7 @@ When setting this field in a firewall rule, the protocol field must also be set, | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2476,7 +2513,7 @@ Provides information about the specific version of the rule in deployment for mo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2492,7 +2529,7 @@ Provides information about the specific version of the rule in deployment for mo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2514,7 +2551,7 @@ Provides information about the specific version of the rule in deployment for mo | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -2530,7 +2567,7 @@ Provides information about the specific version of the rule in deployment for mo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2541,7 +2578,7 @@ Provides information about the specific version of the rule in deployment for mo -This value contains the binary version of the structures and data types that are supported by the server. This value is not merged. In addition, this value is always a fixed value for a specific firewall and advanced security component's software build. This value identifies a policy configuration option that is supported only on servers that have a schema version of 0x0201. +This value contains the binary version of the structures and data types that are supported by the server. This value isn't merged. In addition, this value is always a fixed value for a specific firewall and advanced security component's software build. This value identifies a policy configuration option that's supported only on servers that have a schema version of 0x0201. @@ -2553,7 +2590,7 @@ This value contains the binary version of the structures and data types that are | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2569,7 +2606,7 @@ This value contains the binary version of the structures and data types that are | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2580,7 +2617,7 @@ This value contains the binary version of the structures and data types that are -This value specifies how certificate revocation list (CRL) verification is enforced. The value MUST be 0, 1, or 2. A value of 0 disables CRL checking. A value of 1 specifies that CRL checking is attempted and that certificate validation fails only if the certificate is revoked. Other failures that are encountered during CRL checking (such as the revocation URL being unreachable) do not cause certificate validation to fail. A value of 2 means that checking is required and that certificate validation fails if any error is encountered during CRL processing. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured; otherwise, use the local store value. +This value specifies how certificate revocation list (CRL) verification is enforced. The value MUST be 0, 1, or 2. A value of 0 disables CRL checking. A value of 1 specifies that CRL checking is attempted and that certificate validation fails only if the certificate is revoked. Other failures that are encountered during CRL checking (such as the revocation URL being unreachable) don't cause certificate validation to fail. A value of 2 means that checking is required and that certificate validation fails if any error is encountered during CRL processing. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it's configured; otherwise, use the local store value. @@ -2592,7 +2629,7 @@ This value specifies how certificate revocation list (CRL) verification is enfor | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | @@ -2602,7 +2639,7 @@ This value specifies how certificate revocation list (CRL) verification is enfor | Value | Description | |:--|:--| | 0 | Disables CRL checking. | -| 1 | Specifies that CRL checking is attempted and that certificate validation fails only if the certificate is revoked. Other failures that are encountered during CRL checking (such as the revocation URL being unreachable) do not cause certificate validation to fail. | +| 1 | Specifies that CRL checking is attempted and that certificate validation fails only if the certificate is revoked. Other failures that are encountered during CRL checking (such as the revocation URL being unreachable) don't cause certificate validation to fail. | | 2 | Means that checking is required and that certificate validation fails if any error is encountered during CRL processing. | @@ -2618,7 +2655,7 @@ This value specifies how certificate revocation list (CRL) verification is enfor | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2629,7 +2666,7 @@ This value specifies how certificate revocation list (CRL) verification is enfor -Value that contains a bitmask of the current enforced profiles that are maintained by the server firewall host. See [FW_PROFILE_TYPE](/openspecs/windows_protocols/ms-fasp/7704e238-174d-4a5e-b809-5f3787dd8acc) for the bitmasks that are used to identify profile types. This value is available only in the dynamic store; therefore, it is not merged and has no merge law. +Value that contains a bitmask of the current enforced profiles that are maintained by the server firewall host. See [FW_PROFILE_TYPE](/openspecs/windows_protocols/ms-fasp/7704e238-174d-4a5e-b809-5f3787dd8acc) for the bitmasks that are used to identify profile types. This value is available only in the dynamic store; therefore, it isn't merged and has no merge law. @@ -2641,7 +2678,7 @@ Value that contains a bitmask of the current enforced profiles that are maintain | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -2657,7 +2694,7 @@ Value that contains a bitmask of the current enforced profiles that are maintain | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2680,7 +2717,7 @@ This value is an on/off switch. If off, the firewall performs stateful File Tran | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | false | @@ -2706,7 +2743,7 @@ This value is an on/off switch. If off, the firewall performs stateful File Tran | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2717,7 +2754,7 @@ This value is an on/off switch. If off, the firewall performs stateful File Tran -This value specifies how scaling for the software on the receive side is enabled for both the encrypted receive and clear text forward path for the IPsec tunnel gateway scenario. Use of this option also ensures that the packet order is preserved. The data type for this option value is a integer and is a combination of flags. A value of 0x00 indicates that all queuing is to be disabled. A value of 0x01 specifies that inbound encrypted packets are to be queued. A value of 0x02 specifies that packets are to be queued after decryption is performed for forwarding. +This value specifies how scaling for the software on the receive side is enabled for both the encrypted receive and clear text forward path for the IPsec tunnel gateway scenario. Use of this option also ensures that the packet order is preserved. The data type for this option value is an integer and is a combination of flags. A value of 0x00 indicates that all queuing is to be disabled. A value of 0x01 specifies that inbound encrypted packets are to be queued. A value of 0x02 specifies that packets are to be queued after decryption is performed for forwarding. @@ -2729,7 +2766,7 @@ This value specifies how scaling for the software on the receive side is enabled | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 0x0 | @@ -2756,7 +2793,7 @@ This value specifies how scaling for the software on the receive side is enabled | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2767,7 +2804,7 @@ This value specifies how scaling for the software on the receive side is enabled -This value configures IPsec exceptions and MUST be a combination of the valid flags that are defined in [IPSEC_EXEMPT_VALUES](/openspecs/windows_protocols/ms-fasp/7daabd9f-74c3-4295-add6-e2402b01b191); therefore, the maximum value MUST always be IPSEC_EXEMPT_MAX-1 for servers supporting a schema version of 0x0201 and IPSEC_EXEMPT_MAX_V2_0-1 for servers supporting a schema version of 0x0200. If the maximum value is exceeded when the method RRPC_FWSetGlobalConfig (Opnum 4) is called, the method returns ERROR_INVALID_PARAMETER. This error code is returned if no other preceding error is discovered. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured; otherwise, use the local store value. +This value configures IPsec exceptions and MUST be a combination of the valid flags that are defined in [IPSEC_EXEMPT_VALUES](/openspecs/windows_protocols/ms-fasp/7daabd9f-74c3-4295-add6-e2402b01b191); therefore, the maximum value MUST always be IPSEC_EXEMPT_MAX-1 for servers supporting a schema version of 0x0201 and IPSEC_EXEMPT_MAX_V2_0-1 for servers supporting a schema version of 0x0200. If the maximum value is exceeded when the method RRPC_FWSetGlobalConfig (Opnum 4) is called, the method returns ERROR_INVALID_PARAMETER. This error code is returned if no other preceding error is discovered. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it's configured; otherwise, use the local store value. @@ -2779,7 +2816,7 @@ This value configures IPsec exceptions and MUST be a combination of the valid fl | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 0x0 | @@ -2808,7 +2845,7 @@ This value configures IPsec exceptions and MUST be a combination of the valid fl | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2819,7 +2856,7 @@ This value configures IPsec exceptions and MUST be a combination of the valid fl -This value is used as an on/off switch. When this option is false, keying modules MUST ignore the entire authentication set if they do not support all of the authentication suites specified in the set. When this option is true, keying modules MUST ignore only the authentication suites that they don't support. For schema versions 0x0200, 0x0201, and 0x020A, this value is invalid and MUST NOT be used. +This value is used as an on/off switch. When this option is false, keying modules MUST ignore the entire authentication set if they don't support all of the authentication suites specified in the set. When this option is true, keying modules MUST ignore only the authentication suites that they don't support. For schema versions 0x0200, 0x0201, and 0x020A, this value is invalid and MUST NOT be used. @@ -2831,7 +2868,7 @@ This value is used as an on/off switch. When this option is false, keying module | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | @@ -2856,7 +2893,7 @@ This value is used as an on/off switch. When this option is false, keying module | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2867,7 +2904,7 @@ This value is used as an on/off switch. When this option is false, keying module -This value contains the policy version of the policy store being managed. This value is not merged and therefore, has no merge law. +This value contains the policy version of the policy store being managed. This value isn't merged and therefore, has no merge law. @@ -2879,7 +2916,7 @@ This value contains the policy version of the policy store being managed. This v | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2895,7 +2932,7 @@ This value contains the policy version of the policy store being managed. This v | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2906,7 +2943,7 @@ This value contains the policy version of the policy store being managed. This v -Value that contains the maximum policy version that the server host can accept. The version number is two octets in size. The lowest-order octet is the minor version; the second-to-lowest octet is the major version. This value is not merged and is always a fixed value for a particular firewall and advanced security components software build. +Value that contains the maximum policy version that the server host can accept. The version number is two octets in size. The lowest-order octet is the minor version; the second-to-lowest octet is the major version. This value isn't merged and is always a fixed value for a particular firewall and advanced security components software build. @@ -2918,7 +2955,7 @@ Value that contains the maximum policy version that the server host can accept. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -2934,7 +2971,7 @@ Value that contains the maximum policy version that the server host can accept. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2945,7 +2982,7 @@ Value that contains the maximum policy version that the server host can accept. -Specifies the preshared key encoding that is used. MUST be a valid value from the [PRESHARED_KEY_ENCODING_VALUES](/openspecs/windows_protocols/ms-fasp/b9d24a5e-7755-4c60-adeb-e0c7a718f909) enumeration. Default is 1 [UTF-8]. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured; otherwise, use the local store value. +Specifies the preshared key encoding that's used. MUST be a valid value from the [PRESHARED_KEY_ENCODING_VALUES](/openspecs/windows_protocols/ms-fasp/b9d24a5e-7755-4c60-adeb-e0c7a718f909) enumeration. Default is 1 [UTF-8]. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it's configured; otherwise, use the local store value. @@ -2957,7 +2994,7 @@ Specifies the preshared key encoding that is used. MUST be a valid value from th | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 1 | @@ -2967,7 +3004,7 @@ Specifies the preshared key encoding that is used. MUST be a valid value from th | Value | Description | |:--|:--| -| 0 | FW_GLOBAL_CONFIG_PRESHARED_KEY_ENCODING_NONE: Preshared key is not encoded. Instead, it is kept in its wide-character format. This symbolic constant has a value of 0. | +| 0 | FW_GLOBAL_CONFIG_PRESHARED_KEY_ENCODING_NONE: Preshared key isn't encoded. Instead, it's kept in its wide-character format. This symbolic constant has a value of 0. | | 1 (Default) | FW_GLOBAL_CONFIG_PRESHARED_KEY_ENCODING_UTF_8: Encode the preshared key using UTF-8. This symbolic constant has a value of 1. | @@ -2983,7 +3020,7 @@ Specifies the preshared key encoding that is used. MUST be a valid value from th | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2994,7 +3031,7 @@ Specifies the preshared key encoding that is used. MUST be a valid value from th -This value configures the security association idle time, in seconds. Security associations are deleted after network traffic is not seen for this specified period of time. The value MUST be in the range of 300 to 3,600 inclusive. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured; otherwise, use the local store value. +This value configures the security association idle time, in seconds. Security associations are deleted after network traffic isn't seen for this specified period of time. The value MUST be in the range of 300 to 3,600 inclusive. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it's configured; otherwise, use the local store value. @@ -3006,7 +3043,7 @@ This value configures the security association idle time, in seconds. Security a | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Allowed Values | Range: `[300-3600]` | | Default Value | 300 | @@ -3024,7 +3061,7 @@ This value configures the security association idle time, in seconds. Security a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -3047,7 +3084,7 @@ A list of rules controlling traffic through the Windows Firewall for Hyper-V con | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -3063,7 +3100,7 @@ A list of rules controlling traffic through the Windows Firewall for Hyper-V con | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -3074,7 +3111,7 @@ A list of rules controlling traffic through the Windows Firewall for Hyper-V con -Unique alpha numeric identifier for the rule. The rule name must not include a forward slash (/). +Unique alpha numeric identifier for the rule. The rule name mustn't include a forward slash (/). @@ -3086,7 +3123,7 @@ Unique alpha numeric identifier for the rule. The rule name must not include a f | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | | Atomic Required | True | | Dynamic Node Naming | ServerGeneratedUniqueIdentifier | @@ -3105,7 +3142,7 @@ Unique alpha numeric identifier for the rule. The rule name must not include a f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -3117,6 +3154,7 @@ Unique alpha numeric identifier for the rule. The rule name must not include a f Specifies the action the rule enforces: + 0 - Block 1 - Allow. @@ -3130,7 +3168,7 @@ Specifies the action the rule enforces: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 1 | @@ -3156,7 +3194,7 @@ Specifies the action the rule enforces: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -3170,6 +3208,7 @@ Specifies the action the rule enforces: The rule is enabled based on the traffic direction as following. IN - the rule applies to inbound traffic. + OUT - the rule applies to outbound traffic. If not specified the default is OUT. @@ -3184,7 +3223,7 @@ If not specified the default is OUT. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | | Default Value | OUT | @@ -3210,7 +3249,7 @@ If not specified the default is OUT. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -3222,6 +3261,7 @@ If not specified the default is OUT. Indicates whether the rule is enabled or disabled. If the rule must be enabled, this value must be set to true. + If not specified - a new rule is disabled by default. @@ -3234,7 +3274,7 @@ If not specified - a new rule is disabled by default. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | @@ -3259,7 +3299,7 @@ If not specified - a new rule is disabled by default. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -3270,13 +3310,18 @@ If not specified - a new rule is disabled by default. -Consists of one or more comma-delimited tokens specifying the local addresses covered by the rule. "*" is the default value. +Consists of one or more comma-delimited tokens specifying the local addresses covered by the rule. "\*" is the default value. + Valid tokens include: -"*" indicates any local address. If present, this must be the only token included. + +"\*" indicates any local address. If present, this must be the only token included. A subnet can be specified using either the subnet mask or network prefix notation. If neither a subnet mask not a network prefix is specified, the subnet mask defaults to 255.255.255.255. + A valid IPv6 address. + An IPv4 address range in the format of "start address - end address" with no spaces included. + An IPv6 address range in the format of "start address - end address" with no spaces included. If not specified the default is All. @@ -3289,7 +3334,7 @@ An IPv6 address range in the format of "start address - end address" with no spa | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `,`) | @@ -3306,7 +3351,7 @@ An IPv6 address range in the format of "start address - end address" with no spa | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -3329,7 +3374,7 @@ Comma Separated list of ranges for eg. 100-120,200,300-320. If not specified the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Regular Expression: `^[0-9,-]+$` | @@ -3346,7 +3391,7 @@ Comma Separated list of ranges for eg. 100-120,200,300-320. If not specified the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -3369,7 +3414,7 @@ Specifies the friendly name of the Hyper-V Firewall rule. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -3385,7 +3430,7 @@ Specifies the friendly name of the Hyper-V Firewall rule. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -3396,7 +3441,7 @@ Specifies the friendly name of the Hyper-V Firewall rule. -This value represents the order of rule enforcement. A lower priority rule is evaluated first. If not specified, block rules are evaluated before allow rules. If priority is configured, it is highly recommended to configure the value for ALL rules to ensure expected evaluation of rules. +This value represents the order of rule enforcement. A lower priority rule is evaluated first. If not specified, block rules are evaluated before allow rules. If priority is configured, it's highly recommended to configure the value for ALL rules to ensure expected evaluation of rules. @@ -3408,7 +3453,7 @@ This value represents the order of rule enforcement. A lower priority rule is ev | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-65535]` | @@ -3425,7 +3470,7 @@ This value represents the order of rule enforcement. A lower priority rule is ev | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -3448,7 +3493,7 @@ Specifies the profiles to which the rule belongs: Domain, Private, Public. See [ | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | @@ -3458,8 +3503,8 @@ Specifies the profiles to which the rule belongs: Domain, Private, Public. See [ | Flag | Description | |:--|:--| | 0x1 | FW_PROFILE_TYPE_DOMAIN: This value represents the profile for networks that are connected to domains. | -| 0x2 | FW_PROFILE_TYPE_STANDARD: This value represents the standard profile for networks. These networks are classified as private by the administrators in the server host. The classification happens the first time the host connects to the network. Usually these networks are behind Network Address Translation (NAT) devices, routers, and other edge devices, and they are in a private location, such as a home or an office. AND FW_PROFILE_TYPE_PRIVATE: This value represents the profile for private networks, which is represented by the same value as that used for FW_PROFILE_TYPE_STANDARD. | -| 0x4 | FW_PROFILE_TYPE_PUBLIC: This value represents the profile for public networks. These networks are classified as public by the administrators in the server host. The classification happens the first time the host connects to the network. Usually these networks are those at airports, coffee shops, and other public places where the peers in the network or the network administrator are not trusted. | +| 0x2 | FW_PROFILE_TYPE_STANDARD: This value represents the standard profile for networks. These networks are classified as private by the administrators in the server host. The classification happens the first time the host connects to the network. Usually these networks are behind Network Address Translation (NAT) devices, routers, and other edge devices, and they're in a private location, such as a home or an office. AND FW_PROFILE_TYPE_PRIVATE: This value represents the profile for private networks, which is represented by the same value as that used for FW_PROFILE_TYPE_STANDARD. | +| 0x4 | FW_PROFILE_TYPE_PUBLIC: This value represents the profile for public networks. These networks are classified as public by the administrators in the server host. The classification happens the first time the host connects to the network. Usually these networks are those at airports, coffee shops, and other public places where the peers in the network or the network administrator aren't trusted. | | 0x7FFFFFFF | FW_PROFILE_TYPE_ALL: This value represents all these network sets and any future network sets. | @@ -3475,7 +3520,7 @@ Specifies the profiles to which the rule belongs: Domain, Private, Public. See [ | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -3498,7 +3543,7 @@ Specifies the profiles to which the rule belongs: Domain, Private, Public. See [ | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-65535]` | @@ -3515,7 +3560,7 @@ Specifies the profiles to which the rule belongs: Domain, Private, Public. See [ | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -3526,11 +3571,16 @@ Specifies the profiles to which the rule belongs: Domain, Private, Public. See [ -Consists of one or more comma-delimited tokens specifying the remote addresses covered by the rule. The default value is "*". Valid tokens include: -"*" indicates any remote address. If present, this must be the only token included. +Consists of one or more comma-delimited tokens specifying the remote addresses covered by the rule. The default value is "\*". Valid tokens include: + +"\*" indicates any remote address. If present, this must be the only token included. + A subnet can be specified using either the subnet mask or network prefix notation. If neither a subnet mask not a network prefix is specified, the subnet mask defaults to 255.255.255.255. + A valid IPv6 address. + An IPv4 address range in the format of "start address - end address" with no spaces included. + An IPv6 address range in the format of "start address - end address" with no spaces included. If not specified the default is All. @@ -3543,7 +3593,7 @@ An IPv6 address range in the format of "start address - end address" with no spa | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `,`) | @@ -3560,7 +3610,7 @@ An IPv6 address range in the format of "start address - end address" with no spa | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -3583,7 +3633,7 @@ Comma Separated list of ranges for eg. 100-120,200,300-320. If not specified the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Regular Expression: `^[0-9,-]+$` | @@ -3600,7 +3650,7 @@ Comma Separated list of ranges for eg. 100-120,200,300-320. If not specified the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -3623,7 +3673,7 @@ Provides information about the specific version of the rule in deployment for mo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -3639,7 +3689,7 @@ Provides information about the specific version of the rule in deployment for mo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -3662,7 +3712,7 @@ This field specifies the VM Creator ID that this rule is applicable to. A NULL G | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Regular Expression: `\{[0-9A-Fa-f]{8}\-[0-9A-Fa-f]{4}\-[0-9A-Fa-f]{4}\-[0-9A-Fa-f]{4}\-[0-9A-Fa-f]{12}\}` | @@ -3679,7 +3729,7 @@ This field specifies the VM Creator ID that this rule is applicable to. A NULL G | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -3702,7 +3752,7 @@ Settings for the Windows Firewall for Hyper-V containers. Each setting applies o | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -3718,7 +3768,7 @@ Settings for the Windows Firewall for Hyper-V containers. Each setting applies o | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -3741,7 +3791,7 @@ VM Creator ID that these settings apply to. Valid format is a GUID. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | | Atomic Required | True | | Dynamic Node Naming | ServerGeneratedUniqueIdentifier | @@ -3760,7 +3810,7 @@ VM Creator ID that these settings apply to. Valid format is a GUID. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -3783,7 +3833,7 @@ This value is used as an on/off switch. If this value is true, applicable host f | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | true | @@ -3809,7 +3859,7 @@ This value is used as an on/off switch. If this value is true, applicable host f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -3820,7 +3870,7 @@ This value is used as an on/off switch. If this value is true, applicable host f -This value is the action that the Hyper-V Firewall does by default (and evaluates at the very end) on inbound connections. The allow action is represented by 0x00000000; 0x00000001 represents a block action. Default value is 1 [Block]. This value controls the settings for all profiles. It is recommended to instead use the profile setting value under the profile subtree. +This value is the action that the Hyper-V Firewall does by default (and evaluates at the very end) on inbound connections. The allow action is represented by 0x00000000; 0x00000001 represents a block action. Default value is 1 [Block]. This value controls the settings for all profiles. It's recommended to instead use the profile setting value under the profile subtree. @@ -3832,7 +3882,7 @@ This value is the action that the Hyper-V Firewall does by default (and evaluate | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 1 | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/HyperVVMSettings/[VMCreatorId]/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -3859,7 +3909,7 @@ This value is the action that the Hyper-V Firewall does by default (and evaluate | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -3870,7 +3920,7 @@ This value is the action that the Hyper-V Firewall does by default (and evaluate -This value is the action that the Hyper-V Firewall does by default (and evaluates at the very end) on outbound connections. The allow action is represented by 0x00000000; 0x00000001 represents a block action. Default value is 0 [Allow]. This value controls the settings for all profiles. It is recommended to instead use the profile setting value under the profile subtree. +This value is the action that the Hyper-V Firewall does by default (and evaluates at the very end) on outbound connections. The allow action is represented by 0x00000000; 0x00000001 represents a block action. Default value is 0 [Allow]. This value controls the settings for all profiles. It's recommended to instead use the profile setting value under the profile subtree. @@ -3882,7 +3932,7 @@ This value is the action that the Hyper-V Firewall does by default (and evaluate | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 0 | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/HyperVVMSettings/[VMCreatorId]/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -3909,7 +3959,7 @@ This value is the action that the Hyper-V Firewall does by default (and evaluate | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -3931,7 +3981,7 @@ This value is the action that the Hyper-V Firewall does by default (and evaluate | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -3947,7 +3997,7 @@ This value is the action that the Hyper-V Firewall does by default (and evaluate | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -3970,7 +4020,7 @@ This value is used as an on/off switch. If this value is false, Hyper-V Firewall | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Replace | | Default Value | true | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/HyperVVMSettings/[VMCreatorId]/DomainProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -3997,7 +4047,7 @@ This value is used as an on/off switch. If this value is false, Hyper-V Firewall | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -4020,7 +4070,7 @@ This value is the action that the Hyper-V Firewall does by default (and evaluate | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 1 | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/HyperVVMSettings/[VMCreatorId]/DomainProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -4047,7 +4097,7 @@ This value is the action that the Hyper-V Firewall does by default (and evaluate | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -4070,7 +4120,7 @@ This value is the action that the Hyper-V Firewall does by default (and evaluate | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 0 | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/HyperVVMSettings/[VMCreatorId]/DomainProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -4097,7 +4147,7 @@ This value is the action that the Hyper-V Firewall does by default (and evaluate | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -4120,7 +4170,7 @@ This value is an on/off switch for the Hyper-V Firewall enforcement. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Replace | | Default Value | true | @@ -4146,7 +4196,7 @@ This value is an on/off switch for the Hyper-V Firewall enforcement. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -4157,7 +4207,7 @@ This value is an on/off switch for the Hyper-V Firewall enforcement. -This value is an on/off switch for the Hyper-V Firewall. This value controls the settings for all profiles. It is recommended to instead use the profile setting value under the profile subtree. +This value is an on/off switch for the Hyper-V Firewall. This value controls the settings for all profiles. It's recommended to instead use the profile setting value under the profile subtree. @@ -4169,7 +4219,7 @@ This value is an on/off switch for the Hyper-V Firewall. This value controls the | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Replace | | Default Value | true | @@ -4195,7 +4245,7 @@ This value is an on/off switch for the Hyper-V Firewall. This value controls the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -4218,7 +4268,7 @@ This value is an on/off switch for loopback traffic. This determines if this VM | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Replace | | Default Value | false | @@ -4244,7 +4294,7 @@ This value is an on/off switch for loopback traffic. This determines if this VM | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -4266,7 +4316,7 @@ This value is an on/off switch for loopback traffic. This determines if this VM | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -4282,7 +4332,7 @@ This value is an on/off switch for loopback traffic. This determines if this VM | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -4305,7 +4355,7 @@ This value is used as an on/off switch. If this value is false, Hyper-V Firewall | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Replace | | Default Value | true | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/HyperVVMSettings/[VMCreatorId]/PrivateProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -4332,7 +4382,7 @@ This value is used as an on/off switch. If this value is false, Hyper-V Firewall | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -4355,7 +4405,7 @@ This value is the action that the Hyper-V Firewall does by default (and evaluate | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 1 | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/HyperVVMSettings/[VMCreatorId]/PrivateProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -4382,7 +4432,7 @@ This value is the action that the Hyper-V Firewall does by default (and evaluate | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -4405,7 +4455,7 @@ This value is the action that the Hyper-V Firewall does by default (and evaluate | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 0 | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/HyperVVMSettings/[VMCreatorId]/PrivateProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -4432,7 +4482,7 @@ This value is the action that the Hyper-V Firewall does by default (and evaluate | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -4455,7 +4505,7 @@ This value is an on/off switch for the Hyper-V Firewall enforcement. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Replace | | Default Value | true | @@ -4481,7 +4531,7 @@ This value is an on/off switch for the Hyper-V Firewall enforcement. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -4503,7 +4553,7 @@ This value is an on/off switch for the Hyper-V Firewall enforcement. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -4519,7 +4569,7 @@ This value is an on/off switch for the Hyper-V Firewall enforcement. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -4542,7 +4592,7 @@ This value is used as an on/off switch. If this value is false, Hyper-V Firewall | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Replace | | Default Value | true | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/HyperVVMSettings/[VMCreatorId]/PublicProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -4569,7 +4619,7 @@ This value is used as an on/off switch. If this value is false, Hyper-V Firewall | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -4592,7 +4642,7 @@ This value is the action that the Hyper-V Firewall does by default (and evaluate | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 1 | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/HyperVVMSettings/[VMCreatorId]/PublicProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -4619,7 +4669,7 @@ This value is the action that the Hyper-V Firewall does by default (and evaluate | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -4642,7 +4692,7 @@ This value is the action that the Hyper-V Firewall does by default (and evaluate | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 0 | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/HyperVVMSettings/[VMCreatorId]/PublicProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -4669,7 +4719,7 @@ This value is the action that the Hyper-V Firewall does by default (and evaluate | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -4692,7 +4742,7 @@ This value is an on/off switch for the Hyper-V Firewall enforcement. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Replace | | Default Value | true | @@ -4718,7 +4768,7 @@ This value is an on/off switch for the Hyper-V Firewall enforcement. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -4740,7 +4790,7 @@ This value is an on/off switch for the Hyper-V Firewall enforcement. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -4756,7 +4806,7 @@ This value is an on/off switch for the Hyper-V Firewall enforcement. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -4779,7 +4829,7 @@ This value is an on/off switch. If this value is false, connection security rule | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | true | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/PrivateProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -4806,7 +4856,7 @@ This value is an on/off switch. If this value is false, connection security rule | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -4829,7 +4879,7 @@ This value is used as an on/off switch. If this value is false, firewall rules f | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | true | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/PrivateProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -4856,7 +4906,7 @@ This value is used as an on/off switch. If this value is false, firewall rules f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -4867,7 +4917,7 @@ This value is used as an on/off switch. If this value is false, firewall rules f -This value is used as an on/off switch. If this value is false, authorized application firewall rules in the local store are ignored and not enforced. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured; otherwise, the local store value is used. +This value is used as an on/off switch. If this value is false, authorized application firewall rules in the local store are ignored and not enforced. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it's configured; otherwise, the local store value is used. @@ -4879,7 +4929,7 @@ This value is used as an on/off switch. If this value is false, authorized appli | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | true | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/PrivateProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -4906,7 +4956,7 @@ This value is used as an on/off switch. If this value is false, authorized appli | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -4917,7 +4967,7 @@ This value is used as an on/off switch. If this value is false, authorized appli -This value is the action that the firewall does by default (and evaluates at the very end) on inbound connections. The allow action is represented by 0x00000000; 0x00000001 represents a block action. Default value is 1 [Block]. The merge law for this option is to let the value of the GroupPolicyRSoPStore.win if it is configured; otherwise, the local store value is used. +This value is the action that the firewall does by default (and evaluates at the very end) on inbound connections. The allow action is represented by 0x00000000; 0x00000001 represents a block action. Default value is 1 [Block]. The merge law for this option is to let the value of the GroupPolicyRSoPStore.win if it's configured; otherwise, the local store value is used. @@ -4929,7 +4979,7 @@ This value is the action that the firewall does by default (and evaluates at the | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 1 | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/PrivateProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -4956,7 +5006,7 @@ This value is the action that the firewall does by default (and evaluates at the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -4967,7 +5017,7 @@ This value is the action that the firewall does by default (and evaluates at the -This value is the action that the firewall does by default (and evaluates at the very end) on outbound connections. The allow action is represented by 0x00000000; 0x00000001 represents a block action. Default value is 0 [Allow]. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured; otherwise, the local store value is used. +This value is the action that the firewall does by default (and evaluates at the very end) on outbound connections. The allow action is represented by 0x00000000; 0x00000001 represents a block action. Default value is 0 [Allow]. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it's configured; otherwise, the local store value is used. @@ -4979,7 +5029,7 @@ This value is the action that the firewall does by default (and evaluates at the | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 0 | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/PrivateProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -5029,7 +5079,7 @@ This value is the action that the firewall does by default (and evaluates at the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -5040,7 +5090,7 @@ This value is the action that the firewall does by default (and evaluates at the -This value is an on/off switch. If this value is false, the firewall MAY display a notification to the user when an application is blocked from listening on a port. If this value is on, the firewall MUST NOT display such a notification. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured; otherwise, the local store value is used. +This value is an on/off switch. If this value is false, the firewall MAY display a notification to the user when an application is blocked from listening on a port. If this value is on, the firewall MUST NOT display such a notification. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it's configured; otherwise, the local store value is used. @@ -5052,7 +5102,7 @@ This value is an on/off switch. If this value is false, the firewall MAY display | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | false | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/PrivateProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -5079,7 +5129,7 @@ This value is an on/off switch. If this value is false, the firewall MAY display | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -5090,7 +5140,7 @@ This value is an on/off switch. If this value is false, the firewall MAY display -This value is an on/off switch. When this option is false, the server operates in stealth mode. The firewall rules used to enforce stealth mode are implementation-specific. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured; otherwise, the local store value is used. +This value is an on/off switch. When this option is false, the server operates in stealth mode. The firewall rules used to enforce stealth mode are implementation-specific. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it's configured; otherwise, the local store value is used. @@ -5102,7 +5152,7 @@ This value is an on/off switch. When this option is false, the server operates i | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | false | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/PrivateProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -5129,7 +5179,7 @@ This value is an on/off switch. When this option is false, the server operates i | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -5140,7 +5190,7 @@ This value is an on/off switch. When this option is false, the server operates i -This value is an on/off switch. This option is ignored if DisableStealthMode is on. Otherwise, when this option is true, the firewall's stealth mode rules MUST NOT prevent the host computer from responding to unsolicited network traffic if that traffic is secured by IPsec. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured; otherwise, the local store value is used. For schema versions 0x0200, 0x0201, and 0x020A, this value is invalid and MUST NOT be used. +This value is an on/off switch. This option is ignored if DisableStealthMode is on. Otherwise, when this option is true, the firewall's stealth mode rules MUST NOT prevent the host computer from responding to unsolicited network traffic if that traffic is secured by IPsec. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it's configured; otherwise, the local store value is used. For schema versions 0x0200, 0x0201, and 0x020A, this value is invalid and MUST NOT be used. @@ -5152,7 +5202,7 @@ This value is an on/off switch. This option is ignored if DisableStealthMode is | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | true | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/PrivateProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -5179,7 +5229,7 @@ This value is an on/off switch. This option is ignored if DisableStealthMode is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -5190,7 +5240,7 @@ This value is an on/off switch. This option is ignored if DisableStealthMode is -This value is used as an on/off switch. If it is true, unicast responses to multicast broadcast traffic is blocked. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured; otherwise, the local store value is used. +This value is used as an on/off switch. If it's true, unicast responses to multicast broadcast traffic is blocked. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it's configured; otherwise, the local store value is used. @@ -5202,7 +5252,7 @@ This value is used as an on/off switch. If it is true, unicast responses to mult | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | false | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/PrivateProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -5229,7 +5279,7 @@ This value is used as an on/off switch. If it is true, unicast responses to mult | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -5240,7 +5290,7 @@ This value is used as an on/off switch. If it is true, unicast responses to mult -This value is an on/off switch for the firewall and advanced security enforcement. If this value is false, the server MUST NOT block any network traffic, regardless of other policy settings. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured; otherwise, the local store value is used. +This value is an on/off switch for the firewall and advanced security enforcement. If this value is false, the server MUST NOT block any network traffic, regardless of other policy settings. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it's configured; otherwise, the local store value is used. @@ -5252,7 +5302,7 @@ This value is an on/off switch for the firewall and advanced security enforcemen | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Get, Replace | | Default Value | true | @@ -5278,7 +5328,7 @@ This value is an on/off switch for the firewall and advanced security enforcemen | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -5301,7 +5351,7 @@ This value is used as an on/off switch. If this value is on, the firewall logs a | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | false | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/PrivateProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -5328,7 +5378,7 @@ This value is used as an on/off switch. If this value is on, the firewall logs a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -5339,7 +5389,7 @@ This value is used as an on/off switch. If this value is on, the firewall logs a -This value is used as an on/off switch. The server MAY use this value in an implementation-specific way to control logging of events if a rule is not enforced for any reason. The merge law for this option is to let "on" values win. +This value is used as an on/off switch. The server MAY use this value in an implementation-specific way to control logging of events if a rule isn't enforced for any reason. The merge law for this option is to let "on" values win. @@ -5351,7 +5401,7 @@ This value is used as an on/off switch. The server MAY use this value in an impl | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | false | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/PrivateProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -5378,7 +5428,7 @@ This value is used as an on/off switch. The server MAY use this value in an impl | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -5401,7 +5451,7 @@ This value is used as an on/off switch. If this value is on, the firewall logs a | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | false | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/PrivateProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -5428,7 +5478,7 @@ This value is used as an on/off switch. If this value is on, the firewall logs a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -5439,7 +5489,7 @@ This value is used as an on/off switch. If this value is on, the firewall logs a -This value is used as an on/off switch. If this value is false, global port firewall rules in the local store are ignored and not enforced. The setting only has meaning if it is set or enumerated in the Group Policy store or if it is enumerated from the GroupPolicyRSoPStore. The merge law for this option is to let the value GroupPolicyRSoPStore win if it is configured; otherwise, the local store value is used. +This value is used as an on/off switch. If this value is false, global port firewall rules in the local store are ignored and not enforced. The setting only has meaning if it's set or enumerated in the Group Policy store or if it's enumerated from the GroupPolicyRSoPStore. The merge law for this option is to let the value GroupPolicyRSoPStore win if it's configured; otherwise, the local store value is used. @@ -5451,7 +5501,7 @@ This value is used as an on/off switch. If this value is false, global port fire | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | true | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/PrivateProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -5478,7 +5528,7 @@ This value is used as an on/off switch. If this value is false, global port fire | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -5489,7 +5539,7 @@ This value is used as an on/off switch. If this value is false, global port fire -This value is a string that represents a file path to the log where the firewall logs dropped packets and successful connections. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured, otherwise the MdmStore value wins if it is configured, otherwise the local store value is used. +This value is a string that represents a file path to the log where the firewall logs dropped packets and successful connections. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it's configured, otherwise the MdmStore value wins if it's configured, otherwise the local store value is used. @@ -5501,7 +5551,7 @@ This value is a string that represents a file path to the log where the firewall | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | | Default Value | %systemroot%\system32\LogFiles\Firewall\pfirewall.log | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/PrivateProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -5519,7 +5569,7 @@ This value is a string that represents a file path to the log where the firewall | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -5530,7 +5580,7 @@ This value is a string that represents a file path to the log where the firewall -This value specifies the size, in kilobytes, of the log file where dropped packets and successful connections are logged. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured, otherwise the MdmStore value wins if it is configured, otherwise the local store value is used. +This value specifies the size, in kilobytes, of the log file where dropped packets and successful connections are logged. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it's configured, otherwise the MdmStore value wins if it's configured, otherwise the local store value is used. @@ -5542,7 +5592,7 @@ This value specifies the size, in kilobytes, of the log file where dropped packe | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Allowed Values | Range: `[0-4294967295]` | | Default Value | 1024 | @@ -5561,7 +5611,7 @@ This value specifies the size, in kilobytes, of the log file where dropped packe | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -5584,7 +5634,7 @@ This value is used as an on/off switch. If this value is on and EnableFirewall i | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | false | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/PrivateProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -5611,7 +5661,7 @@ This value is used as an on/off switch. If this value is on and EnableFirewall i | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -5633,7 +5683,7 @@ This value is used as an on/off switch. If this value is on and EnableFirewall i | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -5649,7 +5699,7 @@ This value is used as an on/off switch. If this value is on and EnableFirewall i | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -5672,7 +5722,7 @@ This value is an on/off switch. If this value is false, connection security rule | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | true | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/PublicProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -5699,7 +5749,7 @@ This value is an on/off switch. If this value is false, connection security rule | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -5722,7 +5772,7 @@ This value is used as an on/off switch. If this value is false, firewall rules f | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | true | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/PublicProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -5749,7 +5799,7 @@ This value is used as an on/off switch. If this value is false, firewall rules f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -5760,7 +5810,7 @@ This value is used as an on/off switch. If this value is false, firewall rules f -This value is used as an on/off switch. If this value is false, authorized application firewall rules in the local store are ignored and not enforced. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured; otherwise, the local store value is used. +This value is used as an on/off switch. If this value is false, authorized application firewall rules in the local store are ignored and not enforced. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it's configured; otherwise, the local store value is used. @@ -5772,7 +5822,7 @@ This value is used as an on/off switch. If this value is false, authorized appli | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | true | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/PublicProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -5799,7 +5849,7 @@ This value is used as an on/off switch. If this value is false, authorized appli | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -5810,7 +5860,7 @@ This value is used as an on/off switch. If this value is false, authorized appli -This value is the action that the firewall does by default (and evaluates at the very end) on inbound connections. The allow action is represented by 0x00000000; 0x00000001 represents a block action. Default value is 1 [Block]. The merge law for this option is to let the value of the GroupPolicyRSoPStore.win if it is configured; otherwise, the local store value is used. +This value is the action that the firewall does by default (and evaluates at the very end) on inbound connections. The allow action is represented by 0x00000000; 0x00000001 represents a block action. Default value is 1 [Block]. The merge law for this option is to let the value of the GroupPolicyRSoPStore.win if it's configured; otherwise, the local store value is used. @@ -5822,7 +5872,7 @@ This value is the action that the firewall does by default (and evaluates at the | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 1 | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/PublicProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -5849,7 +5899,7 @@ This value is the action that the firewall does by default (and evaluates at the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -5860,7 +5910,7 @@ This value is the action that the firewall does by default (and evaluates at the -This value is the action that the firewall does by default (and evaluates at the very end) on outbound connections. The allow action is represented by 0x00000000; 0x00000001 represents a block action. Default value is 0 [Allow]. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured; otherwise, the local store value is used. +This value is the action that the firewall does by default (and evaluates at the very end) on outbound connections. The allow action is represented by 0x00000000; 0x00000001 represents a block action. Default value is 0 [Allow]. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it's configured; otherwise, the local store value is used. @@ -5872,7 +5922,7 @@ This value is the action that the firewall does by default (and evaluates at the | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 0 | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/PublicProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -5922,7 +5972,7 @@ This value is the action that the firewall does by default (and evaluates at the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -5933,7 +5983,7 @@ This value is the action that the firewall does by default (and evaluates at the -This value is an on/off switch. If this value is false, the firewall MAY display a notification to the user when an application is blocked from listening on a port. If this value is on, the firewall MUST NOT display such a notification. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured; otherwise, the local store value is used. +This value is an on/off switch. If this value is false, the firewall MAY display a notification to the user when an application is blocked from listening on a port. If this value is on, the firewall MUST NOT display such a notification. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it's configured; otherwise, the local store value is used. @@ -5945,7 +5995,7 @@ This value is an on/off switch. If this value is false, the firewall MAY display | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | false | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/PublicProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -5972,7 +6022,7 @@ This value is an on/off switch. If this value is false, the firewall MAY display | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -5983,7 +6033,7 @@ This value is an on/off switch. If this value is false, the firewall MAY display -This value is an on/off switch. When this option is false, the server operates in stealth mode. The firewall rules used to enforce stealth mode are implementation-specific. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured; otherwise, the local store value is used. +This value is an on/off switch. When this option is false, the server operates in stealth mode. The firewall rules used to enforce stealth mode are implementation-specific. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it's configured; otherwise, the local store value is used. @@ -5995,7 +6045,7 @@ This value is an on/off switch. When this option is false, the server operates i | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | false | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/PublicProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -6022,7 +6072,7 @@ This value is an on/off switch. When this option is false, the server operates i | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -6033,7 +6083,7 @@ This value is an on/off switch. When this option is false, the server operates i -This value is an on/off switch. This option is ignored if DisableStealthMode is on. Otherwise, when this option is true, the firewall's stealth mode rules MUST NOT prevent the host computer from responding to unsolicited network traffic if that traffic is secured by IPsec. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured; otherwise, the local store value is used. For schema versions 0x0200, 0x0201, and 0x020A, this value is invalid and MUST NOT be used. +This value is an on/off switch. This option is ignored if DisableStealthMode is on. Otherwise, when this option is true, the firewall's stealth mode rules MUST NOT prevent the host computer from responding to unsolicited network traffic if that traffic is secured by IPsec. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it's configured; otherwise, the local store value is used. For schema versions 0x0200, 0x0201, and 0x020A, this value is invalid and MUST NOT be used. @@ -6045,7 +6095,7 @@ This value is an on/off switch. This option is ignored if DisableStealthMode is | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | true | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/PublicProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -6072,7 +6122,7 @@ This value is an on/off switch. This option is ignored if DisableStealthMode is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -6083,7 +6133,7 @@ This value is an on/off switch. This option is ignored if DisableStealthMode is -This value is used as an on/off switch. If it is true, unicast responses to multicast broadcast traffic is blocked. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured; otherwise, the local store value is used. +This value is used as an on/off switch. If it's true, unicast responses to multicast broadcast traffic is blocked. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it's configured; otherwise, the local store value is used. @@ -6095,7 +6145,7 @@ This value is used as an on/off switch. If it is true, unicast responses to mult | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | false | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/PublicProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -6122,7 +6172,7 @@ This value is used as an on/off switch. If it is true, unicast responses to mult | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -6133,7 +6183,7 @@ This value is used as an on/off switch. If it is true, unicast responses to mult -This value is an on/off switch for the firewall and advanced security enforcement. If this value is false, the server MUST NOT block any network traffic, regardless of other policy settings. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured; otherwise, the local store value is used. +This value is an on/off switch for the firewall and advanced security enforcement. If this value is false, the server MUST NOT block any network traffic, regardless of other policy settings. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it's configured; otherwise, the local store value is used. @@ -6145,7 +6195,7 @@ This value is an on/off switch for the firewall and advanced security enforcemen | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | true | @@ -6171,7 +6221,7 @@ This value is an on/off switch for the firewall and advanced security enforcemen | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -6194,7 +6244,7 @@ This value is used as an on/off switch. If this value is on, the firewall logs a | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | false | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/PublicProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -6221,7 +6271,7 @@ This value is used as an on/off switch. If this value is on, the firewall logs a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -6232,7 +6282,7 @@ This value is used as an on/off switch. If this value is on, the firewall logs a -This value is used as an on/off switch. The server MAY use this value in an implementation-specific way to control logging of events if a rule is not enforced for any reason. The merge law for this option is to let "on" values win. +This value is used as an on/off switch. The server MAY use this value in an implementation-specific way to control logging of events if a rule isn't enforced for any reason. The merge law for this option is to let "on" values win. @@ -6244,7 +6294,7 @@ This value is used as an on/off switch. The server MAY use this value in an impl | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | false | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/PublicProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -6271,7 +6321,7 @@ This value is used as an on/off switch. The server MAY use this value in an impl | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -6294,7 +6344,7 @@ This value is used as an on/off switch. If this value is on, the firewall logs a | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | false | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/PublicProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -6321,7 +6371,7 @@ This value is used as an on/off switch. If this value is on, the firewall logs a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -6332,7 +6382,7 @@ This value is used as an on/off switch. If this value is on, the firewall logs a -This value is used as an on/off switch. If this value is false, global port firewall rules in the local store are ignored and not enforced. The setting only has meaning if it is set or enumerated in the Group Policy store or if it is enumerated from the GroupPolicyRSoPStore. The merge law for this option is to let the value GroupPolicyRSoPStore win if it is configured; otherwise, the local store value is used. +This value is used as an on/off switch. If this value is false, global port firewall rules in the local store are ignored and not enforced. The setting only has meaning if it's set or enumerated in the Group Policy store or if it's enumerated from the GroupPolicyRSoPStore. The merge law for this option is to let the value GroupPolicyRSoPStore win if it's configured; otherwise, the local store value is used. @@ -6344,7 +6394,7 @@ This value is used as an on/off switch. If this value is false, global port fire | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | true | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/PublicProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -6371,7 +6421,7 @@ This value is used as an on/off switch. If this value is false, global port fire | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -6382,7 +6432,7 @@ This value is used as an on/off switch. If this value is false, global port fire -This value is a string that represents a file path to the log where the firewall logs dropped packets and successful connections. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured, otherwise the MdmStore value wins if it is configured, otherwise the local store value is used. +This value is a string that represents a file path to the log where the firewall logs dropped packets and successful connections. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it's configured, otherwise the MdmStore value wins if it's configured, otherwise the local store value is used. @@ -6394,7 +6444,7 @@ This value is a string that represents a file path to the log where the firewall | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | | Default Value | %systemroot%\system32\LogFiles\Firewall\pfirewall.log | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/PublicProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | @@ -6412,7 +6462,7 @@ This value is a string that represents a file path to the log where the firewall | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -6423,7 +6473,7 @@ This value is a string that represents a file path to the log where the firewall -This value specifies the size, in kilobytes, of the log file where dropped packets and successful connections are logged. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it is configured, otherwise the MdmStore value wins if it is configured, otherwise the local store value is used. +This value specifies the size, in kilobytes, of the log file where dropped packets and successful connections are logged. The merge law for this option is to let the value of the GroupPolicyRSoPStore win if it's configured, otherwise the MdmStore value wins if it's configured, otherwise the local store value is used. @@ -6435,7 +6485,7 @@ This value specifies the size, in kilobytes, of the log file where dropped packe | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Allowed Values | Range: `[0-4294967295]` | | Default Value | 1024 | @@ -6454,7 +6504,7 @@ This value specifies the size, in kilobytes, of the log file where dropped packe | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -6477,7 +6527,7 @@ This value is used as an on/off switch. If this value is on and EnableFirewall i | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | false | | Dependency [Enable Firewall] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/Firewall/MdmStore/PublicProfile/EnableFirewall`
    Dependency Allowed Value: `true`
    Dependency Allowed Value Type: `ENUM`
    | diff --git a/windows/client-management/mdm/healthattestation-csp.md b/windows/client-management/mdm/healthattestation-csp.md index a7eb92f01a..ff69e90877 100644 --- a/windows/client-management/mdm/healthattestation-csp.md +++ b/windows/client-management/mdm/healthattestation-csp.md @@ -4,7 +4,7 @@ description: Learn more about the HealthAttestation CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 02/28/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -55,7 +55,7 @@ The following list shows the HealthAttestation configuration service provider no | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -79,7 +79,7 @@ The status is always cleared prior to making the attest service call. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -122,7 +122,7 @@ The status is always cleared prior to making the attest service call. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -146,7 +146,7 @@ Value type is a base64 string. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -162,7 +162,7 @@ Value type is a base64 string. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -185,7 +185,7 @@ Identifies a unique device health attestation session. CorrelationId is used to | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -201,7 +201,7 @@ Identifies a unique device health attestation session. CorrelationId is used to | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -224,7 +224,7 @@ Provides the current protocol version that the client is using to communicate wi | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -240,7 +240,7 @@ Provides the current protocol version that the client is using to communicate wi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -251,7 +251,7 @@ Provides the current protocol version that the client is using to communicate wi -Instructs the client to initiate a new request to DHA-Service, and get a new DHA-EncBlob (a summary of the boot state that is issued by DHA-Service). This option should only be used if the MDM server enforces a certificate freshness policy, which needs to force a device to get a fresh encrypted blob from DHA-Service. +Instructs the client to initiate a new request to DHA-Service, and get a new DHA-EncBlob (a summary of the boot state that's issued by DHA-Service). This option should only be used if the MDM server enforces a certificate freshness policy, which needs to force a device to get a fresh encrypted blob from DHA-Service. @@ -263,7 +263,7 @@ Instructs the client to initiate a new request to DHA-Service, and get a new DHA | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | False | @@ -289,7 +289,7 @@ Instructs the client to initiate a new request to DHA-Service, and get a new DHA | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -313,7 +313,7 @@ The report is stored in a registry key in the respective MDM enrollment store. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -357,7 +357,7 @@ The report is stored in a registry key in the respective MDM enrollment store. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -381,7 +381,7 @@ If there's more than one correlation ID, they're separated by ";" in the string. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -426,7 +426,7 @@ If there's more than one correlation ID, they're separated by ";" in the string. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -437,7 +437,7 @@ If there's more than one correlation ID, they're separated by ";" in the string. -Identifies the fully qualified domain name (FQDN) of the DHA-Service that is assigned to perform attestation. If an FQDN is not assigned, DHA-Cloud (Microsoft owned and operated cloud service) will be used as the default attestation service. +Identifies the fully qualified domain name (FQDN) of the DHA-Service that's assigned to perform attestation. If an FQDN isn't assigned, DHA-Cloud (Microsoft owned and operated cloud service) will be used as the default attestation service. @@ -449,7 +449,7 @@ Identifies the fully qualified domain name (FQDN) of the DHA-Service that is ass | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | | Default Value | has.spserv.microsoft.com. | @@ -466,7 +466,7 @@ Identifies the fully qualified domain name (FQDN) of the DHA-Service that is ass | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -489,7 +489,7 @@ Returns the maximum protocol version that this client can support. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -505,7 +505,7 @@ Returns the maximum protocol version that this client can support. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -516,7 +516,7 @@ Returns the maximum protocol version that this client can support. -Enables MDMs to protect the device health attestation communications from man-in-the-middle type (MITM) attacks with a crypt-protected random value that is generated by the MDM Server. The nonce is in hex format, with a minimum size of 8 bytes, and a maximum size of 32 bytes. +Enables MDMs to protect the device health attestation communications from man-in-the-middle type (MITM) attacks with a crypt-protected random value that's generated by the MDM Server. The nonce is in hex format, with a minimum size of 8 bytes, and a maximum size of 32 bytes. @@ -528,7 +528,7 @@ Enables MDMs to protect the device health attestation communications from man-in | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | | Default Value | \0 | @@ -545,7 +545,7 @@ Enables MDMs to protect the device health attestation communications from man-in | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -568,7 +568,7 @@ Provides the maximum preferred protocol version that the client is configured to | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 3 | @@ -585,7 +585,7 @@ Provides the maximum preferred protocol version that the client is configured to | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -608,7 +608,7 @@ Provides the current status of the device health request. For the complete list | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -624,7 +624,7 @@ Provides the current status of the device health request. For the complete list | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -647,7 +647,7 @@ Returns a bitmask of information describing the state of TPM. It indicates wheth | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -663,7 +663,7 @@ Returns a bitmask of information describing the state of TPM. It indicates wheth | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -687,7 +687,7 @@ If the attestation process is launched successfully, this node will return code | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Exec | @@ -750,7 +750,7 @@ If the attestation process is launched successfully, this node will return code | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -773,7 +773,7 @@ Notifies the device to prepare a device health verification request. | Property name | Property value | |:--|:--| -| Format | null | +| Format | `null` | | Access Type | Exec | diff --git a/windows/client-management/mdm/includes/mdm-admx-csp-note.md b/windows/client-management/mdm/includes/mdm-admx-csp-note.md new file mode 100644 index 0000000000..68b132c9a5 --- /dev/null +++ b/windows/client-management/mdm/includes/mdm-admx-csp-note.md @@ -0,0 +1,12 @@ +--- +author: vinaypamnani-msft +ms.author: vinpa +ms.prod: windows +ms.topic: include +ms.date: 05/09/2023 +--- + +> [!TIP] +> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as `chr`. For details, see [Understanding ADMX-backed policies](../../understanding-admx-backed-policies.md). +> +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). diff --git a/windows/client-management/mdm/includes/mdm-admx-policy-note.md b/windows/client-management/mdm/includes/mdm-admx-policy-note.md new file mode 100644 index 0000000000..24b506bf4b --- /dev/null +++ b/windows/client-management/mdm/includes/mdm-admx-policy-note.md @@ -0,0 +1,10 @@ +--- +author: vinaypamnani-msft +ms.author: vinpa +ms.prod: windows +ms.topic: include +ms.date: 05/09/2023 +--- + +> [!TIP] +> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](../../understanding-admx-backed-policies.md#enabling-a-policy). diff --git a/windows/client-management/mdm/includes/mdm-insider-csp-note.md b/windows/client-management/mdm/includes/mdm-insider-csp-note.md new file mode 100644 index 0000000000..5c8c70b1fe --- /dev/null +++ b/windows/client-management/mdm/includes/mdm-insider-csp-note.md @@ -0,0 +1,10 @@ +--- +author: vinaypamnani-msft +ms.author: vinpa +ms.prod: windows +ms.topic: include +ms.date: 05/09/2023 +--- + +> [!IMPORTANT] +> This CSP contains preview policies that are under development and only applicable for [Windows Insider Preview builds](/windows-insider/). These policies are subject to change and may have dependencies on other features or services in preview. diff --git a/windows/client-management/mdm/laps-csp.md b/windows/client-management/mdm/laps-csp.md index 004ac731d2..21eb2d1b73 100644 --- a/windows/client-management/mdm/laps-csp.md +++ b/windows/client-management/mdm/laps-csp.md @@ -4,7 +4,7 @@ description: Learn more about the LAPS CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 04/07/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -54,7 +54,7 @@ The following list shows the LAPS configuration service provider nodes: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20348.1663] and later
    :heavy_check_mark: [10.0.25145] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.4244] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041.2784] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.1754] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621.1480] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20348.1663] and later
    ✅ [10.0.25145] and later
    ✅ Windows 10, version 1809 [10.0.17763.4244] and later
    ✅ Windows 10, version 2004 [10.0.19041.2784] and later
    ✅ Windows 11, version 21H2 [10.0.22000.1754] and later
    ✅ Windows 11, version 22H2 [10.0.22621.1480] and later | @@ -77,7 +77,7 @@ Defines the parent interior node for all action-related settings in the LAPS CSP | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -93,7 +93,7 @@ Defines the parent interior node for all action-related settings in the LAPS CSP | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20348.1663] and later
    :heavy_check_mark: [10.0.25145] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.4244] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041.2784] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.1754] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621.1480] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20348.1663] and later
    ✅ [10.0.25145] and later
    ✅ Windows 10, version 1809 [10.0.17763.4244] and later
    ✅ Windows 10, version 2004 [10.0.19041.2784] and later
    ✅ Windows 11, version 21H2 [10.0.22000.1754] and later
    ✅ Windows 11, version 22H2 [10.0.22621.1480] and later | @@ -117,7 +117,7 @@ This action invokes an immediate reset of the local administrator account passwo | Property name | Property value | |:--|:--| -| Format | null | +| Format | `null` | | Access Type | Exec | @@ -133,7 +133,7 @@ This action invokes an immediate reset of the local administrator account passwo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20348.1663] and later
    :heavy_check_mark: [10.0.25145] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.4244] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041.2784] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.1754] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621.1480] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20348.1663] and later
    ✅ [10.0.25145] and later
    ✅ Windows 10, version 1809 [10.0.17763.4244] and later
    ✅ Windows 10, version 2004 [10.0.19041.2784] and later
    ✅ Windows 11, version 21H2 [10.0.22000.1754] and later
    ✅ Windows 11, version 22H2 [10.0.22621.1480] and later | @@ -161,7 +161,7 @@ The value returned is an HRESULT code: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | | Default Value | 0 | @@ -178,7 +178,7 @@ The value returned is an HRESULT code: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20348.1663] and later
    :heavy_check_mark: [10.0.25145] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.4244] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041.2784] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.1754] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621.1480] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20348.1663] and later
    ✅ [10.0.25145] and later
    ✅ Windows 10, version 1809 [10.0.17763.4244] and later
    ✅ Windows 10, version 2004 [10.0.19041.2784] and later
    ✅ Windows 11, version 21H2 [10.0.22000.1754] and later
    ✅ Windows 11, version 22H2 [10.0.22621.1480] and later | @@ -201,7 +201,7 @@ Root node for LAPS policies. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | | Atomic Required | True | @@ -218,7 +218,7 @@ Root node for LAPS policies. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20348.1663] and later
    :heavy_check_mark: [10.0.25145] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.4244] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041.2784] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.1754] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621.1480] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20348.1663] and later
    ✅ [10.0.25145] and later
    ✅ Windows 10, version 1809 [10.0.17763.4244] and later
    ✅ Windows 10, version 2004 [10.0.19041.2784] and later
    ✅ Windows 11, version 21H2 [10.0.22000.1754] and later
    ✅ Windows 11, version 22H2 [10.0.22621.1480] and later | @@ -249,7 +249,7 @@ This setting has a maximum allowed value of 12 passwords. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-12]` | | Default Value | 0 | @@ -268,7 +268,7 @@ This setting has a maximum allowed value of 12 passwords. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20348.1663] and later
    :heavy_check_mark: [10.0.25145] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.4244] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041.2784] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.1754] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621.1480] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20348.1663] and later
    ✅ [10.0.25145] and later
    ✅ Windows 10, version 1809 [10.0.17763.4244] and later
    ✅ Windows 10, version 2004 [10.0.19041.2784] and later
    ✅ Windows 11, version 21H2 [10.0.22000.1754] and later
    ✅ Windows 11, version 22H2 [10.0.22621.1480] and later | @@ -285,7 +285,7 @@ If not specified, the default built-in local administrator account will be locat If specified, the specified account's password will be managed. -**Note** if a custom managed local administrator account name is specified in this setting, that account must be created via other means. Specifying a name in this setting will not cause the account to be created. +Note if a custom managed local administrator account name is specified in this setting, that account must be created via other means. Specifying a name in this setting won't cause the account to be created. @@ -297,7 +297,7 @@ If specified, the specified account's password will be managed. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -313,7 +313,7 @@ If specified, the specified account's password will be managed. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20348.1663] and later
    :heavy_check_mark: [10.0.25145] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.4244] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041.2784] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.1754] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621.1480] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20348.1663] and later
    ✅ [10.0.25145] and later
    ✅ Windows 10, version 1809 [10.0.17763.4244] and later
    ✅ Windows 10, version 2004 [10.0.19041.2784] and later
    ✅ Windows 11, version 21H2 [10.0.22000.1754] and later
    ✅ Windows 11, version 22H2 [10.0.22621.1480] and later | @@ -332,7 +332,7 @@ This setting is only honored when the Active Directory domain is at Windows Serv - If this setting is enabled, and the Active Directory domain meets the DFL prerequisite, the password will be encrypted before being stored in Active Directory. -- If this setting is disabled, or the Active Directory domain does not meet the DFL prerequisite, the password will be stored as clear-text in Active Directory. +- If this setting is disabled, or the Active Directory domain doesn't meet the DFL prerequisite, the password will be stored as clear-text in Active Directory. If not specified, this setting defaults to True. @@ -348,7 +348,7 @@ If not specified, this setting defaults to True. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | True | | Dependency [BackupDirectory] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/LAPS/Policies/BackupDirectory`
    Dependency Allowed Value: `2`
    Dependency Allowed Value Type: `ENUM`
    | @@ -375,7 +375,7 @@ If not specified, this setting defaults to True. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20348.1663] and later
    :heavy_check_mark: [10.0.25145] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.4244] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041.2784] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.1754] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621.1480] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20348.1663] and later
    ✅ [10.0.25145] and later
    ✅ Windows 10, version 1809 [10.0.17763.4244] and later
    ✅ Windows 10, version 2004 [10.0.19041.2784] and later
    ✅ Windows 11, version 21H2 [10.0.22000.1754] and later
    ✅ Windows 11, version 22H2 [10.0.22621.1480] and later | @@ -414,7 +414,7 @@ If the specified user or group account is invalid the device will fallback to us | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Dependency [BackupDirectory] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/LAPS/Policies/BackupDirectory`
    Dependency Allowed Value: `2`
    Dependency Allowed Value Type: `ENUM`
    | @@ -431,7 +431,7 @@ If the specified user or group account is invalid the device will fallback to us | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20348.1663] and later
    :heavy_check_mark: [10.0.25145] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.4244] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041.2784] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.1754] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621.1480] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20348.1663] and later
    ✅ [10.0.25145] and later
    ✅ Windows 10, version 1809 [10.0.17763.4244] and later
    ✅ Windows 10, version 2004 [10.0.19041.2784] and later
    ✅ Windows 11, version 21H2 [10.0.22000.1754] and later
    ✅ Windows 11, version 22H2 [10.0.22621.1480] and later | @@ -446,9 +446,9 @@ Use this setting to configure which directory the local admin account password i The allowable settings are: -0=Disabled (password will not be backed up) +0=Disabled (password won't be backed up) 1=Backup the password to Azure AD only -2=Backup the password to Active Directory only +2=Backup the password to Active Directory only. If not specified, this setting will default to 0. @@ -462,7 +462,7 @@ If not specified, this setting will default to 0. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -472,7 +472,7 @@ If not specified, this setting will default to 0. | Value | Description | |:--|:--| -| 0 (Default) | Disabled (password will not be backed up). | +| 0 (Default) | Disabled (password won't be backed up). | | 1 | Backup the password to Azure AD only. | | 2 | Backup the password to Active Directory only. | @@ -489,7 +489,7 @@ If not specified, this setting will default to 0. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20348.1663] and later
    :heavy_check_mark: [10.0.25145] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.4244] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041.2784] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.1754] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621.1480] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20348.1663] and later
    ✅ [10.0.25145] and later
    ✅ Windows 10, version 1809 [10.0.17763.4244] and later
    ✅ Windows 10, version 2004 [10.0.19041.2784] and later
    ✅ Windows 11, version 21H2 [10.0.22000.1754] and later
    ✅ Windows 11, version 22H2 [10.0.22621.1480] and later | @@ -502,7 +502,7 @@ If not specified, this setting will default to 0. Use this policy to configure the maximum password age of the managed local administrator account. -If not specified, this setting will default to 30 days +If not specified, this setting will default to 30 days. This setting has a minimum allowed value of 1 day when backing the password to on-premises Active Directory, and 7 days when backing the password to Azure AD. @@ -518,7 +518,7 @@ This setting has a maximum allowed value of 365 days. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[1-365]` | | Default Value | 30 | @@ -537,7 +537,7 @@ This setting has a maximum allowed value of 365 days. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20348.1663] and later
    :heavy_check_mark: [10.0.25145] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.4244] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041.2784] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.1754] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621.1480] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20348.1663] and later
    ✅ [10.0.25145] and later
    ✅ Windows 10, version 1809 [10.0.17763.4244] and later
    ✅ Windows 10, version 2004 [10.0.19041.2784] and later
    ✅ Windows 11, version 21H2 [10.0.22000.1754] and later
    ✅ Windows 11, version 22H2 [10.0.22621.1480] and later | @@ -555,7 +555,7 @@ The allowable settings are: 1=Large letters 2=Large letters + small letters 3=Large letters + small letters + numbers -4=Large letters + small letters + numbers + special characters +4=Large letters + small letters + numbers + special characters. If not specified, this setting will default to 4. @@ -571,7 +571,7 @@ If not specified, this setting will default to 4. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 4 | @@ -599,7 +599,7 @@ If not specified, this setting will default to 4. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20348.1663] and later
    :heavy_check_mark: [10.0.25145] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.4244] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041.2784] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.1754] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621.1480] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20348.1663] and later
    ✅ [10.0.25145] and later
    ✅ Windows 10, version 1809 [10.0.17763.4244] and later
    ✅ Windows 10, version 2004 [10.0.19041.2784] and later
    ✅ Windows 11, version 21H2 [10.0.22000.1754] and later
    ✅ Windows 11, version 22H2 [10.0.22621.1480] and later | @@ -628,7 +628,7 @@ If not specified, this setting defaults to True. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | True | | Dependency [BackupDirectory] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/LAPS/Policies/BackupDirectory`
    Dependency Allowed Value: `2`
    Dependency Allowed Value Type: `ENUM`
    | @@ -640,7 +640,7 @@ If not specified, this setting defaults to True. | Value | Description | |:--|:--| | false | Allow configured password expiration timestamp to exceed maximum password age. | -| true (Default) | Do not allow configured password expiration timestamp to exceed maximum password age. | +| true (Default) | Don't allow configured password expiration timestamp to exceed maximum password age. | @@ -655,7 +655,7 @@ If not specified, this setting defaults to True. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20348.1663] and later
    :heavy_check_mark: [10.0.25145] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.4244] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041.2784] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.1754] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621.1480] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20348.1663] and later
    ✅ [10.0.25145] and later
    ✅ Windows 10, version 1809 [10.0.17763.4244] and later
    ✅ Windows 10, version 2004 [10.0.19041.2784] and later
    ✅ Windows 11, version 21H2 [10.0.22000.1754] and later
    ✅ Windows 11, version 22H2 [10.0.22621.1480] and later | @@ -684,7 +684,7 @@ This setting has a maximum allowed value of 64 characters. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[8-64]` | | Default Value | 14 | @@ -702,7 +702,7 @@ This setting has a maximum allowed value of 64 characters. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20348.1663] and later
    :heavy_check_mark: [10.0.25145] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.4244] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041.2784] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.1754] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621.1480] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20348.1663] and later
    ✅ [10.0.25145] and later
    ✅ Windows 10, version 1809 [10.0.17763.4244] and later
    ✅ Windows 10, version 2004 [10.0.19041.2784] and later
    ✅ Windows 11, version 21H2 [10.0.22000.1754] and later
    ✅ Windows 11, version 22H2 [10.0.22621.1480] and later | @@ -732,7 +732,7 @@ If not specified, this setting will default to 3 (Reset the password and logoff | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 3 | @@ -759,7 +759,7 @@ If not specified, this setting will default to 3 (Reset the password and logoff | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20348.1663] and later
    :heavy_check_mark: [10.0.25145] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.4244] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041.2784] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.1754] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621.1480] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20348.1663] and later
    ✅ [10.0.25145] and later
    ✅ Windows 10, version 1809 [10.0.17763.4244] and later
    ✅ Windows 10, version 2004 [10.0.19041.2784] and later
    ✅ Windows 11, version 21H2 [10.0.22000.1754] and later
    ✅ Windows 11, version 22H2 [10.0.22621.1480] and later | @@ -788,7 +788,7 @@ This setting has a maximum allowed value of 24 hours. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-24]` | | Default Value | 24 | diff --git a/windows/client-management/mdm/networkproxy-csp.md b/windows/client-management/mdm/networkproxy-csp.md index 44b8f2d7ae..c545e91306 100644 --- a/windows/client-management/mdm/networkproxy-csp.md +++ b/windows/client-management/mdm/networkproxy-csp.md @@ -4,7 +4,7 @@ description: Learn more about the NetworkProxy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 02/28/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -47,7 +47,7 @@ The following list shows the NetworkProxy configuration service provider nodes: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -70,7 +70,7 @@ Automatically detect settings. If enabled, the system tries to find the path to | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Delete, Get, Replace | | Default Value | 1 | @@ -96,7 +96,7 @@ Automatically detect settings. If enabled, the system tries to find the path to | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -107,7 +107,7 @@ Automatically detect settings. If enabled, the system tries to find the path to -Node for configuring a static proxy for Ethernet and Wi-Fi connections. The same proxy server is used for all protocols - including HTTP, HTTPS, FTP, and SOCKS. These settings do not apply to VPN connections. +Node for configuring a static proxy for Ethernet and Wi-Fi connections. The same proxy server is used for all protocols - including HTTP, HTTPS, FTP, and SOCKS. These settings don't apply to VPN connections. @@ -119,7 +119,7 @@ Node for configuring a static proxy for Ethernet and Wi-Fi connections. The same | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -135,7 +135,7 @@ Node for configuring a static proxy for Ethernet and Wi-Fi connections. The same | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -146,7 +146,7 @@ Node for configuring a static proxy for Ethernet and Wi-Fi connections. The same -Addresses that should not use the proxy server. The system will not use the proxy server for addresses beginning with what is specified in this node. Use semicolons (;) to separate entries. +Addresses that shouldn't use the proxy server. The system won't use the proxy server for addresses beginning with what's specified in this node. Use semicolons (;) to separate entries. @@ -158,7 +158,7 @@ Addresses that should not use the proxy server. The system will not use the prox | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -175,7 +175,7 @@ Addresses that should not use the proxy server. The system will not use the prox | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -198,7 +198,7 @@ Address to the proxy server. Specify an address in the format ``[":"` @@ -214,7 +214,7 @@ Address to the proxy server. Specify an address in the format ``[":"` | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -237,7 +237,7 @@ Specifies whether the proxy server should be used for local (intranet) addresses | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Delete, Get, Replace | | Default Value | 0 | @@ -248,7 +248,7 @@ Specifies whether the proxy server should be used for local (intranet) addresses | Value | Description | |:--|:--| | 0 (Default) | Use proxy server for local addresses. | -| 1 | Do not use proxy server for local addresses. | +| 1 | Don't use proxy server for local addresses. | @@ -263,7 +263,7 @@ Specifies whether the proxy server should be used for local (intranet) addresses | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -288,7 +288,7 @@ When set to 0, it enables proxy configuration as global, machine wide. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Delete, Get, Replace | | Default Value | 1 | @@ -314,7 +314,7 @@ When set to 0, it enables proxy configuration as global, machine wide. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -337,7 +337,7 @@ Address to the PAC script you want to use. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Delete, Get, Replace | diff --git a/windows/client-management/mdm/networkqospolicy-csp.md b/windows/client-management/mdm/networkqospolicy-csp.md index 6d224dd68d..03fc13cf06 100644 --- a/windows/client-management/mdm/networkqospolicy-csp.md +++ b/windows/client-management/mdm/networkqospolicy-csp.md @@ -4,7 +4,7 @@ description: Learn more about the NetworkQoSPolicy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 02/28/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -60,7 +60,7 @@ The following list shows the NetworkQoSPolicy configuration service provider nod | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2009 [10.0.19042] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2009 [10.0.19042] and later | @@ -83,7 +83,7 @@ The value of this node should be a policy name. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | | Dynamic Node Naming | UniqueName: The value of this node should be a policy name. | @@ -100,7 +100,7 @@ The value of this node should be a policy name. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2009 [10.0.19042] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2009 [10.0.19042] and later | @@ -123,7 +123,7 @@ Specifies the name of an application to be used to match the network traffic, su | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -139,7 +139,7 @@ Specifies the name of an application to be used to match the network traffic, su | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2009 [10.0.19042] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2009 [10.0.19042] and later | @@ -162,7 +162,7 @@ Specifies a single port or a range of ports to be used to match the network traf | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -178,7 +178,7 @@ Specifies a single port or a range of ports to be used to match the network traf | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2009 [10.0.19042] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2009 [10.0.19042] and later | @@ -201,7 +201,7 @@ The differentiated services code point (DSCP) value to apply to matching network | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-63]` | @@ -218,7 +218,7 @@ The differentiated services code point (DSCP) value to apply to matching network | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2009 [10.0.19042] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2009 [10.0.19042] and later | @@ -241,7 +241,7 @@ Specifies the IP protocol used to match the network traffic. Valid values are 0: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -258,7 +258,7 @@ Specifies the IP protocol used to match the network traffic. Valid values are 0: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2009 [10.0.19042] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2009 [10.0.19042] and later | @@ -281,7 +281,7 @@ The IEEE 802.1p value to apply to matching network traffice. Valid values are 0- | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-7]` | @@ -298,7 +298,7 @@ The IEEE 802.1p value to apply to matching network traffice. Valid values are 0- | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2009 [10.0.19042] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2009 [10.0.19042] and later | @@ -321,7 +321,7 @@ Specifies a single port or a range of ports to be used to match the network traf | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -337,7 +337,7 @@ Specifies a single port or a range of ports to be used to match the network traf | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2009 [10.0.19042] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2009 [10.0.19042] and later | @@ -360,7 +360,7 @@ Version information. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | diff --git a/windows/client-management/mdm/nodecache-csp.md b/windows/client-management/mdm/nodecache-csp.md index e3a206ff86..0d63aaf864 100644 --- a/windows/client-management/mdm/nodecache-csp.md +++ b/windows/client-management/mdm/nodecache-csp.md @@ -4,7 +4,7 @@ description: Learn more about the NodeCache CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 02/28/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -62,7 +62,7 @@ The following list shows the NodeCache configuration service provider nodes: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -85,7 +85,7 @@ Group settings per DM server. Each group of settings is distinguished by the ser | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | UniqueName: It should be the same DM server PROVIDER-ID value that was supplied through the w7 APPLICATION configuration service provider XML during the enrollment process. | @@ -102,7 +102,7 @@ Group settings per DM server. Each group of settings is distinguished by the ser | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -125,7 +125,7 @@ Character string representing the cache version set by the server. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get, Replace | @@ -141,7 +141,7 @@ Character string representing the cache version set by the server. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -152,7 +152,7 @@ Character string representing the cache version set by the server. -List of nodes whose values do not match their expected values as specified in /NodeID/ExpectedValue. +List of nodes whose values don't match their expected values as specified in /NodeID/ExpectedValue. @@ -164,7 +164,7 @@ List of nodes whose values do not match their expected values as specified in /N | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -180,7 +180,7 @@ List of nodes whose values do not match their expected values as specified in /N | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -191,7 +191,7 @@ List of nodes whose values do not match their expected values as specified in /N -XML containing nodes whose values do not match their expected values as specified in /NodeID/ExpectedValue. +XML containing nodes whose values don't match their expected values as specified in /NodeID/ExpectedValue. @@ -203,7 +203,7 @@ XML containing nodes whose values do not match their expected values as specifie | Property name | Property value | |:--|:--| -| Format | xml | +| Format | `xml` | | Access Type | Get | @@ -219,7 +219,7 @@ XML containing nodes whose values do not match their expected values as specifie | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -242,7 +242,7 @@ Root node for cached nodes. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -258,7 +258,7 @@ Root node for cached nodes. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -269,7 +269,7 @@ Root node for cached nodes. -Information about each cached node is stored under NodeID as specified by the server. This value must not contain a comma. +Information about each cached node is stored under NodeID as specified by the server. This value mustn't contain a comma. @@ -281,7 +281,7 @@ Information about each cached node is stored under NodeID as specified by the se | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | ServerGeneratedUniqueIdentifier | @@ -298,7 +298,7 @@ Information about each cached node is stored under NodeID as specified by the se | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -321,7 +321,7 @@ This will automatically set the value on the device to match the node's actual v | Property name | Property value | |:--|:--| -| Format | null | +| Format | `null` | | Access Type | Add, Delete, Get | @@ -337,7 +337,7 @@ This will automatically set the value on the device to match the node's actual v | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -361,7 +361,7 @@ Supported values are string and x-nodemon-nonexistent. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get | @@ -395,7 +395,7 @@ Here's an example for setting the ExpectedValue to nonexistent. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -418,7 +418,7 @@ This node's value is a complete OMA DM node URI. It can specify either an interi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get | @@ -434,7 +434,7 @@ This node's value is a complete OMA DM node URI. It can specify either an interi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -457,7 +457,7 @@ Group settings per DM server. Each group of settings is distinguished by the ser | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | UniqueName: It should be the same DM server PROVIDER-ID value that was supplied through the w7 APPLICATION configuration service provider XML during the enrollment process. | @@ -474,7 +474,7 @@ Group settings per DM server. Each group of settings is distinguished by the ser | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -497,7 +497,7 @@ Character string representing the cache version set by the server. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Get, Replace | @@ -513,7 +513,7 @@ Character string representing the cache version set by the server. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -524,7 +524,7 @@ Character string representing the cache version set by the server. -List of nodes whose values do not match their expected values as specified in /NodeID/ExpectedValue. +List of nodes whose values don't match their expected values as specified in /NodeID/ExpectedValue. @@ -536,7 +536,7 @@ List of nodes whose values do not match their expected values as specified in /N | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -552,7 +552,7 @@ List of nodes whose values do not match their expected values as specified in /N | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -563,7 +563,7 @@ List of nodes whose values do not match their expected values as specified in /N -XML containing nodes whose values do not match their expected values as specified in /NodeID/ExpectedValue. +XML containing nodes whose values don't match their expected values as specified in /NodeID/ExpectedValue. @@ -575,7 +575,7 @@ XML containing nodes whose values do not match their expected values as specifie | Property name | Property value | |:--|:--| -| Format | xml | +| Format | `xml` | | Access Type | Get | @@ -591,7 +591,7 @@ XML containing nodes whose values do not match their expected values as specifie | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -614,7 +614,7 @@ Root node for cached nodes. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -630,7 +630,7 @@ Root node for cached nodes. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -641,7 +641,7 @@ Root node for cached nodes. -Information about each cached node is stored under NodeID as specified by the server. This value must not contain a comma. +Information about each cached node is stored under NodeID as specified by the server. This value mustn't contain a comma. @@ -653,7 +653,7 @@ Information about each cached node is stored under NodeID as specified by the se | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | ServerGeneratedUniqueIdentifier | @@ -670,7 +670,7 @@ Information about each cached node is stored under NodeID as specified by the se | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -693,7 +693,7 @@ This will automatically set the value on the device to match the node's actual v | Property name | Property value | |:--|:--| -| Format | null | +| Format | `null` | | Access Type | Add, Delete, Get | @@ -709,7 +709,7 @@ This will automatically set the value on the device to match the node's actual v | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -733,7 +733,7 @@ Supported values are string and x-nodemon-nonexistent. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get | @@ -767,7 +767,7 @@ Here's an example for setting the ExpectedValue to nonexistent. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -790,7 +790,7 @@ This node's value is a complete OMA DM node URI. It can specify either an interi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get | diff --git a/windows/client-management/mdm/office-csp.md b/windows/client-management/mdm/office-csp.md index 525461336f..887ab52ddd 100644 --- a/windows/client-management/mdm/office-csp.md +++ b/windows/client-management/mdm/office-csp.md @@ -4,7 +4,7 @@ description: Learn more about the Office CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 02/28/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -46,7 +46,7 @@ The following list shows the Office configuration service provider nodes: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -69,7 +69,7 @@ Installation options for the office CSP. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -85,7 +85,7 @@ Installation options for the office CSP. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -108,7 +108,7 @@ A unique identifier which represents the installation instance id. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | UniqueName: A unique identifier which represents the installation instance id. | @@ -125,7 +125,7 @@ A unique identifier which represents the installation instance id. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -152,7 +152,7 @@ Final Office 365 installation status. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -168,7 +168,7 @@ Final Office 365 installation status. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -191,7 +191,7 @@ The install action will install office given the configuration in the data. The | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Exec, Get | @@ -207,7 +207,7 @@ The install action will install office given the configuration in the data. The | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -230,7 +230,7 @@ The installation status of the CSP. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -246,7 +246,7 @@ The installation status of the CSP. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -269,7 +269,7 @@ The current Office 365 installation status on the machine. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -285,7 +285,7 @@ The current Office 365 installation status on the machine. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -308,7 +308,7 @@ Installation options for the office CSP. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -324,7 +324,7 @@ Installation options for the office CSP. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -347,7 +347,7 @@ A unique identifier which represents the installation instance id. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | UniqueName: A unique identifier which represents the installation instance id. | @@ -364,7 +364,7 @@ A unique identifier which represents the installation instance id. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -387,7 +387,7 @@ Final Office 365 installation status. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -403,7 +403,7 @@ Final Office 365 installation status. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -426,7 +426,7 @@ The install action will install office given the configuration in the data. The | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Exec, Get | @@ -442,7 +442,7 @@ The install action will install office given the configuration in the data. The | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -465,7 +465,7 @@ The installation status of the CSP. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -481,7 +481,7 @@ The installation status of the CSP. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -504,7 +504,7 @@ The current Office 365 installation status on the machine. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | diff --git a/windows/client-management/mdm/passportforwork-csp.md b/windows/client-management/mdm/passportforwork-csp.md index e172fe94a5..a325b44c94 100644 --- a/windows/client-management/mdm/passportforwork-csp.md +++ b/windows/client-management/mdm/passportforwork-csp.md @@ -4,7 +4,7 @@ description: Learn more about the PassportForWork CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 04/26/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,8 +16,7 @@ ms.topic: reference # PassportForWork CSP -> [!IMPORTANT] -> This CSP contains preview policies that are under development and only applicable for [Windows Insider Preview builds](/windows-insider/). These policies are subject to change and may have dependencies on other features or services in preview. +[!INCLUDE [Windows Insider tip](includes/mdm-insider-csp-note.md)] @@ -90,7 +89,7 @@ The following list shows the PassportForWork configuration service provider node | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -101,7 +100,7 @@ The following list shows the PassportForWork configuration service provider node -This policy specifies the Tenant ID in the format of a Globally Unique Identifier (GUID) without curly braces ( { , } ), which will be used as part of Windows Hello for Business provisioning and management. +This policy specifies the Tenant ID in the format of a Globally Unique Identifier (GUID) without curly braces `{ }`, which will be used as part of Windows Hello for Business provisioning and management. @@ -114,7 +113,7 @@ To get the GUID, use the PowerShell cmdlet [Get-AzureAccount](/powershell/module | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | UniqueName: A globally unique identifier (GUID), without curly braces ( { , } ), that is used as part of Windows Hello for Business provisioning and management. To get a GUID, use the PowerShell cmdlet Get-AzureAccount. For more information see https://devblogs.microsoft.com/scripting/get-windows-azure-active-directory-tenant-id-in-windows-powershell. | @@ -131,7 +130,7 @@ To get the GUID, use the PowerShell cmdlet [Get-AzureAccount](/powershell/module | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -154,7 +153,7 @@ Root node for policies. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | @@ -170,7 +169,7 @@ Root node for policies. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -181,7 +180,7 @@ Root node for policies. -Do not start Windows Hello provisioning after sign-in. +Don't start Windows Hello provisioning after sign-in. @@ -193,7 +192,7 @@ Do not start Windows Hello provisioning after sign-in. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | False | @@ -219,7 +218,7 @@ Do not start Windows Hello provisioning after sign-in. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -234,7 +233,7 @@ If the user forgets their PIN, it can be changed to a new PIN using the Windows - If you enable this policy setting, the PIN recovery secret will be stored on the device and the user will be able to change to a new PIN in case their PIN is forgotten. -- If you disable or do not configure this policy setting, the PIN recovery secret will not be created or stored. If the user's PIN is forgotten, the only way to get a new PIN is by deleting the existing PIN and creating a new one, which will require the user to re-register with any services the old PIN provided access to. +- If you disable or don't configure this policy setting, the PIN recovery secret won't be created or stored. If the user's PIN is forgotten, the only way to get a new PIN is by deleting the existing PIN and creating a new one, which will require the user to re-register with any services the old PIN provided access to. @@ -246,7 +245,7 @@ If the user forgets their PIN, it can be changed to a new PIN using the Windows | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | False | @@ -272,7 +271,7 @@ If the user forgets their PIN, it can be changed to a new PIN using the Windows | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -297,7 +296,7 @@ Root node for excluded security devices. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | @@ -313,7 +312,7 @@ Root node for excluded security devices. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -328,7 +327,7 @@ Some Trusted Platform Modules (TPMs) are only compliant with the older 1.2 revis - If you enable this policy setting, TPM revision 1.2 modules will be disallowed from being used with Windows Hello for Business. -- If you disable or do not configure this policy setting, TPM revision 1.2 modules will be allowed to be used with Windows Hello for Business. +- If you disable or don't configure this policy setting, TPM revision 1.2 modules will be allowed to be used with Windows Hello for Business. @@ -340,7 +339,7 @@ Some Trusted Platform Modules (TPMs) are only compliant with the older 1.2 revis | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | False | @@ -366,7 +365,7 @@ Some Trusted Platform Modules (TPMs) are only compliant with the older 1.2 revis | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -389,7 +388,7 @@ Root node for PIN policies. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | @@ -405,7 +404,7 @@ Root node for PIN policies. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -418,11 +417,11 @@ Root node for PIN policies. Use this policy setting to configure the use of digits in the Windows Hello for Business PIN. -A value of 1 corresponds to "Required." If you configure this policy setting to 1, Windows Hello for Business requires users to include at least one digit in their PIN. +A value of 1 corresponds to "Required". If you configure this policy setting to 1, Windows Hello for Business requires users to include at least one digit in their PIN. -A value of 2 corresponds to "Disallow." If you configure this policy setting to 2, Windows Hello for Business prevents users from using digits in their PIN. +A value of 2 corresponds to "Disallow". If you configure this policy setting to 2, Windows Hello for Business prevents users from using digits in their PIN. -- If you do not configure this policy setting, Windows Hello for Business requires users to use digits in their PIN. +If you don't configure this policy setting, Windows Hello for Business requires users to use digits in their PIN. @@ -434,7 +433,7 @@ A value of 2 corresponds to "Disallow." If you configure this policy setting to | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -461,7 +460,7 @@ A value of 2 corresponds to "Disallow." If you configure this policy setting to | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -472,7 +471,7 @@ A value of 2 corresponds to "Disallow." If you configure this policy setting to -This policy specifies when the PIN expires (in days). Valid values are 0 to 730 inclusive. If this policy is set to 0, then PINs do not expire. +This policy specifies when the PIN expires (in days). Valid values are 0 to 730 inclusive. If this policy is set to 0, then PINs don't expire. @@ -484,7 +483,7 @@ This policy specifies when the PIN expires (in days). Valid values are 0 to 730 | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-730]` | | Default Value | 0 | @@ -502,7 +501,7 @@ This policy specifies when the PIN expires (in days). Valid values are 0 to 730 | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -513,7 +512,7 @@ This policy specifies when the PIN expires (in days). Valid values are 0 to 730 -This policy specifies the number of past PINs that can be stored in the history that can't be used. Valid values are 0 to 50 inclusive. If this policy is set to 0, then storage of previous PINs is not required. PIN history is not preserved through PIN reset. +This policy specifies the number of past PINs that can be stored in the history that can't be used. Valid values are 0 to 50 inclusive. If this policy is set to 0, then storage of previous PINs isn't required. PIN history isn't preserved through PIN reset. @@ -525,7 +524,7 @@ This policy specifies the number of past PINs that can be stored in the history | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-50]` | | Default Value | 0 | @@ -543,7 +542,7 @@ This policy specifies the number of past PINs that can be stored in the history | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -556,11 +555,11 @@ This policy specifies the number of past PINs that can be stored in the history Use this policy setting to configure the use of lowercase letters in the Windows Hello for Business PIN. -A value of 1 corresponds to "Required." If you configure this policy setting to 1, Windows Hello for Business requires users to include at least one lowercase letter in their PIN. +A value of 1 corresponds to "Required". If you configure this policy setting to 1, Windows Hello for Business requires users to include at least one lowercase letter in their PIN. -A value of 2 corresponds to "Disallow." If you configure this policy setting to 2, Windows Hello for Business prevents users from using lowercase letters in their PIN. +A value of 2 corresponds to "Disallow". If you configure this policy setting to 2, Windows Hello for Business prevents users from using lowercase letters in their PIN. -- If you do not configure this policy setting, Windows Hello for Business does not allow users to use lowercase letters in their PIN. +If you don't configure this policy setting, Windows Hello for Business doesn't allow users to use lowercase letters in their PIN. @@ -572,7 +571,7 @@ A value of 2 corresponds to "Disallow." If you configure this policy setting to | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -599,7 +598,7 @@ A value of 2 corresponds to "Disallow." If you configure this policy setting to | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -614,10 +613,10 @@ Maximum PIN length configures the maximum number of characters allowed for the P - If you configure this policy setting, the PIN length must be less than or equal to this number. -- If you do not configure this policy setting, the PIN length must be less than or equal to 127. +- If you don't configure this policy setting, the PIN length must be less than or equal to 127. > [!NOTE] -> If the above specified conditions for the maximum PIN length are not met, default values will be used for both the maximum and minimum PIN lengths. +> If the above specified conditions for the maximum PIN length aren't met, default values will be used for both the maximum and minimum PIN lengths. @@ -629,7 +628,7 @@ Maximum PIN length configures the maximum number of characters allowed for the P | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[4-127]` | | Default Value | 127 | @@ -647,7 +646,7 @@ Maximum PIN length configures the maximum number of characters allowed for the P | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -662,10 +661,10 @@ Minimum PIN length configures the minimum number of characters required for the - If you configure this policy setting, the PIN length must be greater than or equal to this number. -- If you do not configure this policy setting, the PIN length must be greater than or equal to 4. +- If you don't configure this policy setting, the PIN length must be greater than or equal to 4. > [!NOTE] -> If the above specified conditions for the minimum PIN length are not met, default values will be used for both the maximum and minimum PIN lengths. +> If the above specified conditions for the minimum PIN length aren't met, default values will be used for both the maximum and minimum PIN lengths. @@ -677,7 +676,7 @@ Minimum PIN length configures the minimum number of characters required for the | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[4-127]` | | Default Value | 4 | @@ -695,7 +694,7 @@ Minimum PIN length configures the minimum number of characters required for the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -708,11 +707,11 @@ Minimum PIN length configures the minimum number of characters required for the Use this policy setting to configure the use of special characters in the Windows Hello for Business PIN gesture. Valid special characters for Windows Hello for Business PIN gestures include: ! " # $ % & ' ( ) * + , - . / : ; `< = >` ? @ [ \ ] ^ _ ` { | } ~ . -A value of 1 corresponds to "Required." If you configure this policy setting to 1, Windows Hello for Business requires users to include at least one special character in their PIN. +A value of 1 corresponds to "Required". If you configure this policy setting to 1, Windows Hello for Business requires users to include at least one special character in their PIN. -A value of 2 corresponds to "Disallow." If you configure this policy setting to 2, Windows Hello for Business prevents users from using special characters in their PIN. +A value of 2 corresponds to "Disallow". If you configure this policy setting to 2, Windows Hello for Business prevents users from using special characters in their PIN. -- If you do not configure this policy setting, Windows Hello for Business does not allow users to use special characters in their PIN. +If you don't configure this policy setting, Windows Hello for Business doesn't allow users to use special characters in their PIN. @@ -724,7 +723,7 @@ A value of 2 corresponds to "Disallow." If you configure this policy setting to | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -751,7 +750,7 @@ A value of 2 corresponds to "Disallow." If you configure this policy setting to | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -764,11 +763,11 @@ A value of 2 corresponds to "Disallow." If you configure this policy setting to Use this policy setting to configure the use of uppercase letters in the Windows Hello for Business PIN. -A value of 1 corresponds to "Required." If you configure this policy setting to 1, Windows Hello for Business requires users to include at least one uppercase letter in their PIN. +A value of 1 corresponds to "Required". If you configure this policy setting to 1, Windows Hello for Business requires users to include at least one uppercase letter in their PIN. -A value of 2 corresponds to "Disallow." If you configure this policy setting to 2, Windows Hello for Business prevents users from using uppercase letters in their PIN. +A value of 2 corresponds to "Disallow". If you configure this policy setting to 2, Windows Hello for Business prevents users from using uppercase letters in their PIN. -- If you do not configure this policy setting, Windows Hello for Business does not allow users to use uppercase letters in their PIN. +If you don't configure this policy setting, Windows Hello for Business doesn't allow users to use uppercase letters in their PIN. @@ -780,7 +779,7 @@ A value of 2 corresponds to "Disallow." If you configure this policy setting to | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -807,7 +806,7 @@ A value of 2 corresponds to "Disallow." If you configure this policy setting to | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -830,7 +829,7 @@ Root node for phone sign-in policies. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | @@ -846,7 +845,7 @@ Root node for phone sign-in policies. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -862,7 +861,8 @@ Boolean that specifies if phone sign-in can be used with a device. Phone sign-in Default value is false. - If you enable this setting, a desktop device will allow a registered, companion device to be used as an authentication factor. -- If you disable this setting, a companion device cannot be used in desktop authentication scenarios. + +- If you disable this setting, a companion device can't be used in desktop authentication scenarios. @@ -876,7 +876,7 @@ Default value is false. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | False | @@ -902,7 +902,7 @@ Default value is false. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -913,11 +913,11 @@ Default value is false. -A Trusted Platform Module (TPM) provides additional security benefits over software because data stored within it cannot be used on other devices. +A Trusted Platform Module (TPM) provides additional security benefits over software because data stored within it can't be used on other devices. - If you enable this policy setting, only devices with a usable TPM provision Windows Hello for Business. -- If you disable or do not configure this policy setting, the TPM is still preferred, but all devices provision Windows Hello for Business using software if the TPM is non-functional or unavailable. +- If you disable or don't configure this policy setting, the TPM is still preferred, but all devices provision Windows Hello for Business using software if the TPM is non-functional or unavailable. @@ -929,7 +929,7 @@ A Trusted Platform Module (TPM) provides additional security benefits over softw | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | False | @@ -955,7 +955,7 @@ A Trusted Platform Module (TPM) provides additional security benefits over softw | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -970,7 +970,7 @@ Windows Hello for Business can use certificates to authenticate to on-premise re - If you enable this policy setting, Windows Hello for Business will wait until the device has received a certificate payload from the mobile device management server before provisioning a PIN. -- If you disable or do not configure this policy setting, the PIN will be provisioned when the user logs in, without waiting for a certificate payload. +- If you disable or don't configure this policy setting, the PIN will be provisioned when the user logs in, without waiting for a certificate payload. @@ -982,7 +982,7 @@ Windows Hello for Business can use certificates to authenticate to on-premise re | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | False | @@ -1008,7 +1008,7 @@ Windows Hello for Business can use certificates to authenticate to on-premise re | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 21H2 [10.0.19044.1566] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.527] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 21H2 [10.0.19044.1566] and later
    ✅ Windows 11, version 21H2 [10.0.22000.527] and later
    ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -1023,7 +1023,7 @@ Boolean value that enables Windows Hello for Business to use Azure AD Kerberos t - If you enable this policy setting, Windows Hello for Business will use an Azure AD Kerberos ticket to authenticate to on-premises resources. The Azure AD Kerberos ticket is returned to the client after a successful authentication to Azure AD if Azure AD Kerberos is enabled for the tenant and domain. -- If you disable or do not configure this policy setting, Windows Hello for Business will use a key or certificate to authenticate to on-premises resources. +- If you disable or don't configure this policy setting, Windows Hello for Business will use a key or certificate to authenticate to on-premises resources. @@ -1035,7 +1035,7 @@ Boolean value that enables Windows Hello for Business to use Azure AD Kerberos t | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | False | @@ -1061,7 +1061,7 @@ Boolean value that enables Windows Hello for Business to use Azure AD Kerberos t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -1075,7 +1075,7 @@ Boolean value that enables Windows Hello for Business to use Azure AD Kerberos t - If you enable this policy setting, applications use Windows Hello for Business certificates as smart card certificates. Biometric factors are unavailable when a user is asked to authorize the use of the certificate's private key. This policy setting is designed to allow compatibility with applications that rely exclusively on smart card certificates. -- If you disable or do not configure this policy setting, applications do not use Windows Hello for Business certificates as smart card certificates, and biometric factors are available when a user is asked to authorize the use of the certificate's private key. +- If you disable or don't configure this policy setting, applications don't use Windows Hello for Business certificates as smart card certificates, and biometric factors are available when a user is asked to authorize the use of the certificate's private key. Windows requires a user to lock and unlock their session after changing this setting if the user is currently signed in. @@ -1089,7 +1089,7 @@ Windows requires a user to lock and unlock their session after changing this set | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | False | @@ -1115,7 +1115,7 @@ Windows requires a user to lock and unlock their session after changing this set | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1128,9 +1128,9 @@ Windows requires a user to lock and unlock their session after changing this set Windows Hello for Business is an alternative method for signing into Windows using your Active Directory or Azure Active Directory account that can replace passwords, Smart Cards, and Virtual Smart Cards. -- If you enable or do not configure this policy setting, the device provisions Windows Hello for Business for all users. +- If you enable or don't configure this policy setting, the device provisions Windows Hello for Business for all users. -- If you disable this policy setting, the device does not provision Windows Hello for Business for any user. +- If you disable this policy setting, the device doesn't provision Windows Hello for Business for any user. @@ -1142,7 +1142,7 @@ Windows Hello for Business is an alternative method for signing into Windows usi | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | True | @@ -1168,7 +1168,7 @@ Windows Hello for Business is an alternative method for signing into Windows usi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1191,7 +1191,7 @@ Root node for biometrics policies. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1207,7 +1207,7 @@ Root node for biometrics policies. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -1218,7 +1218,7 @@ Root node for biometrics policies. -Enhanced Sign-in Security (ESS) isolates both biometric template data and matching operations to trusted hardware or specified memory regions, meaning the rest of the operating system cannot access or tamper with them. Because the channel of communication between the sensors and the algorithm is also secured, it is impossible for malware to inject or replay data in order to simulate a user signing in or to lock a user out of their machine. +Enhanced Sign-in Security (ESS) isolates both biometric template data and matching operations to trusted hardware or specified memory regions, meaning the rest of the operating system can't access or tamper with them. Because the channel of communication between the sensors and the algorithm is also secured, it's impossible for malware to inject or replay data in order to simulate a user signing in or to lock a user out of their machine. @@ -1230,7 +1230,7 @@ Enhanced Sign-in Security (ESS) isolates both biometric template data and matchi | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1265,7 +1265,7 @@ Enhanced Sign-in Security (ESS) isolates both biometric template data and matchi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1278,11 +1278,11 @@ Enhanced Sign-in Security (ESS) isolates both biometric template data and matchi This setting determines whether enhanced anti-spoofing is required for Windows Hello face authentication. -- If you enable this setting, Windows requires all users on managed devices to use enhanced anti-spoofing for Windows Hello face authentication. This disables Windows Hello face authentication on devices that do not support enhanced anti-spoofing. +- If you enable this setting, Windows requires all users on managed devices to use enhanced anti-spoofing for Windows Hello face authentication. This disables Windows Hello face authentication on devices that don't support enhanced anti-spoofing. -- If you disable or do not configure this setting, Windows doesn't require enhanced anti-spoofing for Windows Hello face authentication. +- If you disable or don't configure this setting, Windows doesn't require enhanced anti-spoofing for Windows Hello face authentication. -**Note** that enhanced anti-spoofing for Windows Hello face authentication is not required on unmanaged devices. +Note that enhanced anti-spoofing for Windows Hello face authentication isn't required on unmanaged devices. @@ -1296,7 +1296,7 @@ This setting determines whether enhanced anti-spoofing is required for Windows H | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | False | @@ -1322,7 +1322,7 @@ This setting determines whether enhanced anti-spoofing is required for Windows H | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1335,7 +1335,7 @@ This setting determines whether enhanced anti-spoofing is required for Windows H Windows Hello for Business enables users to use biometric gestures, such as face and fingerprints, as an alternative to the PIN gesture. However, users must still configure a PIN to use in case of failures. -- If you enable or do not configure this policy setting, Windows Hello for Business allows the use of biometric gestures. +- If you enable or don't configure this policy setting, Windows Hello for Business allows the use of biometric gestures. - If you disable this policy setting, Windows Hello for Business prevents the use of biometric gestures. @@ -1354,7 +1354,7 @@ Windows Hello for Business enables users to use biometric gestures, such as face | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | False | @@ -1380,7 +1380,7 @@ Windows Hello for Business enables users to use biometric gestures, such as face | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1403,7 +1403,7 @@ Device Unlock. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1419,7 +1419,7 @@ Device Unlock. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1442,7 +1442,7 @@ Contains a list of providers by GUID that are to be considered for the first ste | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Regular Expression: `{[0-9A-Fa-f]{8}\-[0-9A-Fa-f]{4}\-[0-9A-Fa-f]{4}\-[0-9A-Fa-f]{4}\-[0-9A-Fa-f]{12}\}` | @@ -1459,7 +1459,7 @@ Contains a list of providers by GUID that are to be considered for the first ste | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1482,7 +1482,7 @@ Contains a list of providers by GUID that are to be considered for the second st | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Regular Expression: `{[0-9A-Fa-f]{8}\-[0-9A-Fa-f]{4}\-[0-9A-Fa-f]{4}\-[0-9A-Fa-f]{4}\-[0-9A-Fa-f]{12}\}` | @@ -1499,7 +1499,7 @@ Contains a list of providers by GUID that are to be considered for the second st | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1522,7 +1522,7 @@ List of plugins that the passive provider monitors to detect user presence. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1538,7 +1538,7 @@ List of plugins that the passive provider monitors to detect user presence. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1561,7 +1561,7 @@ Dynamic Lock. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1577,7 +1577,7 @@ Dynamic Lock. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1588,7 +1588,7 @@ Dynamic Lock. -Enables/Disables Dyanamic Lock. +Enables/Disables Dynamic Lock. @@ -1600,7 +1600,7 @@ Enables/Disables Dyanamic Lock. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | False | @@ -1626,7 +1626,7 @@ Enables/Disables Dyanamic Lock. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1649,7 +1649,7 @@ List of plugins that the passive provider monitors to detect user absence. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1665,7 +1665,7 @@ List of plugins that the passive provider monitors to detect user absence. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -1688,7 +1688,7 @@ Security Key. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1704,7 +1704,7 @@ Security Key. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -1715,7 +1715,7 @@ Security Key. -Use security key for signin. 0 is disabled. 1 is enable. If you do not configure this policy setting, the default is disabled. +Use security key for signin. 0 is disabled. 1 is enable. If you don't configure this policy setting, the default is disabled. @@ -1728,7 +1728,7 @@ Enables users to sign in to their device with a [FIDO2 security key](/azure/acti | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1757,7 +1757,7 @@ Enables users to sign in to their device with a [FIDO2 security key](/azure/acti | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1772,7 +1772,7 @@ THIS NODE IS DEPRECATED AND WILL BE REMOVED IN A FUTURE VERSION. PLEASE USE Biom Windows Hello for Business enables users to use biometric gestures, such as face and fingerprints, as an alternative to the PIN gesture. However, users must still configure a PIN to use in case of failures. -- If you enable or do not configure this policy setting, Windows Hello for Business allows the use of biometric gestures. +- If you enable or don't configure this policy setting, Windows Hello for Business allows the use of biometric gestures. - If you disable this policy setting, Windows Hello for Business prevents the use of biometric gestures. @@ -1789,7 +1789,7 @@ Windows Hello for Business enables users to use biometric gestures, such as face | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | False | @@ -1815,7 +1815,7 @@ Windows Hello for Business enables users to use biometric gestures, such as face | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1826,7 +1826,7 @@ Windows Hello for Business enables users to use biometric gestures, such as face -This policy specifies the Tenant ID in the format of a Globally Unique Identifier (GUID) without curly braces ( { , } ), which will be used as part of Windows Hello for Business provisioning and management. +This policy specifies the Tenant ID in the format of a Globally Unique Identifier (GUID) without curly braces `{ }`, which will be used as part of Windows Hello for Business provisioning and management. @@ -1839,7 +1839,7 @@ To get the GUID, use the PowerShell cmdlet [Get-AzureAccount](/powershell/module | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | UniqueName: A globally unique identifier (GUID), without curly braces ( { , } ), that is used as part of Windows Hello for Business provisioning and management. To get a GUID, use the PowerShell cmdlet Get-AzureAccount. For more information see https://devblogs.microsoft.com/scripting/get-windows-azure-active-directory-tenant-id-in-windows-powershell. | @@ -1856,7 +1856,7 @@ To get the GUID, use the PowerShell cmdlet [Get-AzureAccount](/powershell/module | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1879,7 +1879,7 @@ Root node for policies. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | @@ -1895,7 +1895,7 @@ Root node for policies. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1910,7 +1910,7 @@ If the user forgets their PIN, it can be changed to a new PIN using the Windows - If you enable this policy setting, the PIN recovery secret will be stored on the device and the user will be able to change to a new PIN in case their PIN is forgotten. -- If you disable or do not configure this policy setting, the PIN recovery secret will not be created or stored. If the user's PIN is forgotten, the only way to get a new PIN is by deleting the existing PIN and creating a new one, which will require the user to re-register with any services the old PIN provided access to. +- If you disable or don't configure this policy setting, the PIN recovery secret won't be created or stored. If the user's PIN is forgotten, the only way to get a new PIN is by deleting the existing PIN and creating a new one, which will require the user to re-register with any services the old PIN provided access to. @@ -1922,7 +1922,7 @@ If the user forgets their PIN, it can be changed to a new PIN using the Windows | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | False | @@ -1948,7 +1948,7 @@ If the user forgets their PIN, it can be changed to a new PIN using the Windows | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1971,7 +1971,7 @@ Root node for PIN policies. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | @@ -1987,7 +1987,7 @@ Root node for PIN policies. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2000,11 +2000,11 @@ Root node for PIN policies. Use this policy setting to configure the use of digits in the Windows Hello for Business PIN. -A value of 1 corresponds to "Required." If you configure this policy setting to 1, Windows Hello for Business requires users to include at least one digit in their PIN. +A value of 1 corresponds to "Required". If you configure this policy setting to 1, Windows Hello for Business requires users to include at least one digit in their PIN. -A value of 2 corresponds to "Disallow." If you configure this policy setting to 2, Windows Hello for Business prevents users from using digits in their PIN. +A value of 2 corresponds to "Disallow". If you configure this policy setting to 2, Windows Hello for Business prevents users from using digits in their PIN. -- If you do not configure this policy setting, Windows Hello for Business requires users to use digits in their PIN. +If you don't configure this policy setting, Windows Hello for Business requires users to use digits in their PIN. @@ -2016,7 +2016,7 @@ A value of 2 corresponds to "Disallow." If you configure this policy setting to | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2043,7 +2043,7 @@ A value of 2 corresponds to "Disallow." If you configure this policy setting to | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2054,7 +2054,7 @@ A value of 2 corresponds to "Disallow." If you configure this policy setting to -This policy specifies when the PIN expires (in days). Valid values are 0 to 730 inclusive. If this policy is set to 0, then PINs do not expire. +This policy specifies when the PIN expires (in days). Valid values are 0 to 730 inclusive. If this policy is set to 0, then PINs don't expire. @@ -2066,7 +2066,7 @@ This policy specifies when the PIN expires (in days). Valid values are 0 to 730 | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-730]` | | Default Value | 0 | @@ -2084,7 +2084,7 @@ This policy specifies when the PIN expires (in days). Valid values are 0 to 730 | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2095,7 +2095,7 @@ This policy specifies when the PIN expires (in days). Valid values are 0 to 730 -This policy specifies the number of past PINs that can be stored in the history that can't be used. Valid values are 0 to 50 inclusive. If this policy is set to 0, then storage of previous PINs is not required. PIN history is not preserved through PIN reset. +This policy specifies the number of past PINs that can be stored in the history that can't be used. Valid values are 0 to 50 inclusive. If this policy is set to 0, then storage of previous PINs isn't required. PIN history isn't preserved through PIN reset. @@ -2107,7 +2107,7 @@ This policy specifies the number of past PINs that can be stored in the history | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-50]` | | Default Value | 0 | @@ -2125,7 +2125,7 @@ This policy specifies the number of past PINs that can be stored in the history | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2138,11 +2138,11 @@ This policy specifies the number of past PINs that can be stored in the history Use this policy setting to configure the use of lowercase letters in the Windows Hello for Business PIN. -A value of 1 corresponds to "Required." If you configure this policy setting to 1, Windows Hello for Business requires users to include at least one lowercase letter in their PIN. +A value of 1 corresponds to "Required". If you configure this policy setting to 1, Windows Hello for Business requires users to include at least one lowercase letter in their PIN. -A value of 2 corresponds to "Disallow." If you configure this policy setting to 2, Windows Hello for Business prevents users from using lowercase letters in their PIN. +A value of 2 corresponds to "Disallow". If you configure this policy setting to 2, Windows Hello for Business prevents users from using lowercase letters in their PIN. -- If you do not configure this policy setting, Windows Hello for Business does not allow users to use lowercase letters in their PIN. +If you don't configure this policy setting, Windows Hello for Business doesn't allow users to use lowercase letters in their PIN. @@ -2154,7 +2154,7 @@ A value of 2 corresponds to "Disallow." If you configure this policy setting to | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2181,7 +2181,7 @@ A value of 2 corresponds to "Disallow." If you configure this policy setting to | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2196,10 +2196,10 @@ Maximum PIN length configures the maximum number of characters allowed for the P - If you configure this policy setting, the PIN length must be less than or equal to this number. -- If you do not configure this policy setting, the PIN length must be less than or equal to 127. +- If you don't configure this policy setting, the PIN length must be less than or equal to 127. > [!NOTE] -> If the above specified conditions for the maximum PIN length are not met, default values will be used for both the maximum and minimum PIN lengths. +> If the above specified conditions for the maximum PIN length aren't met, default values will be used for both the maximum and minimum PIN lengths. @@ -2211,7 +2211,7 @@ Maximum PIN length configures the maximum number of characters allowed for the P | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[4-127]` | | Default Value | 127 | @@ -2229,7 +2229,7 @@ Maximum PIN length configures the maximum number of characters allowed for the P | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2244,10 +2244,10 @@ Minimum PIN length configures the minimum number of characters required for the - If you configure this policy setting, the PIN length must be greater than or equal to this number. -- If you do not configure this policy setting, the PIN length must be greater than or equal to 4. +- If you don't configure this policy setting, the PIN length must be greater than or equal to 4. > [!NOTE] -> If the above specified conditions for the minimum PIN length are not met, default values will be used for both the maximum and minimum PIN lengths. +> If the above specified conditions for the minimum PIN length aren't met, default values will be used for both the maximum and minimum PIN lengths. @@ -2259,7 +2259,7 @@ Minimum PIN length configures the minimum number of characters required for the | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[4-127]` | | Default Value | 4 | @@ -2277,7 +2277,7 @@ Minimum PIN length configures the minimum number of characters required for the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2290,11 +2290,11 @@ Minimum PIN length configures the minimum number of characters required for the Use this policy setting to configure the use of special characters in the Windows Hello for Business PIN gesture. Valid special characters for Windows Hello for Business PIN gestures include: ! " # $ % & ' ( ) * + , - . / : ; `< = >` ? @ [ \ ] ^ _ ` { | } ~ . -A value of 1 corresponds to "Required." If you configure this policy setting to 1, Windows Hello for Business requires users to include at least one special character in their PIN. +A value of 1 corresponds to "Required". If you configure this policy setting to 1, Windows Hello for Business requires users to include at least one special character in their PIN. -A value of 2 corresponds to "Disallow." If you configure this policy setting to 2, Windows Hello for Business prevents users from using special characters in their PIN. +A value of 2 corresponds to "Disallow". If you configure this policy setting to 2, Windows Hello for Business prevents users from using special characters in their PIN. -- If you do not configure this policy setting, Windows Hello for Business does not allow users to use special characters in their PIN. +If you don't configure this policy setting, Windows Hello for Business doesn't allow users to use special characters in their PIN. @@ -2306,7 +2306,7 @@ A value of 2 corresponds to "Disallow." If you configure this policy setting to | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2333,7 +2333,7 @@ A value of 2 corresponds to "Disallow." If you configure this policy setting to | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2346,11 +2346,11 @@ A value of 2 corresponds to "Disallow." If you configure this policy setting to Use this policy setting to configure the use of uppercase letters in the Windows Hello for Business PIN. -A value of 1 corresponds to "Required." If you configure this policy setting to 1, Windows Hello for Business requires users to include at least one uppercase letter in their PIN. +A value of 1 corresponds to "Required". If you configure this policy setting to 1, Windows Hello for Business requires users to include at least one uppercase letter in their PIN. -A value of 2 corresponds to "Disallow." If you configure this policy setting to 2, Windows Hello for Business prevents users from using uppercase letters in their PIN. +A value of 2 corresponds to "Disallow". If you configure this policy setting to 2, Windows Hello for Business prevents users from using uppercase letters in their PIN. -- If you do not configure this policy setting, Windows Hello for Business does not allow users to use uppercase letters in their PIN. +If you don't configure this policy setting, Windows Hello for Business doesn't allow users to use uppercase letters in their PIN. @@ -2362,7 +2362,7 @@ A value of 2 corresponds to "Disallow." If you configure this policy setting to | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2389,7 +2389,7 @@ A value of 2 corresponds to "Disallow." If you configure this policy setting to | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2400,11 +2400,11 @@ A value of 2 corresponds to "Disallow." If you configure this policy setting to -A Trusted Platform Module (TPM) provides additional security benefits over software because data stored within it cannot be used on other devices. +A Trusted Platform Module (TPM) provides additional security benefits over software because data stored within it can't be used on other devices. - If you enable this policy setting, only devices with a usable TPM provision Windows Hello for Business. -- If you disable or do not configure this policy setting, the TPM is still preferred, but all devices provision Windows Hello for Business using software if the TPM is non-functional or unavailable. +- If you disable or don't configure this policy setting, the TPM is still preferred, but all devices provision Windows Hello for Business using software if the TPM is non-functional or unavailable. @@ -2416,7 +2416,7 @@ A Trusted Platform Module (TPM) provides additional security benefits over softw | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | False | @@ -2442,7 +2442,7 @@ A Trusted Platform Module (TPM) provides additional security benefits over softw | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2455,9 +2455,9 @@ A Trusted Platform Module (TPM) provides additional security benefits over softw Windows Hello for Business is an alternative method for signing into Windows using your Active Directory or Azure Active Directory account that can replace passwords, Smart Cards, and Virtual Smart Cards. -- If you enable or do not configure this policy setting, the device provisions Windows Hello for Business for all users. +- If you enable or don't configure this policy setting, the device provisions Windows Hello for Business for all users. -- If you disable this policy setting, the device does not provision Windows Hello for Business for any user. +- If you disable this policy setting, the device doesn't provision Windows Hello for Business for any user. @@ -2469,7 +2469,7 @@ Windows Hello for Business is an alternative method for signing into Windows usi | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | True | diff --git a/windows/client-management/mdm/personaldataencryption-csp.md b/windows/client-management/mdm/personaldataencryption-csp.md index 9477520647..ad6900a0f4 100644 --- a/windows/client-management/mdm/personaldataencryption-csp.md +++ b/windows/client-management/mdm/personaldataencryption-csp.md @@ -4,7 +4,7 @@ description: Learn more about the PDE CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 04/14/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -36,7 +36,7 @@ The following list shows the PDE configuration service provider nodes: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ❌ Device
    ✅ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -60,7 +60,7 @@ The [UserDataProtectionManager Class](/uwp/api/windows.security.dataprotection.u | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -85,7 +85,7 @@ The [UserDataProtectionManager Class](/uwp/api/windows.security.dataprotection.u | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ❌ Device
    ✅ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -111,7 +111,7 @@ Reports the current status of Personal Data Encryption (PDE) for the user. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -127,7 +127,7 @@ Reports the current status of Personal Data Encryption (PDE) for the user. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ❌ Device
    ✅ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -150,7 +150,7 @@ This node reports the current state of Personal Data Encryption for a user. '0' | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | diff --git a/windows/client-management/mdm/personalization-csp.md b/windows/client-management/mdm/personalization-csp.md index 822238c6fa..13569098fc 100644 --- a/windows/client-management/mdm/personalization-csp.md +++ b/windows/client-management/mdm/personalization-csp.md @@ -4,7 +4,7 @@ description: Learn more about the Personalization CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 02/28/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -19,6 +19,9 @@ ms.topic: reference The Personalization CSP can set the lock screen and desktop background images. Setting these policies also prevents the user from changing the image. You can also use the Personalization settings in a provisioning package. + +> [!IMPORTANT] +> Personalization CSP is supported in Windows Enterprise and Education SKUs. It works in Windows Professional only when SetEduPolicies in [SharedPC CSP](sharedpc-csp.md) is set. @@ -37,7 +40,7 @@ The following list shows the Personalization configuration service provider node | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -60,7 +63,7 @@ This represents the status of the DesktopImage. 1 - Successfully downloaded or c | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -76,7 +79,7 @@ This represents the status of the DesktopImage. 1 - Successfully downloaded or c | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -99,7 +102,7 @@ A http or https Url to a jpg, jpeg or png image that needs to be downloaded and | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -115,7 +118,7 @@ A http or https Url to a jpg, jpeg or png image that needs to be downloaded and | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -138,7 +141,7 @@ This represents the status of the LockScreenImage. 1 - Successfully downloaded o | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -154,7 +157,7 @@ This represents the status of the LockScreenImage. 1 - Successfully downloaded o | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -177,7 +180,7 @@ A http or https Url to a jpg, jpeg or png image that neeeds to be downloaded and | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index 1fc1424bc4..47182cc12f 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -4,7 +4,7 @@ description: Learn more about the Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 05/01/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -25,23 +25,21 @@ The Policy configuration service provider has the following sub-categories: - Policy/Config/**AreaName** - Handles the policy configuration request from the server. - Policy/Result/**AreaName** - Provides a read-only path to policies enforced on the device. - +## Policy scope -> [!IMPORTANT] -> Policy scope is the level at which a policy can be configured. Some policies can only be configured at the device level, meaning the policy will take effect independent of who is logged into the device. Other policies can be configured at the user level, meaning the policy will only take effect for that user. -> -> The allowed scope of a specific policy is represented below its table of supported Windows editions. To configure a policy under a specific scope (user vs. device), please use the following paths: -> -> User scope: -> -> - **./User/Vendor/MSFT/Policy/Config/_AreaName/PolicyName_** to configure the policy. -> - **./User/Vendor/MSFT/Policy/Result/_AreaName/PolicyName_** to get the result. -> -> Device scope: -> -> - **./Device/Vendor/MSFT/Policy/Config/_AreaName/PolicyName_** to configure the policy. -> - **./Device/Vendor/MSFT/Policy/Result/_AreaName/PolicyName_** to get the result. -> +Policy scope is the level at which a policy can be configured. Some policies can only be configured at the device level, meaning the policy will take effect independent of who is logged into the device. Other policies can be configured at the user level, meaning the policy will only take effect for that user. To configure a policy under a specific scope (user vs. device), please use the following paths: + +**User scope**: + +- **./User/Vendor/MSFT/Policy/Config/_AreaName/PolicyName_** to configure the policy. +- **./User/Vendor/MSFT/Policy/Result/_AreaName/PolicyName_** to get the result. + +**Device scope**: + +- **./Device/Vendor/MSFT/Policy/Config/_AreaName/PolicyName_** to configure the policy. +- **./Device/Vendor/MSFT/Policy/Result/_AreaName/PolicyName_** to get the result. + +> [!NOTE] > For device wide configuration the **_Device/_** portion may be omitted from the path, deeming the following paths respectively equivalent to the paths provided above: > > - **./Vendor/MSFT/Policy/Config/_AreaName/PolicyName_** to configure the policy. @@ -82,7 +80,7 @@ The following list shows the Policy configuration service provider nodes: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -105,7 +103,7 @@ Node for grouping all policies configured by one source. The configuration sourc | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | @@ -121,7 +119,7 @@ Node for grouping all policies configured by one source. The configuration sourc | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -132,7 +130,7 @@ Node for grouping all policies configured by one source. The configuration sourc -The area group that can be configured by a single technology for a single provider. Once added, you cannot change the value. See the individual Area DDFs for Policy CSP for a list of Areas that can be configured. +The area group that can be configured by a single technology for a single provider. Once added, you can't change the value. See the individual Area DDFs for Policy CSP for a list of Areas that can be configured. @@ -144,7 +142,7 @@ The area group that can be configured by a single technology for a single provid | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | ClientInventory | @@ -161,7 +159,7 @@ The area group that can be configured by a single technology for a single provid | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -192,7 +190,7 @@ The following list shows some tips to help you when configuring policies: | Property name | Property value | |:--|:--| -| Format | null | +| Format | `null` | | Access Type | Add, Delete, Get, Replace | | Dynamic Node Naming | ClientInventory | @@ -209,7 +207,7 @@ The following list shows some tips to help you when configuring policies: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -232,7 +230,7 @@ The root node for grouping different configuration operations. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | @@ -248,7 +246,7 @@ The root node for grouping different configuration operations. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -259,7 +257,7 @@ The root node for grouping different configuration operations. -Allows settings for ADMX files for Win32 and Desktop Bridge apps to be imported (ingested) by your device and processed into new ADMX-backed policies or preferences. By using ADMXInstall, you can add ADMX-backed policies for those Win32 or Desktop Bridge apps that have been added between OS releases. ADMX-backed policies are ingested to your device by using the Policy CSP URI: ./Vendor/MSFT/Policy/ConfigOperations/ADMXInstall. Each ADMX-backed policy or preference that is added is assigned a unique ID. ADMX files that have been installed by using ConfigOperations/ADMXInstall can later be deleted by using the URI delete operation. Deleting an ADMX file will delete the ADMX file from disk, remove the metadata from the ADMXdefault registry hive, and delete all the policies that were set from the file. The MDM server can also delete all ADMX policies that are tied to a particular app by calling delete on the URI, ./Vendor/MSFT/Policy/ConfigOperations/ADMXInstall/{AppName}. +Allows settings for ADMX files for Win32 and Desktop Bridge apps to be imported (ingested) by your device and processed into new ADMX-backed policies or preferences. By using ADMXInstall, you can add ADMX-backed policies for those Win32 or Desktop Bridge apps that have been added between OS releases. ADMX-backed policies are ingested to your device by using the Policy CSP URI: ./Vendor/MSFT/Policy/ConfigOperations/ADMXInstall. Each ADMX-backed policy or preference that's added is assigned a unique ID. ADMX files that have been installed by using ConfigOperations/ADMXInstall can later be deleted by using the URI delete operation. Deleting an ADMX file will delete the ADMX file from disk, remove the metadata from the ADMXdefault registry hive, and delete all the policies that were set from the file. The MDM server can also delete all ADMX policies that are tied to a particular app by calling delete on the URI, ./Vendor/MSFT/Policy/ConfigOperations/ADMXInstall/{AppName}. @@ -275,7 +273,7 @@ Allows settings for ADMX files for Win32 and Desktop Bridge apps to be imported | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | @@ -291,7 +289,7 @@ Allows settings for ADMX files for Win32 and Desktop Bridge apps to be imported | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -314,7 +312,7 @@ Specifies the name of the Win32 or Desktop Bridge app associated with the ADMX f | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | UniqueName: Specifies the name of the Win32 or Desktop Bridge app associated with the ADMX file. | @@ -331,7 +329,7 @@ Specifies the name of the Win32 or Desktop Bridge app associated with the ADMX f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -354,7 +352,7 @@ Setting Type of Win32 App. Policy Or Preference. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | UniqueName: Setting Type of Win32 App. Policy Or Preference | @@ -371,7 +369,7 @@ Setting Type of Win32 App. Policy Or Preference. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -394,7 +392,7 @@ Unique ID of ADMX file. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Dynamic Node Naming | ServerGeneratedUniqueIdentifier | @@ -411,7 +409,7 @@ Unique ID of ADMX file. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299.1481] and later
    :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1099] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.832] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.387] and later
    :heavy_check_mark: Windows 10, version 1909 [10.0.18363] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299.1481] and later
    ✅ Windows 10, version 1803 [10.0.17134.1099] and later
    ✅ Windows 10, version 1809 [10.0.17763.832] and later
    ✅ Windows 10, version 1903 [10.0.18362.387] and later
    ✅ Windows 10, version 1909 [10.0.18363] and later | @@ -434,7 +432,7 @@ Properties of Win32 App ADMX Ingestion. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | @@ -450,7 +448,7 @@ Properties of Win32 App ADMX Ingestion. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299.1481] and later
    :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1099] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.832] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.387] and later
    :heavy_check_mark: Windows 10, version 1909 [10.0.18363] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299.1481] and later
    ✅ Windows 10, version 1803 [10.0.17134.1099] and later
    ✅ Windows 10, version 1809 [10.0.17763.832] and later
    ✅ Windows 10, version 1903 [10.0.18362.387] and later
    ✅ Windows 10, version 1909 [10.0.18363] and later | @@ -473,7 +471,7 @@ Setting Type of Win32 App. Policy Or Preference. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | UniqueName: Setting Type of Win32 App. Policy Or Preference | @@ -490,7 +488,7 @@ Setting Type of Win32 App. Policy Or Preference. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299.1481] and later
    :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1099] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.832] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.387] and later
    :heavy_check_mark: Windows 10, version 1909 [10.0.18363] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299.1481] and later
    ✅ Windows 10, version 1803 [10.0.17134.1099] and later
    ✅ Windows 10, version 1809 [10.0.17763.832] and later
    ✅ Windows 10, version 1903 [10.0.18362.387] and later
    ✅ Windows 10, version 1909 [10.0.18363] and later | @@ -513,7 +511,7 @@ Unique ID of ADMX file. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | ServerGeneratedUniqueIdentifier | @@ -530,7 +528,7 @@ Unique ID of ADMX file. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299.1481] and later
    :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1099] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.832] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.387] and later
    :heavy_check_mark: Windows 10, version 1909 [10.0.18363] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299.1481] and later
    ✅ Windows 10, version 1803 [10.0.17134.1099] and later
    ✅ Windows 10, version 1809 [10.0.17763.832] and later
    ✅ Windows 10, version 1903 [10.0.18362.387] and later
    ✅ Windows 10, version 1909 [10.0.18363] and later | @@ -553,7 +551,7 @@ Version of ADMX file. This can be set by the server to keep a record of the vers | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -569,7 +567,7 @@ Version of ADMX file. This can be set by the server to keep a record of the vers | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -592,7 +590,7 @@ Groups the evaluated policies from all providers that can be configured. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -608,7 +606,7 @@ Groups the evaluated policies from all providers that can be configured. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -631,7 +629,7 @@ The area group that can be configured by a single technology independent of the | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | | Dynamic Node Naming | ClientInventory | @@ -648,7 +646,7 @@ The area group that can be configured by a single technology independent of the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -671,7 +669,7 @@ Specifies the name/value pair used in the policy. See the individual Area DDFs f | Property name | Property value | |:--|:--| -| Format | null | +| Format | `null` | | Access Type | Get | | Dynamic Node Naming | ClientInventory | @@ -688,7 +686,7 @@ Specifies the name/value pair used in the policy. See the individual Area DDFs f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | | +| ✅ Device
    ✅ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | | @@ -711,7 +709,7 @@ Node for grouping all policies configured by one source. The configuration sourc | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | @@ -727,7 +725,7 @@ Node for grouping all policies configured by one source. The configuration sourc | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | | +| ✅ Device
    ✅ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | | @@ -738,7 +736,7 @@ Node for grouping all policies configured by one source. The configuration sourc -The area group that can be configured by a single technology for a single provider. Once added, you cannot change the value. See the individual Area DDFs for Policy CSP for a list of Areas that can be configured. +The area group that can be configured by a single technology for a single provider. Once added, you can't change the value. See the individual Area DDFs for Policy CSP for a list of Areas that can be configured. @@ -758,7 +756,7 @@ The following list shows some tips to help you when configuring policies: | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | ClientInventory | @@ -775,7 +773,7 @@ The following list shows some tips to help you when configuring policies: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | | +| ✅ Device
    ✅ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | | @@ -798,7 +796,7 @@ Specifies the name/value pair used in the policy. See the individual Area DDFs f | Property name | Property value | |:--|:--| -| Format | null | +| Format | `null` | | Access Type | Add, Delete, Get, Replace | | Dynamic Node Naming | ClientInventory | @@ -815,7 +813,7 @@ Specifies the name/value pair used in the policy. See the individual Area DDFs f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | | +| ✅ Device
    ✅ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | | @@ -838,7 +836,7 @@ Groups the evaluated policies from all providers that can be configured. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -854,7 +852,7 @@ Groups the evaluated policies from all providers that can be configured. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | | +| ✅ Device
    ✅ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | | @@ -877,7 +875,7 @@ The area group that can be configured by a single technology independent of the | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | | Dynamic Node Naming | ClientInventory | @@ -894,7 +892,7 @@ The area group that can be configured by a single technology independent of the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | | +| ✅ Device
    ✅ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | | @@ -917,7 +915,7 @@ Specifies the name/value pair used in the policy. See the individual Area DDFs f | Property name | Property value | |:--|:--| -| Format | null | +| Format | `null` | | Access Type | Get | | Dynamic Node Naming | ServerGeneratedUniqueIdentifier | diff --git a/windows/client-management/mdm/policy-csp-abovelock.md b/windows/client-management/mdm/policy-csp-abovelock.md index f6ee903aef..06983bfbba 100644 --- a/windows/client-management/mdm/policy-csp-abovelock.md +++ b/windows/client-management/mdm/policy-csp-abovelock.md @@ -4,7 +4,7 @@ description: Learn more about the AboveLock Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -29,7 +29,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -52,7 +52,7 @@ This policy is deprecated. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -78,7 +78,7 @@ This policy is deprecated. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -105,7 +105,7 @@ This policy setting determines whether or not the user can interact with Cortana | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -145,7 +145,7 @@ This policy setting determines whether or not the user can interact with Cortana | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -168,7 +168,7 @@ Specifies whether to allow toast notifications above the device lock screen. Mos | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | diff --git a/windows/client-management/mdm/policy-csp-accounts.md b/windows/client-management/mdm/policy-csp-accounts.md index a9ee824925..fb9305bfb2 100644 --- a/windows/client-management/mdm/policy-csp-accounts.md +++ b/windows/client-management/mdm/policy-csp-accounts.md @@ -4,7 +4,7 @@ description: Learn more about the Accounts Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -52,7 +52,7 @@ Specifies whether user is allowed to add non-MSA email accounts. Most restricted | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -78,7 +78,7 @@ Specifies whether user is allowed to add non-MSA email accounts. Most restricted | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -101,7 +101,7 @@ Specifies whether the user is allowed to use an MSA account for non-email relate | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -127,7 +127,7 @@ Specifies whether the user is allowed to use an MSA account for non-email relate | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -141,10 +141,10 @@ Specifies whether the user is allowed to use an MSA account for non-email relate Allows IT Admins the ability to disable the Microsoft Account Sign-In Assistant (wlidsvc) NT service. > [!NOTE] -> If the MSA service is disabled, Windows Update will no longer offer feature updates to devices running Windows 10 1709 or higher. See Feature updates are not being offered while other updates are. +> If the MSA service is disabled, Windows Update will no longer offer feature updates to devices running Windows 10 1709 or higher. See Feature updates aren't being offered while other updates are. > [!NOTE] -> If the MSA service is disabled, the Subscription Activation feature will not work properly and your users will not be able to "step-up" from Windows 10 Pro to Windows 10 Enterprise, because the MSA ticket for license authentication cannot be generated. The machine will remain on Windows 10 Pro and no error will be displayed in the Activation Settings app. +> If the MSA service is disabled, the Subscription Activation feature won't work properly and your users won't be able to "step-up" from Windows 10 Pro to Windows 10 Enterprise, because the MSA ticket for license authentication can't be generated. The machine will remain on Windows 10 Pro and no error will be displayed in the Activation Settings app. @@ -156,7 +156,7 @@ Allows IT Admins the ability to disable the Microsoft Account Sign-In Assistant | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -182,7 +182,7 @@ Allows IT Admins the ability to disable the Microsoft Account Sign-In Assistant | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -204,7 +204,7 @@ Allows IT Admins the ability to disable the Microsoft Account Sign-In Assistant | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -220,7 +220,7 @@ Allows IT Admins the ability to disable the Microsoft Account Sign-In Assistant | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -244,7 +244,7 @@ Most restricted value is 1. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -254,7 +254,7 @@ Most restricted value is 1. | Value | Description | |:--|:--| -| 0 (Default) | Allow both device and user authentication. Do not block user authentication. | +| 0 (Default) | Allow both device and user authentication. Don't block user authentication. | | 1 | Only allow device authentication. Block user authentication. | diff --git a/windows/client-management/mdm/policy-csp-activexcontrols.md b/windows/client-management/mdm/policy-csp-activexcontrols.md index 6432707d70..f392d1166b 100644 --- a/windows/client-management/mdm/policy-csp-activexcontrols.md +++ b/windows/client-management/mdm/policy-csp-activexcontrols.md @@ -4,7 +4,7 @@ description: Learn more about the ActiveXControls Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ActiveXControls -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -46,10 +43,10 @@ This policy setting determines which ActiveX installation sites standard users i - If you enable this setting, the administrator can create a list of approved ActiveX Install sites specified by host URL. -- If you disable or do not configure this policy setting, ActiveX controls prompt the user for administrative credentials before installation. +- If you disable or don't configure this policy setting, ActiveX controls prompt the user for administrative credentials before installation. > [!NOTE] -> Wild card characters cannot be used when specifying the host URLs. +> Wild card characters can't be used when specifying the host URLs. @@ -61,13 +58,12 @@ This policy setting determines which ActiveX installation sites standard users i | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-activexinstallservice.md b/windows/client-management/mdm/policy-csp-admx-activexinstallservice.md index ad05a61b1f..bfdb343427 100644 --- a/windows/client-management/mdm/policy-csp-admx-activexinstallservice.md +++ b/windows/client-management/mdm/policy-csp-admx-activexinstallservice.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_ActiveXInstallService Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_ActiveXInstallService -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,7 +43,7 @@ This policy setting controls the installation of ActiveX controls for sites in T - If you enable this policy setting, ActiveX controls are installed according to the settings defined by this policy setting. -- If you disable or do not configure this policy setting, ActiveX controls prompt the user before installation. +- If you disable or don't configure this policy setting, ActiveX controls prompt the user before installation. If the trusted site uses the HTTPS protocol, this policy setting can also control how ActiveX Installer Service responds to certificate errors. By default all HTTPS connections must supply a server certificate that passes all validation criteria. If you are aware that a trusted site has a certificate error but you want to trust it anyway you can select the certificate errors that you want to ignore. @@ -63,13 +60,12 @@ If the trusted site uses the HTTPS protocol, this policy setting can also contro | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-addremoveprograms.md b/windows/client-management/mdm/policy-csp-admx-addremoveprograms.md index d1170a124f..285f7a332a 100644 --- a/windows/client-management/mdm/policy-csp-admx-addremoveprograms.md +++ b/windows/client-management/mdm/policy-csp-admx-addremoveprograms.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_AddRemovePrograms Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_AddRemovePrograms -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,11 +43,11 @@ Specifies the category of programs that appears when users open the "Add New Pro - If you enable this setting, only the programs in the category you specify are displayed when the "Add New Programs" page opens. Users can use the Category box on the "Add New Programs" page to display programs in other categories. -To use this setting, type the name of a category in the Category box for this setting. You must enter a category that is already defined in Add or Remove Programs. To define a category, use Software Installation. +To use this setting, type the name of a category in the Category box for this setting. You must enter a category that's already defined in Add or Remove Programs. To define a category, use Software Installation. -- If you disable this setting or do not configure it, all programs (Category: All) are displayed when the "Add New Programs" page opens. +- If you disable this setting or don't configure it, all programs (Category: All) are displayed when the "Add New Programs" page opens. -You can use this setting to direct users to the programs they are most likely to need. +You can use this setting to direct users to the programs they're most likely to need. > [!NOTE] > This setting is ignored if either the "Remove Add or Remove Programs" setting or the "Hide Add New Programs page" setting is enabled. @@ -65,13 +62,12 @@ You can use this setting to direct users to the programs they are most likely to | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -97,7 +93,7 @@ You can use this setting to direct users to the programs they are most likely to | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -110,12 +106,12 @@ You can use this setting to direct users to the programs they are most likely to Removes the "Add a program from CD-ROM or floppy disk" section from the Add New Programs page. This prevents users from using Add or Remove Programs to install programs from removable media. -If you disable this setting or do not configure it, the "Add a program from CD-ROM or floppy disk" option is available to all users. +If you disable this setting or don't configure it, the "Add a program from CD-ROM or floppy disk" option is available to all users. -This setting does not prevent users from using other tools and methods to add or remove program components. +This setting doesn't prevent users from using other tools and methods to add or remove program components. > [!NOTE] -> If the "Hide Add New Programs page" setting is enabled, this setting is ignored. Also, if the "Prevent removable media source for any install" setting (located in User Configuration\Administrative Templates\Windows Components\Windows Installer) is enabled, users cannot add programs from removable media, regardless of this setting. +> If the "Hide Add New Programs page" setting is enabled, this setting is ignored. Also, if the "Prevent removable media source for any install" setting (located in User Configuration\Administrative Templates\Windows Components\Windows Installer) is enabled, users can't add programs from removable media, regardless of this setting. @@ -127,13 +123,12 @@ This setting does not prevent users from using other tools and methods to add or | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -160,7 +155,7 @@ This setting does not prevent users from using other tools and methods to add or | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -173,9 +168,9 @@ This setting does not prevent users from using other tools and methods to add or Removes the "Add programs from Microsoft" section from the Add New Programs page. This setting prevents users from using Add or Remove Programs to connect to Windows Update. -If you disable this setting or do not configure it, "Add programs from Microsoft" is available to all users. +If you disable this setting or don't configure it, "Add programs from Microsoft" is available to all users. -This setting does not prevent users from using other tools and methods to connect to Windows Update. +This setting doesn't prevent users from using other tools and methods to connect to Windows Update. > [!NOTE] > If the "Hide Add New Programs page" setting is enabled, this setting is ignored. @@ -190,13 +185,12 @@ This setting does not prevent users from using other tools and methods to connec | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -223,7 +217,7 @@ This setting does not prevent users from using other tools and methods to connec | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -240,9 +234,9 @@ This setting removes the "Add programs from your network" section from the Add N Published programs are those programs that the system administrator has explicitly made available to the user with a tool such as Windows Installer. Typically, system administrators publish programs to notify users that the programs are available, to recommend their use, or to enable users to install them without having to search for installation files. -- If you enable this setting, users cannot tell which programs have been published by the system administrator, and they cannot use Add or Remove Programs to install published programs. However, they can still install programs by using other methods, and they can view and install assigned (partially installed) programs that are offered on the desktop or on the Start menu. +- If you enable this setting, users can't tell which programs have been published by the system administrator, and they can't use Add or Remove Programs to install published programs. However, they can still install programs by using other methods, and they can view and install assigned (partially installed) programs that are offered on the desktop or on the Start menu. -- If you disable this setting or do not configure it, "Add programs from your network" is available to all users. +- If you disable this setting or don't configure it, "Add programs from your network" is available to all users. > [!NOTE] > If the "Hide Add New Programs page" setting is enabled, this setting is ignored. @@ -257,13 +251,12 @@ Published programs are those programs that the system administrator has explicit | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -290,7 +283,7 @@ Published programs are those programs that the system administrator has explicit | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -301,13 +294,13 @@ Published programs are those programs that the system administrator has explicit -Removes the Add New Programs button from the Add or Remove Programs bar. As a result, users cannot view or change the attached page. +Removes the Add New Programs button from the Add or Remove Programs bar. As a result, users can't view or change the attached page. The Add New Programs button lets users install programs published or assigned by a system administrator. -If you disable this setting or do not configure it, the Add New Programs button is available to all users. +If you disable this setting or don't configure it, the Add New Programs button is available to all users. -This setting does not prevent users from using other tools and methods to install programs. +This setting doesn't prevent users from using other tools and methods to install programs. @@ -319,13 +312,12 @@ This setting does not prevent users from using other tools and methods to instal | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -352,7 +344,7 @@ This setting does not prevent users from using other tools and methods to instal | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -369,11 +361,11 @@ This setting removes Add or Remove Programs from Control Panel and removes the A Add or Remove Programs lets users install, uninstall, repair, add, and remove features and components of Windows 2000 Professional and a wide variety of Windows programs. Programs published or assigned to the user appear in Add or Remove Programs. -If you disable this setting or do not configure it, Add or Remove Programs is available to all users. +If you disable this setting or don't configure it, Add or Remove Programs is available to all users. When enabled, this setting takes precedence over the other settings in this folder. -This setting does not prevent users from using other tools and methods to install or uninstall programs. +This setting doesn't prevent users from using other tools and methods to install or uninstall programs. @@ -385,13 +377,12 @@ This setting does not prevent users from using other tools and methods to instal | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -418,7 +409,7 @@ This setting does not prevent users from using other tools and methods to instal | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -429,15 +420,15 @@ This setting does not prevent users from using other tools and methods to instal -Removes the Set Program Access and Defaults button from the Add or Remove Programs bar. As a result, users cannot view or change the associated page. +Removes the Set Program Access and Defaults button from the Add or Remove Programs bar. As a result, users can't view or change the associated page. The Set Program Access and Defaults button lets administrators specify default programs for certain activities, such as Web browsing or sending e-mail, as well as which programs are accessible from the Start menu, desktop, and other locations. -If you disable this setting or do not configure it, the Set Program Access and Defaults button is available to all users. +If you disable this setting or don't configure it, the Set Program Access and Defaults button is available to all users. -This setting does not prevent users from using other tools and methods to change program access or defaults. +This setting doesn't prevent users from using other tools and methods to change program access or defaults. -This setting does not prevent the Set Program Access and Defaults icon from appearing on the Start menu. See the "Remove Set Program Access and Defaults from Start menu" setting. +This setting doesn't prevent the Set Program Access and Defaults icon from appearing on the Start menu. See the "Remove Set Program Access and Defaults from Start menu" setting. @@ -449,13 +440,12 @@ This setting does not prevent the Set Program Access and Defaults icon from appe | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -482,7 +472,7 @@ This setting does not prevent the Set Program Access and Defaults icon from appe | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -493,13 +483,13 @@ This setting does not prevent the Set Program Access and Defaults icon from appe -Removes the Change or Remove Programs button from the Add or Remove Programs bar. As a result, users cannot view or change the attached page. +Removes the Change or Remove Programs button from the Add or Remove Programs bar. As a result, users can't view or change the attached page. The Change or Remove Programs button lets users uninstall, repair, add, or remove features of installed programs. -If you disable this setting or do not configure it, the Change or Remove Programs page is available to all users. +If you disable this setting or don't configure it, the Change or Remove Programs page is available to all users. -This setting does not prevent users from using other tools and methods to delete or uninstall programs. +This setting doesn't prevent users from using other tools and methods to delete or uninstall programs. @@ -511,13 +501,12 @@ This setting does not prevent users from using other tools and methods to delete | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -544,7 +533,7 @@ This setting does not prevent users from using other tools and methods to delete | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -557,16 +546,16 @@ This setting does not prevent users from using other tools and methods to delete Prevents users from using Add or Remove Programs to configure installed services. -This setting removes the "Set up services" section of the Add/Remove Windows Components page. The "Set up services" section lists system services that have not been configured and offers users easy access to the configuration tools. +This setting removes the "Set up services" section of the Add/Remove Windows Components page. The "Set up services" section lists system services that haven't been configured and offers users easy access to the configuration tools. -- If you disable this setting or do not configure it, "Set up services" appears only when there are unconfigured system services. +- If you disable this setting or don't configure it, "Set up services" appears only when there are unconfigured system services. - If you enable this setting, "Set up services" never appears. -This setting does not prevent users from using other methods to configure services. +This setting doesn't prevent users from using other methods to configure services. > [!NOTE] -> When "Set up services" does not appear, clicking the Add/Remove Windows Components button starts the Windows Component Wizard immediately. Because the only remaining option on the Add/Remove Windows Components page starts the wizard, that option is selected automatically, and the page is bypassed. +> When "Set up services" doesn't appear, clicking the Add/Remove Windows Components button starts the Windows Component Wizard immediately. Because the only remaining option on the Add/Remove Windows Components page starts the wizard, that option is selected automatically, and the page is bypassed. To remove "Set up services" and prevent the Windows Component Wizard from starting, enable the "Hide Add/Remove Windows Components page" setting. If the "Hide Add/Remove Windows Components page" setting is enabled, this setting is ignored. @@ -580,13 +569,12 @@ To remove "Set up services" and prevent the Windows Component Wizard from starti | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -613,7 +601,7 @@ To remove "Set up services" and prevent the Windows Component Wizard from starti | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -628,7 +616,7 @@ Removes links to the Support Info dialog box from programs on the Change or Remo Programs listed on the Change or Remove Programs page can include a "Click here for support information" hyperlink. When clicked, the hyperlink opens a dialog box that displays troubleshooting information, including a link to the installation files and data that users need to obtain product support, such as the Product ID and version number of the program. The dialog box also includes a hyperlink to support information on the Internet, such as the Microsoft Product Support Services Web page. -If you disable this setting or do not configure it, the Support Info hyperlink appears. +If you disable this setting or don't configure it, the Support Info hyperlink appears. > [!NOTE] > Not all programs provide a support information hyperlink. @@ -643,13 +631,12 @@ If you disable this setting or do not configure it, the Support Info hyperlink a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -676,7 +663,7 @@ If you disable this setting or do not configure it, the Support Info hyperlink a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -687,13 +674,13 @@ If you disable this setting or do not configure it, the Support Info hyperlink a -Removes the Add/Remove Windows Components button from the Add or Remove Programs bar. As a result, users cannot view or change the associated page. +Removes the Add/Remove Windows Components button from the Add or Remove Programs bar. As a result, users can't view or change the associated page. The Add/Remove Windows Components button lets users configure installed services and use the Windows Component Wizard to add, remove, and configure components of Windows from the installation files. -If you disable this setting or do not configure it, the Add/Remove Windows Components button is available to all users. +If you disable this setting or don't configure it, the Add/Remove Windows Components button is available to all users. -This setting does not prevent users from using other tools and methods to configure services or add or remove program components. However, this setting blocks user access to the Windows Component Wizard. +This setting doesn't prevent users from using other tools and methods to configure services or add or remove program components. However, this setting blocks user access to the Windows Component Wizard. @@ -705,13 +692,12 @@ This setting does not prevent users from using other tools and methods to config | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-admpwd.md b/windows/client-management/mdm/policy-csp-admx-admpwd.md index 747cb54e0e..8a92c2eff6 100644 --- a/windows/client-management/mdm/policy-csp-admx-admpwd.md +++ b/windows/client-management/mdm/policy-csp-admx-admpwd.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_AdmPwd Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_AdmPwd -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -56,14 +53,13 @@ If you disable or not configure this setting, local administrator password is NO | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -85,7 +81,7 @@ If you disable or not configure this setting, local administrator password is NO | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -110,14 +106,13 @@ When you disable or don't configure this setting, password expiration time may b | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -139,7 +134,7 @@ When you disable or don't configure this setting, password expiration time may b | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -164,14 +159,13 @@ When you disable or don't configure this setting, password expiration time may b | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -193,7 +187,7 @@ When you disable or don't configure this setting, password expiration time may b | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -220,14 +214,13 @@ If you disable or not configure this setting, local administrator password is NO | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-appcompat.md b/windows/client-management/mdm/policy-csp-admx-appcompat.md index d864def13f..d110cff6bc 100644 --- a/windows/client-management/mdm/policy-csp-admx-appcompat.md +++ b/windows/client-management/mdm/policy-csp-admx-appcompat.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_AppCompat Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_AppCompat -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,7 +43,7 @@ Specifies whether to prevent the MS-DOS subsystem (ntvdm.exe) from running on th You can use this setting to turn off the MS-DOS subsystem, which will reduce resource usage and prevent users from running 16-bit applications. To run any 16-bit application or any application with 16-bit components, ntvdm.exe must be allowed to run. The MS-DOS subsystem starts when the first 16-bit application is launched. While the MS-DOS subsystem is running, any subsequent 16-bit applications launch faster, but overall resource usage on the system is increased. -If the status is set to Enabled, the MS-DOS subsystem is prevented from running, which then prevents any 16-bit applications from running. In addition, any 32-bit applications with 16-bit installers or other 16-bit components cannot run. +If the status is set to Enabled, the MS-DOS subsystem is prevented from running, which then prevents any 16-bit applications from running. In addition, any 32-bit applications with 16-bit installers or other 16-bit components can't run. If the status is set to Disabled, the MS-DOS subsystem runs for all users on this computer. @@ -65,13 +62,12 @@ If the status is set to Not Configured, the OS falls back on a local policy set | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -98,7 +94,7 @@ If the status is set to Not Configured, the OS falls back on a local policy set | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -111,7 +107,7 @@ If the status is set to Not Configured, the OS falls back on a local policy set This policy controls the visibility of the Program Compatibility property page shell extension. This shell extension is visible on the property context-menu of any program shortcut or executable file. -The compatibility property page displays a list of options that can be selected and applied to the application to resolve the most common issues affecting legacy applications. Enabling this policy setting removes the property page from the context-menus, but does not affect previous compatibility settings applied to application using this interface. +The compatibility property page displays a list of options that can be selected and applied to the application to resolve the most common issues affecting legacy applications. Enabling this policy setting removes the property page from the context-menus, but doesn't affect previous compatibility settings applied to application using this interface. @@ -123,13 +119,12 @@ The compatibility property page displays a list of options that can be selected | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -156,7 +151,7 @@ The compatibility property page displays a list of options that can be selected | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -187,13 +182,12 @@ Disabling telemetry will take effect on any newly launched applications. To ensu | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -220,7 +214,7 @@ Disabling telemetry will take effect on any newly launched applications. To ensu | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -235,11 +229,11 @@ This policy controls the state of the application compatibility engine in the sy The engine is part of the loader and looks through a compatibility database every time an application is started on the system. If a match for the application is found it provides either run-time solutions or compatibility fixes, or displays an Application Help message if the application has a know problem. -Turning off the application compatibility engine will boost system performance. However, this will degrade the compatibility of many popular legacy applications, and will not block known incompatible applications from installing. (For Instance: This may result in a blue screen if an old anti-virus application is installed.) +Turning off the application compatibility engine will boost system performance. However, this will degrade the compatibility of many popular legacy applications, and won't block known incompatible applications from installing. (For Instance: This may result in a blue screen if an old anti-virus application is installed). -The Windows Resource Protection and User Account Control features of Windows use the application compatibility engine to provide mitigations for application problems. If the engine is turned off, these mitigations will not be applied to applications and their installers and these applications may fail to install or run properly. +The Windows Resource Protection and User Account Control features of Windows use the application compatibility engine to provide mitigations for application problems. If the engine is turned off, these mitigations won't be applied to applications and their installers and these applications may fail to install or run properly. -This option is useful to server administrators who require faster performance and are aware of the compatibility of the applications they are using. It is particularly useful for a web server where applications may be launched several hundred times a second, and the performance of the loader is essential. +This option is useful to server administrators who require faster performance and are aware of the compatibility of the applications they're using. It's particularly useful for a web server where applications may be launched several hundred times a second, and the performance of the loader is essential. > [!NOTE] > Many system processes cache the value of this setting for performance reasons. If you make changes to this setting, please reboot to ensure that your system accurately reflects those changes. @@ -254,13 +248,12 @@ This option is useful to server administrators who require faster performance an | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -287,7 +280,7 @@ This option is useful to server administrators who require faster performance an | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -298,7 +291,7 @@ This option is useful to server administrators who require faster performance an -This setting exists only for backward compatibility, and is not valid for this version of Windows. To configure the Program Compatibility Assistant, use the 'Turn off Program Compatibility Assistant' setting under Computer Configuration\Administrative Templates\Windows Components\Application Compatibility. +This setting exists only for backward compatibility, and isn't valid for this version of Windows. To configure the Program Compatibility Assistant, use the 'Turn off Program Compatibility Assistant' setting under Computer Configuration\Administrative Templates\Windows Components\Application Compatibility. @@ -310,13 +303,12 @@ This setting exists only for backward compatibility, and is not valid for this v | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -343,7 +335,7 @@ This setting exists only for backward compatibility, and is not valid for this v | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -358,9 +350,9 @@ This policy setting controls the state of the Program Compatibility Assistant (P The PCA monitors applications run by the user. When a potential compatibility issue with an application is detected, the PCA will prompt the user with recommended solutions. To configure the diagnostic settings for the PCA, go to System->Troubleshooting and Diagnostics->Application Compatibility Diagnostics. -- If you enable this policy setting, the PCA will be turned off. The user will not be presented with solutions to known compatibility issues when running applications. Turning off the PCA can be useful for system administrators who require better performance and are already aware of application compatibility issues. +- If you enable this policy setting, the PCA will be turned off. The user won't be presented with solutions to known compatibility issues when running applications. Turning off the PCA can be useful for system administrators who require better performance and are already aware of application compatibility issues. -- If you disable or do not configure this policy setting, the PCA will be turned on. To configure the diagnostic settings for the PCA, go to System->Troubleshooting and Diagnostics->Application Compatibility Diagnostics. +- If you disable or don't configure this policy setting, the PCA will be turned on. To configure the diagnostic settings for the PCA, go to System->Troubleshooting and Diagnostics->Application Compatibility Diagnostics. > [!NOTE] > The Diagnostic Policy Service (DPS) and Program Compatibility Assistant Service must be running for the PCA to run. These services can be configured by using the Services snap-in to the Microsoft Management Console. @@ -375,13 +367,12 @@ The PCA monitors applications run by the user. When a potential compatibility is | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -408,7 +399,7 @@ The PCA monitors applications run by the user. When a potential compatibility is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -423,9 +414,9 @@ This policy setting controls the state of the Inventory Collector. The Inventory Collector inventories applications, files, devices, and drivers on the system and sends the information to Microsoft. This information is used to help diagnose compatibility problems. -- If you enable this policy setting, the Inventory Collector will be turned off and data will not be sent to Microsoft. Collection of installation data through the Program Compatibility Assistant is also disabled. +- If you enable this policy setting, the Inventory Collector will be turned off and data won't be sent to Microsoft. Collection of installation data through the Program Compatibility Assistant is also disabled. -- If you disable or do not configure this policy setting, the Inventory Collector will be turned on. +- If you disable or don't configure this policy setting, the Inventory Collector will be turned on. > [!NOTE] > This policy setting has no effect if the Customer Experience Improvement Program is turned off. The Inventory Collector will be off. @@ -440,13 +431,12 @@ The Inventory Collector inventories applications, files, devices, and drivers on | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -473,7 +463,7 @@ The Inventory Collector inventories applications, files, devices, and drivers on | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -490,9 +480,9 @@ Switchback is a mechanism that provides generic compatibility mitigations to old Switchback is on by default. -- If you enable this policy setting, Switchback will be turned off. Turning Switchback off may degrade the compatibility of older applications. This option is useful for server administrators who require performance and are aware of compatibility of the applications they are using. +- If you enable this policy setting, Switchback will be turned off. Turning Switchback off may degrade the compatibility of older applications. This option is useful for server administrators who require performance and are aware of compatibility of the applications they're using. -- If you disable or do not configure this policy setting, the Switchback will be turned on. +- If you disable or don't configure this policy setting, the Switchback will be turned on. Please reboot the system after changing the setting to ensure that your system accurately reflects those changes. @@ -506,13 +496,12 @@ Please reboot the system after changing the setting to ensure that your system a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -539,7 +528,7 @@ Please reboot the system after changing the setting to ensure that your system a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -556,7 +545,7 @@ Steps Recorder keeps a record of steps taken by the user. The data generated by - If you enable this policy setting, Steps Recorder will be disabled. -- If you disable or do not configure this policy setting, Steps Recorder will be enabled. +- If you disable or don't configure this policy setting, Steps Recorder will be enabled. @@ -568,13 +557,12 @@ Steps Recorder keeps a record of steps taken by the user. The data generated by | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-appxpackagemanager.md b/windows/client-management/mdm/policy-csp-admx-appxpackagemanager.md index fb99a07c57..7471be691a 100644 --- a/windows/client-management/mdm/policy-csp-admx-appxpackagemanager.md +++ b/windows/client-management/mdm/policy-csp-admx-appxpackagemanager.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_AppxPackageManager Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_AppxPackageManager -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,17 +41,17 @@ ms.topic: reference This policy setting allows you to manage the deployment of Windows Store apps when the user is signed in using a special profile. Special profiles are the following user profiles, where changes are discarded after the user signs off: -Roaming user profiles to which the "Delete cached copies of roaming profiles" Group Policy setting applies +Roaming user profiles to which the "Delete cached copies of roaming profiles" Group Policy setting applies. -Mandatory user profiles and super-mandatory profiles, which are created by an administrator +Mandatory user profiles and super-mandatory profiles, which are created by an administrator. -Temporary user profiles, which are created when an error prevents the correct profile from loading +Temporary user profiles, which are created when an error prevents the correct profile from loading. -User profiles for the Guest account and members of the Guests group +User profiles for the Guest account and members of the Guests group. - If you enable this policy setting, Group Policy allows deployment operations (adding, registering, staging, updating, or removing an app package) of Windows Store apps when using a special profile. -- If you disable or do not configure this policy setting, Group Policy blocks deployment operations of Windows Store apps when using a special profile. +- If you disable or don't configure this policy setting, Group Policy blocks deployment operations of Windows Store apps when using a special profile. @@ -66,13 +63,12 @@ User profiles for the Guest account and members of the Guests group | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-appxruntime.md b/windows/client-management/mdm/policy-csp-admx-appxruntime.md index b440390a21..a2a5bd54c3 100644 --- a/windows/client-management/mdm/policy-csp-admx-appxruntime.md +++ b/windows/client-management/mdm/policy-csp-admx-appxruntime.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_AppXRuntime Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/12/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_AppXRuntime -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -58,13 +55,12 @@ This policy setting lets you turn on Content URI Rules to supplement the static | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -91,7 +87,7 @@ This policy setting lets you turn on Content URI Rules to supplement the static | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -108,9 +104,9 @@ This policy setting lets you turn on Content URI Rules to supplement the static This policy setting lets you control whether Windows Store apps can open files using the default desktop app for a file type. Because desktop apps run at a higher integrity level than Windows Store apps, there is a risk that a Windows Store app might compromise the system by opening a file in the default desktop app for a file type. -- If you enable this policy setting, Windows Store apps cannot open files in the default desktop app for a file type; they can open files only in other Windows Store apps. +- If you enable this policy setting, Windows Store apps can't open files in the default desktop app for a file type; they can open files only in other Windows Store apps. -- If you disable or do not configure this policy setting, Windows Store apps can open files in the default desktop app for a file type. +- If you disable or don't configure this policy setting, Windows Store apps can open files in the default desktop app for a file type. @@ -122,13 +118,12 @@ This policy setting lets you control whether Windows Store apps can open files u | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -155,7 +150,7 @@ This policy setting lets you control whether Windows Store apps can open files u | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -168,11 +163,11 @@ This policy setting lets you control whether Windows Store apps can open files u This policy setting controls whether Universal Windows apps with Windows Runtime API access directly from web content can be launched. -- If you enable this policy setting, Universal Windows apps which declare Windows Runtime API access in ApplicationContentUriRules section of the manifest cannot be launched; Universal Windows apps which have not declared Windows Runtime API access in the manifest are not affected. +- If you enable this policy setting, Universal Windows apps which declare Windows Runtime API access in ApplicationContentUriRules section of the manifest can't be launched; Universal Windows apps which haven't declared Windows Runtime API access in the manifest aren't affected. -- If you disable or do not configure this policy setting, all Universal Windows apps can be launched. +- If you disable or don't configure this policy setting, all Universal Windows apps can be launched. -This policy should not be enabled unless recommended by Microsoft as a security response because it can cause severe app compatibility issues. +This policy shouldn't be enabled unless recommended by Microsoft as a security response because it can cause severe app compatibility issues. @@ -184,13 +179,12 @@ This policy should not be enabled unless recommended by Microsoft as a security | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -217,7 +211,7 @@ This policy should not be enabled unless recommended by Microsoft as a security | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -234,12 +228,12 @@ This policy should not be enabled unless recommended by Microsoft as a security This policy setting lets you control whether Windows Store apps can open URIs using the default desktop app for a URI scheme. Because desktop apps run at a higher integrity level than Windows Store apps, there is a risk that a URI scheme launched by a Windows Store app might compromise the system by launching a desktop app. -- If you enable this policy setting, Windows Store apps cannot open URIs in the default desktop app for a URI scheme; they can open URIs only in other Windows Store apps. +- If you enable this policy setting, Windows Store apps can't open URIs in the default desktop app for a URI scheme; they can open URIs only in other Windows Store apps. -- If you disable or do not configure this policy setting, Windows Store apps can open URIs in the default desktop app for a URI scheme. +- If you disable or don't configure this policy setting, Windows Store apps can open URIs in the default desktop app for a URI scheme. > [!NOTE] -> Enabling this policy setting does not block Windows Store apps from opening the default desktop app for the http, https, and mailto URI schemes. The handlers for these URI schemes are hardened against URI-based vulnerabilities from untrusted sources, reducing the associated risk. +> Enabling this policy setting doesn't block Windows Store apps from opening the default desktop app for the http, https, and mailto URI schemes. The handlers for these URI schemes are hardened against URI-based vulnerabilities from untrusted sources, reducing the associated risk. @@ -251,13 +245,12 @@ This policy setting lets you control whether Windows Store apps can open URIs us | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-attachmentmanager.md b/windows/client-management/mdm/policy-csp-admx-attachmentmanager.md index e6f792fa8b..4e3c88f316 100644 --- a/windows/client-management/mdm/policy-csp-admx-attachmentmanager.md +++ b/windows/client-management/mdm/policy-csp-admx-attachmentmanager.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_AttachmentManager Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_AttachmentManager -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -54,7 +51,7 @@ Using both the file handler and type data is the most restrictive option. Window - If you disable this policy setting, Windows uses its default trust logic, which prefers the file handler over the file type. -- If you do not configure this policy setting, Windows uses its default trust logic, which prefers the file handler over the file type. +- If you don't configure this policy setting, Windows uses its default trust logic, which prefers the file handler over the file type. @@ -66,13 +63,12 @@ Using both the file handler and type data is the most restrictive option. Window | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -98,7 +94,7 @@ Using both the file handler and type data is the most restrictive option. Window | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -115,13 +111,13 @@ High Risk: If the attachment is in the list of high-risk file types and is from Moderate Risk: If the attachment is in the list of moderate-risk file types and is from the restricted or Internet zone, Windows prompts the user before accessing the file. -Low Risk: If the attachment is in the list of low-risk file types, Windows will not prompt the user before accessing the file, regardless of the file's zone information. +Low Risk: If the attachment is in the list of low-risk file types, Windows won't prompt the user before accessing the file, regardless of the file's zone information. - If you enable this policy setting, you can specify the default risk level for file types. - If you disable this policy setting, Windows sets the default risk level to moderate. -- If you do not configure this policy setting, Windows sets the default risk level to moderate. +- If you don't configure this policy setting, Windows sets the default risk level to moderate. @@ -133,13 +129,12 @@ Low Risk: If the attachment is in the list of low-risk file types, Windows will | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -165,7 +160,7 @@ Low Risk: If the attachment is in the list of low-risk file types, Windows will | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -182,7 +177,7 @@ This policy setting allows you to configure the list of high-risk file types. If - If you disable this policy setting, Windows uses its built-in list of file types that pose a high risk. -- If you do not configure this policy setting, Windows uses its built-in list of high-risk file types. +- If you don't configure this policy setting, Windows uses its built-in list of high-risk file types. @@ -194,13 +189,12 @@ This policy setting allows you to configure the list of high-risk file types. If | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -226,7 +220,7 @@ This policy setting allows you to configure the list of high-risk file types. If | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -237,13 +231,13 @@ This policy setting allows you to configure the list of high-risk file types. If -This policy setting allows you to configure the list of low-risk file types. If the attachment is in the list of low-risk file types, Windows will not prompt the user before accessing the file, regardless of the file's zone information. This inclusion list overrides the list of high-risk file types built into Windows and has a lower precedence than the high-risk or medium-risk inclusion lists (where an extension is listed in more than one inclusion list). +This policy setting allows you to configure the list of low-risk file types. If the attachment is in the list of low-risk file types, Windows won't prompt the user before accessing the file, regardless of the file's zone information. This inclusion list overrides the list of high-risk file types built into Windows and has a lower precedence than the high-risk or medium-risk inclusion lists (where an extension is listed in more than one inclusion list). - If you enable this policy setting, you can specify file types that pose a low risk. - If you disable this policy setting, Windows uses its default trust logic. -- If you do not configure this policy setting, Windows uses its default trust logic. +- If you don't configure this policy setting, Windows uses its default trust logic. @@ -255,13 +249,12 @@ This policy setting allows you to configure the list of low-risk file types. If | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -287,7 +280,7 @@ This policy setting allows you to configure the list of low-risk file types. If | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -304,7 +297,7 @@ This policy setting allows you to configure the list of moderate-risk file types - If you disable this policy setting, Windows uses its default trust logic. -- If you do not configure this policy setting, Windows uses its default trust logic. +- If you don't configure this policy setting, Windows uses its default trust logic. @@ -316,13 +309,12 @@ This policy setting allows you to configure the list of moderate-risk file types | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-auditsettings.md b/windows/client-management/mdm/policy-csp-admx-auditsettings.md index 9df41c0e25..c2c110b8ba 100644 --- a/windows/client-management/mdm/policy-csp-admx-auditsettings.md +++ b/windows/client-management/mdm/policy-csp-admx-auditsettings.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_AuditSettings Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_AuditSettings -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -48,9 +45,9 @@ This setting only applies when the Audit Process Creation policy is enabled. - If you enable this policy setting the command line information for every process will be logged in plain text in the security event log as part of the Audit Process Creation event 4688, "a new process has been created," on the workstations and servers on which this policy setting is applied. -- If you disable or do not configure this policy setting, the process's command line information will not be included in Audit Process Creation events. +- If you disable or don't configure this policy setting, the process's command line information won't be included in Audit Process Creation events. -Default: Not configured +Default: Not configured. > [!NOTE] > When this policy setting is enabled, any user with access to read the security events will be able to read the command line arguments for any successfully created process. Command line arguments can contain sensitive or private information such as passwords or user data. @@ -65,13 +62,12 @@ Default: Not configured | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-bits.md b/windows/client-management/mdm/policy-csp-admx-bits.md index 53f320034a..6ca32a3a25 100644 --- a/windows/client-management/mdm/policy-csp-admx-bits.md +++ b/windows/client-management/mdm/policy-csp-admx-bits.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_Bits Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_Bits -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,12 +41,12 @@ ms.topic: reference This setting affects whether the BITS client is allowed to use Windows Branch Cache. If the Windows Branch Cache component is installed and enabled on a computer, BITS jobs on that computer can use Windows Branch Cache by default. -- If you enable this policy setting, the BITS client does not use Windows Branch Cache. +- If you enable this policy setting, the BITS client doesn't use Windows Branch Cache. -- If you disable or do not configure this policy setting, the BITS client uses Windows Branch Cache. +- If you disable or don't configure this policy setting, the BITS client uses Windows Branch Cache. > [!NOTE] -> This policy setting does not affect the use of Windows Branch Cache by applications other than BITS. This policy setting does not apply to BITS transfers over SMB. This setting has no effect if the computer's administrative settings for Windows Branch Cache disable its use entirely. +> This policy setting doesn't affect the use of Windows Branch Cache by applications other than BITS. This policy setting doesn't apply to BITS transfers over SMB. This setting has no effect if the computer's administrative settings for Windows Branch Cache disable its use entirely. @@ -61,13 +58,12 @@ This setting affects whether the BITS client is allowed to use Windows Branch Ca | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -94,7 +90,7 @@ This setting affects whether the BITS client is allowed to use Windows Branch Ca | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -109,7 +105,7 @@ This policy setting specifies whether the computer will act as a BITS peer cachi - If you enable this policy setting, the computer will no longer use the BITS peer caching feature to download files; files will be downloaded only from the origin server. However, the computer will still make files available to its peers. -- If you disable or do not configure this policy setting, the computer attempts to download peer-enabled BITS jobs from peer computers before reverting to the origin server. +- If you disable or don't configure this policy setting, the computer attempts to download peer-enabled BITS jobs from peer computers before reverting to the origin server. > [!NOTE] > This policy setting has no effect if the "Allow BITS peer caching" policy setting is disabled or not configured. @@ -124,13 +120,12 @@ This policy setting specifies whether the computer will act as a BITS peer cachi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -157,7 +152,7 @@ This policy setting specifies whether the computer will act as a BITS peer cachi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -172,7 +167,7 @@ This policy setting specifies whether the computer will act as a BITS peer cachi - If you enable this policy setting, the computer will no longer cache downloaded files and offer them to its peers. However, the computer will still download files from peers. -- If you disable or do not configure this policy setting, the computer will offer downloaded and cached files to its peers. +- If you disable or don't configure this policy setting, the computer will offer downloaded and cached files to its peers. > [!NOTE] > This setting has no effect if the "Allow BITS peer caching" setting is disabled or not configured. @@ -187,13 +182,12 @@ This policy setting specifies whether the computer will act as a BITS peer cachi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -220,7 +214,7 @@ This policy setting specifies whether the computer will act as a BITS peer cachi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -235,9 +229,9 @@ This policy setting determines if the Background Intelligent Transfer Service (B If BITS peer caching is enabled, BITS caches downloaded files and makes them available to other BITS peers. When transferring a download job, BITS first requests the files for the job from its peers in the same IP subnet. If none of the peers in the subnet have the requested files, BITS downloads them from the origin server. -- If you enable this policy setting, BITS downloads files from peers, caches the files, and responds to content requests from peers. Using the "Do not allow the computer to act as a BITS peer caching server" and "Do not allow the computer to act as a BITS peer caching client" policy settings, it is possible to control BITS peer caching functionality at a more detailed level. However, it should be noted that the "Allow BITS peer caching" policy setting must be enabled for the other two policy settings to have any effect. +- If you enable this policy setting, BITS downloads files from peers, caches the files, and responds to content requests from peers. Using the "Do not allow the computer to act as a BITS peer caching server" and "Do not allow the computer to act as a BITS peer caching client" policy settings, it's possible to control BITS peer caching functionality at a more detailed level. However, it should be noted that the "Allow BITS peer caching" policy setting must be enabled for the other two policy settings to have any effect. -- If you disable or do not configure this policy setting, the BITS peer caching feature will be disabled, and BITS will download files directly from the origin server. +- If you disable or don't configure this policy setting, the BITS peer caching feature will be disabled, and BITS will download files directly from the origin server. @@ -249,13 +243,12 @@ If BITS peer caching is enabled, BITS caches downloaded files and makes them ava | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -282,7 +275,7 @@ If BITS peer caching is enabled, BITS caches downloaded files and makes them ava | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -293,13 +286,15 @@ If BITS peer caching is enabled, BITS caches downloaded files and makes them ava -This policy setting limits the network bandwidth that BITS uses for peer cache transfers (this setting does not affect transfers from the origin server). +This policy setting limits the network bandwidth that BITS uses for peer cache transfers (this setting doesn't affect transfers from the origin server). + To prevent any negative impact to a computer caused by serving other peers, by default BITS will use up to 30 percent of the bandwidth of the slowest active network interface. For example, if a computer has both a 100 Mbps network card and a 56 Kbps modem, and both are active, BITS will use a maximum of 30 percent of 56 Kbps. + You can change the default behavior of BITS, and specify a fixed maximum bandwidth that BITS will use for peer caching. - If you enable this policy setting, you can enter a value in bits per second (bps) between 1048576 and 4294967200 to use as the maximum network bandwidth used for peer caching. -- If you disable this policy setting or do not configure it, the default value of 30 percent of the slowest active network interface will be used. +- If you disable this policy setting or don't configure it, the default value of 30 percent of the slowest active network interface will be used. > [!NOTE] > This setting has no effect if the "Allow BITS peer caching" policy setting is disabled or not configured. @@ -314,13 +309,12 @@ You can change the default behavior of BITS, and specify a fixed maximum bandwid | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -346,7 +340,7 @@ You can change the default behavior of BITS, and specify a fixed maximum bandwid | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -357,13 +351,13 @@ You can change the default behavior of BITS, and specify a fixed maximum bandwid -This policy setting limits the network bandwidth that Background Intelligent Transfer Service (BITS) uses for background transfers during the maintenance days and hours. Maintenance schedules further limit the network bandwidth that is used for background transfers. +This policy setting limits the network bandwidth that Background Intelligent Transfer Service (BITS) uses for background transfers during the maintenance days and hours. Maintenance schedules further limit the network bandwidth that's used for background transfers. - If you enable this policy setting, you can define a separate set of network bandwidth limits and set up a schedule for the maintenance period. You can specify a limit to use for background jobs during a maintenance schedule. For example, if normal priority jobs are currently limited to 256 Kbps on a work schedule, you can further limit the network bandwidth of normal priority jobs to 0 Kbps from 8:00 A. M. to 10:00 A. M. on a maintenance schedule. -- If you disable or do not configure this policy setting, the limits defined for work or nonwork schedules will be used. +- If you disable or don't configure this policy setting, the limits defined for work or nonwork schedules will be used. > [!NOTE] > The bandwidth limits that are set for the maintenance period supersede any limits defined for work and other schedules. @@ -378,13 +372,12 @@ You can specify a limit to use for background jobs during a maintenance schedule | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -411,7 +404,7 @@ You can specify a limit to use for background jobs during a maintenance schedule | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -422,13 +415,13 @@ You can specify a limit to use for background jobs during a maintenance schedule -This policy setting limits the network bandwidth that Background Intelligent Transfer Service (BITS) uses for background transfers during the work and nonwork days and hours. The work schedule is defined using a weekly calendar, which consists of days of the week and hours of the day. All hours and days that are not defined in a work schedule are considered non-work hours. +This policy setting limits the network bandwidth that Background Intelligent Transfer Service (BITS) uses for background transfers during the work and nonwork days and hours. The work schedule is defined using a weekly calendar, which consists of days of the week and hours of the day. All hours and days that aren't defined in a work schedule are considered non-work hours. - If you enable this policy setting, you can set up a schedule for limiting network bandwidth during both work and nonwork hours. After the work schedule is defined, you can set the bandwidth usage limits for each of the three BITS background priority levels: high, normal, and low. You can specify a limit to use for background jobs during a work schedule. For example, you can limit the network bandwidth of low priority jobs to 128 Kbps from 8:00 A. M. to 5:00 P. M. on Monday through Friday, and then set the limit to 512 Kbps for nonwork hours. -- If you disable or do not configure this policy setting, BITS uses all available unused bandwidth for background job transfers. +- If you disable or don't configure this policy setting, BITS uses all available unused bandwidth for background job transfers. @@ -440,13 +433,12 @@ You can specify a limit to use for background jobs during a work schedule. For e | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -473,7 +465,7 @@ You can specify a limit to use for background jobs during a work schedule. For e | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -488,7 +480,7 @@ This policy setting limits the maximum amount of disk space that can be used for - If you enable this policy setting, you can enter the percentage of disk space to be used for the BITS peer cache. You can enter a value between 1 percent and 80 percent. -- If you disable or do not configure this policy setting, the default size of the BITS peer cache is 1 percent of the total system disk size. +- If you disable or don't configure this policy setting, the default size of the BITS peer cache is 1 percent of the total system disk size. > [!NOTE] > This policy setting has no effect if the "Allow BITS peer caching" setting is disabled or not configured. @@ -503,13 +495,12 @@ This policy setting limits the maximum amount of disk space that can be used for | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -535,7 +526,7 @@ This policy setting limits the maximum amount of disk space that can be used for | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -546,11 +537,11 @@ This policy setting limits the maximum amount of disk space that can be used for -This policy setting limits the maximum age of files in the Background Intelligent Transfer Service (BITS) peer cache. In order to make the most efficient use of disk space, by default BITS removes any files in the peer cache that have not been accessed in the past 90 days. +This policy setting limits the maximum age of files in the Background Intelligent Transfer Service (BITS) peer cache. In order to make the most efficient use of disk space, by default BITS removes any files in the peer cache that haven't been accessed in the past 90 days. - If you enable this policy setting, you can specify in days the maximum age of files in the cache. You can enter a value between 1 and 120 days. -- If you disable or do not configure this policy setting, files that have not been accessed for the past 90 days will be removed from the peer cache. +- If you disable or don't configure this policy setting, files that haven't been accessed for the past 90 days will be removed from the peer cache. > [!NOTE] > This policy setting has no effect if the "Allow BITS Peercaching" policy setting is disabled or not configured. @@ -565,13 +556,12 @@ This policy setting limits the maximum age of files in the Background Intelligen | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -597,7 +587,7 @@ This policy setting limits the maximum age of files in the Background Intelligen | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -616,7 +606,7 @@ By default BITS uses a maximum download time of 90 days (7,776,000 seconds). - If you enable this policy setting, you can set the maximum job download time to a specified number of seconds. -- If you disable or do not configure this policy setting, the default value of 90 days (7,776,000 seconds) will be used. +- If you disable or don't configure this policy setting, the default value of 90 days (7,776,000 seconds) will be used. @@ -628,13 +618,12 @@ By default BITS uses a maximum download time of 90 days (7,776,000 seconds). | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -660,7 +649,7 @@ By default BITS uses a maximum download time of 90 days (7,776,000 seconds). | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -675,10 +664,10 @@ This policy setting limits the number of files that a BITS job can contain. By d - If you enable this policy setting, BITS will limit the maximum number of files a job can contain to the specified number. -- If you disable or do not configure this policy setting, BITS will use the default value of 200 for the maximum number of files a job can contain. +- If you disable or don't configure this policy setting, BITS will use the default value of 200 for the maximum number of files a job can contain. > [!NOTE] -> BITS Jobs created by services and the local administrator account do not count toward this limit. +> BITS Jobs created by services and the local administrator account don't count toward this limit. @@ -690,13 +679,12 @@ This policy setting limits the number of files that a BITS job can contain. By d | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -722,7 +710,7 @@ This policy setting limits the number of files that a BITS job can contain. By d | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -737,10 +725,10 @@ This policy setting limits the number of BITS jobs that can be created for all u - If you enable this policy setting, BITS will limit the maximum number of BITS jobs to the specified number. -- If you disable or do not configure this policy setting, BITS will use the default BITS job limit of 300 jobs. +- If you disable or don't configure this policy setting, BITS will use the default BITS job limit of 300 jobs. > [!NOTE] -> BITS jobs created by services and the local administrator account do not count toward this limit. +> BITS jobs created by services and the local administrator account don't count toward this limit. @@ -752,13 +740,12 @@ This policy setting limits the number of BITS jobs that can be created for all u | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -784,7 +771,7 @@ This policy setting limits the number of BITS jobs that can be created for all u | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -799,10 +786,10 @@ This policy setting limits the number of BITS jobs that can be created by a user - If you enable this policy setting, BITS will limit the maximum number of BITS jobs a user can create to the specified number. -- If you disable or do not configure this policy setting, BITS will use the default user BITS job limit of 300 jobs. +- If you disable or don't configure this policy setting, BITS will use the default user BITS job limit of 300 jobs. > [!NOTE] -> This limit must be lower than the setting specified in the "Maximum number of BITS jobs for this computer" policy setting, or 300 if the "Maximum number of BITS jobs for this computer" policy setting is not configured. BITS jobs created by services and the local administrator account do not count toward this limit. +> This limit must be lower than the setting specified in the "Maximum number of BITS jobs for this computer" policy setting, or 300 if the "Maximum number of BITS jobs for this computer" policy setting isn't configured. BITS jobs created by services and the local administrator account don't count toward this limit. @@ -814,13 +801,12 @@ This policy setting limits the number of BITS jobs that can be created by a user | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -846,7 +832,7 @@ This policy setting limits the number of BITS jobs that can be created by a user | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -861,10 +847,10 @@ This policy setting limits the number of ranges that can be added to a file in a - If you enable this policy setting, BITS will limit the maximum number of ranges that can be added to a file to the specified number. -- If you disable or do not configure this policy setting, BITS will limit ranges to 500 ranges per file. +- If you disable or don't configure this policy setting, BITS will limit ranges to 500 ranges per file. > [!NOTE] -> BITS Jobs created by services and the local administrator account do not count toward this limit. +> BITS Jobs created by services and the local administrator account don't count toward this limit. @@ -876,13 +862,12 @@ This policy setting limits the number of ranges that can be added to a file in a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-ciphersuiteorder.md b/windows/client-management/mdm/policy-csp-admx-ciphersuiteorder.md index 4381ecdcb1..a36aa6c74c 100644 --- a/windows/client-management/mdm/policy-csp-admx-ciphersuiteorder.md +++ b/windows/client-management/mdm/policy-csp-admx-ciphersuiteorder.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_CipherSuiteOrder Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_CipherSuiteOrder -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,7 +43,7 @@ This policy setting determines the cipher suites used by the Secure Socket Layer - If you enable this policy setting, SSL cipher suites are prioritized in the order specified. -- If you disable or do not configure this policy setting, default cipher suite order is used. +- If you disable or don't configure this policy setting, default cipher suite order is used. Link for all the cipherSuites: @@ -60,13 +57,12 @@ Link for all the cipherSuites: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -92,7 +88,7 @@ Link for all the cipherSuites: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -107,7 +103,7 @@ This policy setting determines the priority order of ECC curves used with ECDHE - If you enable this policy setting, ECC curves are prioritized in the order specified.(Enter one Curve name per line) -- If you disable or do not configure this policy setting, the default ECC curve order is used. +- If you disable or don't configure this policy setting, the default ECC curve order is used. Default Curve Order @@ -129,13 +125,12 @@ CertUtil.exe -DisplayEccCurve. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-com.md b/windows/client-management/mdm/policy-csp-admx-com.md index 3ee1a98a1d..7f3c480db6 100644 --- a/windows/client-management/mdm/policy-csp-admx-com.md +++ b/windows/client-management/mdm/policy-csp-admx-com.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_COM Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_COM -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,11 +41,11 @@ ms.topic: reference This policy setting directs the system to search Active Directory for missing Component Object Model (COM) components that a program requires. -Many Windows programs, such as the MMC snap-ins, use the interfaces provided by the COM components. These programs cannot perform all their functions unless Windows has internally registered the required components. +Many Windows programs, such as the MMC snap-ins, use the interfaces provided by the COM components. These programs can't perform all their functions unless Windows has internally registered the required components. -- If you enable this policy setting and a component registration is missing, the system searches for it in Active Directory and, if it is found, downloads it. The resulting searches might make some programs start or run slowly. +- If you enable this policy setting and a component registration is missing, the system searches for it in Active Directory and, if it's found, downloads it. The resulting searches might make some programs start or run slowly. -- If you disable or do not configure this policy setting, the program continues without the registration. As a result, the program might not perform all its functions, or it might stop. +- If you disable or don't configure this policy setting, the program continues without the registration. As a result, the program might not perform all its functions, or it might stop. This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration. @@ -62,13 +59,12 @@ This setting appears in the Computer Configuration and User Configuration folder | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -95,7 +91,7 @@ This setting appears in the Computer Configuration and User Configuration folder | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -108,11 +104,11 @@ This setting appears in the Computer Configuration and User Configuration folder This policy setting directs the system to search Active Directory for missing Component Object Model (COM) components that a program requires. -Many Windows programs, such as the MMC snap-ins, use the interfaces provided by the COM components. These programs cannot perform all their functions unless Windows has internally registered the required components. +Many Windows programs, such as the MMC snap-ins, use the interfaces provided by the COM components. These programs can't perform all their functions unless Windows has internally registered the required components. -- If you enable this policy setting and a component registration is missing, the system searches for it in Active Directory and, if it is found, downloads it. The resulting searches might make some programs start or run slowly. +- If you enable this policy setting and a component registration is missing, the system searches for it in Active Directory and, if it's found, downloads it. The resulting searches might make some programs start or run slowly. -- If you disable or do not configure this policy setting, the program continues without the registration. As a result, the program might not perform all its functions, or it might stop. +- If you disable or don't configure this policy setting, the program continues without the registration. As a result, the program might not perform all its functions, or it might stop. This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration. @@ -126,13 +122,12 @@ This setting appears in the Computer Configuration and User Configuration folder | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-controlpanel.md b/windows/client-management/mdm/policy-csp-admx-controlpanel.md index 07bb2c18f1..d847bc2c59 100644 --- a/windows/client-management/mdm/policy-csp-admx-controlpanel.md +++ b/windows/client-management/mdm/policy-csp-admx-controlpanel.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_ControlPanel Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_ControlPanel -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -49,12 +46,12 @@ If you enable this setting, you can select specific items not to display on the To hide a Control Panel item, enable this policy setting and click Show to access the list of disallowed Control Panel items. In the Show Contents dialog box in the Value column, enter the Control Panel item's canonical name. For example, enter Microsoft. Mouse, Microsoft. System, or Microsoft. Personalization. > [!NOTE] -> For Windows Vista, Windows Server 2008, and earlier versions of Windows, the module name should be entered, for example timedate.cpl or inetcpl.cpl. If a Control Panel item does not have a CPL file, or the CPL file contains multiple applets, then its module name and string resource identification number should be entered, for example @systemcpl.dll,-1 for System, or @themecpl.dll,-1 for Personalization. A complete list of canonical and module names can be found in MSDN by searching "Control Panel items". +> For Windows Vista, Windows Server 2008, and earlier versions of Windows, the module name should be entered, for example timedate.cpl or inetcpl.cpl. If a Control Panel item doesn't have a CPL file, or the CPL file contains multiple applets, then its module name and string resource identification number should be entered, for example @systemcpl.dll,-1 for System, or @themecpl.dll,-1 for Personalization. A complete list of canonical and module names can be found in MSDN by searching "Control Panel items". If both the "Hide specified Control Panel items" setting and the "Show only specified Control Panel items" setting are enabled, the "Show only specified Control Panel items" setting is ignored. > [!NOTE] -> The Display Control Panel item cannot be hidden in the Desktop context menu by using this setting. To hide the Display Control Panel item and prevent users from modifying the computer's display settings use the "Disable Display Control Panel" setting instead. +> The Display Control Panel item can't be hidden in the Desktop context menu by using this setting. To hide the Display Control Panel item and prevent users from modifying the computer's display settings use the "Disable Display Control Panel" setting instead. > [!NOTE] > To hide pages in the System Settings app, use the "Settings Page Visibility" setting under Computer Configuration. @@ -69,13 +66,12 @@ If both the "Hide specified Control Panel items" setting and the "Show only spec | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -102,7 +98,7 @@ If both the "Hide specified Control Panel items" setting and the "Show only spec | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -119,7 +115,7 @@ This policy setting controls the default Control Panel view, whether by category - If this policy setting is disabled, the Control Panel opens to the category view. -- If this policy setting is not configured, the Control Panel opens to the view used in the last Control Panel session. +- If this policy setting isn't configured, the Control Panel opens to the view used in the last Control Panel session. > [!NOTE] > Icon size is dependent upon what the user has set it to in the previous session. @@ -134,13 +130,12 @@ This policy setting controls the default Control Panel view, whether by category | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -167,7 +162,7 @@ This policy setting controls the default Control Panel view, whether by category | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -180,17 +175,23 @@ This policy setting controls the default Control Panel view, whether by category Disables all Control Panel programs and the PC settings app. -This setting prevents Control.exe and SystemSettings.exe, the program files for Control Panel and PC settings, from starting. As a result, users cannot start Control Panel or PC settings, or run any of their items. +This setting prevents Control.exe and SystemSettings.exe, the program files for Control Panel and PC settings, from starting. As a result, users can't start Control Panel or PC settings, or run any of their items. This setting removes Control Panel from: -The Start screen -File Explorer + +The Start screen. + +File Explorer. This setting removes PC settings from: -The Start screen -Settings charm -Account picture -Search results + +The Start screen. + +Settings charm. + +Account picture. + +Search results. If users try to select a Control Panel item from the Properties item on a context menu, a message appears explaining that a setting prevents the action. @@ -204,13 +205,12 @@ If users try to select a Control Panel item from the Properties item on a contex | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -237,7 +237,7 @@ If users try to select a Control Panel item from the Properties item on a contex | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -253,12 +253,12 @@ This policy setting controls which Control Panel items such as Mouse, System, or To display a Control Panel item, enable this policy setting and click Show to access the list of allowed Control Panel items. In the Show Contents dialog box in the Value column, enter the Control Panel item's canonical name. For example, enter Microsoft. Mouse, Microsoft. System, or Microsoft. Personalization. > [!NOTE] -> For Windows Vista, Windows Server 2008, and earlier versions of Windows, the module name, for example timedate.cpl or inetcpl.cpl, should be entered. If a Control Panel item does not have a CPL file, or the CPL file contains multiple applets, then its module name and string resource identification number should be entered. For example, enter @systemcpl.dll,-1 for System or @themecpl.dll,-1 for Personalization. A complete list of canonical and module names of Control Panel items can be found in MSDN by searching "Control Panel items". +> For Windows Vista, Windows Server 2008, and earlier versions of Windows, the module name, for example timedate.cpl or inetcpl.cpl, should be entered. If a Control Panel item doesn't have a CPL file, or the CPL file contains multiple applets, then its module name and string resource identification number should be entered. For example, enter @systemcpl.dll,-1 for System or @themecpl.dll,-1 for Personalization. A complete list of canonical and module names of Control Panel items can be found in MSDN by searching "Control Panel items". If both the "Hide specified Control Panel items" setting and the "Show only specified Control Panel items" setting are enabled, the "Show only specified Control Panel items" setting is ignored. > [!NOTE] -> The Display Control Panel item cannot be hidden in the Desktop context menu by using this setting. To hide the Display Control Panel item and prevent users from modifying the computer's display settings use the "Disable Display Control Panel" setting instead. +> The Display Control Panel item can't be hidden in the Desktop context menu by using this setting. To hide the Display Control Panel item and prevent users from modifying the computer's display settings use the "Disable Display Control Panel" setting instead. > [!NOTE] > To hide pages in the System Settings app, use the "Settings Page Visibility" setting under Computer Configuration. @@ -273,13 +273,12 @@ If both the "Hide specified Control Panel items" setting and the "Show only spec | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-controlpaneldisplay.md b/windows/client-management/mdm/policy-csp-admx-controlpaneldisplay.md index e751b4fa8b..1f95adc480 100644 --- a/windows/client-management/mdm/policy-csp-admx-controlpaneldisplay.md +++ b/windows/client-management/mdm/policy-csp-admx-controlpaneldisplay.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_ControlPanelDisplay Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_ControlPanelDisplay -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,7 +41,7 @@ ms.topic: reference Disables the Display Control Panel. -If you enable this setting, the Display Control Panel does not run. When users try to start Display, a message appears explaining that a setting prevents the action. +If you enable this setting, the Display Control Panel doesn't run. When users try to start Display, a message appears explaining that a setting prevents the action. Also, see the "Prohibit access to the Control Panel" (User Configuration\Administrative Templates\Control Panel) and "Remove programs on Settings menu" (User Configuration\Administrative Templates\Start Menu & Taskbar) settings. @@ -58,13 +55,12 @@ Also, see the "Prohibit access to the Control Panel" (User Configuration\Adminis | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -91,7 +87,7 @@ Also, see the "Prohibit access to the Control Panel" (User Configuration\Adminis | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -116,13 +112,12 @@ This setting prevents users from using Control Panel to add, configure, or chang | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -149,7 +144,7 @@ This setting prevents users from using Control Panel to add, configure, or chang | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -162,9 +157,9 @@ This setting prevents users from using Control Panel to add, configure, or chang This setting forces the theme color scheme to be the default color scheme. -- If you enable this setting, a user cannot change the color scheme of the current desktop theme. +- If you enable this setting, a user can't change the color scheme of the current desktop theme. -- If you disable or do not configure this setting, a user may change the color scheme of the current desktop theme. +- If you disable or don't configure this setting, a user may change the color scheme of the current desktop theme. For Windows 7 and later, use the "Prevent changing color and appearance" setting. @@ -178,13 +173,12 @@ For Windows 7 and later, use the "Prevent changing color and appearance" setting | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -211,7 +205,7 @@ For Windows 7 and later, use the "Prevent changing color and appearance" setting | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -224,12 +218,12 @@ For Windows 7 and later, use the "Prevent changing color and appearance" setting This setting disables the theme gallery in the Personalization Control Panel. -- If you enable this setting, users cannot change or save a theme. Elements of a theme such as the desktop background, color, sounds, and screen saver can still be changed (unless policies are set to turn them off). +- If you enable this setting, users can't change or save a theme. Elements of a theme such as the desktop background, color, sounds, and screen saver can still be changed (unless policies are set to turn them off). -- If you disable or do not configure this setting, there is no effect. +- If you disable or don't configure this setting, there is no effect. > [!NOTE] -> If you enable this setting but do not specify a theme using the "load a specific theme" setting, the theme defaults to whatever the user previously set or the system default. +> If you enable this setting but don't specify a theme using the "load a specific theme" setting, the theme defaults to whatever the user previously set or the system default. @@ -241,13 +235,12 @@ This setting disables the theme gallery in the Personalization Control Panel. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -274,7 +267,7 @@ This setting disables the theme gallery in the Personalization Control Panel. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -301,13 +294,12 @@ When enabled on Windows XP and later systems, this setting prevents users and ap | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -334,7 +326,7 @@ When enabled on Windows XP and later systems, this setting prevents users and ap | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -347,9 +339,9 @@ When enabled on Windows XP and later systems, this setting prevents users and ap Enables desktop screen savers. -- If you disable this setting, screen savers do not run. Also, this setting disables the Screen Saver section of the Screen Saver dialog in the Personalization or Display Control Panel. As a result, users cannot change the screen saver options. +- If you disable this setting, screen savers don't run. Also, this setting disables the Screen Saver section of the Screen Saver dialog in the Personalization or Display Control Panel. As a result, users can't change the screen saver options. -- If you do not configure it, this setting has no effect on the system. +- If you don't configure it, this setting has no effect on the system. - If you enable it, a screen saver runs, provided the following two conditions hold: First, a valid screen saver on the client is specified through the "Screen Saver executable name" setting or through Control Panel on the client computer. Second, the screen saver timeout is set to a nonzero value through the setting or Control Panel. @@ -365,13 +357,12 @@ Also, see the "Prevent changing Screen Saver" setting. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -398,7 +389,7 @@ Also, see the "Prevent changing Screen Saver" setting. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -430,13 +421,12 @@ This can be used in conjunction with the "Prevent changing lock screen and logon | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -462,7 +452,7 @@ This can be used in conjunction with the "Prevent changing lock screen and logon | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -477,7 +467,7 @@ Prevents users from changing the size of the font in the windows and buttons dis - If this setting is enabled, the "Font size" drop-down list on the Appearance tab in Display Properties is disabled. -- If you disable or do not configure this setting, a user may change the font size using the "Font size" drop-down list on the Appearance tab. +- If you disable or don't configure this setting, a user may change the font size using the "Font size" drop-down list on the Appearance tab. @@ -489,13 +479,12 @@ Prevents users from changing the size of the font in the windows and buttons dis | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -522,7 +511,7 @@ Prevents users from changing the size of the font in the windows and buttons dis | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -537,7 +526,7 @@ Prevents users from changing the background image shown when the machine is lock By default, users can change the background image shown when the machine is locked or displaying the logon screen. -If you enable this setting, the user will not be able to change their lock screen and logon image, and they will instead see the default image. +If you enable this setting, the user won't be able to change their lock screen and logon image, and they will instead see the default image. @@ -549,13 +538,12 @@ If you enable this setting, the user will not be able to change their lock scree | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -582,7 +570,7 @@ If you enable this setting, the user will not be able to change their lock scree | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -597,7 +585,7 @@ Prevents users from changing the look of their start menu background, such as it By default, users can change the look of their start menu background, such as its color or accent. -If you enable this setting, the user will be assigned the default start menu background and colors and will not be allowed to change them. +If you enable this setting, the user will be assigned the default start menu background and colors and won't be allowed to change them. If the "Force a specific background and accent color" policy is also set on a supported version of Windows, then those colors take precedence over this policy. @@ -613,13 +601,12 @@ If the "Force a specific Start background" policy is also set on a supported ver | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -646,7 +633,7 @@ If the "Force a specific Start background" policy is also set on a supported ver | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -657,7 +644,7 @@ If the "Force a specific Start background" policy is also set on a supported ver -Disables the Color (or Window Color) page in the Personalization Control Panel, or the Color Scheme dialog in the Display Control Panel on systems where the Personalization feature is not available. +Disables the Color (or Window Color) page in the Personalization Control Panel, or the Color Scheme dialog in the Display Control Panel on systems where the Personalization feature isn't available. This setting prevents users from using Control Panel to change the window border and taskbar color (on Windows 8), glass color (on Windows Vista and Windows 7), system colors, or color scheme of the desktop and windows. @@ -675,13 +662,12 @@ For systems prior to Windows Vista, this setting hides the Appearance and Themes | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -708,7 +694,7 @@ For systems prior to Windows Vista, this setting hides the Appearance and Themes | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -742,13 +728,12 @@ Also, see the "Allow only bitmapped wallpaper" setting. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -775,7 +760,7 @@ Also, see the "Allow only bitmapped wallpaper" setting. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -804,13 +789,12 @@ For systems prior to Windows Vista, this setting also hides the Desktop tab in t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -837,7 +821,7 @@ For systems prior to Windows Vista, this setting also hides the Desktop tab in t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -850,9 +834,9 @@ For systems prior to Windows Vista, this setting also hides the Desktop tab in t This policy setting controls whether the lock screen appears for users. -- If you enable this policy setting, users that are not required to press CTRL + ALT + DEL before signing in will see their selected tile after locking their PC. +- If you enable this policy setting, users that aren't required to press CTRL + ALT + DEL before signing in will see their selected tile after locking their PC. -- If you disable or do not configure this policy setting, users that are not required to press CTRL + ALT + DEL before signing in will see a lock screen after locking their PC. They must dismiss the lock screen using touch, the keyboard, or by dragging it with the mouse. +- If you disable or don't configure this policy setting, users that aren't required to press CTRL + ALT + DEL before signing in will see a lock screen after locking their PC. They must dismiss the lock screen using touch, the keyboard, or by dragging it with the mouse. @@ -864,13 +848,12 @@ This policy setting controls whether the lock screen appears for users. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -897,7 +880,7 @@ This policy setting controls whether the lock screen appears for users. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -924,13 +907,12 @@ If you enable this setting, none of the mouse pointer scheme settings can be cha | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -957,7 +939,7 @@ If you enable this setting, none of the mouse pointer scheme settings can be cha | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -970,7 +952,7 @@ If you enable this setting, none of the mouse pointer scheme settings can be cha Prevents the Screen Saver dialog from opening in the Personalization or Display Control Panel. -This setting prevents users from using Control Panel to add, configure, or change the screen saver on the computer. It does not prevent a screen saver from running. +This setting prevents users from using Control Panel to add, configure, or change the screen saver on the computer. It doesn't prevent a screen saver from running. @@ -982,13 +964,12 @@ This setting prevents users from using Control Panel to add, configure, or chang | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1015,7 +996,7 @@ This setting prevents users from using Control Panel to add, configure, or chang | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1042,13 +1023,12 @@ If you enable this setting, none of the Sound Scheme settings can be changed by | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1075,7 +1055,7 @@ If you enable this setting, none of the Sound Scheme settings can be changed by | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1090,7 +1070,7 @@ Forces Windows to use the specified colors for the background and accent. The co By default, users can change the background and accent colors. -If this setting is enabled, the background and accent colors of Windows will be set to the specified colors and users cannot change those colors. This setting will not be applied if the specified colors do not meet a contrast ratio of 2:1 with white text. +If this setting is enabled, the background and accent colors of Windows will be set to the specified colors and users can't change those colors. This setting won't be applied if the specified colors don't meet a contrast ratio of 2:1 with white text. @@ -1102,13 +1082,12 @@ If this setting is enabled, the background and accent colors of Windows will be | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1134,7 +1113,7 @@ If this setting is enabled, the background and accent colors of Windows will be | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1148,11 +1127,12 @@ If this setting is enabled, the background and accent colors of Windows will be Determines whether screen savers used on the computer are password protected. - If you enable this setting, all screen savers are password protected. -- If you disable this setting, password protection cannot be set on any screen saver. + +- If you disable this setting, password protection can't be set on any screen saver. This setting also disables the "Password protected" checkbox on the Screen Saver dialog in the Personalization or Display Control Panel, preventing users from changing the password protection setting. -- If you do not configure this setting, users can choose whether or not to set password protection on each screen saver. +- If you don't configure this setting, users can choose whether or not to set password protection on each screen saver. To ensure that a computer will be password protected, enable the "Enable Screen Saver" setting and specify a timeout via the "Screen Saver timeout" setting. @@ -1169,13 +1149,12 @@ To ensure that a computer will be password protected, enable the "Enable Screen | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1202,7 +1181,7 @@ To ensure that a computer will be password protected, enable the "Enable Screen | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1215,7 +1194,7 @@ To ensure that a computer will be password protected, enable the "Enable Screen Specifies how much user idle time must elapse before the screen saver is launched. -When configured, this idle time can be set from a minimum of 1 second to a maximum of 86,400 seconds, or 24 hours. If set to zero, the screen saver will not be started. +When configured, this idle time can be set from a minimum of 1 second to a maximum of 86,400 seconds, or 24 hours. If set to zero, the screen saver won't be started. This setting has no effect under any of the following circumstances: @@ -1239,13 +1218,12 @@ When not configured, whatever wait time is set on the client through the Screen | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1271,7 +1249,7 @@ When not configured, whatever wait time is set on the client through the Screen | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1286,14 +1264,14 @@ Specifies the screen saver for the user's desktop. - If you enable this setting, the system displays the specified screen saver on the user's desktop. Also, this setting disables the drop-down list of screen savers in the Screen Saver dialog in the Personalization or Display Control Panel, which prevents users from changing the screen saver. -- If you disable this setting or do not configure it, users can select any screen saver. +- If you disable this setting or don't configure it, users can select any screen saver. -- If you enable this setting, type the name of the file that contains the screen saver, including the .scr file name extension. If the screen saver file is not in the %Systemroot%\System32 directory, type the fully qualified path to the file. +- If you enable this setting, type the name of the file that contains the screen saver, including the .scr file name extension. If the screen saver file isn't in the %Systemroot%\System32 directory, type the fully qualified path to the file. -If the specified screen saver is not installed on a computer to which this setting applies, the setting is ignored. +If the specified screen saver isn't installed on a computer to which this setting applies, the setting is ignored. > [!NOTE] -> This setting can be superseded by the "Enable Screen Saver" setting. If the "Enable Screen Saver" setting is disabled, this setting is ignored, and screen savers do not run. +> This setting can be superseded by the "Enable Screen Saver" setting. If the "Enable Screen Saver" setting is disabled, this setting is ignored, and screen savers don't run. @@ -1305,13 +1283,12 @@ If the specified screen saver is not installed on a computer to which this setti | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1337,7 +1314,7 @@ If the specified screen saver is not installed on a computer to which this setti | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1354,9 +1331,9 @@ If the specified screen saver is not installed on a computer to which this setti Specifies which theme file is applied to the computer the first time a user logs on. -- If you enable this setting, the theme that you specify will be applied when a new user logs on for the first time. This policy does not prevent the user from changing the theme or any of the theme elements such as the desktop background, color, sounds, or screen saver after the first logon. +- If you enable this setting, the theme that you specify will be applied when a new user logs on for the first time. This policy doesn't prevent the user from changing the theme or any of the theme elements such as the desktop background, color, sounds, or screen saver after the first logon. -- If you disable or do not configure this setting, the default theme will be applied at the first logon. +- If you disable or don't configure this setting, the default theme will be applied at the first logon. @@ -1368,13 +1345,12 @@ Specifies which theme file is applied to the computer the first time a user logs | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1400,7 +1376,7 @@ Specifies which theme file is applied to the computer the first time a user logs | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1417,16 +1393,16 @@ This can be a local computer visual style (aero.msstyles), or a file located on - If you enable this setting, the visual style file that you specify will be used. Also, a user may not apply a different visual style when changing themes. -- If you disable or do not configure this setting, the users can select the visual style that they want to use by changing themes (if the Personalization Control Panel is available). +- If you disable or don't configure this setting, the users can select the visual style that they want to use by changing themes (if the Personalization Control Panel is available). > [!NOTE] -> If this setting is enabled and the file is not available at user logon, the default visual style is loaded. +> If this setting is enabled and the file isn't available at user logon, the default visual style is loaded. > [!NOTE] -> When running Windows XP, you can select the Luna visual style by typing %windir%\resources\Themes\Luna\Luna.msstyles +> When running Windows XP, you can select the Luna visual style by typing %windir%\resources\Themes\Luna\Luna.msstyles. > [!NOTE] -> To select the Windows Classic visual style, leave the box blank beside "Path to Visual Style:" and enable this setting. When running Windows 8 or Windows RT, you cannot apply the Windows Classic visual style. +> To select the Windows Classic visual style, leave the box blank beside "Path to Visual Style:" and enable this setting. When running Windows 8 or Windows RT, you can't apply the Windows Classic visual style. @@ -1438,13 +1414,12 @@ This can be a local computer visual style (aero.msstyles), or a file located on | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1470,7 +1445,7 @@ This can be a local computer visual style (aero.msstyles), or a file located on | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1485,7 +1460,7 @@ Forces the Start screen to use one of the available backgrounds, 1 through 20, a If this setting is set to zero or not configured, then Start uses the default background, and users can change it. -If this setting is set to a nonzero value, then Start uses the specified background, and users cannot change it. If the specified background is not supported, the default background is used. +If this setting is set to a nonzero value, then Start uses the specified background, and users can't change it. If the specified background isn't supported, the default background is used. @@ -1497,13 +1472,12 @@ If this setting is set to a nonzero value, then Start uses the specified backgro | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-cpls.md b/windows/client-management/mdm/policy-csp-admx-cpls.md index 7f08bf470b..30bfe07997 100644 --- a/windows/client-management/mdm/policy-csp-admx-cpls.md +++ b/windows/client-management/mdm/policy-csp-admx-cpls.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_Cpls Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_Cpls -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -45,11 +42,11 @@ ms.topic: reference This policy setting allows an administrator to standardize the account pictures for all users on a system to the default account picture. One application for this policy setting is to standardize the account pictures to a company logo. > [!NOTE] -> The default account picture is stored at %PROGRAMDATA%\Microsoft\User Account Pictures\user.jpg. The default guest picture is stored at %PROGRAMDATA%\Microsoft\User Account Pictures\guest.jpg. If the default pictures do not exist, an empty frame is displayed. +> The default account picture is stored at %PROGRAMDATA%\Microsoft\User Account Pictures\user.jpg. The default guest picture is stored at %PROGRAMDATA%\Microsoft\User Account Pictures\guest.jpg. If the default pictures don't exist, an empty frame is displayed. - If you enable this policy setting, the default user account picture will display for all users on the system with no customization allowed. -- If you disable or do not configure this policy setting, users will be able to customize their account pictures. +- If you disable or don't configure this policy setting, users will be able to customize their account pictures. @@ -61,13 +58,12 @@ This policy setting allows an administrator to standardize the account pictures | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-credentialproviders.md b/windows/client-management/mdm/policy-csp-admx-credentialproviders.md index 90a95f4010..04915e32c2 100644 --- a/windows/client-management/mdm/policy-csp-admx-credentialproviders.md +++ b/windows/client-management/mdm/policy-csp-admx-credentialproviders.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_CredentialProviders Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_CredentialProviders -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,9 +43,9 @@ This policy setting allows you to control whether a user can change the time bef - If you enable this policy setting, a user on a Connected Standby device can change the amount of time after the device's screen turns off before a password is required when waking the device. The time is limited by any EAS settings or Group Policies that affect the maximum idle time before a device locks. Additionally, if a password is required when a screensaver turns on, the screensaver timeout will limit the options the user may choose. -- If you disable this policy setting, a user cannot change the amount of time after the device's screen turns off before a password is required when waking the device. Instead, a password is required immediately after the screen turns off. +- If you disable this policy setting, a user can't change the amount of time after the device's screen turns off before a password is required when waking the device. Instead, a password is required immediately after the screen turns off. -- If you don't configure this policy setting on a domain-joined device, a user cannot change the amount of time after the device's screen turns off before a password is required when waking the device. Instead, a password is required immediately after the screen turns off. +- If you don't configure this policy setting on a domain-joined device, a user can't change the amount of time after the device's screen turns off before a password is required when waking the device. Instead, a password is required immediately after the screen turns off. - If you don't configure this policy setting on a workgroup device, a user on a Connected Standby device can change the amount of time after the device's screen turns off before a password is required when waking the device. The time is limited by any EAS settings or Group Policies that affect the maximum idle time before a device locks. Additionally, if a password is required when a screensaver turns on, the screensaver timeout will limit the options the user may choose. @@ -62,13 +59,12 @@ This policy setting allows you to control whether a user can change the time bef | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -95,7 +91,7 @@ This policy setting allows you to control whether a user can change the time bef | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -110,7 +106,7 @@ This policy setting allows the administrator to assign a specified credential pr - If you enable this policy setting, the specified credential provider is selected on other user tile. -- If you disable or do not configure this policy setting, the system picks the default credential provider on other user tile. +- If you disable or don't configure this policy setting, the system picks the default credential provider on other user tile. > [!NOTE] > A list of registered credential providers and their GUIDs can be found in the registry at HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\Credential Providers. @@ -125,13 +121,12 @@ This policy setting allows the administrator to assign a specified credential pr | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -157,7 +152,7 @@ This policy setting allows the administrator to assign a specified credential pr | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -168,21 +163,17 @@ This policy setting allows the administrator to assign a specified credential pr -This policy setting allows the administrator to exclude the specified -credential providers from use during authentication. +This policy setting allows the administrator to exclude the specified credential providers from use during authentication. + +Note credential providers are used to process and validate user credentials during logon or when authentication is required. -**Note** credential providers are used to process and validate user -credentials during logon or when authentication is required. Windows Vista provides two default credential providers: -Password and Smart Card. An administrator can install additional -credential providers for different sets of credentials -(for example, to support biometric authentication). -- If you enable this policy, an administrator can specify the CLSIDs -of the credential providers to exclude from the set of installed -credential providers available for authentication purposes. +Password and Smart Card. An administrator can install additional credential providers for different sets of credentials (for example, to support biometric authentication). -- If you disable or do not configure this policy, all installed and otherwise enabled credential providers are available for authentication purposes. +- If you enable this policy, an administrator can specify the CLSIDs of the credential providers to exclude from the set of installed credential providers available for authentication purposes. + +- If you disable or don't configure this policy, all installed and otherwise enabled credential providers are available for authentication purposes. @@ -194,13 +185,12 @@ credential providers available for authentication purposes. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-credssp.md b/windows/client-management/mdm/policy-csp-admx-credssp.md index 336f4f912a..746fc85903 100644 --- a/windows/client-management/mdm/policy-csp-admx-credssp.md +++ b/windows/client-management/mdm/policy-csp-admx-credssp.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_CredSsp Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_CredSsp -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -50,17 +47,21 @@ This policy setting applies when server authentication was achieved by using a t The policy becomes effective the next time the user signs on to a computer running Windows. -- If you disable or do not configure (by default) this policy setting, delegation of default credentials is not permitted to any computer. Applications depending upon this delegation behavior might fail authentication. For more information, see KB. +- If you disable or don't configure (by default) this policy setting, delegation of default credentials isn't permitted to any computer. Applications depending upon this delegation behavior might fail authentication. For more information, see KB. FWlink for KB: + > [!NOTE] > The "Allow delegating default credentials" policy setting can be set to one or more Service Principal Names (SPNs). The SPN represents the target server to which the user credentials can be delegated. The use of a single wildcard character is permitted when specifying the SPN. For Example: -TERMSRV/host.humanresources.fabrikam.com Remote Desktop Session Host running on host.humanresources.fabrikam.com machine + +TERMSRV/host.humanresources.fabrikam.com Remote Desktop Session Host running on host.humanresources.fabrikam.com machine. + TERMSRV/* Remote Desktop Session Host running on all machines. + TERMSRV/*.humanresources.fabrikam.com Remote Desktop Session Host running on all machines in .humanresources.fabrikam.com. @@ -73,13 +74,12 @@ TERMSRV/*.humanresources.fabrikam.com Remote Desktop Session Host running on all | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -106,7 +106,7 @@ TERMSRV/*.humanresources.fabrikam.com Remote Desktop Session Host running on all | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -123,14 +123,17 @@ This policy setting applies when server authentication was achieved via NTLM. - If you enable this policy setting, you can specify the servers to which the user's default credentials can be delegated (default credentials are those that you use when first logging on to Windows). -- If you disable or do not configure (by default) this policy setting, delegation of default credentials is not permitted to any machine. +- If you disable or don't configure (by default) this policy setting, delegation of default credentials isn't permitted to any machine. > [!NOTE] > The "Allow delegating default credentials with NTLM-only server authentication" policy setting can be set to one or more Service Principal Names (SPNs). The SPN represents the target server to which the user credentials can be delegated. The use of a single wildcard character is permitted when specifying the SPN. For Example: -TERMSRV/host.humanresources.fabrikam.com Remote Desktop Session Host running on host.humanresources.fabrikam.com machine + +TERMSRV/host.humanresources.fabrikam.com Remote Desktop Session Host running on host.humanresources.fabrikam.com machine. + TERMSRV/* Remote Desktop Session Host running on all machines. + TERMSRV/*.humanresources.fabrikam.com Remote Desktop Session Host running on all machines in .humanresources.fabrikam.com. @@ -143,13 +146,12 @@ TERMSRV/*.humanresources.fabrikam.com Remote Desktop Session Host running on all | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -176,7 +178,7 @@ TERMSRV/*.humanresources.fabrikam.com Remote Desktop Session Host running on all | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -187,7 +189,7 @@ TERMSRV/*.humanresources.fabrikam.com Remote Desktop Session Host running on all -Encryption Oracle Remediation +Encryption Oracle Remediation. This policy setting applies to applications using the CredSSP component (for example: Remote Desktop Connection). @@ -195,9 +197,9 @@ Some versions of the CredSSP protocol are vulnerable to an encryption oracle att If you enable this policy setting, CredSSP version support will be selected based on the following options: -Force Updated Clients: Client applications which use CredSSP will not be able to fall back to the insecure versions and services using CredSSP will not accept unpatched clients. **Note** this setting should not be deployed until all remote hosts support the newest version. +Force Updated Clients: Client applications which use CredSSP won't be able to fall back to the insecure versions and services using CredSSP won't accept unpatched clients. Note this setting shouldn't be deployed until all remote hosts support the newest version. -Mitigated: Client applications which use CredSSP will not be able to fall back to the insecure version but services using CredSSP will accept unpatched clients. See the link below for important information about the risk posed by remaining unpatched clients. +Mitigated: Client applications which use CredSSP won't be able to fall back to the insecure version but services using CredSSP will accept unpatched clients. See the link below for important information about the risk posed by remaining unpatched clients. Vulnerable: Client applications which use CredSSP will expose the remote servers to attacks by supporting fall back to the insecure versions and services using CredSSP will accept unpatched clients. @@ -213,13 +215,12 @@ For more information about the vulnerability and servicing requirements for prot | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -245,7 +246,7 @@ For more information about the vulnerability and servicing requirements for prot | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -262,17 +263,21 @@ This policy setting applies when server authentication was achieved via a truste - If you enable this policy setting, you can specify the servers to which the user's fresh credentials can be delegated (fresh credentials are those that you are prompted for when executing the application). -- If you do not configure (by default) this policy setting, after proper mutual authentication, delegation of fresh credentials is permitted to Remote Desktop Session Host running on any machine (TERMSRV/*). +- If you don't configure (by default) this policy setting, after proper mutual authentication, delegation of fresh credentials is permitted to Remote Desktop Session Host running on any machine (TERMSRV/*). -- If you disable this policy setting, delegation of fresh credentials is not permitted to any machine. +- If you disable this policy setting, delegation of fresh credentials isn't permitted to any machine. > [!NOTE] > The "Allow delegating fresh credentials" policy setting can be set to one or more Service Principal Names (SPNs). The SPN represents the target server to which the user credentials can be delegated. The use of a single wildcard is permitted when specifying the SPN. For Example: -TERMSRV/host.humanresources.fabrikam.com -Remote Desktop Session Host running on host.humanresources.fabrikam.com machine + +TERMSRV/host.humanresources.fabrikam.com. + +Remote Desktop Session Host running on host.humanresources.fabrikam.com machine. + TERMSRV/* Remote Desktop Session Host running on all machines. + TERMSRV/*.humanresources.fabrikam.com Remote Desktop Session Host running on all machines in .humanresources.fabrikam.com. @@ -285,13 +290,12 @@ TERMSRV/*.humanresources.fabrikam.com Remote Desktop Session Host running on all | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -318,7 +322,7 @@ TERMSRV/*.humanresources.fabrikam.com Remote Desktop Session Host running on all | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -335,16 +339,19 @@ This policy setting applies when server authentication was achieved via NTLM. - If you enable this policy setting, you can specify the servers to which the user's fresh credentials can be delegated (fresh credentials are those that you are prompted for when executing the application). -- If you do not configure (by default) this policy setting, after proper mutual authentication, delegation of fresh credentials is permitted to Remote Desktop Session Host running on any machine (TERMSRV/*). +- If you don't configure (by default) this policy setting, after proper mutual authentication, delegation of fresh credentials is permitted to Remote Desktop Session Host running on any machine (TERMSRV/*). -- If you disable this policy setting, delegation of fresh credentials is not permitted to any machine. +- If you disable this policy setting, delegation of fresh credentials isn't permitted to any machine. > [!NOTE] > The "Allow delegating fresh credentials with NTLM-only server authentication" policy setting can be set to one or more Service Principal Names (SPNs). The SPN represents the target server to which the user credentials can be delegated. The use of a single wildcard character is permitted when specifying the SPN. For Example: -TERMSRV/host.humanresources.fabrikam.com Remote Desktop Session Host running on host.humanresources.fabrikam.com machine + +TERMSRV/host.humanresources.fabrikam.com Remote Desktop Session Host running on host.humanresources.fabrikam.com machine. + TERMSRV/* Remote Desktop Session Host running on all machines. + TERMSRV/*.humanresources.fabrikam.com Remote Desktop Session Host running on all machines in humanresources.fabrikam.com. @@ -357,13 +364,12 @@ TERMSRV/*.humanresources.fabrikam.com Remote Desktop Session Host running on all | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -390,7 +396,7 @@ TERMSRV/*.humanresources.fabrikam.com Remote Desktop Session Host running on all | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -407,16 +413,19 @@ This policy setting applies when server authentication was achieved via a truste - If you enable this policy setting, you can specify the servers to which the user's saved credentials can be delegated (saved credentials are those that you elect to save/remember using the Windows credential manager). -- If you do not configure (by default) this policy setting, after proper mutual authentication, delegation of saved credentials is permitted to Remote Desktop Session Host running on any machine (TERMSRV/*). +- If you don't configure (by default) this policy setting, after proper mutual authentication, delegation of saved credentials is permitted to Remote Desktop Session Host running on any machine (TERMSRV/*). -- If you disable this policy setting, delegation of saved credentials is not permitted to any machine. +- If you disable this policy setting, delegation of saved credentials isn't permitted to any machine. > [!NOTE] > The "Allow delegating saved credentials" policy setting can be set to one or more Service Principal Names (SPNs). The SPN represents the target server to which the user credentials can be delegated. The use of a single wildcard character is permitted when specifying the SPN. For Example: -TERMSRV/host.humanresources.fabrikam.com Remote Desktop Session Host running on host.humanresources.fabrikam.com machine + +TERMSRV/host.humanresources.fabrikam.com Remote Desktop Session Host running on host.humanresources.fabrikam.com machine. + TERMSRV/* Remote Desktop Session Host running on all machines. + TERMSRV/*.humanresources.fabrikam.com Remote Desktop Session Host running on all machines in humanresources.fabrikam.com. @@ -429,13 +438,12 @@ TERMSRV/*.humanresources.fabrikam.com Remote Desktop Session Host running on all | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -462,7 +470,7 @@ TERMSRV/*.humanresources.fabrikam.com Remote Desktop Session Host running on all | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -479,16 +487,19 @@ This policy setting applies when server authentication was achieved via NTLM. - If you enable this policy setting, you can specify the servers to which the user's saved credentials can be delegated (saved credentials are those that you elect to save/remember using the Windows credential manager). -- If you do not configure (by default) this policy setting, after proper mutual authentication, delegation of saved credentials is permitted to Remote Desktop Session Host running on any machine (TERMSRV/*) if the client machine is not a member of any domain. If the client is domain-joined, by default the delegation of saved credentials is not permitted to any machine. +- If you don't configure (by default) this policy setting, after proper mutual authentication, delegation of saved credentials is permitted to Remote Desktop Session Host running on any machine (TERMSRV/*) if the client machine isn't a member of any domain. If the client is domain-joined, by default the delegation of saved credentials isn't permitted to any machine. -- If you disable this policy setting, delegation of saved credentials is not permitted to any machine. +- If you disable this policy setting, delegation of saved credentials isn't permitted to any machine. > [!NOTE] > The "Allow delegating saved credentials with NTLM-only server authentication" policy setting can be set to one or more Service Principal Names (SPNs). The SPN represents the target server to which the user credentials can be delegated. The use of a single wildcard character is permitted when specifying the SPN. For Example: -TERMSRV/host.humanresources.fabrikam.com Remote Desktop Session Host running on host.humanresources.fabrikam.com machine + +TERMSRV/host.humanresources.fabrikam.com Remote Desktop Session Host running on host.humanresources.fabrikam.com machine. + TERMSRV/* Remote Desktop Session Host running on all machines. + TERMSRV/*.humanresources.fabrikam.com Remote Desktop Session Host running on all machines in humanresources.fabrikam.com. @@ -501,13 +512,12 @@ TERMSRV/*.humanresources.fabrikam.com Remote Desktop Session Host running on all | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -534,7 +544,7 @@ TERMSRV/*.humanresources.fabrikam.com Remote Desktop Session Host running on all | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -547,17 +557,20 @@ TERMSRV/*.humanresources.fabrikam.com Remote Desktop Session Host running on all This policy setting applies to applications using the Cred SSP component (for example: Remote Desktop Connection). -- If you enable this policy setting, you can specify the servers to which the user's default credentials cannot be delegated (default credentials are those that you use when first logging on to Windows). +- If you enable this policy setting, you can specify the servers to which the user's default credentials can't be delegated (default credentials are those that you use when first logging on to Windows). -- If you disable or do not configure (by default) this policy setting, this policy setting does not specify any server. +- If you disable or don't configure (by default) this policy setting, this policy setting doesn't specify any server. > [!NOTE] -> The "Deny delegating default credentials" policy setting can be set to one or more Service Principal Names (SPNs). The SPN represents the target server to which the user credentials cannot be delegated. The use of a single wildcard character is permitted when specifying the SPN. +> The "Deny delegating default credentials" policy setting can be set to one or more Service Principal Names (SPNs). The SPN represents the target server to which the user credentials can't be delegated. The use of a single wildcard character is permitted when specifying the SPN. For Example: -TERMSRV/host.humanresources.fabrikam.com Remote Desktop Session Host running on host.humanresources.fabrikam.com machine + +TERMSRV/host.humanresources.fabrikam.com Remote Desktop Session Host running on host.humanresources.fabrikam.com machine. + TERMSRV/* Remote Desktop Session Host running on all machines. -TERMSRV/*.humanresources.fabrikam.com Remote Desktop Session Host running on all machines in .humanresources.fabrikam.com + +TERMSRV/*.humanresources.fabrikam.com Remote Desktop Session Host running on all machines in .humanresources.fabrikam.com. This policy setting can be used in combination with the "Allow delegating default credentials" policy setting to define exceptions for specific servers that are otherwise permitted when using wildcard characters in the "Allow delegating default credentials" server list. @@ -571,13 +584,12 @@ This policy setting can be used in combination with the "Allow delegating defaul | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -604,7 +616,7 @@ This policy setting can be used in combination with the "Allow delegating defaul | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -617,17 +629,20 @@ This policy setting can be used in combination with the "Allow delegating defaul This policy setting applies to applications using the Cred SSP component (for example: Remote Desktop Connection). -- If you enable this policy setting, you can specify the servers to which the user's fresh credentials cannot be delegated (fresh credentials are those that you are prompted for when executing the application). +- If you enable this policy setting, you can specify the servers to which the user's fresh credentials can't be delegated (fresh credentials are those that you are prompted for when executing the application). -- If you disable or do not configure (by default) this policy setting, this policy setting does not specify any server. +- If you disable or don't configure (by default) this policy setting, this policy setting doesn't specify any server. > [!NOTE] -> The "Deny delegating fresh credentials" policy setting can be set to one or more Service Principal Names (SPNs). The SPN represents the target server to which the user credentials cannot be delegated. The use of a single wildcard character is permitted when specifying the SPN. +> The "Deny delegating fresh credentials" policy setting can be set to one or more Service Principal Names (SPNs). The SPN represents the target server to which the user credentials can't be delegated. The use of a single wildcard character is permitted when specifying the SPN. For Example: -TERMSRV/host.humanresources.fabrikam.com Remote Desktop Session Host running on host.humanresources.fabrikam.com machine + +TERMSRV/host.humanresources.fabrikam.com Remote Desktop Session Host running on host.humanresources.fabrikam.com machine. + TERMSRV/* Remote Desktop Session Host running on all machines. -TERMSRV/*.humanresources.fabrikam.com Remote Desktop Session Host running on all machines in .humanresources.fabrikam.com + +TERMSRV/*.humanresources.fabrikam.com Remote Desktop Session Host running on all machines in .humanresources.fabrikam.com. This policy setting can be used in combination with the "Allow delegating fresh credentials" policy setting to define exceptions for specific servers that are otherwise permitted when using wildcard characters in the "Allow delegating fresh credentials" server list. @@ -641,13 +656,12 @@ This policy setting can be used in combination with the "Allow delegating fresh | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -674,7 +688,7 @@ This policy setting can be used in combination with the "Allow delegating fresh | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -687,17 +701,20 @@ This policy setting can be used in combination with the "Allow delegating fresh This policy setting applies to applications using the Cred SSP component (for example: Remote Desktop Connection). -- If you enable this policy setting, you can specify the servers to which the user's saved credentials cannot be delegated (saved credentials are those that you elect to save/remember using the Windows credential manager). +- If you enable this policy setting, you can specify the servers to which the user's saved credentials can't be delegated (saved credentials are those that you elect to save/remember using the Windows credential manager). -- If you disable or do not configure (by default) this policy setting, this policy setting does not specify any server. +- If you disable or don't configure (by default) this policy setting, this policy setting doesn't specify any server. > [!NOTE] -> The "Deny delegating saved credentials" policy setting can be set to one or more Service Principal Names (SPNs). The SPN represents the target server to which the user credentials cannot be delegated. The use of a single wildcard character is permitted when specifying the SPN. +> The "Deny delegating saved credentials" policy setting can be set to one or more Service Principal Names (SPNs). The SPN represents the target server to which the user credentials can't be delegated. The use of a single wildcard character is permitted when specifying the SPN. For Example: -TERMSRV/host.humanresources.fabrikam.com Remote Desktop Session Host running on host.humanresources.fabrikam.com machine + +TERMSRV/host.humanresources.fabrikam.com Remote Desktop Session Host running on host.humanresources.fabrikam.com machine. + TERMSRV/* Remote Desktop Session Host running on all machines. -TERMSRV/*.humanresources.fabrikam.com Remote Desktop Session Host running on all machines in .humanresources.fabrikam.com + +TERMSRV/*.humanresources.fabrikam.com Remote Desktop Session Host running on all machines in .humanresources.fabrikam.com. This policy setting can be used in combination with the "Allow delegating saved credentials" policy setting to define exceptions for specific servers that are otherwise permitted when using wildcard characters in the "Allow delegating saved credentials" server list. @@ -711,13 +728,12 @@ This policy setting can be used in combination with the "Allow delegating saved | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -744,7 +760,7 @@ This policy setting can be used in combination with the "Allow delegating saved | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -755,10 +771,11 @@ This policy setting can be used in combination with the "Allow delegating saved -When running in Restricted Admin or Remote Credential Guard mode, participating apps do not expose signed in or supplied credentials to a remote host. Restricted Admin limits access to resources located on other servers or networks from the remote host because credentials are not delegated. Remote Credential Guard does not limit access to resources because it redirects all requests back to the client device. +When running in Restricted Admin or Remote Credential Guard mode, participating apps don't expose signed in or supplied credentials to a remote host. Restricted Admin limits access to resources located on other servers or networks from the remote host because credentials aren't delegated. Remote Credential Guard doesn't limit access to resources because it redirects all requests back to the client device. Participating apps: -Remote Desktop Client + +Remote Desktop Client. - If you enable this policy setting, the following options are supported: @@ -768,13 +785,13 @@ Require Remote Credential Guard: Participating applications must use Remote Cred Require Restricted Admin: Participating applications must use Restricted Admin to connect to remote hosts. -- If you disable or do not configure this policy setting, Restricted Admin and Remote Credential Guard mode are not enforced and participating apps can delegate credentials to remote devices. +- If you disable or don't configure this policy setting, Restricted Admin and Remote Credential Guard mode aren't enforced and participating apps can delegate credentials to remote devices. > [!NOTE] > To disable most credential delegation, it may be sufficient to deny delegation in Credential Security Support Provider (CredSSP) by modifying Administrative template settings (located at Computer Configuration\Administrative Templates\System\Credentials Delegation). > [!NOTE] -> On Windows 8.1 and Windows Server 2012 R2, enabling this policy will enforce Restricted Administration mode, regardless of the mode chosen. These versions do not support Remote Credential Guard. +> On Windows 8.1 and Windows Server 2012 R2, enabling this policy will enforce Restricted Administration mode, regardless of the mode chosen. These versions don't support Remote Credential Guard. @@ -786,13 +803,12 @@ Require Restricted Admin: Participating applications must use Restricted Admin t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-credui.md b/windows/client-management/mdm/policy-csp-admx-credui.md index dfe52973d8..78a89322e1 100644 --- a/windows/client-management/mdm/policy-csp-admx-credui.md +++ b/windows/client-management/mdm/policy-csp-admx-credui.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_CredUI Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_CredUI -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -49,7 +46,7 @@ This policy setting requires the user to enter Microsoft Windows credentials usi - If you enable this policy setting, users will be required to enter Windows credentials on the Secure Desktop by means of the trusted path mechanism. -- If you disable or do not configure this policy setting, users will enter Windows credentials within the user's desktop session, potentially allowing malicious code access to the user's Windows credentials. +- If you disable or don't configure this policy setting, users will enter Windows credentials within the user's desktop session, potentially allowing malicious code access to the user's Windows credentials. @@ -61,13 +58,12 @@ This policy setting requires the user to enter Microsoft Windows credentials usi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -94,7 +90,7 @@ This policy setting requires the user to enter Microsoft Windows credentials usi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -117,13 +113,12 @@ If you turn this policy setting on, local users won't be able to set up and use | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-ctrlaltdel.md b/windows/client-management/mdm/policy-csp-admx-ctrlaltdel.md index 84347d6bd5..5ac2644ebe 100644 --- a/windows/client-management/mdm/policy-csp-admx-ctrlaltdel.md +++ b/windows/client-management/mdm/policy-csp-admx-ctrlaltdel.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_CtrlAltDel Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_CtrlAltDel -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,7 +41,7 @@ ms.topic: reference This policy setting prevents users from changing their Windows password on demand. -If you enable this policy setting, the 'Change Password' button on the Windows Security dialog box will not appear when you press Ctrl+Alt+Del. +If you enable this policy setting, the 'Change Password' button on the Windows Security dialog box won't appear when you press Ctrl+Alt+Del. However, users are still able to change their password when prompted by the system. The system prompts users for a new password when an administrator requires a new password or their password is expiring. @@ -58,13 +55,12 @@ However, users are still able to change their password when prompted by the syst | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -91,7 +87,7 @@ However, users are still able to change their password when prompted by the syst | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -104,11 +100,11 @@ However, users are still able to change their password when prompted by the syst This policy setting prevents users from locking the system. -While locked, the desktop is hidden and the system cannot be used. Only the user who locked the system or the system administrator can unlock it. +While locked, the desktop is hidden and the system can't be used. Only the user who locked the system or the system administrator can unlock it. -- If you enable this policy setting, users cannot lock the computer from the keyboard using Ctrl+Alt+Del. +- If you enable this policy setting, users can't lock the computer from the keyboard using Ctrl+Alt+Del. -- If you disable or do not configure this policy setting, users will be able to lock the computer from the keyboard using Ctrl+Alt+Del. +- If you disable or don't configure this policy setting, users will be able to lock the computer from the keyboard using Ctrl+Alt+Del. > [!TIP] > To lock a computer without configuring a setting, press Ctrl+Alt+Delete, and then click Lock this computer. @@ -123,13 +119,12 @@ While locked, the desktop is hidden and the system cannot be used. Only the user | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -156,7 +151,7 @@ While locked, the desktop is hidden and the system cannot be used. Only the user | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -171,9 +166,9 @@ This policy setting prevents users from starting Task Manager. Task Manager (taskmgr.exe) lets users start and stop programs; monitor the performance of their computers; view and monitor all programs running on their computers, including system services; find the executable names of programs; and change the priority of the process in which programs run. -- If you enable this policy setting, users will not be able to access Task Manager. If users try to start Task Manager, a message appears explaining that a policy prevents the action. +- If you enable this policy setting, users won't be able to access Task Manager. If users try to start Task Manager, a message appears explaining that a policy prevents the action. -- If you disable or do not configure this policy setting, users can access Task Manager to start and stop programs, monitor the performance of their computers, view and monitor all programs running on their computers, including system services, find the executable names of programs, and change the priority of the process in which programs run. +- If you disable or don't configure this policy setting, users can access Task Manager to start and stop programs, monitor the performance of their computers, view and monitor all programs running on their computers, including system services, find the executable names of programs, and change the priority of the process in which programs run. @@ -185,13 +180,12 @@ Task Manager (taskmgr.exe) lets users start and stop programs; monitor the perfo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -218,7 +212,7 @@ Task Manager (taskmgr.exe) lets users start and stop programs; monitor the perfo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -231,11 +225,11 @@ Task Manager (taskmgr.exe) lets users start and stop programs; monitor the perfo This policy setting disables or removes all menu items and buttons that log the user off the system. -- If you enable this policy setting, users will not see the Log off menu item when they press Ctrl+Alt+Del. This will prevent them from logging off unless they restart or shutdown the computer, or clicking Log off from the Start menu. +- If you enable this policy setting, users won't see the Log off menu item when they press Ctrl+Alt+Del. This will prevent them from logging off unless they restart or shutdown the computer, or clicking Log off from the Start menu. Also, see the 'Remove Logoff on the Start Menu' policy setting. -- If you disable or do not configure this policy setting, users can see and select the Log off menu item when they press Ctrl+Alt+Del. +- If you disable or don't configure this policy setting, users can see and select the Log off menu item when they press Ctrl+Alt+Del. @@ -247,13 +241,12 @@ Also, see the 'Remove Logoff on the Start Menu' policy setting. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-datacollection.md b/windows/client-management/mdm/policy-csp-admx-datacollection.md index fcae6c76a0..d7d17584e5 100644 --- a/windows/client-management/mdm/policy-csp-admx-datacollection.md +++ b/windows/client-management/mdm/policy-csp-admx-datacollection.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_DataCollection Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_DataCollection -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,7 +41,7 @@ ms.topic: reference This policy setting defines the identifier used to uniquely associate this device's diagnostic data data as belonging to a given organization. If your organization is participating in a program that requires this device to be identified as belonging to your organization then use this setting to provide that identification. The value for this setting will be provided by Microsoft as part of the onboarding process for the program. -If you disable or do not configure this policy setting, then Microsoft will not be able to use this identifier to associate this machine and its diagnostic data data with your organization. +If you disable or don't configure this policy setting, then Microsoft won't be able to use this identifier to associate this machine and its diagnostic data data with your organization. @@ -58,13 +55,12 @@ If you disable or do not configure this policy setting, then Microsoft will not | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-dcom.md b/windows/client-management/mdm/policy-csp-admx-dcom.md index 57e6837e05..7e0c8df5bb 100644 --- a/windows/client-management/mdm/policy-csp-admx-dcom.md +++ b/windows/client-management/mdm/policy-csp-admx-dcom.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_DCOM Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_DCOM -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,11 +41,11 @@ ms.topic: reference Allows you to specify that local computer administrators can supplement the "Define Activation Security Check exemptions" list. -- If you enable this policy setting, and DCOM does not find an explicit entry for a DCOM server application id (appid) in the "Define Activation Security Check exemptions" policy (if enabled), DCOM will look for an entry in the locally configured list. +- If you enable this policy setting, and DCOM doesn't find an explicit entry for a DCOM server application id (appid) in the "Define Activation Security Check exemptions" policy (if enabled), DCOM will look for an entry in the locally configured list. -- If you disable this policy setting, DCOM will not look in the locally configured DCOM activation security check exemption list. +- If you disable this policy setting, DCOM won't look in the locally configured DCOM activation security check exemption list. -- If you do not configure this policy setting, DCOM will only look in the locally configured exemption list if the "Define Activation Security Check exemptions" policy is not configured. +- If you don't configure this policy setting, DCOM will only look in the locally configured exemption list if the "Define Activation Security Check exemptions" policy isn't configured. @@ -61,13 +58,12 @@ Allows you to specify that local computer administrators can supplement the "Def | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -94,7 +90,7 @@ Allows you to specify that local computer administrators can supplement the "Def | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -109,19 +105,19 @@ Allows you to view and change a list of DCOM server application ids (appids) whi DCOM server appids added to this policy must be listed in curly-brace format. For Example: `{b5dcb061-cefb-42e0-a1be-e6a6438133fe}`. If you enter a non-existent or improperly formatted appid DCOM will add it to the list without checking for errors. -- If you enable this policy setting, you can view and change the list of DCOM activation security check exemptions defined by Group Policy settings. If you add an appid to this list and set its value to 1, DCOM will not enforce the Activation security check for that DCOM server. If you add an appid to this list and set its value to 0 DCOM will always enforce the Activation security check for that DCOM server regardless of local settings. +- If you enable this policy setting, you can view and change the list of DCOM activation security check exemptions defined by Group Policy settings. If you add an appid to this list and set its value to 1, DCOM won't enforce the Activation security check for that DCOM server. If you add an appid to this list and set its value to 0 DCOM will always enforce the Activation security check for that DCOM server regardless of local settings. - If you disable this policy setting, the appid exemption list defined by Group Policy is deleted, and the one defined by local computer administrators is used. -- If you do not configure this policy setting, the appid exemption list defined by local computer administrators is used. +- If you don't configure this policy setting, the appid exemption list defined by local computer administrators is used. -**Note**: +Note: The DCOM Activation security check is done after a DCOM server process is started, but before an object activation request is dispatched to the server process. This access check is done against the DCOM server's custom launch permission security descriptor if it exists, or otherwise against the configured defaults. -If the DCOM server's custom launch permission contains explicit DENY entries this may mean that object activations that would have previously succeeded for such specified users, once the DCOM server process was up and running, might now fail instead. The proper action in this situation is to re-configure the DCOM server's custom launch permission settings for correct security settings, but this policy setting may be used in the short-term as an application compatibility deployment aid. +If the DCOM server's custom launch permission contains explicit DENY entries this may mean that object activations that would've previously succeeded for such specified users, once the DCOM server process was up and running, might now fail instead. The proper action in this situation is to re-configure the DCOM server's custom launch permission settings for correct security settings, but this policy setting may be used in the short-term as an application compatibility deployment aid. -DCOM servers added to this exemption list are only exempted if their custom launch permissions do not contain specific LocalLaunch, RemoteLaunch, LocalActivate, or RemoteActivate grant or deny entries for any users or groups. Also note, exemptions for DCOM Server Appids added to this list will apply to both 32-bit and 64-bit versions of the server if present. +DCOM servers added to this exemption list are only exempted if their custom launch permissions don't contain specific LocalLaunch, RemoteLaunch, LocalActivate, or RemoteActivate grant or deny entries for any users or groups. Also note, exemptions for DCOM Server Appids added to this list will apply to both 32-bit and 64-bit versions of the server if present. @@ -134,13 +130,12 @@ DCOM servers added to this exemption list are only exempted if their custom laun | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-desktop.md b/windows/client-management/mdm/policy-csp-admx-desktop.md index 4a0662062e..e5cf956edd 100644 --- a/windows/client-management/mdm/policy-csp-admx-desktop.md +++ b/windows/client-management/mdm/policy-csp-admx-desktop.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_Desktop Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_Desktop -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,9 +43,9 @@ Displays the filter bar above the results of an Active Directory search. The fil - If you enable this setting, the filter bar appears when the Active Directory Find dialog box opens, but users can hide it. -- If you disable this setting or do not configure it, the filter bar does not appear, but users can display it by selecting "Filter" on the "View" menu. +- If you disable this setting or don't configure it, the filter bar doesn't appear, but users can display it by selecting "Filter" on the "View" menu. -To see the filter bar, open Network Locations, click Entire Network, and then click Directory. Right-click the name of a Windows domain, and click Find. Type the name of an object in the directory, such as "Administrator." If the filter bar does not appear above the resulting display, on the View menu, click Filter. +To see the filter bar, open Network Locations, click Entire Network, and then click Directory. Right-click the name of a Windows domain, and click Find. Type the name of an object in the directory, such as "Administrator". If the filter bar doesn't appear above the resulting display, on the View menu, click Filter. @@ -60,13 +57,12 @@ To see the filter bar, open Network Locations, click Entire Network, and then cl | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -93,7 +89,7 @@ To see the filter bar, open Network Locations, click Entire Network, and then cl | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -108,9 +104,9 @@ Hides the Active Directory folder in Network Locations. The Active Directory folder displays Active Directory objects in a browse window. -- If you enable this setting, the Active Directory folder does not appear in the Network Locations folder. +- If you enable this setting, the Active Directory folder doesn't appear in the Network Locations folder. -- If you disable this setting or do not configure it, the Active Directory folder appears in the Network Locations folder. +- If you disable this setting or don't configure it, the Active Directory folder appears in the Network Locations folder. This setting is designed to let users search Active Directory but not tempt them to casually browse Active Directory. @@ -124,13 +120,12 @@ This setting is designed to let users search Active Directory but not tempt them | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -157,7 +152,7 @@ This setting is designed to let users search Active Directory but not tempt them | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -172,7 +167,7 @@ Specifies the maximum number of objects the system displays in response to a com - If you enable this setting, you can use the "Number of objects returned" box to limit returns from an Active Directory search. -- If you disable this setting or do not configure it, the system displays up to 10,000 objects. This consumes approximately 2 MB of memory or disk space. +- If you disable this setting or don't configure it, the system displays up to 10,000 objects. This consumes approximately 2 MB of memory or disk space. This setting is designed to protect the network and the domain controller from the effect of expansive searches. @@ -186,13 +181,12 @@ This setting is designed to protect the network and the domain controller from t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -218,7 +212,7 @@ This setting is designed to protect the network and the domain controller from t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -233,7 +227,7 @@ Enables Active Desktop and prevents users from disabling it. This setting prevents users from trying to enable or disable Active Desktop while a policy controls it. -If you disable this setting or do not configure it, Active Desktop is disabled by default, but users can enable it. +If you disable this setting or don't configure it, Active Desktop is disabled by default, but users can enable it. > [!NOTE] > If both the "Enable Active Desktop" setting and the "Disable Active Desktop" setting are enabled, the "Disable Active Desktop" setting is ignored. If the "Turn on Classic Shell" setting ( in User Configuration\Administrative Templates\Windows Components\Windows Explorer) is enabled, Active Desktop is disabled, and both of these policies are ignored. @@ -248,13 +242,12 @@ If you disable this setting or do not configure it, Active Desktop is disabled b | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -281,7 +274,7 @@ If you disable this setting or do not configure it, Active Desktop is disabled b | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -296,7 +289,7 @@ Disables Active Desktop and prevents users from enabling it. This setting prevents users from trying to enable or disable Active Desktop while a policy controls it. -If you disable this setting or do not configure it, Active Desktop is disabled by default, but users can enable it. +If you disable this setting or don't configure it, Active Desktop is disabled by default, but users can enable it. > [!NOTE] > If both the "Enable Active Desktop" setting and the "Disable Active Desktop" setting are enabled, the "Disable Active Desktop" setting is ignored. If the "Turn on Classic Shell" setting (in User Configuration\Administrative Templates\Windows Components\Windows Explorer) is enabled, Active Desktop is disabled, and both these policies are ignored. @@ -311,13 +304,12 @@ If you disable this setting or do not configure it, Active Desktop is disabled b | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -344,7 +336,7 @@ If you disable this setting or do not configure it, Active Desktop is disabled b | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -357,7 +349,7 @@ If you disable this setting or do not configure it, Active Desktop is disabled b Prevents the user from enabling or disabling Active Desktop or changing the Active Desktop configuration. -This is a comprehensive setting that locks down the configuration you establish by using other policies in this folder. This setting removes the Web tab from Display in Control Panel. As a result, users cannot enable or disable Active Desktop. If Active Desktop is already enabled, users cannot add, remove, or edit Web content or disable, lock, or synchronize Active Desktop components. +This is a comprehensive setting that locks down the configuration you establish by using other policies in this folder. This setting removes the Web tab from Display in Control Panel. As a result, users can't enable or disable Active Desktop. If Active Desktop is already enabled, users can't add, remove, or edit Web content or disable, lock, or synchronize Active Desktop components. @@ -369,13 +361,12 @@ This is a comprehensive setting that locks down the configuration you establish | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -402,7 +393,7 @@ This is a comprehensive setting that locks down the configuration you establish | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -419,7 +410,7 @@ This is a comprehensive setting that locks down the configuration you establish Removes icons, shortcuts, and other default and user-defined items from the desktop, including Briefcase, Recycle Bin, Computer, and Network Locations. -Removing icons and shortcuts does not prevent the user from using another method to start the programs or opening the items they represent. +Removing icons and shortcuts doesn't prevent the user from using another method to start the programs or opening the items they represent. Also, see "Items displayed in Places Bar" in User Configuration\Administrative Templates\Windows Components\Common Open File Dialog to remove the Desktop icon from the Places Bar. This will help prevent users from saving data to the Desktop. @@ -433,13 +424,12 @@ Also, see "Items displayed in Places Bar" in User Configuration\Administrative T | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -466,7 +456,7 @@ Also, see "Items displayed in Places Bar" in User Configuration\Administrative T | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -479,12 +469,12 @@ Also, see "Items displayed in Places Bar" in User Configuration\Administrative T Prevents users from using the Desktop Cleanup Wizard. -- If you enable this setting, the Desktop Cleanup wizard does not automatically run on a users workstation every 60 days. The user will also not be able to access the Desktop Cleanup Wizard. +- If you enable this setting, the Desktop Cleanup wizard doesn't automatically run on a users workstation every 60 days. The user will also not be able to access the Desktop Cleanup Wizard. -- If you disable this setting or do not configure it, the default behavior of the Desktop Clean Wizard running every 60 days occurs. +- If you disable this setting or don't configure it, the default behavior of the Desktop Clean Wizard running every 60 days occurs. > [!NOTE] -> When this setting is not enabled, users can run the Desktop Cleanup Wizard, or have it run automatically every 60 days from Display, by clicking the Desktop tab and then clicking the Customize Desktop button. +> When this setting isn't enabled, users can run the Desktop Cleanup Wizard, or have it run automatically every 60 days from Display, by clicking the Desktop tab and then clicking the Customize Desktop button. @@ -496,13 +486,12 @@ Prevents users from using the Desktop Cleanup Wizard. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -529,7 +518,7 @@ Prevents users from using the Desktop Cleanup Wizard. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -542,7 +531,7 @@ Prevents users from using the Desktop Cleanup Wizard. Removes the Internet Explorer icon from the desktop and from the Quick Launch bar on the taskbar. -This setting does not prevent the user from starting Internet Explorer by using other methods. +This setting doesn't prevent the user from starting Internet Explorer by using other methods. @@ -554,13 +543,12 @@ This setting does not prevent the user from starting Internet Explorer by using | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -587,7 +575,7 @@ This setting does not prevent the user from starting Internet Explorer by using | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -604,10 +592,10 @@ This setting hides Computer from the desktop and from the new Start menu. It als - If you disable this setting, Computer is displayed as usual, appearing as normal on the desktop, Start menu, folder tree pane, and Web views, unless restricted by another setting. -- If you do not configure this setting, the default is to display Computer as usual. +- If you don't configure this setting, the default is to display Computer as usual. > [!NOTE] -> In operating systems earlier than Microsoft Windows Vista, this policy applies to the My Computer icon. Hiding Computer and its contents does not hide the contents of the child folders of Computer. For example, if the users navigate into one of their hard drives, they see all of their folders and files there, even if this setting is enabled. +> In operating systems earlier than Microsoft Windows Vista, this policy applies to the My Computer icon. Hiding Computer and its contents doesn't hide the contents of the child folders of Computer. For example, if the users navigate into one of their hard drives, they see all of their folders and files there, even if this setting is enabled. @@ -619,13 +607,12 @@ This setting hides Computer from the desktop and from the new Start menu. It als | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -652,7 +639,7 @@ This setting hides Computer from the desktop and from the new Start menu. It als | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -667,9 +654,9 @@ Removes most occurrences of the My Documents icon. This setting removes the My Documents icon from the desktop, from File Explorer, from programs that use the File Explorer windows, and from the standard Open dialog box. -This setting does not prevent the user from using other methods to gain access to the contents of the My Documents folder. +This setting doesn't prevent the user from using other methods to gain access to the contents of the My Documents folder. -This setting does not remove the My Documents icon from the Start menu. To do so, use the "Remove My Documents icon from Start Menu" setting. +This setting doesn't remove the My Documents icon from the Start menu. To do so, use the "Remove My Documents icon from Start Menu" setting. > [!NOTE] > To make changes to this setting effective, you must log off from and log back on to Windows 2000 Professional. @@ -684,13 +671,12 @@ This setting does not remove the My Documents icon from the Start menu. To do so | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -717,7 +703,7 @@ This setting does not remove the My Documents icon from the Start menu. To do so | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -730,7 +716,7 @@ This setting does not remove the My Documents icon from the Start menu. To do so Removes the Network Locations icon from the desktop. -This setting only affects the desktop icon. It does not prevent users from connecting to the network or browsing for shared computers on the network. +This setting only affects the desktop icon. It doesn't prevent users from connecting to the network or browsing for shared computers on the network. > [!NOTE] > In operating systems earlier than Microsoft Windows Vista, this policy applies to the My Network Places icon. @@ -745,13 +731,12 @@ This setting only affects the desktop icon. It does not prevent users from conne | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -778,7 +763,7 @@ This setting only affects the desktop icon. It does not prevent users from conne | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -791,9 +776,9 @@ This setting only affects the desktop icon. It does not prevent users from conne This setting hides Properties on the context menu for Computer. -- If you enable this setting, the Properties option will not be present when the user right-clicks My Computer or clicks Computer and then goes to the File menu. Likewise, Alt-Enter does nothing when Computer is selected. +- If you enable this setting, the Properties option won't be present when the user right-clicks My Computer or clicks Computer and then goes to the File menu. Likewise, Alt-Enter does nothing when Computer is selected. -- If you disable or do not configure this setting, the Properties option is displayed as usual. +- If you disable or don't configure this setting, the Properties option is displayed as usual. @@ -805,13 +790,12 @@ This setting hides Properties on the context menu for Computer. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -838,7 +822,7 @@ This setting hides Properties on the context menu for Computer. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -851,13 +835,15 @@ This setting hides Properties on the context menu for Computer. This policy setting hides the Properties menu command on the shortcut menu for the My Documents icon. -- If you enable this policy setting, the Properties menu command will not be displayed when the user does any of the following: +- If you enable this policy setting, the Properties menu command won't be displayed when the user does any of the following: Right-clicks the My Documents icon. + Clicks the My Documents icon, and then opens the File menu. + Clicks the My Documents icon, and then presses ALT+ENTER. -- If you disable or do not configure this policy setting, the Properties menu command is displayed. +- If you disable or don't configure this policy setting, the Properties menu command is displayed. @@ -869,13 +855,12 @@ Clicks the My Documents icon, and then presses ALT+ENTER. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -902,7 +887,7 @@ Clicks the My Documents icon, and then presses ALT+ENTER. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -913,11 +898,11 @@ Clicks the My Documents icon, and then presses ALT+ENTER. -Remote shared folders are not added to Network Locations whenever you open a document in the shared folder. +Remote shared folders aren't added to Network Locations whenever you open a document in the shared folder. -- If you disable this setting or do not configure it, when you open a document in a remote shared folder, the system adds a connection to the shared folder to Network Locations. +- If you disable this setting or don't configure it, when you open a document in a remote shared folder, the system adds a connection to the shared folder to Network Locations. -- If you enable this setting, shared folders are not added to Network Locations automatically when you open a document in the shared folder. +- If you enable this setting, shared folders aren't added to Network Locations automatically when you open a document in the shared folder. @@ -929,13 +914,12 @@ Remote shared folders are not added to Network Locations whenever you open a doc | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -962,7 +946,7 @@ Remote shared folders are not added to Network Locations whenever you open a doc | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -977,7 +961,7 @@ Removes most occurrences of the Recycle Bin icon. This setting removes the Recycle Bin icon from the desktop, from File Explorer, from programs that use the File Explorer windows, and from the standard Open dialog box. -This setting does not prevent the user from using other methods to gain access to the contents of the Recycle Bin folder. +This setting doesn't prevent the user from using other methods to gain access to the contents of the Recycle Bin folder. > [!NOTE] > To make changes to this setting effective, you must log off and then log back on. @@ -992,13 +976,12 @@ This setting does not prevent the user from using other methods to gain access t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1025,7 +1008,7 @@ This setting does not prevent the user from using other methods to gain access t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1038,9 +1021,9 @@ This setting does not prevent the user from using other methods to gain access t Removes the Properties option from the Recycle Bin context menu. -- If you enable this setting, the Properties option will not be present when the user right-clicks on Recycle Bin or opens Recycle Bin and then clicks File. Likewise, Alt-Enter does nothing when Recycle Bin is selected. +- If you enable this setting, the Properties option won't be present when the user right-clicks on Recycle Bin or opens Recycle Bin and then clicks File. Likewise, Alt-Enter does nothing when Recycle Bin is selected. -- If you disable or do not configure this setting, the Properties option is displayed as usual. +- If you disable or don't configure this setting, the Properties option is displayed as usual. @@ -1052,13 +1035,12 @@ Removes the Properties option from the Recycle Bin context menu. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1085,7 +1067,7 @@ Removes the Properties option from the Recycle Bin context menu. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1098,7 +1080,7 @@ Removes the Properties option from the Recycle Bin context menu. Prevents users from saving certain changes to the desktop. -If you enable this setting, users can change the desktop, but some changes, such as the position of open windows or the size and position of the taskbar, are not saved when users log off. However, shortcuts placed on the desktop are always saved. +If you enable this setting, users can change the desktop, but some changes, such as the position of open windows or the size and position of the taskbar, aren't saved when users log off. However, shortcuts placed on the desktop are always saved. @@ -1110,13 +1092,12 @@ If you enable this setting, users can change the desktop, but some changes, such | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1143,7 +1124,7 @@ If you enable this setting, users can change the desktop, but some changes, such | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1156,9 +1137,9 @@ If you enable this setting, users can change the desktop, but some changes, such Prevents windows from being minimized or restored when the active window is shaken back and forth with the mouse. -- If you enable this policy, application windows will not be minimized or restored when the active window is shaken back and forth with the mouse. +- If you enable this policy, application windows won't be minimized or restored when the active window is shaken back and forth with the mouse. -- If you disable or do not configure this policy, this window minimizing and restoring gesture will apply. +- If you disable or don't configure this policy, this window minimizing and restoring gesture will apply. @@ -1170,13 +1151,12 @@ Prevents windows from being minimized or restored when the active window is shak | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1203,7 +1183,7 @@ Prevents windows from being minimized or restored when the active window is shak | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1221,7 +1201,7 @@ You can use the "Add" box in this setting to add particular Web-based items or s You can also use this setting to delete particular Web-based items from users' desktops. Users can add the item again (if settings allow), but the item is deleted each time the setting is refreshed. > [!NOTE] -> Removing an item from the "Add" list for this setting is not the same as deleting it. Items that are removed from the "Add" list are not removed from the desktop. They are simply not added again. +> Removing an item from the "Add" list for this setting isn't the same as deleting it. Items that are removed from the "Add" list aren't removed from the desktop. They are simply not added again. > [!NOTE] > For this setting to take affect, you must log off and log on to the system. @@ -1236,13 +1216,12 @@ You can also use this setting to delete particular Web-based items from users' d | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1268,7 +1247,7 @@ You can also use this setting to delete particular Web-based items from users' d | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1281,7 +1260,7 @@ You can also use this setting to delete particular Web-based items from users' d Prevents users from adding Web content to their Active Desktop. -This setting removes the "New" button from Web tab in Display in Control Panel. As a result, users cannot add Web pages or pictures from the Internet or an intranet to the desktop. This setting does not remove existing Web content from their Active Desktop, or prevent users from removing existing Web content. +This setting removes the "New" button from Web tab in Display in Control Panel. As a result, users can't add Web pages or pictures from the Internet or an intranet to the desktop. This setting doesn't remove existing Web content from their Active Desktop, or prevent users from removing existing Web content. Also, see the "Disable all items" setting. @@ -1295,13 +1274,12 @@ Also, see the "Disable all items" setting. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1328,7 +1306,7 @@ Also, see the "Disable all items" setting. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1341,12 +1319,12 @@ Also, see the "Disable all items" setting. Prevents users from removing Web content from their Active Desktop. -In Active Desktop, you can add items to the desktop but close them so they are not displayed. +In Active Desktop, you can add items to the desktop but close them so they aren't displayed. -If you enable this setting, items added to the desktop cannot be closed; they always appear on the desktop. This setting removes the check boxes from items on the Web tab in Display in Control Panel. +If you enable this setting, items added to the desktop can't be closed; they always appear on the desktop. This setting removes the check boxes from items on the Web tab in Display in Control Panel. > [!NOTE] -> This setting does not prevent users from deleting items from their Active Desktop. +> This setting doesn't prevent users from deleting items from their Active Desktop. @@ -1358,13 +1336,12 @@ If you enable this setting, items added to the desktop cannot be closed; they al | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1391,7 +1368,7 @@ If you enable this setting, items added to the desktop cannot be closed; they al | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1406,7 +1383,7 @@ Prevents users from deleting Web content from their Active Desktop. This setting removes the Delete button from the Web tab in Display in Control Panel. As a result, users can temporarily remove, but not delete, Web content from their Active Desktop. -This setting does not prevent users from adding Web content to their Active Desktop. +This setting doesn't prevent users from adding Web content to their Active Desktop. Also, see the "Prohibit closing items" and "Disable all items" settings. @@ -1420,13 +1397,12 @@ Also, see the "Prohibit closing items" and "Disable all items" settings. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1453,7 +1429,7 @@ Also, see the "Prohibit closing items" and "Disable all items" settings. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1466,7 +1442,7 @@ Also, see the "Prohibit closing items" and "Disable all items" settings. Prevents users from changing the properties of Web content items on their Active Desktop. -This setting disables the Properties button on the Web tab in Display in Control Panel. Also, it removes the Properties item from the menu for each item on the Active Desktop. As a result, users cannot change the properties of an item, such as its synchronization schedule, password, or display characteristics. +This setting disables the Properties button on the Web tab in Display in Control Panel. Also, it removes the Properties item from the menu for each item on the Active Desktop. As a result, users can't change the properties of an item, such as its synchronization schedule, password, or display characteristics. @@ -1478,13 +1454,12 @@ This setting disables the Properties button on the Web tab in Display in Control | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1511,7 +1486,7 @@ This setting disables the Properties button on the Web tab in Display in Control | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1524,10 +1499,10 @@ This setting disables the Properties button on the Web tab in Display in Control Removes Active Desktop content and prevents users from adding Active Desktop content. -This setting removes all Active Desktop items from the desktop. It also removes the Web tab from Display in Control Panel. As a result, users cannot add Web pages or pictures from the Internet or an intranet to the desktop. +This setting removes all Active Desktop items from the desktop. It also removes the Web tab from Display in Control Panel. As a result, users can't add Web pages or pictures from the Internet or an intranet to the desktop. > [!NOTE] -> This setting does not disable Active Desktop. Users can still use image formats, such as JPEG and GIF, for their desktop wallpaper. +> This setting doesn't disable Active Desktop. Users can still use image formats, such as JPEG and GIF, for their desktop wallpaper. @@ -1539,13 +1514,12 @@ This setting removes all Active Desktop items from the desktop. It also removes | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1572,7 +1546,7 @@ This setting removes all Active Desktop items from the desktop. It also removes | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1585,13 +1559,13 @@ This setting removes all Active Desktop items from the desktop. It also removes Prevents users from manipulating desktop toolbars. -If you enable this setting, users cannot add or remove toolbars from the desktop. Also, users cannot drag toolbars on to or off of docked toolbars. +If you enable this setting, users can't add or remove toolbars from the desktop. Also, users can't drag toolbars on to or off of docked toolbars. > [!NOTE] > If users have added or removed toolbars, this setting prevents them from restoring the default configuration. > [!TIP] -> To view the toolbars that can be added to the desktop, right-click a docked toolbar (such as the taskbar beside the Start button), and point to "Toolbars." +> To view the toolbars that can be added to the desktop, right-click a docked toolbar (such as the taskbar beside the Start button), and point to "Toolbars". Also, see the "Prohibit adjusting desktop toolbars" setting. @@ -1605,13 +1579,12 @@ Also, see the "Prohibit adjusting desktop toolbars" setting. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1638,7 +1611,7 @@ Also, see the "Prohibit adjusting desktop toolbars" setting. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1649,9 +1622,9 @@ Also, see the "Prohibit adjusting desktop toolbars" setting. -Prevents users from adjusting the length of desktop toolbars. Also, users cannot reposition items or toolbars on docked toolbars. +Prevents users from adjusting the length of desktop toolbars. Also, users can't reposition items or toolbars on docked toolbars. -This setting does not prevent users from adding or removing toolbars on the desktop. +This setting doesn't prevent users from adding or removing toolbars on the desktop. > [!NOTE] > If users have adjusted their toolbars, this setting prevents them from restoring the default configuration. @@ -1668,13 +1641,12 @@ Also, see the "Prevent adding, dragging, dropping and closing the Taskbar's tool | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1701,7 +1673,7 @@ Also, see the "Prevent adding, dragging, dropping and closing the Taskbar's tool | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1712,7 +1684,7 @@ Also, see the "Prevent adding, dragging, dropping and closing the Taskbar's tool -Permits only bitmap images for wallpaper. This setting limits the desktop background ("wallpaper") to bitmap (.bmp) files. If users select files with other image formats, such as JPEG, GIF, PNG, or HTML, through the Browse button on the Desktop tab, the wallpaper does not load. Files that are autoconverted to a .bmp format, such as JPEG, GIF, and PNG, can be set as Wallpaper by right-clicking the image and selecting "Set as Wallpaper". +Permits only bitmap images for wallpaper. This setting limits the desktop background ("wallpaper") to bitmap (.bmp) files. If users select files with other image formats, such as JPEG, GIF, PNG, or HTML, through the Browse button on the Desktop tab, the wallpaper doesn't load. Files that are autoconverted to a .bmp format, such as JPEG, GIF, and PNG, can be set as Wallpaper by right-clicking the image and selecting "Set as Wallpaper". Also, see the "Desktop Wallpaper" and the "Prevent changing wallpaper" (in User Configuration\Administrative Templates\Control Panel\Display) settings. @@ -1726,13 +1698,12 @@ Also, see the "Desktop Wallpaper" and the "Prevent changing wallpaper" (in User | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1759,7 +1730,7 @@ Also, see the "Desktop Wallpaper" and the "Prevent changing wallpaper" (in User | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1774,14 +1745,14 @@ Specifies the desktop background ("wallpaper") displayed on all users' desktops. This setting lets you specify the wallpaper on users' desktops and prevents users from changing the image or its presentation. The wallpaper you specify can be stored in a bitmap (*.bmp) or JPEG (*.jpg) file. -To use this setting, type the fully qualified path and name of the file that stores the wallpaper image. You can type a local path, such as C:\Windows\web\wallpaper\home.jpg or a UNC path, such as \\Server\Share\Corp.jpg. If the specified file is not available when the user logs on, no wallpaper is displayed. Users cannot specify alternative wallpaper. You can also use this setting to specify that the wallpaper image be centered, tiled, or stretched. Users cannot change this specification. +To use this setting, type the fully qualified path and name of the file that stores the wallpaper image. You can type a local path, such as C:\Windows\web\wallpaper\home.jpg or a UNC path, such as \\Server\Share\Corp.jpg. If the specified file isn't available when the user logs on, no wallpaper is displayed. Users can't specify alternative wallpaper. You can also use this setting to specify that the wallpaper image be centered, tiled, or stretched. Users can't change this specification. -If you disable this setting or do not configure it, no wallpaper is displayed. However, users can select the wallpaper of their choice. +If you disable this setting or don't configure it, no wallpaper is displayed. However, users can select the wallpaper of their choice. Also, see the "Allow only bitmapped wallpaper" in the same location, and the "Prevent changing wallpaper" setting in User Configuration\Administrative Templates\Control Panel. > [!NOTE] -> This setting does not apply to remote desktop server sessions. +> This setting doesn't apply to remote desktop server sessions. @@ -1793,13 +1764,12 @@ Also, see the "Allow only bitmapped wallpaper" in the same location, and the "Pr | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-devicecompat.md b/windows/client-management/mdm/policy-csp-admx-devicecompat.md index c7ba19f2ce..ca20f8c48b 100644 --- a/windows/client-management/mdm/policy-csp-admx-devicecompat.md +++ b/windows/client-management/mdm/policy-csp-admx-devicecompat.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_DeviceCompat Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_DeviceCompat -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -54,13 +51,12 @@ Changes behavior of Microsoft bus drivers to work with specific devices. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -87,7 +83,7 @@ Changes behavior of Microsoft bus drivers to work with specific devices. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -110,13 +106,12 @@ Changes behavior of 3rd-party drivers to work around incompatibilities introduce | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-deviceguard.md b/windows/client-management/mdm/policy-csp-admx-deviceguard.md index 35e1379f3c..b1348a061e 100644 --- a/windows/client-management/mdm/policy-csp-admx-deviceguard.md +++ b/windows/client-management/mdm/policy-csp-admx-deviceguard.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_DeviceGuard Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_DeviceGuard -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -33,7 +30,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,9 +41,9 @@ ms.topic: reference -Deploy Windows Defender Application Control +Deploy Windows Defender Application Control. -This policy setting lets you deploy a Code Integrity Policy to a machine to control what is allowed to run on that machine. +This policy setting lets you deploy a Code Integrity Policy to a machine to control what's allowed to run on that machine. If you deploy a Code Integrity Policy, Windows will restrict what can run in both kernel mode and on the Windows Desktop based on the policy. To enable this policy the machine must be rebooted. @@ -67,13 +64,12 @@ If using a signed and protected policy then disabling this policy setting doesn' | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-deviceinstallation.md b/windows/client-management/mdm/policy-csp-admx-deviceinstallation.md index e0d3710fed..17c29621cf 100644 --- a/windows/client-management/mdm/policy-csp-admx-deviceinstallation.md +++ b/windows/client-management/mdm/policy-csp-admx-deviceinstallation.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_DeviceInstallation Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_DeviceInstallation -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -48,7 +45,7 @@ This policy setting allows you to determine whether members of the Administrator - If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server. -- If you disable or do not configure this policy setting, members of the Administrators group are subject to all policy settings that restrict device installation. +- If you disable or don't configure this policy setting, members of the Administrators group are subject to all policy settings that restrict device installation. @@ -60,13 +57,12 @@ This policy setting allows you to determine whether members of the Administrator | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -93,7 +89,7 @@ This policy setting allows you to determine whether members of the Administrator | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -108,7 +104,7 @@ This policy setting allows you to display a custom message to users in a notific - If you enable this policy setting, Windows displays the text you type in the Detail Text box when a policy setting prevents device installation. -- If you disable or do not configure this policy setting, Windows displays a default message when a policy setting prevents device installation. +- If you disable or don't configure this policy setting, Windows displays a default message when a policy setting prevents device installation. @@ -120,13 +116,12 @@ This policy setting allows you to display a custom message to users in a notific | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -152,7 +147,7 @@ This policy setting allows you to display a custom message to users in a notific | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -167,7 +162,7 @@ This policy setting allows you to display a custom message title in a notificati - If you enable this policy setting, Windows displays the text you type in the Main Text box as the title text of a notification when a policy setting prevents device installation. -- If you disable or do not configure this policy setting, Windows displays a default title in a notification when a policy setting prevents device installation. +- If you disable or don't configure this policy setting, Windows displays a default title in a notification when a policy setting prevents device installation. @@ -179,13 +174,12 @@ This policy setting allows you to display a custom message title in a notificati | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -211,7 +205,7 @@ This policy setting allows you to display a custom message title in a notificati | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -226,7 +220,7 @@ This policy setting allows you to configure the number of seconds Windows waits - If you enable this policy setting, Windows waits for the number of seconds you specify before terminating the installation. -- If you disable or do not configure this policy setting, Windows waits 240 seconds for a device installation task to complete before terminating the installation. +- If you disable or don't configure this policy setting, Windows waits 240 seconds for a device installation task to complete before terminating the installation. @@ -238,13 +232,12 @@ This policy setting allows you to configure the number of seconds Windows waits | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -270,7 +263,7 @@ This policy setting allows you to configure the number of seconds Windows waits | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -285,10 +278,10 @@ This policy setting establishes the amount of time (in seconds) that the system - If you enable this policy setting, set the amount of seconds you want the system to wait until a reboot. -- If you disable or do not configure this policy setting, the system does not force a reboot. +- If you disable or don't configure this policy setting, the system doesn't force a reboot. > [!NOTE] -> If no reboot is forced, the device installation restriction right will not take effect until the system is restarted. +> If no reboot is forced, the device installation restriction right won't take effect until the system is restarted. @@ -300,13 +293,12 @@ This policy setting establishes the amount of time (in seconds) that the system | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -333,7 +325,7 @@ This policy setting establishes the amount of time (in seconds) that the system | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -344,16 +336,16 @@ This policy setting establishes the amount of time (in seconds) that the system -This policy setting allows you to prevent Windows from installing removable devices. A device is considered removable when the driver for the device to which it is connected indicates that the device is removable. For example, a Universal Serial Bus (USB) device is reported to be removable by the drivers for the USB hub to which the device is connected. By default, this policy setting takes precedence over any other policy setting that allows Windows to install a device. +This policy setting allows you to prevent Windows from installing removable devices. A device is considered removable when the driver for the device to which it's connected indicates that the device is removable. For example, a Universal Serial Bus (USB) device is reported to be removable by the drivers for the USB hub to which the device is connected. By default, this policy setting takes precedence over any other policy setting that allows Windows to install a device. > [!NOTE] > To enable the "Allow installation of devices using drivers that match these device setup classes", "Allow installation of devices that match any of these device IDs", and "Allow installation of devices that match any of these device instance IDs" policy settings to supersede this policy setting for applicable devices, enable the "Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria" policy setting. -- If you enable this policy setting, Windows is prevented from installing removable devices and existing removable devices cannot have their drivers updated. +- If you enable this policy setting, Windows is prevented from installing removable devices and existing removable devices can't have their drivers updated. - If you enable this policy setting on a remote desktop server, the policy setting affects redirection of removable devices from a remote desktop client to the remote desktop server. -- If you disable or do not configure this policy setting, Windows can install and update driver packages for removable devices as allowed or prevented by other policy settings. +- If you disable or don't configure this policy setting, Windows can install and update driver packages for removable devices as allowed or prevented by other policy settings. @@ -365,13 +357,12 @@ This policy setting allows you to prevent Windows from installing removable devi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -398,7 +389,7 @@ This policy setting allows you to prevent Windows from installing removable devi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -411,9 +402,9 @@ This policy setting allows you to prevent Windows from installing removable devi This policy setting allows you to prevent Windows from creating a system restore point during device activity that would normally prompt Windows to create a system restore point. Windows normally creates restore points for certain driver activity, such as the installation of an unsigned driver. A system restore point enables you to more easily restore your system to its state before the activity. -- If you enable this policy setting, Windows does not create a system restore point when one would normally be created. +- If you enable this policy setting, Windows doesn't create a system restore point when one would normally be created. -- If you disable or do not configure this policy setting, Windows creates a system restore point as it normally would. +- If you disable or don't configure this policy setting, Windows creates a system restore point as it normally would. @@ -425,13 +416,12 @@ This policy setting allows you to prevent Windows from creating a system restore | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -458,7 +448,7 @@ This policy setting allows you to prevent Windows from creating a system restore | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -473,7 +463,7 @@ This policy setting specifies a list of device setup class GUIDs describing driv - If you enable this policy setting, members of the Users group may install new drivers for the specified device setup classes. The drivers must be signed according to Windows Driver Signing Policy, or be signed by publishers already in the TrustedPublisher store. -- If you disable or do not configure this policy setting, only members of the Administrators group are allowed to install new driver packages on the system. +- If you disable or don't configure this policy setting, only members of the Administrators group are allowed to install new driver packages on the system. @@ -485,13 +475,12 @@ This policy setting specifies a list of device setup class GUIDs describing driv | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-devicesetup.md b/windows/client-management/mdm/policy-csp-admx-devicesetup.md index 658452c874..031a59b0a8 100644 --- a/windows/client-management/mdm/policy-csp-admx-devicesetup.md +++ b/windows/client-management/mdm/policy-csp-admx-devicesetup.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_DeviceSetup Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_DeviceSetup -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,9 +41,9 @@ ms.topic: reference This policy setting allows you to turn off "Found New Hardware" balloons during device installation. -- If you enable this policy setting, "Found New Hardware" balloons do not appear while a device is being installed. +- If you enable this policy setting, "Found New Hardware" balloons don't appear while a device is being installed. -- If you disable or do not configure this policy setting, "Found New Hardware" balloons appear while a device is being installed, unless the driver for the device suppresses the balloons. +- If you disable or don't configure this policy setting, "Found New Hardware" balloons appear while a device is being installed, unless the driver for the device suppresses the balloons. @@ -58,13 +55,12 @@ This policy setting allows you to turn off "Found New Hardware" balloons during | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -91,7 +87,7 @@ This policy setting allows you to turn off "Found New Hardware" balloons during | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -106,11 +102,11 @@ This policy setting allows you to specify the order in which Windows searches so - If you enable this policy setting, you can select whether Windows searches for drivers on Windows Update unconditionally, only if necessary, or not at all. -**Note** that searching always implies that Windows will attempt to search Windows Update exactly one time. With this setting, Windows will not continually search for updates. This setting is used to ensure that the best software will be found for the device, even if the network is temporarily available. +Note that searching always implies that Windows will attempt to search Windows Update exactly one time. With this setting, Windows won't continually search for updates. This setting is used to ensure that the best software will be found for the device, even if the network is temporarily available. -If the setting for searching only if needed is specified, then Windows will search for a driver only if a driver is not locally available on the system. +If the setting for searching only if needed is specified, then Windows will search for a driver only if a driver isn't locally available on the system. -- If you disable or do not configure this policy setting, members of the Administrators group can determine the priority order in which Windows searches source locations for device drivers. +- If you disable or don't configure this policy setting, members of the Administrators group can determine the priority order in which Windows searches source locations for device drivers. @@ -122,13 +118,12 @@ If the setting for searching only if needed is specified, then Windows will sear | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-dfs.md b/windows/client-management/mdm/policy-csp-admx-dfs.md index a1bfa5be48..da7f64566e 100644 --- a/windows/client-management/mdm/policy-csp-admx-dfs.md +++ b/windows/client-management/mdm/policy-csp-admx-dfs.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_DFS Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_DFS -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,7 +43,7 @@ This policy setting allows you to configure how often a Distributed File System - If you enable this policy setting, you can configure how often a DFS client attempts to discover domain controllers. This value is specified in minutes. -- If you disable or do not configure this policy setting, the default value of 15 minutes applies. +- If you disable or don't configure this policy setting, the default value of 15 minutes applies. > [!NOTE] > The minimum value you can select is 15 minutes. If you try to set this setting to a value less than 15 minutes, the default value of 15 minutes is applied. @@ -61,13 +58,12 @@ This policy setting allows you to configure how often a Distributed File System | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-digitallocker.md b/windows/client-management/mdm/policy-csp-admx-digitallocker.md index 78e62e2a1a..dca7129486 100644 --- a/windows/client-management/mdm/policy-csp-admx-digitallocker.md +++ b/windows/client-management/mdm/policy-csp-admx-digitallocker.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_DigitalLocker Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_DigitalLocker -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,9 +43,9 @@ Specifies whether Digital Locker can run. Digital Locker is a dedicated download manager associated with Windows Marketplace and a feature of Windows that can be used to manage and download products acquired and stored in the user's Windows Marketplace Digital Locker. -- If you enable this setting, Digital Locker will not run. +- If you enable this setting, Digital Locker won't run. -- If you disable or do not configure this setting, Digital Locker can be run. +- If you disable or don't configure this setting, Digital Locker can be run. @@ -60,13 +57,12 @@ Digital Locker is a dedicated download manager associated with Windows Marketpla | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -93,7 +89,7 @@ Digital Locker is a dedicated download manager associated with Windows Marketpla | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -108,9 +104,9 @@ Specifies whether Digital Locker can run. Digital Locker is a dedicated download manager associated with Windows Marketplace and a feature of Windows that can be used to manage and download products acquired and stored in the user's Windows Marketplace Digital Locker. -- If you enable this setting, Digital Locker will not run. +- If you enable this setting, Digital Locker won't run. -- If you disable or do not configure this setting, Digital Locker can be run. +- If you disable or don't configure this setting, Digital Locker can be run. @@ -122,13 +118,12 @@ Digital Locker is a dedicated download manager associated with Windows Marketpla | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-diskdiagnostic.md b/windows/client-management/mdm/policy-csp-admx-diskdiagnostic.md index 01ef255643..8f7131923e 100644 --- a/windows/client-management/mdm/policy-csp-admx-diskdiagnostic.md +++ b/windows/client-management/mdm/policy-csp-admx-diskdiagnostic.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_DiskDiagnostic Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_DiskDiagnostic -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,14 +43,14 @@ This policy setting substitutes custom alert text in the disk diagnostic message - If you enable this policy setting, Windows displays custom alert text in the disk diagnostic message. The custom text may not exceed 512 characters. -- If you disable or do not configure this policy setting, Windows displays the default alert text in the disk diagnostic message. +- If you disable or don't configure this policy setting, Windows displays the default alert text in the disk diagnostic message. No reboots or service restarts are required for this policy setting to take effect: changes take effect immediately. -This policy setting only takes effect if the Disk Diagnostic scenario policy setting is enabled or not configured and the Diagnostic Policy Service (DPS) is in the running state. When the service is stopped or disabled, diagnostic scenarios are not executed. The DPS can be configured with the Services snap-in to the Microsoft Management Console. +This policy setting only takes effect if the Disk Diagnostic scenario policy setting is enabled or not configured and the Diagnostic Policy Service (DPS) is in the running state. When the service is stopped or disabled, diagnostic scenarios aren't executed. The DPS can be configured with the Services snap-in to the Microsoft Management Console. > [!NOTE] -> For Windows Server systems, this policy setting applies only if the Desktop Experience optional component is installed and the Remote Desktop Services role is not installed. +> For Windows Server systems, this policy setting applies only if the Desktop Experience optional component is installed and the Remote Desktop Services role isn't installed. @@ -65,13 +62,12 @@ This policy setting only takes effect if the Disk Diagnostic scenario policy set | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -97,7 +93,7 @@ This policy setting only takes effect if the Disk Diagnostic scenario policy set | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -110,22 +106,22 @@ This policy setting only takes effect if the Disk Diagnostic scenario policy set This policy setting determines the execution level for S. M. A. R. T.-based disk diagnostics. -Self-Monitoring And Reporting Technology (S. M. A. R. T.) is a standard mechanism for storage devices to report faults to Windows. A disk that reports a S. M. A. R. T. fault may need to be repaired or replaced. The Diagnostic Policy Service (DPS) detects and logs S. M. A. R. T. faults to the event log when they occur. +Self-Monitoring And Reporting Technology (S. M. A. R. T). is a standard mechanism for storage devices to report faults to Windows. A disk that reports a S. M. A. R. T. fault may need to be repaired or replaced. The Diagnostic Policy Service (DPS) detects and logs S. M. A. R. T. faults to the event log when they occur. - If you enable this policy setting, the DPS also warns users of S. M. A. R. T. faults and guides them through backup and recovery to minimize potential data loss. - If you disable this policy, S. M. A. R. T. faults are still detected and logged, but no corrective action is taken. -- If you do not configure this policy setting, the DPS enables S. M. A. R. T. fault resolution by default. +- If you don't configure this policy setting, the DPS enables S. M. A. R. T. fault resolution by default. -This policy setting takes effect only if the diagnostics-wide scenario execution policy is not configured. +This policy setting takes effect only if the diagnostics-wide scenario execution policy isn't configured. No reboots or service restarts are required for this policy setting to take effect: changes take effect immediately. -This policy setting takes effect only when the DPS is in the running state. When the service is stopped or disabled, diagnostic scenarios are not executed. The DPS can be configured with the Services snap-in to the Microsoft Management Console. +This policy setting takes effect only when the DPS is in the running state. When the service is stopped or disabled, diagnostic scenarios aren't executed. The DPS can be configured with the Services snap-in to the Microsoft Management Console. > [!NOTE] -> For Windows Server systems, this policy setting applies only if the Desktop Experience optional component is installed and the Remote Desktop Services role is not installed. +> For Windows Server systems, this policy setting applies only if the Desktop Experience optional component is installed and the Remote Desktop Services role isn't installed. @@ -137,13 +133,12 @@ This policy setting takes effect only when the DPS is in the running state. When | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-disknvcache.md b/windows/client-management/mdm/policy-csp-admx-disknvcache.md index 04aee2cb1f..8effe588c4 100644 --- a/windows/client-management/mdm/policy-csp-admx-disknvcache.md +++ b/windows/client-management/mdm/policy-csp-admx-disknvcache.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_DiskNVCache Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_DiskNVCache -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,11 +41,11 @@ ms.topic: reference This policy setting turns off the boot and resume optimizations for the hybrid hard disks in the system. -- If you enable this policy setting, the system does not use the non-volatile (NV) cache to optimize boot and resume. +- If you enable this policy setting, the system doesn't use the non-volatile (NV) cache to optimize boot and resume. - If you disable this policy setting, the system uses the NV cache to achieve faster boot and resume. The system determines the data that will be stored in the NV cache to optimize boot and resume. The required data is stored in the NV cache during shutdown and hibernate, respectively. This might cause a slight increase in the time taken for shutdown and hibernate. -- If you do not configure this policy setting, the default behavior is observed and the NV cache is used for boot and resume optimizations. +- If you don't configure this policy setting, the default behavior is observed and the NV cache is used for boot and resume optimizations. > [!NOTE] > This policy setting is applicable only if the NV cache feature is on. @@ -63,13 +60,12 @@ This policy setting turns off the boot and resume optimizations for the hybrid h | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -96,7 +92,7 @@ This policy setting turns off the boot and resume optimizations for the hybrid h | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -109,11 +105,11 @@ This policy setting turns off the boot and resume optimizations for the hybrid h This policy setting turns off power save mode on the hybrid hard disks in the system. -- If you enable this policy setting, the hard disks are not put into NV cache power save mode and no power savings are achieved. +- If you enable this policy setting, the hard disks aren't put into NV cache power save mode and no power savings are achieved. - If you disable this policy setting, the hard disks are put into an NV cache power saving mode. In this mode, the system tries to save power by aggressively spinning down the disk. -- If you do not configure this policy setting, the default behavior is to allow the hybrid hard disks to be in power save mode. +- If you don't configure this policy setting, the default behavior is to allow the hybrid hard disks to be in power save mode. > [!NOTE] > This policy setting is applicable only if the NV cache feature is on. @@ -128,13 +124,12 @@ This policy setting turns off power save mode on the hybrid hard disks in the sy | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -161,7 +156,7 @@ This policy setting turns off power save mode on the hybrid hard disks in the sy | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -174,14 +169,14 @@ This policy setting turns off power save mode on the hybrid hard disks in the sy This policy setting turns off all support for the non-volatile (NV) cache on all hybrid hard disks in the system. To check if you have hybrid hard disks in the system, from Device Manager, right-click the disk drive and select Properties. The NV cache can be used to optimize boot and resume by reading data from the cache while the disks are spinning up. The NV cache can also be used to reduce the power consumption of the system by keeping the disks spun down while satisfying reads and writes from the cache. -- If you enable this policy setting, the system will not manage the NV cache and will not enable NV cache power saving mode. +- If you enable this policy setting, the system won't manage the NV cache and won't enable NV cache power saving mode. - If you disable this policy setting, the system will manage the NV cache on the disks if the other policy settings for the NV cache are appropriately configured. > [!NOTE] > This policy setting will take effect on next boot. -- If you do not configure this policy setting, the default behavior is to turn on support for the NV cache. +- If you don't configure this policy setting, the default behavior is to turn on support for the NV cache. @@ -193,13 +188,12 @@ This policy setting turns off all support for the non-volatile (NV) cache on all | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -226,7 +220,7 @@ This policy setting turns off all support for the non-volatile (NV) cache on all | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -241,9 +235,9 @@ This policy setting turns off the solid state mode for the hybrid hard disks. - If you enable this policy setting, frequently written files such as the file system metadata and registry may not be stored in the NV cache. -- If you disable this policy setting, the system will store frequently written data into the non-volatile (NV) cache. This allows the system to exclusively run out of the NV cache and power down the disk for longer periods to save power. **Note** that this can cause increased wear of the NV cache. +- If you disable this policy setting, the system will store frequently written data into the non-volatile (NV) cache. This allows the system to exclusively run out of the NV cache and power down the disk for longer periods to save power. Note that this can cause increased wear of the NV cache. -- If you do not configure this policy setting, the default behavior of the system is observed and frequently written files will be stored in the NV cache. +- If you don't configure this policy setting, the default behavior of the system is observed and frequently written files will be stored in the NV cache. > [!NOTE] > This policy setting is applicable only if the NV cache feature is on. @@ -258,13 +252,12 @@ This policy setting turns off the solid state mode for the hybrid hard disks. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-diskquota.md b/windows/client-management/mdm/policy-csp-admx-diskquota.md index 30316a20e8..d8e4b5055e 100644 --- a/windows/client-management/mdm/policy-csp-admx-diskquota.md +++ b/windows/client-management/mdm/policy-csp-admx-diskquota.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_DiskQuota Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_DiskQuota -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,19 +41,19 @@ ms.topic: reference This policy setting turns on and turns off disk quota management on all NTFS volumes of the computer, and prevents users from changing the setting. -- If you enable this policy setting, disk quota management is turned on, and users cannot turn it off. +- If you enable this policy setting, disk quota management is turned on, and users can't turn it off. -- If you disable the policy setting, disk quota management is turned off, and users cannot turn it on. +- If you disable the policy setting, disk quota management is turned off, and users can't turn it on. -- If this policy setting is not configured, disk quota management is turned off by default, but administrators can turn it on. +- If this policy setting isn't configured, disk quota management is turned off by default, but administrators can turn it on. To prevent users from changing the setting while a setting is in effect, the system disables the "Enable quota management" option on the Quota tab of NTFS volumes. > [!NOTE] -> This policy setting turns on disk quota management but does not establish or enforce a particular disk quota limit. To specify a disk quota limit, use the "Default quota limit and warning level" policy setting. Otherwise, the system uses the physical space on the volume as the quota limit. +> This policy setting turns on disk quota management but doesn't establish or enforce a particular disk quota limit. To specify a disk quota limit, use the "Default quota limit and warning level" policy setting. Otherwise, the system uses the physical space on the volume as the quota limit. > [!NOTE] -> To turn on or turn off disk quota management without specifying a setting, in My Computer, right-click the name of an NTFS volume, click Properties, click the Quota tab, and then click "Enable quota management." +> To turn on or turn off disk quota management without specifying a setting, in My Computer, right-click the name of an NTFS volume, click Properties, click the Quota tab, and then click "Enable quota management". @@ -68,13 +65,12 @@ To prevent users from changing the setting while a setting is in effect, the sys | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -101,7 +97,7 @@ To prevent users from changing the setting while a setting is in effect, the sys | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -115,9 +111,10 @@ To prevent users from changing the setting while a setting is in effect, the sys This policy setting determines whether disk quota limits are enforced and prevents users from changing the setting. - If you enable this policy setting, disk quota limits are enforced. -- If you disable this policy setting, disk quota limits are not enforced. When you enable or disable this policy setting, the system disables the "Deny disk space to users exceeding quota limit" option on the Quota tab so administrators cannot make changes while the setting is in effect. -- If you do not configure this policy setting, the disk quota limit is not enforced by default, but administrators can change the setting. +- If you disable this policy setting, disk quota limits aren't enforced. When you enable or disable this policy setting, the system disables the "Deny disk space to users exceeding quota limit" option on the Quota tab so administrators can't make changes while the setting is in effect. + +- If you don't configure this policy setting, the disk quota limit isn't enforced by default, but administrators can change the setting. Enforcement is optional. When users reach an enforced disk quota limit, the system responds as though the physical space on the volume were exhausted. When users reach an unenforced limit, their status in the Quota Entries window changes, but they can continue to write to the volume as long as physical space is available. @@ -137,13 +134,12 @@ Enforcement is optional. When users reach an enforced disk quota limit, the syst | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -170,7 +166,7 @@ Enforcement is optional. When users reach an enforced disk quota limit, the syst | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -187,13 +183,13 @@ This policy setting determines how much disk space can be used by each user on e This setting overrides new users' settings for the disk quota limit and warning level on their volumes, and it disables the corresponding options in the "Select the default quota limit for new users of this volume" section on the Quota tab. -This policy setting applies to all new users as soon as they write to the volume. It does not affect disk quota limits for current users, or affect customized limits and warning levels set for particular users (on the Quota tab in Volume Properties). +This policy setting applies to all new users as soon as they write to the volume. It doesn't affect disk quota limits for current users, or affect customized limits and warning levels set for particular users (on the Quota tab in Volume Properties). -If you disable or do not configure this policy setting, the disk space available to users is not limited. The disk quota management feature uses the physical space on each volume as its quota limit and warning level. +If you disable or don't configure this policy setting, the disk space available to users isn't limited. The disk quota management feature uses the physical space on each volume as its quota limit and warning level. -When you select a limit, remember that the same limit applies to all users on all volumes, regardless of actual volume size. Be sure to set the limit and warning level so that it is reasonable for the range of volumes in the group. +When you select a limit, remember that the same limit applies to all users on all volumes, regardless of actual volume size. Be sure to set the limit and warning level so that it's reasonable for the range of volumes in the group. -This policy setting is effective only when disk quota management is enabled on the volume. Also, if disk quotas are not enforced, users can exceed the quota limit you set. When users reach the quota limit, their status in the Quota Entries window changes, but users can continue to write to the volume. +This policy setting is effective only when disk quota management is enabled on the volume. Also, if disk quotas aren't enforced, users can exceed the quota limit you set. When users reach the quota limit, their status in the Quota Entries window changes, but users can continue to write to the volume. @@ -205,13 +201,12 @@ This policy setting is effective only when disk quota management is enabled on t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -237,7 +232,7 @@ This policy setting is effective only when disk quota management is enabled on t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -251,13 +246,14 @@ This policy setting is effective only when disk quota management is enabled on t This policy setting determines whether the system records an event in the local Application log when users reach their disk quota limit on a volume, and prevents users from changing the logging setting. - If you enable this policy setting, the system records an event when the user reaches their limit. -- If you disable this policy setting, no event is recorded. Also, when you enable or disable this policy setting, the system disables the "Log event when a user exceeds their quota limit" option on the Quota tab, so administrators cannot change the setting while a setting is in effect. -- If you do not configure this policy setting, no events are recorded, but administrators can use the Quota tab option to change the setting. +- If you disable this policy setting, no event is recorded. Also, when you enable or disable this policy setting, the system disables the "Log event when a user exceeds their quota limit" option on the Quota tab, so administrators can't change the setting while a setting is in effect. + +- If you don't configure this policy setting, no events are recorded, but administrators can use the Quota tab option to change the setting. This policy setting is independent of the enforcement policy settings for disk quotas. As a result, you can direct the system to log an event, regardless of whether or not you choose to enforce the disk quota limit. -Also, this policy setting does not affect the Quota Entries window on the Quota tab. Even without the logged event, users can detect that they have reached their limit, because their status in the Quota Entries window changes. +Also, this policy setting doesn't affect the Quota Entries window on the Quota tab. Even without the logged event, users can detect that they've reached their limit, because their status in the Quota Entries window changes. > [!NOTE] > To find the logging option, in My Computer, right-click the name of an NTFS file system volume, click Properties, and then click the Quota tab. @@ -272,13 +268,12 @@ Also, this policy setting does not affect the Quota Entries window on the Quota | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -305,7 +300,7 @@ Also, this policy setting does not affect the Quota Entries window on the Quota | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -319,11 +314,12 @@ Also, this policy setting does not affect the Quota Entries window on the Quota This policy setting determines whether the system records an event in the Application log when users reach their disk quota warning level on a volume. - If you enable this policy setting, the system records an event. -- If you disable this policy setting, no event is recorded. When you enable or disable this policy setting, the system disables the corresponding "Log event when a user exceeds their warning level" option on the Quota tab so that administrators cannot change logging while a policy setting is in effect. -- If you do not configure this policy setting, no event is recorded, but administrators can use the Quota tab option to change the logging setting. +- If you disable this policy setting, no event is recorded. When you enable or disable this policy setting, the system disables the corresponding "Log event when a user exceeds their warning level" option on the Quota tab so that administrators can't change logging while a policy setting is in effect. -This policy setting does not affect the Quota Entries window on the Quota tab. Even without the logged event, users can detect that they have reached their warning level because their status in the Quota Entries window changes. +- If you don't configure this policy setting, no event is recorded, but administrators can use the Quota tab option to change the logging setting. + +This policy setting doesn't affect the Quota Entries window on the Quota tab. Even without the logged event, users can detect that they've reached their warning level because their status in the Quota Entries window changes. > [!NOTE] > To find the logging option, in My Computer, right-click the name of an NTFS file system volume, click Properties, and then click the Quota tab. @@ -338,13 +334,12 @@ This policy setting does not affect the Quota Entries window on the Quota tab. E | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -371,7 +366,7 @@ This policy setting does not affect the Quota Entries window on the Quota tab. E | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -384,7 +379,7 @@ This policy setting does not affect the Quota Entries window on the Quota tab. E This policy setting extends the disk quota policies in this folder to NTFS file system volumes on removable media. -If you disable or do not configure this policy setting, the disk quota policies established in this folder apply to fixed-media NTFS volumes only. +If you disable or don't configure this policy setting, the disk quota policies established in this folder apply to fixed-media NTFS volumes only. > [!NOTE] > When this policy setting is applied, the computer will apply the disk quota to both fixed and removable media. @@ -399,13 +394,12 @@ If you disable or do not configure this policy setting, the disk quota policies | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-distributedlinktracking.md b/windows/client-management/mdm/policy-csp-admx-distributedlinktracking.md index 60915bf0cb..9029d36c4c 100644 --- a/windows/client-management/mdm/policy-csp-admx-distributedlinktracking.md +++ b/windows/client-management/mdm/policy-csp-admx-distributedlinktracking.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_DistributedLinkTracking Area in Policy CS author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_DistributedLinkTracking -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -42,7 +39,7 @@ ms.topic: reference -Specifies that Distributed Link Tracking clients in this domain may use the Distributed Link Tracking (DLT) server, which runs on domain controllers. The DLT client enables programs to track linked files that are moved within an NTFS volume, to another NTFS volume on the same computer, or to an NTFS volume on another computer. The DLT client can more reliably track links when allowed to use the DLT server. This policy should not be set unless the DLT server is running on all domain controllers in the domain. +Specifies that Distributed Link Tracking clients in this domain may use the Distributed Link Tracking (DLT) server, which runs on domain controllers. The DLT client enables programs to track linked files that are moved within an NTFS volume, to another NTFS volume on the same computer, or to an NTFS volume on another computer. The DLT client can more reliably track links when allowed to use the DLT server. This policy shouldn't be set unless the DLT server is running on all domain controllers in the domain. @@ -55,13 +52,12 @@ Specifies that Distributed Link Tracking clients in this domain may use the Dist | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-dnsclient.md b/windows/client-management/mdm/policy-csp-admx-dnsclient.md index c9dacb52a6..f6c0d4debc 100644 --- a/windows/client-management/mdm/policy-csp-admx-dnsclient.md +++ b/windows/client-management/mdm/policy-csp-admx-dnsclient.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_DnsClient Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_DnsClient -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,7 +43,7 @@ Specifies that NetBIOS over TCP/IP (NetBT) queries are issued for fully qualifie - If you enable this policy setting, NetBT queries will be issued for multi-label and fully qualified domain names such as "www.example.com" in addition to single-label names. -- If you disable this policy setting, or if you do not configure this policy setting, NetBT queries will only be issued for single-label names such as "example" and not for multi-label and fully qualified domain names. +- If you disable this policy setting, or if you don't configure this policy setting, NetBT queries will only be issued for single-label names such as "example" and not for multi-label and fully qualified domain names. @@ -58,13 +55,12 @@ Specifies that NetBIOS over TCP/IP (NetBT) queries are issued for fully qualifie | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -91,7 +87,7 @@ Specifies that NetBIOS over TCP/IP (NetBT) queries are issued for fully qualifie | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -104,17 +100,17 @@ Specifies that NetBIOS over TCP/IP (NetBT) queries are issued for fully qualifie Specifies that computers may attach suffixes to an unqualified multi-label name before sending subsequent DNS queries if the original name query fails. -A name containing dots, but not dot-terminated, is called an unqualified multi-label name, for example "server.corp" is an unqualified multi-label name. The name "server.corp.contoso.com." is an example of a fully qualified name because it contains a terminating dot. +A name containing dots, but not dot-terminated, is called an unqualified multi-label name, for example "server.corp" is an unqualified multi-label name. The name "server.corp.contoso.com" is an example of a fully qualified name because it contains a terminating dot. For example, if attaching suffixes is allowed, an unqualified multi-label name query for "server.corp" will be queried by the DNS client first. If the query succeeds, the response is returned to the client. If the query fails, the unqualified multi-label name is appended with DNS suffixes. These suffixes can be derived from a combination of the local DNS client's primary domain suffix, a connection-specific domain suffix, and a DNS suffix search list. -If attaching suffixes is allowed, and a DNS client with a primary domain suffix of "contoso.com" performs a query for "server.corp" the DNS client will send a query for "server.corp" first, and then a query for "server.corp.contoso.com." second if the first query fails. +If attaching suffixes is allowed, and a DNS client with a primary domain suffix of "contoso.com" performs a query for "server.corp" the DNS client will send a query for "server.corp" first, and then a query for "server.corp.contoso.com" second if the first query fails. - If you enable this policy setting, suffixes are allowed to be appended to an unqualified multi-label name if the original name query fails. - If you disable this policy setting, no suffixes are appended to unqualified multi-label name queries if the original name query fails. -- If you do not configure this policy setting, computers will use their local DNS client settings to determine the query behavior for unqualified multi-label names. +- If you don't configure this policy setting, computers will use their local DNS client settings to determine the query behavior for unqualified multi-label names. @@ -126,13 +122,12 @@ If attaching suffixes is allowed, and a DNS client with a primary domain suffix | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -159,7 +154,7 @@ If attaching suffixes is allowed, and a DNS client with a primary domain suffix | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -176,7 +171,7 @@ To use this policy setting, click Enabled, and then enter a string value represe - If you enable this policy setting, the DNS suffix that you enter will be applied to all network connections used by computers that receive this policy setting. -- If you disable this policy setting, or if you do not configure this policy setting, computers will use the local or DHCP supplied connection specific DNS suffix, if configured. +- If you disable this policy setting, or if you don't configure this policy setting, computers will use the local or DHCP supplied connection specific DNS suffix, if configured. @@ -188,13 +183,12 @@ To use this policy setting, click Enabled, and then enter a string value represe | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -220,7 +214,7 @@ To use this policy setting, click Enabled, and then enter a string value represe | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -237,9 +231,9 @@ With devolution, a DNS client creates queries by appending a single-label, unqua The DNS client appends DNS suffixes to the single-label, unqualified domain name based on the state of the Append primary and connection specific DNS suffixes radio button and Append parent suffixes of the primary DNS suffix check box on the DNS tab in Advanced TCP/IP Settings for the Internet Protocol (TCP/IP) Properties dialog box. -Devolution is not enabled if a global suffix search list is configured using Group Policy. +Devolution isn't enabled if a global suffix search list is configured using Group Policy. -If a global suffix search list is not configured, and the Append primary and connection specific DNS suffixes radio button is selected, the DNS client appends the following names to a single-label name when it sends DNS queries: +If a global suffix search list isn't configured, and the Append primary and connection specific DNS suffixes radio button is selected, the DNS client appends the following names to a single-label name when it sends DNS queries: The primary DNS suffix, as specified on the Computer Name tab of the System control panel. @@ -247,13 +241,13 @@ Each connection-specific DNS suffix, assigned either through DHCP or specified i For example, when a user submits a query for a single-label name such as "example," the DNS client attaches a suffix such as "microsoft.com" resulting in the query "example.microsoft.com," before sending the query to a DNS server. -If a DNS suffix search list is not specified, the DNS client attaches the primary DNS suffix to a single-label name. If this query fails, the connection-specific DNS suffix is attached for a new query. If none of these queries are resolved, the client devolves the primary DNS suffix of the computer (drops the leftmost label of the primary DNS suffix), attaches this devolved primary DNS suffix to the single-label name, and submits this new query to a DNS server. +If a DNS suffix search list isn't specified, the DNS client attaches the primary DNS suffix to a single-label name. If this query fails, the connection-specific DNS suffix is attached for a new query. If none of these queries are resolved, the client devolves the primary DNS suffix of the computer (drops the leftmost label of the primary DNS suffix), attaches this devolved primary DNS suffix to the single-label name, and submits this new query to a DNS server. -For example, if the primary DNS suffix ooo.aaa.microsoft.com is attached to the non-dot-terminated single-label name "example," and the DNS query for example.ooo.aaa.microsoft.com fails, the DNS client devolves the primary DNS suffix (drops the leftmost label) till the specified devolution level, and submits a query for example.aaa.microsoft.com. If this query fails, the primary DNS suffix is devolved further if it is under specified devolution level and the query example.microsoft.com is submitted. If this query fails, devolution continues if it is under specified devolution level and the query example.microsoft.com is submitted, corresponding to a devolution level of two. The primary DNS suffix cannot be devolved beyond a devolution level of two. The devolution level can be configured using this policy setting. The default devolution level is two. +For example, if the primary DNS suffix ooo.aaa.microsoft.com is attached to the non-dot-terminated single-label name "example," and the DNS query for example.ooo.aaa.microsoft.com fails, the DNS client devolves the primary DNS suffix (drops the leftmost label) till the specified devolution level, and submits a query for example.aaa.microsoft.com. If this query fails, the primary DNS suffix is devolved further if it's under specified devolution level and the query example.microsoft.com is submitted. If this query fails, devolution continues if it's under specified devolution level and the query example.microsoft.com is submitted, corresponding to a devolution level of two. The primary DNS suffix can't be devolved beyond a devolution level of two. The devolution level can be configured using this policy setting. The default devolution level is two. - If you enable this policy setting and DNS devolution is also enabled, DNS clients use the DNS devolution level that you specify. -- If this policy setting is disabled, or if this policy setting is not configured, DNS clients use the default devolution level of two provided that DNS devolution is enabled. +- If this policy setting is disabled, or if this policy setting isn't configured, DNS clients use the default devolution level of two provided that DNS devolution is enabled. @@ -265,13 +259,12 @@ For example, if the primary DNS suffix ooo.aaa.microsoft.com is attached to the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -298,7 +291,7 @@ For example, if the primary DNS suffix ooo.aaa.microsoft.com is attached to the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -311,9 +304,9 @@ For example, if the primary DNS suffix ooo.aaa.microsoft.com is attached to the Specifies whether the DNS client should convert internationalized domain names (IDNs) to Punycode when the computer is on non-domain networks with no WINS servers configured. -- If this policy setting is enabled, IDNs are not converted to Punycode. +- If this policy setting is enabled, IDNs aren't converted to Punycode. -- If this policy setting is disabled, or if this policy setting is not configured, IDNs are converted to Punycode when the computer is on non-domain networks with no WINS servers configured. +- If this policy setting is disabled, or if this policy setting isn't configured, IDNs are converted to Punycode when the computer is on non-domain networks with no WINS servers configured. @@ -325,13 +318,12 @@ Specifies whether the DNS client should convert internationalized domain names ( | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -358,7 +350,7 @@ Specifies whether the DNS client should convert internationalized domain names ( | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -373,7 +365,7 @@ Specifies whether the DNS client should convert internationalized domain names ( - If this policy setting is enabled, IDNs are converted to the Nameprep form. -- If this policy setting is disabled, or if this policy setting is not configured, IDNs are not converted to the Nameprep form. +- If this policy setting is disabled, or if this policy setting isn't configured, IDNs aren't converted to the Nameprep form. @@ -385,13 +377,12 @@ Specifies whether the DNS client should convert internationalized domain names ( | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -418,7 +409,7 @@ Specifies whether the DNS client should convert internationalized domain names ( | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -435,7 +426,7 @@ To use this policy setting, click Enabled, and then enter a space-delimited list - If you enable this policy setting, the list of DNS servers is applied to all network connections used by computers that receive this policy setting. -- If you disable this policy setting, or if you do not configure this policy setting, computers will use the local or DHCP supplied list of DNS servers, if configured. +- If you disable this policy setting, or if you don't configure this policy setting, computers will use the local or DHCP supplied list of DNS servers, if configured. @@ -447,13 +438,12 @@ To use this policy setting, click Enabled, and then enter a space-delimited list | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -479,7 +469,7 @@ To use this policy setting, click Enabled, and then enter a space-delimited list | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -490,11 +480,11 @@ To use this policy setting, click Enabled, and then enter a space-delimited list -Specifies that responses from link local name resolution protocols received over a network interface that is higher in the binding order are preferred over DNS responses from network interfaces lower in the binding order. Examples of link local name resolution protocols include link local multicast name resolution (LLMNR) and NetBIOS over TCP/IP (NetBT). +Specifies that responses from link local name resolution protocols received over a network interface that's higher in the binding order are preferred over DNS responses from network interfaces lower in the binding order. Examples of link local name resolution protocols include link local multicast name resolution (LLMNR) and NetBIOS over TCP/IP (NetBT). - If you enable this policy setting, responses from link local protocols will be preferred over DNS responses if the local responses are from a network with a higher binding order. -- If you disable this policy setting, or if you do not configure this policy setting, then DNS responses from networks lower in the binding order will be preferred over responses from link local protocols received from networks higher in the binding order. +- If you disable this policy setting, or if you don't configure this policy setting, then DNS responses from networks lower in the binding order will be preferred over responses from link local protocols received from networks higher in the binding order. > [!NOTE] > This policy setting is applicable only if the turn off smart multi-homed name resolution policy setting is disabled or not configured. @@ -509,13 +499,12 @@ Specifies that responses from link local name resolution protocols received over | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -542,7 +531,7 @@ Specifies that responses from link local name resolution protocols received over | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -564,7 +553,7 @@ To use this policy setting, click Enabled and enter the entire primary DNS suffi You can use this policy setting to prevent users, including local administrators, from changing the primary DNS suffix. -- If you disable this policy setting, or if you do not configure this policy setting, each computer uses its local primary DNS suffix, which is usually the DNS name of Active Directory domain to which it is joined. +- If you disable this policy setting, or if you don't configure this policy setting, each computer uses its local primary DNS suffix, which is usually the DNS name of Active Directory domain to which it's joined. @@ -576,13 +565,12 @@ You can use this policy setting to prevent users, including local administrators | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -608,7 +596,7 @@ You can use this policy setting to prevent users, including local administrators | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -630,7 +618,7 @@ For example, with a computer name of mycomputer, a primary DNS suffix of microso > [!IMPORTANT] > This policy setting is ignored on a DNS client computer if dynamic DNS registration is disabled. -- If you disable this policy setting, or if you do not configure this policy setting, a DNS client computer will not register any A and PTR resource records using a connection-specific DNS suffix. +- If you disable this policy setting, or if you don't configure this policy setting, a DNS client computer won't register any A and PTR resource records using a connection-specific DNS suffix. @@ -642,13 +630,12 @@ For example, with a computer name of mycomputer, a primary DNS suffix of microso | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -675,7 +662,7 @@ For example, with a computer name of mycomputer, a primary DNS suffix of microso | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -694,13 +681,13 @@ By default, DNS clients configured to perform dynamic DNS registration will atte To use this policy setting, click Enabled, and then select one of the following options from the drop-down list: -Do not register: Computers will not attempt to register PTR resource records. +Don't register: Computers won't attempt to register PTR resource records. -Register: Computers will attempt to register PTR resource records even if registration of the corresponding A records was not successful. +Register: Computers will attempt to register PTR resource records even if registration of the corresponding A records wasn't successful. Register only if A record registration succeeds: Computers will attempt to register PTR resource records only if registration of the corresponding A records was successful. -- If you disable this policy setting, or if you do not configure this policy setting, computers will use locally configured settings. +- If you disable this policy setting, or if you don't configure this policy setting, computers will use locally configured settings. @@ -712,13 +699,12 @@ Register only if A record registration succeeds: Computers will attempt to regis | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -744,7 +730,7 @@ Register only if A record registration succeeds: Computers will attempt to regis | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -757,7 +743,7 @@ Register only if A record registration succeeds: Computers will attempt to regis Specifies if DNS dynamic update is enabled. Computers configured for DNS dynamic update automatically register and update their DNS resource records with a DNS server. -- If you enable this policy setting, or you do not configure this policy setting, computers will attempt to use dynamic DNS registration on all network connections that have connection-specific dynamic DNS registration enabled. For a dynamic DNS registration to be enabled on a network connection, the connection-specific configuration must allow dynamic DNS registration, and this policy setting must not be disabled. +- If you enable this policy setting, or you don't configure this policy setting, computers will attempt to use dynamic DNS registration on all network connections that have connection-specific dynamic DNS registration enabled. For a dynamic DNS registration to be enabled on a network connection, the connection-specific configuration must allow dynamic DNS registration, and this policy setting mustn't be disabled. - If you disable this policy setting, computers may not use dynamic DNS registration for any of their network connections, regardless of the configuration for individual network connections. @@ -771,13 +757,12 @@ Specifies if DNS dynamic update is enabled. Computers configured for DNS dynamic | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -804,7 +789,7 @@ Specifies if DNS dynamic update is enabled. Computers configured for DNS dynamic | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -817,13 +802,13 @@ Specifies if DNS dynamic update is enabled. Computers configured for DNS dynamic Specifies whether dynamic updates should overwrite existing resource records that contain conflicting IP addresses. -This policy setting is designed for computers that register address (A) resource records in DNS zones that do not use Secure Dynamic Updates. Secure Dynamic Update preserves ownership of resource records and does not allow a DNS client to overwrite records that are registered by other computers. +This policy setting is designed for computers that register address (A) resource records in DNS zones that don't use Secure Dynamic Updates. Secure Dynamic Update preserves ownership of resource records and doesn't allow a DNS client to overwrite records that are registered by other computers. -During dynamic update of resource records in a zone that does not use Secure Dynamic Updates, an A resource record might exist that associates the client's host name with an IP address different than the one currently in use by the client. By default, the DNS client attempts to replace the existing A resource record with an A resource record that has the client's current IP address. +During dynamic update of resource records in a zone that doesn't use Secure Dynamic Updates, an A resource record might exist that associates the client's host name with an IP address different than the one currently in use by the client. By default, the DNS client attempts to replace the existing A resource record with an A resource record that has the client's current IP address. -- If you enable this policy setting or if you do not configure this policy setting, DNS clients maintain their default behavior and will attempt to replace conflicting A resource records during dynamic update. +- If you enable this policy setting or if you don't configure this policy setting, DNS clients maintain their default behavior and will attempt to replace conflicting A resource records during dynamic update. -- If you disable this policy setting, existing A resource records that contain conflicting IP addresses will not be replaced during a dynamic update, and an error will be recorded in Event Viewer. +- If you disable this policy setting, existing A resource records that contain conflicting IP addresses won't be replaced during a dynamic update, and an error will be recorded in Event Viewer. @@ -835,13 +820,12 @@ During dynamic update of resource records in a zone that does not use Secure Dyn | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -868,7 +852,7 @@ During dynamic update of resource records in a zone that does not use Secure Dyn | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -881,7 +865,7 @@ During dynamic update of resource records in a zone that does not use Secure Dyn Specifies the interval used by DNS clients to refresh registration of A and PTR resource. This policy setting only applies to computers performing dynamic DNS updates. -Computers configured to perform dynamic DNS registration of A and PTR resource records periodically reregister their records with DNS servers, even if the record has not changed. This reregistration is required to indicate to DNS servers that records are current and should not be automatically removed (scavenged) when a DNS server is configured to delete stale records. +Computers configured to perform dynamic DNS registration of A and PTR resource records periodically reregister their records with DNS servers, even if the record hasn't changed. This reregistration is required to indicate to DNS servers that records are current and shouldn't be automatically removed (scavenged) when a DNS server is configured to delete stale records. > [!WARNING] > If record scavenging is enabled on the zone, the value of this policy setting should never be longer than the value of the DNS zone refresh interval. Configuring the registration refresh interval to be longer than the refresh interval of the DNS zone might result in the undesired deletion of A and PTR resource records. @@ -890,7 +874,7 @@ To specify the registration refresh interval, click Enabled and then enter a val - If you enable this policy setting, registration refresh interval that you specify will be applied to all network connections used by computers that receive this policy setting. -- If you disable this policy setting, or if you do not configure this policy setting, computers will use the local or DHCP supplied setting. By default, client computers configured with a static IP address attempt to update their DNS resource records once every 24 hours and DHCP clients will attempt to update their DNS resource records when a DHCP lease is granted or renewed. +- If you disable this policy setting, or if you don't configure this policy setting, computers will use the local or DHCP supplied setting. By default, client computers configured with a static IP address attempt to update their DNS resource records once every 24 hours and DHCP clients will attempt to update their DNS resource records when a DHCP lease is granted or renewed. @@ -902,13 +886,12 @@ To specify the registration refresh interval, click Enabled and then enter a val | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -934,7 +917,7 @@ To specify the registration refresh interval, click Enabled and then enter a val | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -951,7 +934,7 @@ To specify the TTL, click Enabled and then enter a value in seconds (for example - If you enable this policy setting, the TTL value that you specify will be applied to DNS resource records registered for all network connections used by computers that receive this policy setting. -- If you disable this policy setting, or if you do not configure this policy setting, computers will use the TTL settings specified in DNS. By default, the TTL is 1200 seconds (20 minutes). +- If you disable this policy setting, or if you don't configure this policy setting, computers will use the TTL settings specified in DNS. By default, the TTL is 1200 seconds (20 minutes). @@ -963,13 +946,12 @@ To specify the TTL, click Enabled and then enter a value in seconds (for example | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -995,7 +977,7 @@ To specify the TTL, click Enabled and then enter a value in seconds (for example | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1008,15 +990,15 @@ To specify the TTL, click Enabled and then enter a value in seconds (for example Specifies the DNS suffixes to attach to an unqualified single-label name before submission of a DNS query for that name. -An unqualified single-label name contains no dots. The name "example" is a single-label name. This is different from a fully qualified domain name such as "example.microsoft.com." +An unqualified single-label name contains no dots. The name "example" is a single-label name. This is different from a fully qualified domain name such as "example.microsoft.com". -Client computers that receive this policy setting will attach one or more suffixes to DNS queries for a single-label name. For example, a DNS query for the single-label name "example" will be modified to "example.microsoft.com" before sending the query to a DNS server if this policy setting is enabled with a suffix of "microsoft.com." +Client computers that receive this policy setting will attach one or more suffixes to DNS queries for a single-label name. For example, a DNS query for the single-label name "example" will be modified to "example.microsoft.com" before sending the query to a DNS server if this policy setting is enabled with a suffix of "microsoft.com". To use this policy setting, click Enabled, and then enter a string value representing the DNS suffixes that should be appended to single-label names. You must specify at least one suffix. Use a comma-delimited string, such as "microsoft.com,serverua.microsoft.com,office.microsoft.com" to specify multiple suffixes. - If you enable this policy setting, one DNS suffix is attached at a time for each query. If a query is unsuccessful, a new DNS suffix is added in place of the failed suffix, and this new query is submitted. The values are used in the order they appear in the string, starting with the leftmost value and proceeding to the right until a query is successful or all suffixes are tried. -- If you disable this policy setting, or if you do not configure this policy setting, the primary DNS suffix and network connection-specific DNS suffixes are appended to the unqualified queries. +- If you disable this policy setting, or if you don't configure this policy setting, the primary DNS suffix and network connection-specific DNS suffixes are appended to the unqualified queries. @@ -1028,13 +1010,12 @@ To use this policy setting, click Enabled, and then enter a string value represe | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1060,7 +1041,7 @@ To use this policy setting, click Enabled, and then enter a string value represe | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1073,9 +1054,9 @@ To use this policy setting, click Enabled, and then enter a string value represe Specifies that a multi-homed DNS client should optimize name resolution across networks. The setting improves performance by issuing parallel DNS, link local multicast name resolution (LLMNR) and NetBIOS over TCP/IP (NetBT) queries across all networks. In the event that multiple positive responses are received, the network binding order is used to determine which response to accept. -- If you enable this policy setting, the DNS client will not perform any optimizations. DNS queries will be issued across all networks first. LLMNR queries will be issued if the DNS queries fail, followed by NetBT queries if LLMNR queries fail. +- If you enable this policy setting, the DNS client won't perform any optimizations. DNS queries will be issued across all networks first. LLMNR queries will be issued if the DNS queries fail, followed by NetBT queries if LLMNR queries fail. -- If you disable this policy setting, or if you do not configure this policy setting, name resolution will be optimized when issuing DNS, LLMNR and NetBT queries. +- If you disable this policy setting, or if you don't configure this policy setting, name resolution will be optimized when issuing DNS, LLMNR and NetBT queries. @@ -1087,13 +1068,12 @@ Specifies that a multi-homed DNS client should optimize name resolution across n | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1120,7 +1100,7 @@ Specifies that a multi-homed DNS client should optimize name resolution across n | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1135,7 +1115,7 @@ Specifies that the DNS client should prefer responses from link local name resol - If you enable this policy setting, the DNS client will prefer DNS responses, followed by LLMNR, followed by NetBT for all networks. -- If you disable this policy setting, or if you do not configure this policy setting, the DNS client will prefer link local responses for flat name queries on non-domain networks. +- If you disable this policy setting, or if you don't configure this policy setting, the DNS client will prefer link local responses for flat name queries on non-domain networks. > [!NOTE] > This policy setting is applicable only if the turn off smart multi-homed name resolution policy setting is disabled or not configured. @@ -1150,13 +1130,12 @@ Specifies that the DNS client should prefer responses from link local name resol | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1183,7 +1162,7 @@ Specifies that the DNS client should prefer responses from link local name resol | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1206,7 +1185,7 @@ Only secure - computers send only secure dynamic updates. - If you enable this policy setting, computers that attempt to send dynamic DNS updates will use the security level that you specify in this policy setting. -- If you disable this policy setting, or if you do not configure this policy setting, computers will use local settings. By default, DNS clients attempt to use unsecured dynamic update first. If an unsecured update is refused, clients try to use secure update. +- If you disable this policy setting, or if you don't configure this policy setting, computers will use local settings. By default, DNS clients attempt to use unsecured dynamic update first. If an unsecured update is refused, clients try to use secure update. @@ -1218,13 +1197,12 @@ Only secure - computers send only secure dynamic updates. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1250,7 +1228,7 @@ Only secure - computers send only secure dynamic updates. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1261,13 +1239,13 @@ Only secure - computers send only secure dynamic updates. -Specifies if computers may send dynamic updates to zones with a single label name. These zones are also known as top-level domain zones, for example: "com." +Specifies if computers may send dynamic updates to zones with a single label name. These zones are also known as top-level domain zones, for example: "com". -By default, a DNS client that is configured to perform dynamic DNS update will update the DNS zone that is authoritative for its DNS resource records unless the authoritative zone is a top-level domain or root zone. +By default, a DNS client that's configured to perform dynamic DNS update will update the DNS zone that's authoritative for its DNS resource records unless the authoritative zone is a top-level domain or root zone. -- If you enable this policy setting, computers send dynamic updates to any zone that is authoritative for the resource records that the computer needs to update, except the root zone. +- If you enable this policy setting, computers send dynamic updates to any zone that's authoritative for the resource records that the computer needs to update, except the root zone. -- If you disable this policy setting, or if you do not configure this policy setting, computers do not send dynamic updates to the root zone or top-level domain zones that are authoritative for the resource records that the computer needs to update. +- If you disable this policy setting, or if you don't configure this policy setting, computers don't send dynamic updates to the root zone or top-level domain zones that are authoritative for the resource records that the computer needs to update. @@ -1279,13 +1257,12 @@ By default, a DNS client that is configured to perform dynamic DNS update will u | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1312,7 +1289,7 @@ By default, a DNS client that is configured to perform dynamic DNS update will u | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1329,9 +1306,9 @@ With devolution, a DNS client creates queries by appending a single-label, unqua The DNS client appends DNS suffixes to the single-label, unqualified domain name based on the state of the Append primary and connection specific DNS suffixes radio button and Append parent suffixes of the primary DNS suffix check box on the DNS tab in Advanced TCP/IP Settings for the Internet Protocol (TCP/IP) Properties dialog box. -Devolution is not enabled if a global suffix search list is configured using Group Policy. +Devolution isn't enabled if a global suffix search list is configured using Group Policy. -If a global suffix search list is not configured, and the Append primary and connection specific DNS suffixes radio button is selected, the DNS client appends the following names to a single-label name when it sends DNS queries: +If a global suffix search list isn't configured, and the Append primary and connection specific DNS suffixes radio button is selected, the DNS client appends the following names to a single-label name when it sends DNS queries: The primary DNS suffix, as specified on the Computer Name tab of the System control panel. @@ -1339,13 +1316,13 @@ Each connection-specific DNS suffix, assigned either through DHCP or specified i For example, when a user submits a query for a single-label name such as "example," the DNS client attaches a suffix such as "microsoft.com" resulting in the query "example.microsoft.com," before sending the query to a DNS server. -If a DNS suffix search list is not specified, the DNS client attaches the primary DNS suffix to a single-label name. If this query fails, the connection-specific DNS suffix is attached for a new query. If none of these queries are resolved, the client devolves the primary DNS suffix of the computer (drops the leftmost label of the primary DNS suffix), attaches this devolved primary DNS suffix to the single-label name, and submits this new query to a DNS server. +If a DNS suffix search list isn't specified, the DNS client attaches the primary DNS suffix to a single-label name. If this query fails, the connection-specific DNS suffix is attached for a new query. If none of these queries are resolved, the client devolves the primary DNS suffix of the computer (drops the leftmost label of the primary DNS suffix), attaches this devolved primary DNS suffix to the single-label name, and submits this new query to a DNS server. -For example, if the primary DNS suffix ooo.aaa.microsoft.com is attached to the non-dot-terminated single-label name "example," and the DNS query for example.ooo.aaa.microsoft.com fails, the DNS client devolves the primary DNS suffix (drops the leftmost label) till the specified devolution level, and submits a query for example.aaa.microsoft.com. If this query fails, the primary DNS suffix is devolved further if it is under specified devolution level and the query example.microsoft.com is submitted. If this query fails, devolution continues if it is under specified devolution level and the query example.microsoft.com is submitted, corresponding to a devolution level of two. The primary DNS suffix cannot be devolved beyond a devolution level of two. The devolution level can be configured using the primary DNS suffix devolution level policy setting. The default devolution level is two. +For example, if the primary DNS suffix ooo.aaa.microsoft.com is attached to the non-dot-terminated single-label name "example," and the DNS query for example.ooo.aaa.microsoft.com fails, the DNS client devolves the primary DNS suffix (drops the leftmost label) till the specified devolution level, and submits a query for example.aaa.microsoft.com. If this query fails, the primary DNS suffix is devolved further if it's under specified devolution level and the query example.microsoft.com is submitted. If this query fails, devolution continues if it's under specified devolution level and the query example.microsoft.com is submitted, corresponding to a devolution level of two. The primary DNS suffix can't be devolved beyond a devolution level of two. The devolution level can be configured using the primary DNS suffix devolution level policy setting. The default devolution level is two. -- If you enable this policy setting, or if you do not configure this policy setting, DNS clients attempt to resolve single-label names using concatenations of the single-label name to be resolved and the devolved primary DNS suffix. +- If you enable this policy setting, or if you don't configure this policy setting, DNS clients attempt to resolve single-label names using concatenations of the single-label name to be resolved and the devolved primary DNS suffix. -- If you disable this policy setting, DNS clients do not attempt to resolve names that are concatenations of the single-label name to be resolved and the devolved primary DNS suffix. +- If you disable this policy setting, DNS clients don't attempt to resolve names that are concatenations of the single-label name to be resolved and the devolved primary DNS suffix. @@ -1357,13 +1334,12 @@ For example, if the primary DNS suffix ooo.aaa.microsoft.com is attached to the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1390,7 +1366,7 @@ For example, if the primary DNS suffix ooo.aaa.microsoft.com is attached to the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1403,11 +1379,11 @@ For example, if the primary DNS suffix ooo.aaa.microsoft.com is attached to the Specifies that link local multicast name resolution (LLMNR) is disabled on client computers. -LLMNR is a secondary name resolution protocol. With LLMNR, queries are sent using multicast over a local network link on a single subnet from a client computer to another client computer on the same subnet that also has LLMNR enabled. LLMNR does not require a DNS server or DNS client configuration, and provides name resolution in scenarios in which conventional DNS name resolution is not possible. +LLMNR is a secondary name resolution protocol. With LLMNR, queries are sent using multicast over a local network link on a single subnet from a client computer to another client computer on the same subnet that also has LLMNR enabled. LLMNR doesn't require a DNS server or DNS client configuration, and provides name resolution in scenarios in which conventional DNS name resolution isn't possible. - If you enable this policy setting, LLMNR will be disabled on all available network adapters on the client computer. -- If you disable this policy setting, or you do not configure this policy setting, LLMNR will be enabled on all available network adapters. +- If you disable this policy setting, or you don't configure this policy setting, LLMNR will be enabled on all available network adapters. @@ -1419,13 +1395,12 @@ LLMNR is a secondary name resolution protocol. With LLMNR, queries are sent usin | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-dwm.md b/windows/client-management/mdm/policy-csp-admx-dwm.md index eccb350bf2..e4a0ac56f6 100644 --- a/windows/client-management/mdm/policy-csp-admx-dwm.md +++ b/windows/client-management/mdm/policy-csp-admx-dwm.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_DWM Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_DWM -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -42,14 +39,14 @@ ms.topic: reference -This policy setting controls the default color for window frames when the user does not specify a color. +This policy setting controls the default color for window frames when the user doesn't specify a color. -- If you enable this policy setting and specify a default color, this color is used in glass window frames, if the user does not specify a color. +- If you enable this policy setting and specify a default color, this color is used in glass window frames, if the user doesn't specify a color. -- If you disable or do not configure this policy setting, the default internal color is used, if the user does not specify a color. +- If you disable or don't configure this policy setting, the default internal color is used, if the user doesn't specify a color. > [!NOTE] -> This policy setting can be used in conjunction with the "Prevent color changes of window frames" setting, to enforce a specific color for window frames that cannot be changed by users. +> This policy setting can be used in conjunction with the "Prevent color changes of window frames" setting, to enforce a specific color for window frames that can't be changed by users. @@ -61,13 +58,12 @@ This policy setting controls the default color for window frames when the user d | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -94,7 +90,7 @@ This policy setting controls the default color for window frames when the user d | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -105,14 +101,14 @@ This policy setting controls the default color for window frames when the user d -This policy setting controls the default color for window frames when the user does not specify a color. +This policy setting controls the default color for window frames when the user doesn't specify a color. -- If you enable this policy setting and specify a default color, this color is used in glass window frames, if the user does not specify a color. +- If you enable this policy setting and specify a default color, this color is used in glass window frames, if the user doesn't specify a color. -- If you disable or do not configure this policy setting, the default internal color is used, if the user does not specify a color. +- If you disable or don't configure this policy setting, the default internal color is used, if the user doesn't specify a color. > [!NOTE] -> This policy setting can be used in conjunction with the "Prevent color changes of window frames" setting, to enforce a specific color for window frames that cannot be changed by users. +> This policy setting can be used in conjunction with the "Prevent color changes of window frames" setting, to enforce a specific color for window frames that can't be changed by users. @@ -124,13 +120,12 @@ This policy setting controls the default color for window frames when the user d | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -157,7 +152,7 @@ This policy setting controls the default color for window frames when the user d | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -172,7 +167,7 @@ This policy setting controls the appearance of window animations such as those f - If you enable this policy setting, window animations are turned off. -- If you disable or do not configure this policy setting, window animations are turned on. +- If you disable or don't configure this policy setting, window animations are turned on. Changing this policy setting requires a logoff for it to be applied. @@ -186,13 +181,12 @@ Changing this policy setting requires a logoff for it to be applied. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -219,7 +213,7 @@ Changing this policy setting requires a logoff for it to be applied. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -234,7 +228,7 @@ This policy setting controls the appearance of window animations such as those f - If you enable this policy setting, window animations are turned off. -- If you disable or do not configure this policy setting, window animations are turned on. +- If you disable or don't configure this policy setting, window animations are turned on. Changing this policy setting requires a logoff for it to be applied. @@ -248,13 +242,12 @@ Changing this policy setting requires a logoff for it to be applied. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -281,7 +274,7 @@ Changing this policy setting requires a logoff for it to be applied. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -296,10 +289,10 @@ This policy setting controls the ability to change the color of window frames. - If you enable this policy setting, you prevent users from changing the default window frame color. -- If you disable or do not configure this policy setting, you allow users to change the default window frame color. +- If you disable or don't configure this policy setting, you allow users to change the default window frame color. > [!NOTE] -> This policy setting can be used in conjunction with the "Specify a default color for window frames" policy setting, to enforce a specific color for window frames that cannot be changed by users. +> This policy setting can be used in conjunction with the "Specify a default color for window frames" policy setting, to enforce a specific color for window frames that can't be changed by users. @@ -311,13 +304,12 @@ This policy setting controls the ability to change the color of window frames. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -344,7 +336,7 @@ This policy setting controls the ability to change the color of window frames. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -359,10 +351,10 @@ This policy setting controls the ability to change the color of window frames. - If you enable this policy setting, you prevent users from changing the default window frame color. -- If you disable or do not configure this policy setting, you allow users to change the default window frame color. +- If you disable or don't configure this policy setting, you allow users to change the default window frame color. > [!NOTE] -> This policy setting can be used in conjunction with the "Specify a default color for window frames" policy setting, to enforce a specific color for window frames that cannot be changed by users. +> This policy setting can be used in conjunction with the "Specify a default color for window frames" policy setting, to enforce a specific color for window frames that can't be changed by users. @@ -374,13 +366,12 @@ This policy setting controls the ability to change the color of window frames. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-eaime.md b/windows/client-management/mdm/policy-csp-admx-eaime.md index 3592fb1a73..41b87fc7cd 100644 --- a/windows/client-management/mdm/policy-csp-admx-eaime.md +++ b/windows/client-management/mdm/policy-csp-admx-eaime.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_EAIME Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_EAIME -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,14 +41,14 @@ ms.topic: reference This policy setting allows you to include the Non-Publishing Standard Glyph in the candidate list when Publishing Standard Glyph for the word exists. -- If you enable this policy setting, Non-Publishing Standard Glyph is not included in the candidate list when Publishing Standard Glyph for the word exists. +- If you enable this policy setting, Non-Publishing Standard Glyph isn't included in the candidate list when Publishing Standard Glyph for the word exists. -- If you disable or do not configure this policy setting, both Publishing Standard Glyph and Non-Publishing Standard Glyph are included in the candidate list. +- If you disable or don't configure this policy setting, both Publishing Standard Glyph and Non-Publishing Standard Glyph are included in the candidate list. This policy setting applies to Japanese Microsoft IME only. > [!NOTE] -> Changes to this setting will not take effect until the user logs off. +> Changes to this setting won't take effect until the user logs off. @@ -63,13 +60,12 @@ This policy setting applies to Japanese Microsoft IME only. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -96,7 +92,7 @@ This policy setting applies to Japanese Microsoft IME only. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -123,12 +119,12 @@ This policy setting allows you to restrict character code range of conversion by 0x1000 // IVS char 0xFFFF // no definition. -- If you disable or do not configure this policy setting, no range of characters are filtered by default. +- If you disable or don't configure this policy setting, no range of characters are filtered by default. This policy setting applies to Japanese Microsoft IME only. > [!NOTE] -> Changes to this setting will not take effect until the user logs off. +> Changes to this setting won't take effect until the user logs off. @@ -140,13 +136,12 @@ This policy setting applies to Japanese Microsoft IME only. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -172,7 +167,7 @@ This policy setting applies to Japanese Microsoft IME only. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -185,9 +180,9 @@ This policy setting applies to Japanese Microsoft IME only. This policy setting allows you to turn off the ability to use a custom dictionary. -- If you enable this policy setting, you cannot add, edit, and delete words in the custom dictionary either with GUI tools or APIs. A word registered in the custom dictionary before enabling this policy setting can continue to be used for conversion. +- If you enable this policy setting, you can't add, edit, and delete words in the custom dictionary either with GUI tools or APIs. A word registered in the custom dictionary before enabling this policy setting can continue to be used for conversion. -- If you disable or do not configure this policy setting, the custom dictionary can be used by default. +- If you disable or don't configure this policy setting, the custom dictionary can be used by default. [Clear auto-tuning information] removes self-tuned words from the custom dictionary, even if a group policy setting is turned on. To do this, select Settings > Time & Language > Japanese Options > Microsoft IME Options. If compatibility mode is turned on, select Advanced options > Dictionary/Auto-tuning > [Clear auto-tuning information]. @@ -196,7 +191,7 @@ This policy setting allows you to turn off the ability to use a custom dictionar This policy setting is applied to Japanese Microsoft IME. > [!NOTE] -> Changes to this setting will not take effect until the user logs off. +> Changes to this setting won't take effect until the user logs off. @@ -208,13 +203,12 @@ This policy setting is applied to Japanese Microsoft IME. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -241,7 +235,7 @@ This policy setting is applied to Japanese Microsoft IME. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -256,12 +250,12 @@ This policy setting allows you to turn off history-based predictive input. - If you enable this policy setting, history-based predictive input is turned off. -- If you disable or do not configure this policy setting, history-based predictive input is on by default. +- If you disable or don't configure this policy setting, history-based predictive input is on by default. This policy setting applies to Japanese Microsoft IME only. > [!NOTE] -> Changes to this setting will not take effect until the user logs off. +> Changes to this setting won't take effect until the user logs off. @@ -273,13 +267,12 @@ This policy setting applies to Japanese Microsoft IME only. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -306,7 +299,7 @@ This policy setting applies to Japanese Microsoft IME only. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -321,14 +314,14 @@ This policy setting allows you to turn off Internet search integration. Search integration includes both using Search Provider (Japanese Microsoft IME) and performing bing search from predictive input for Japanese Microsoft IME. -- If you enable this policy setting, you cannot use search integration. +- If you enable this policy setting, you can't use search integration. -- If you disable or do not configure this policy setting, the search integration function can be used by default. +- If you disable or don't configure this policy setting, the search integration function can be used by default. This policy setting applies to Japanese Microsoft IME. > [!NOTE] -> Changes to this setting will not take effect until the user logs off. +> Changes to this setting won't take effect until the user logs off. @@ -340,13 +333,12 @@ This policy setting applies to Japanese Microsoft IME. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -373,7 +365,7 @@ This policy setting applies to Japanese Microsoft IME. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -386,11 +378,11 @@ This policy setting applies to Japanese Microsoft IME. This policy setting allows you to turn off Open Extended Dictionary. -- If you enable this policy setting, Open Extended Dictionary is turned off. You cannot add a new Open Extended Dictionary. +- If you enable this policy setting, Open Extended Dictionary is turned off. You can't add a new Open Extended Dictionary. -For Japanese Microsoft IME, an Open Extended Dictionary that is added before enabling this policy setting is not used for conversion. +For Japanese Microsoft IME, an Open Extended Dictionary that's added before enabling this policy setting isn't used for conversion. -- If you disable or do not configure this policy setting, Open Extended Dictionary can be added and used by default. +- If you disable or don't configure this policy setting, Open Extended Dictionary can be added and used by default. This policy setting is applied to Japanese Microsoft IME. @@ -404,13 +396,12 @@ This policy setting is applied to Japanese Microsoft IME. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -437,7 +428,7 @@ This policy setting is applied to Japanese Microsoft IME. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -450,9 +441,9 @@ This policy setting is applied to Japanese Microsoft IME. This policy setting allows you to turn off saving the auto-tuning result to file. -- If you enable this policy setting, the auto-tuning data is not saved to file. +- If you enable this policy setting, the auto-tuning data isn't saved to file. -- If you disable or do not configure this policy setting, auto-tuning data is saved to file by default. +- If you disable or don't configure this policy setting, auto-tuning data is saved to file by default. This policy setting applies to Japanese Microsoft IME only. @@ -466,13 +457,12 @@ This policy setting applies to Japanese Microsoft IME only. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -499,7 +489,7 @@ This policy setting applies to Japanese Microsoft IME only. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -530,13 +520,12 @@ This Policy setting applies to Microsoft CHS Pinyin IME and JPN IME. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -563,7 +552,7 @@ This Policy setting applies to Microsoft CHS Pinyin IME and JPN IME. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -594,13 +583,12 @@ This Policy setting applies only to Microsoft CHS Pinyin IME. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -627,7 +615,7 @@ This Policy setting applies only to Microsoft CHS Pinyin IME. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -658,14 +646,13 @@ This Policy setting applies only to Microsoft CHS Pinyin IME. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -687,7 +674,7 @@ This Policy setting applies only to Microsoft CHS Pinyin IME. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -718,14 +705,13 @@ This Policy setting applies only to Microsoft CHS Pinyin IME. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -747,7 +733,7 @@ This Policy setting applies only to Microsoft CHS Pinyin IME. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -762,7 +748,7 @@ This policy setting allows you to turn on logging of misconversion for the misco - If you enable this policy setting, misconversion logging is turned on. -- If you disable or do not configure this policy setting, misconversion logging is turned off. +- If you disable or don't configure this policy setting, misconversion logging is turned off. This policy setting applies to Japanese Microsoft IME and Traditional Chinese IME. @@ -776,13 +762,12 @@ This policy setting applies to Japanese Microsoft IME and Traditional Chinese IM | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-encryptfilesonmove.md b/windows/client-management/mdm/policy-csp-admx-encryptfilesonmove.md index 0c9580b962..92b42d9267 100644 --- a/windows/client-management/mdm/policy-csp-admx-encryptfilesonmove.md +++ b/windows/client-management/mdm/policy-csp-admx-encryptfilesonmove.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_EncryptFilesonMove Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_EncryptFilesonMove -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,9 +41,9 @@ ms.topic: reference This policy setting prevents File Explorer from encrypting files that are moved to an encrypted folder. -- If you enable this policy setting, File Explorer will not automatically encrypt files that are moved to an encrypted folder. +- If you enable this policy setting, File Explorer won't automatically encrypt files that are moved to an encrypted folder. -- If you disable or do not configure this policy setting, File Explorer automatically encrypts files that are moved to an encrypted folder. +- If you disable or don't configure this policy setting, File Explorer automatically encrypts files that are moved to an encrypted folder. This setting applies only to files moved within a volume. When files are moved to other volumes, or if you create a new file in an encrypted folder, File Explorer encrypts those files automatically. @@ -60,13 +57,12 @@ This setting applies only to files moved within a volume. When files are moved t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-enhancedstorage.md b/windows/client-management/mdm/policy-csp-admx-enhancedstorage.md index 72b2d0f856..8d775dd553 100644 --- a/windows/client-management/mdm/policy-csp-admx-enhancedstorage.md +++ b/windows/client-management/mdm/policy-csp-admx-enhancedstorage.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_EnhancedStorage Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_EnhancedStorage -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,7 +43,7 @@ This policy setting allows you to configure a list of Enhanced Storage devices b - If you enable this policy setting, only Enhanced Storage devices that contain a manufacturer and product ID specified in this policy are usable on your computer. -- If you disable or do not configure this policy setting, all Enhanced Storage devices are usable on your computer. +- If you disable or don't configure this policy setting, all Enhanced Storage devices are usable on your computer. @@ -58,13 +55,12 @@ This policy setting allows you to configure a list of Enhanced Storage devices b | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -91,7 +87,7 @@ This policy setting allows you to configure a list of Enhanced Storage devices b | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -106,7 +102,7 @@ This policy setting allows you to create a list of IEEE 1667 silos, compliant wi - If you enable this policy setting, only IEEE 1667 silos that match a silo type identifier specified in this policy are usable on your computer. -- If you disable or do not configure this policy setting, all IEEE 1667 silos on Enhanced Storage devices are usable on your computer. +- If you disable or don't configure this policy setting, all IEEE 1667 silos on Enhanced Storage devices are usable on your computer. @@ -118,13 +114,12 @@ This policy setting allows you to create a list of IEEE 1667 silos, compliant wi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -151,7 +146,7 @@ This policy setting allows you to create a list of IEEE 1667 silos, compliant wi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -164,9 +159,9 @@ This policy setting allows you to create a list of IEEE 1667 silos, compliant wi This policy setting configures whether or not a password can be used to unlock an Enhanced Storage device. -- If you enable this policy setting, a password cannot be used to unlock an Enhanced Storage device. +- If you enable this policy setting, a password can't be used to unlock an Enhanced Storage device. -- If you disable or do not configure this policy setting, a password can be used to unlock an Enhanced Storage device. +- If you disable or don't configure this policy setting, a password can be used to unlock an Enhanced Storage device. @@ -178,13 +173,12 @@ This policy setting configures whether or not a password can be used to unlock a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -211,7 +205,7 @@ This policy setting configures whether or not a password can be used to unlock a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -224,9 +218,9 @@ This policy setting configures whether or not a password can be used to unlock a This policy setting configures whether or not non-Enhanced Storage removable devices are allowed on your computer. -- If you enable this policy setting, non-Enhanced Storage removable devices are not allowed on your computer. +- If you enable this policy setting, non-Enhanced Storage removable devices aren't allowed on your computer. -- If you disable or do not configure this policy setting, non-Enhanced Storage removable devices are allowed on your computer. +- If you disable or don't configure this policy setting, non-Enhanced Storage removable devices are allowed on your computer. @@ -238,13 +232,12 @@ This policy setting configures whether or not non-Enhanced Storage removable dev | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -271,7 +264,7 @@ This policy setting configures whether or not non-Enhanced Storage removable dev | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -288,7 +281,7 @@ This policy setting is supported in Windows Server SKUs only. - If you enable this policy setting, the Enhanced Storage device remains locked when the computer is locked. -- If you disable or do not configure this policy setting, the Enhanced Storage device state is not changed when the computer is locked. +- If you disable or don't configure this policy setting, the Enhanced Storage device state isn't changed when the computer is locked. @@ -300,13 +293,12 @@ This policy setting is supported in Windows Server SKUs only. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -333,7 +325,7 @@ This policy setting is supported in Windows Server SKUs only. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -348,7 +340,7 @@ This policy setting configures whether or not only USB root hub connected Enhanc - If you enable this policy setting, only USB root hub connected Enhanced Storage devices are allowed. -- If you disable or do not configure this policy setting, USB Enhanced Storage devices connected to both USB root hubs and non-root hubs will be allowed. +- If you disable or don't configure this policy setting, USB Enhanced Storage devices connected to both USB root hubs and non-root hubs will be allowed. @@ -360,13 +352,12 @@ This policy setting configures whether or not only USB root hub connected Enhanc | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-errorreporting.md b/windows/client-management/mdm/policy-csp-admx-errorreporting.md index 17b77f1279..b0d3994734 100644 --- a/windows/client-management/mdm/policy-csp-admx-errorreporting.md +++ b/windows/client-management/mdm/policy-csp-admx-errorreporting.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_ErrorReporting Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_ErrorReporting -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -48,7 +45,7 @@ This policy setting controls whether errors in general applications are included If the Report all errors in Microsoft applications check box is filled, all errors in Microsoft applications are reported, regardless of the setting in the Default pull-down menu. When the Report all errors in Windows check box is filled, all errors in Windows applications are reported, regardless of the setting in the Default dropdown list. The Windows applications category is a subset of Microsoft applications. -- If you disable or do not configure this policy setting, users can enable or disable Windows Error Reporting in Control Panel. The default setting in Control Panel is Upload all applications. +- If you disable or don't configure this policy setting, users can enable or disable Windows Error Reporting in Control Panel. The default setting in Control Panel is Upload all applications. This policy setting is ignored if the Configure Error Reporting policy setting is disabled or not configured. @@ -64,13 +61,12 @@ For related information, see the Configure Error Reporting and Report Operating | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -96,7 +92,7 @@ For related information, see the Configure Error Reporting and Report Operating | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -109,11 +105,11 @@ For related information, see the Configure Error Reporting and Report Operating This policy setting controls Windows Error Reporting behavior for errors in general applications when Windows Error Reporting is turned on. -- If you enable this policy setting, you can create a list of applications that are never included in error reports. To create a list of applications for which Windows Error Reporting never reports errors, click Show under the Exclude errors for applications on this list setting, and then add or remove applications from the list of application file names in the Show Contents dialog box (example: notepad.exe). File names must always include the .exe file name extension. Errors that are generated by applications in this list are not reported, even if the Default Application Reporting Settings policy setting is configured to report all application errors. +- If you enable this policy setting, you can create a list of applications that are never included in error reports. To create a list of applications for which Windows Error Reporting never reports errors, click Show under the Exclude errors for applications on this list setting, and then add or remove applications from the list of application file names in the Show Contents dialog box (example: notepad.exe). File names must always include the .exe file name extension. Errors that are generated by applications in this list aren't reported, even if the Default Application Reporting Settings policy setting is configured to report all application errors. - If this policy setting is enabled, the Exclude errors for applications on this list setting takes precedence. If an application is listed both in the List of applications to always report errors for policy setting, and in the exclusion list in this policy setting, the application is excluded from error reporting. You can also use the exclusion list in this policy setting to exclude specific Microsoft applications or parts of Windows if the check boxes for these categories are filled in the Default application reporting settings policy setting. -- If you disable or do not configure this policy setting, the Default application reporting settings policy setting takes precedence. +- If you disable or don't configure this policy setting, the Default application reporting settings policy setting takes precedence. @@ -125,13 +121,12 @@ This policy setting controls Windows Error Reporting behavior for errors in gene | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -157,7 +152,7 @@ This policy setting controls Windows Error Reporting behavior for errors in gene | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -170,13 +165,13 @@ This policy setting controls Windows Error Reporting behavior for errors in gene This policy setting specifies applications for which Windows Error Reporting should always report errors. -To create a list of applications for which Windows Error Reporting never reports errors, click Show under the Exclude errors for applications on this list setting, and then add or remove applications from the list of application file names in the Show Contents dialog box (example: notepad.exe). Errors that are generated by applications in this list are not reported, even if the Default Application Reporting Settings policy setting is configured to report all application errors. +To create a list of applications for which Windows Error Reporting never reports errors, click Show under the Exclude errors for applications on this list setting, and then add or remove applications from the list of application file names in the Show Contents dialog box (example: notepad.exe). Errors that are generated by applications in this list aren't reported, even if the Default Application Reporting Settings policy setting is configured to report all application errors. - If you enable this policy setting, you can create a list of applications that are always included in error reporting. To add applications to the list, click Show under the Report errors for applications on this list setting, and edit the list of application file names in the Show Contents dialog box. The file names must include the .exe file name extension (for example, notepad.exe). Errors that are generated by applications on this list are always reported, even if the Default dropdown in the Default application reporting policy setting is set to report no application errors. -If the Report all errors in Microsoft applications or Report all errors in Windows components check boxes in the Default Application Reporting policy setting are filled, Windows Error Reporting reports errors as if all applications in these categories were added to the list in this policy setting. (Note: The Microsoft applications category includes the Windows components category.) +If the Report all errors in Microsoft applications or Report all errors in Windows components check boxes in the Default Application Reporting policy setting are filled, Windows Error Reporting reports errors as if all applications in these categories were added to the list in this policy setting. (Note: The Microsoft applications category includes the Windows components category). -- If you disable this policy setting or do not configure it, the Default application reporting settings policy setting takes precedence. +- If you disable this policy setting or don't configure it, the Default application reporting settings policy setting takes precedence. Also see the "Default Application Reporting" and "Application Exclusion List" policies. @@ -192,13 +187,12 @@ This setting will be ignored if the 'Configure Error Reporting' setting is disab | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -224,7 +218,7 @@ This setting will be ignored if the 'Configure Error Reporting' setting is disab | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -237,28 +231,28 @@ This setting will be ignored if the 'Configure Error Reporting' setting is disab This policy setting configures how errors are reported to Microsoft, and what information is sent when Windows Error Reporting is enabled. -This policy setting does not enable or disable Windows Error Reporting. To turn Windows Error Reporting on or off, see the Turn off Windows Error Reporting policy setting in Computer Configuration/Administrative Templates/System/Internet Communication Management/Internet Communication settings. +This policy setting doesn't enable or disable Windows Error Reporting. To turn Windows Error Reporting on or off, see the Turn off Windows Error Reporting policy setting in Computer Configuration/Administrative Templates/System/Internet Communication Management/Internet Communication settings. > [!IMPORTANT] -> If the Turn off Windows Error Reporting policy setting is not configured, then Control Panel settings for Windows Error Reporting override this policy setting. +> If the Turn off Windows Error Reporting policy setting isn't configured, then Control Panel settings for Windows Error Reporting override this policy setting. -- If you enable this policy setting, the setting overrides any user changes made to Windows Error Reporting settings in Control Panel, and default values are applied for any Windows Error Reporting policy settings that are not configured (even if users have changed settings by using Control Panel). +- If you enable this policy setting, the setting overrides any user changes made to Windows Error Reporting settings in Control Panel, and default values are applied for any Windows Error Reporting policy settings that aren't configured (even if users have changed settings by using Control Panel). - If you enable this policy setting, you can configure the following settings in the policy setting: -- "Do not display links to any Microsoft 'More information' websites": Select this option if you do not want error dialog boxes to display links to Microsoft websites. +- "Do not display links to any Microsoft 'More information' websites": Select this option if you don't want error dialog boxes to display links to Microsoft websites. -- "Do not collect additional files": Select this option if you do not want additional files to be collected and included in error reports. +- "Do not collect additional files": Select this option if you don't want additional files to be collected and included in error reports. -- "Do not collect additional computer data": Select this if you do not want additional information about the computer to be collected and included in error reports. +- "Do not collect additional computer data": Select this if you don't want additional information about the computer to be collected and included in error reports. -- "Force queue mode for application errors": Select this option if you do not want users to report errors. When this option is selected, errors are stored in a queue directory, and the next administrator to log on to the computer can send the error reports to Microsoft. +- "Force queue mode for application errors": Select this option if you don't want users to report errors. When this option is selected, errors are stored in a queue directory, and the next administrator to log on to the computer can send the error reports to Microsoft. - "Corporate file path": Type a UNC path to enable Corporate Error Reporting. All errors are stored at the specified location instead of being sent directly to Microsoft, and the next administrator to log onto the computer can send the error reports to Microsoft. - "Replace instances of the word 'Microsoft' with": You can specify text with which to customize your error report dialog boxes. The word "Microsoft" is replaced with the specified text. -- If you do not configure this policy setting, users can change Windows Error Reporting settings in Control Panel. By default, these settings are Enable Reporting on computers that are running Windows XP, and Report to Queue on computers that are running Windows Server 2003. +- If you don't configure this policy setting, users can change Windows Error Reporting settings in Control Panel. By default, these settings are Enable Reporting on computers that are running Windows XP, and Report to Queue on computers that are running Windows Server 2003. - If you disable this policy setting, configuration settings in the policy setting are left blank. @@ -274,13 +268,12 @@ See related policy settings Display Error Notification (same folder as this poli | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -306,7 +299,7 @@ See related policy settings Display Error Notification (same folder as this poli | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -321,9 +314,9 @@ This policy setting controls whether errors in the operating system are included - If you enable this policy setting, Windows Error Reporting includes operating system errors. -- If you disable this policy setting, operating system errors are not included in error reports. +- If you disable this policy setting, operating system errors aren't included in error reports. -- If you do not configure this policy setting, users can change this setting in Control Panel. By default, Windows Error Reporting settings in Control Panel are set to upload operating system errors. +- If you don't configure this policy setting, users can change this setting in Control Panel. By default, Windows Error Reporting settings in Control Panel are set to upload operating system errors. See also the Configure Error Reporting policy setting. @@ -337,13 +330,12 @@ See also the Configure Error Reporting policy setting. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -370,7 +362,7 @@ See also the Configure Error Reporting policy setting. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -385,7 +377,7 @@ This policy setting controls the behavior of the Windows Error Reporting archive - If you enable this policy setting, you can configure Windows Error Reporting archiving behavior. If Archive behavior is set to Store all, all data collected for each error report is stored in the appropriate location. If Archive behavior is set to Store parameters only, only the minimum information required to check for an existing solution is stored. The Maximum number of reports to store setting determines how many reports are stored before older reports are automatically deleted. -- If you disable or do not configure this policy setting, no Windows Error Reporting information is stored. +- If you disable or don't configure this policy setting, no Windows Error Reporting information is stored. @@ -397,13 +389,12 @@ This policy setting controls the behavior of the Windows Error Reporting archive | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -430,7 +421,7 @@ This policy setting controls the behavior of the Windows Error Reporting archive | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -445,7 +436,7 @@ This policy setting controls the behavior of the Windows Error Reporting archive - If you enable this policy setting, you can configure Windows Error Reporting archiving behavior. If Archive behavior is set to Store all, all data collected for each error report is stored in the appropriate location. If Archive behavior is set to Store parameters only, only the minimum information required to check for an existing solution is stored. The Maximum number of reports to store setting determines how many reports are stored before older reports are automatically deleted. -- If you disable or do not configure this policy setting, no Windows Error Reporting information is stored. +- If you disable or don't configure this policy setting, no Windows Error Reporting information is stored. @@ -457,13 +448,12 @@ This policy setting controls the behavior of the Windows Error Reporting archive | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -490,7 +480,7 @@ This policy setting controls the behavior of the Windows Error Reporting archive | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -501,9 +491,9 @@ This policy setting controls the behavior of the Windows Error Reporting archive -This policy setting controls whether memory dumps in support of OS-generated error reports can be sent to Microsoft automatically. This policy does not apply to error reports generated by 3rd-party products, or additional data other than memory dumps. +This policy setting controls whether memory dumps in support of OS-generated error reports can be sent to Microsoft automatically. This policy doesn't apply to error reports generated by 3rd-party products, or additional data other than memory dumps. -- If you enable or do not configure this policy setting, any memory dumps generated for error reports by Microsoft Windows are automatically uploaded, without notification to the user. +- If you enable or don't configure this policy setting, any memory dumps generated for error reports by Microsoft Windows are automatically uploaded, without notification to the user. - If you disable this policy setting, then all memory dumps are uploaded according to the default consent and notification settings. @@ -517,13 +507,12 @@ This policy setting controls whether memory dumps in support of OS-generated err | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -550,7 +539,7 @@ This policy setting controls whether memory dumps in support of OS-generated err | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -561,9 +550,9 @@ This policy setting controls whether memory dumps in support of OS-generated err -This policy setting controls whether memory dumps in support of OS-generated error reports can be sent to Microsoft automatically. This policy does not apply to error reports generated by 3rd-party products, or additional data other than memory dumps. +This policy setting controls whether memory dumps in support of OS-generated error reports can be sent to Microsoft automatically. This policy doesn't apply to error reports generated by 3rd-party products, or additional data other than memory dumps. -- If you enable or do not configure this policy setting, any memory dumps generated for error reports by Microsoft Windows are automatically uploaded, without notification to the user. +- If you enable or don't configure this policy setting, any memory dumps generated for error reports by Microsoft Windows are automatically uploaded, without notification to the user. - If you disable this policy setting, then all memory dumps are uploaded according to the default consent and notification settings. @@ -577,13 +566,12 @@ This policy setting controls whether memory dumps in support of OS-generated err | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -610,7 +598,7 @@ This policy setting controls whether memory dumps in support of OS-generated err | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -623,9 +611,9 @@ This policy setting controls whether memory dumps in support of OS-generated err This policy setting determines whether Windows Error Reporting (WER) sends additional, second-level report data even if a CAB file containing data about the same event types has already been uploaded to the server. -- If you enable this policy setting, WER does not throttle data; that is, WER uploads additional CAB files that can contain data about the same event types as an earlier uploaded report. +- If you enable this policy setting, WER doesn't throttle data; that is, WER uploads additional CAB files that can contain data about the same event types as an earlier uploaded report. -- If you disable or do not configure this policy setting, WER throttles data by default; that is, WER does not upload more than one CAB file for a report that contains data about the same event types. +- If you disable or don't configure this policy setting, WER throttles data by default; that is, WER doesn't upload more than one CAB file for a report that contains data about the same event types. @@ -637,13 +625,12 @@ This policy setting determines whether Windows Error Reporting (WER) sends addit | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -670,7 +657,7 @@ This policy setting determines whether Windows Error Reporting (WER) sends addit | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -683,9 +670,9 @@ This policy setting determines whether Windows Error Reporting (WER) sends addit This policy setting determines whether Windows Error Reporting (WER) sends additional, second-level report data even if a CAB file containing data about the same event types has already been uploaded to the server. -- If you enable this policy setting, WER does not throttle data; that is, WER uploads additional CAB files that can contain data about the same event types as an earlier uploaded report. +- If you enable this policy setting, WER doesn't throttle data; that is, WER uploads additional CAB files that can contain data about the same event types as an earlier uploaded report. -- If you disable or do not configure this policy setting, WER throttles data by default; that is, WER does not upload more than one CAB file for a report that contains data about the same event types. +- If you disable or don't configure this policy setting, WER throttles data by default; that is, WER doesn't upload more than one CAB file for a report that contains data about the same event types. @@ -697,13 +684,12 @@ This policy setting determines whether Windows Error Reporting (WER) sends addit | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -730,7 +716,7 @@ This policy setting determines whether Windows Error Reporting (WER) sends addit | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -741,11 +727,11 @@ This policy setting determines whether Windows Error Reporting (WER) sends addit -This policy setting determines whether Windows Error Reporting (WER) checks for a network cost policy that restricts the amount of data that is sent over the network. +This policy setting determines whether Windows Error Reporting (WER) checks for a network cost policy that restricts the amount of data that's sent over the network. -- If you enable this policy setting, WER does not check for network cost policy restrictions, and transmits data even if network cost is restricted. +- If you enable this policy setting, WER doesn't check for network cost policy restrictions, and transmits data even if network cost is restricted. -- If you disable or do not configure this policy setting, WER does not send data, but will check the network cost policy again if the network profile is changed. +- If you disable or don't configure this policy setting, WER doesn't send data, but will check the network cost policy again if the network profile is changed. @@ -757,13 +743,12 @@ This policy setting determines whether Windows Error Reporting (WER) checks for | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -790,7 +775,7 @@ This policy setting determines whether Windows Error Reporting (WER) checks for | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -801,11 +786,11 @@ This policy setting determines whether Windows Error Reporting (WER) checks for -This policy setting determines whether Windows Error Reporting (WER) checks for a network cost policy that restricts the amount of data that is sent over the network. +This policy setting determines whether Windows Error Reporting (WER) checks for a network cost policy that restricts the amount of data that's sent over the network. -- If you enable this policy setting, WER does not check for network cost policy restrictions, and transmits data even if network cost is restricted. +- If you enable this policy setting, WER doesn't check for network cost policy restrictions, and transmits data even if network cost is restricted. -- If you disable or do not configure this policy setting, WER does not send data, but will check the network cost policy again if the network profile is changed. +- If you disable or don't configure this policy setting, WER doesn't send data, but will check the network cost policy again if the network profile is changed. @@ -817,13 +802,12 @@ This policy setting determines whether Windows Error Reporting (WER) checks for | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -850,7 +834,7 @@ This policy setting determines whether Windows Error Reporting (WER) checks for | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -861,11 +845,11 @@ This policy setting determines whether Windows Error Reporting (WER) checks for -This policy setting determines whether Windows Error Reporting (WER) checks if the computer is running on battery power. By default, when a computer is running on battery power, WER only checks for solutions, but does not upload additional report data until the computer is connected to a more permanent power source. +This policy setting determines whether Windows Error Reporting (WER) checks if the computer is running on battery power. By default, when a computer is running on battery power, WER only checks for solutions, but doesn't upload additional report data until the computer is connected to a more permanent power source. -- If you enable this policy setting, WER does not determine whether the computer is running on battery power, but checks for solutions and uploads report data normally. +- If you enable this policy setting, WER doesn't determine whether the computer is running on battery power, but checks for solutions and uploads report data normally. -- If you disable or do not configure this policy setting, WER checks for solutions while a computer is running on battery power, but does not upload report data until the computer is connected to a more permanent power source. +- If you disable or don't configure this policy setting, WER checks for solutions while a computer is running on battery power, but doesn't upload report data until the computer is connected to a more permanent power source. @@ -877,13 +861,12 @@ This policy setting determines whether Windows Error Reporting (WER) checks if t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -910,7 +893,7 @@ This policy setting determines whether Windows Error Reporting (WER) checks if t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -921,11 +904,11 @@ This policy setting determines whether Windows Error Reporting (WER) checks if t -This policy setting determines whether Windows Error Reporting (WER) checks if the computer is running on battery power. By default, when a computer is running on battery power, WER only checks for solutions, but does not upload additional report data until the computer is connected to a more permanent power source. +This policy setting determines whether Windows Error Reporting (WER) checks if the computer is running on battery power. By default, when a computer is running on battery power, WER only checks for solutions, but doesn't upload additional report data until the computer is connected to a more permanent power source. -- If you enable this policy setting, WER does not determine whether the computer is running on battery power, but checks for solutions and uploads report data normally. +- If you enable this policy setting, WER doesn't determine whether the computer is running on battery power, but checks for solutions and uploads report data normally. -- If you disable or do not configure this policy setting, WER checks for solutions while a computer is running on battery power, but does not upload report data until the computer is connected to a more permanent power source. +- If you disable or don't configure this policy setting, WER checks for solutions while a computer is running on battery power, but doesn't upload report data until the computer is connected to a more permanent power source. @@ -937,13 +920,12 @@ This policy setting determines whether Windows Error Reporting (WER) checks if t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -970,7 +952,7 @@ This policy setting determines whether Windows Error Reporting (WER) checks if t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -981,11 +963,11 @@ This policy setting determines whether Windows Error Reporting (WER) checks if t -This policy setting specifies a corporate server to which Windows Error Reporting sends reports (if you do not want to send error reports to Microsoft). +This policy setting specifies a corporate server to which Windows Error Reporting sends reports (if you don't want to send error reports to Microsoft). - If you enable this policy setting, you can specify the name or IP address of an error report destination server on your organization's network. You can also select Connect using SSL to transmit error reports over a Secure Sockets Layer (SSL) connection, and specify a port number on the destination server for transmission. -- If you disable or do not configure this policy setting, Windows Error Reporting sends error reports to Microsoft. +- If you disable or don't configure this policy setting, Windows Error Reporting sends error reports to Microsoft. @@ -997,13 +979,12 @@ This policy setting specifies a corporate server to which Windows Error Reportin | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1029,7 +1010,7 @@ This policy setting specifies a corporate server to which Windows Error Reportin | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1050,11 +1031,11 @@ This policy setting determines the consent behavior of Windows Error Reporting f - 2 (Send parameters): Windows Error Reporting automatically sends the minimum data required to check for an existing solution, and Windows prompts the user for consent to send any additional data requested by Microsoft. -- 3 (Send parameters and safe additional data): Windows Error Reporting automatically sends the minimum data required to check for an existing solution, as well as data which Windows has determined (within a high probability) does not contain personally identifiable data, and prompts the user for consent to send any additional data requested by Microsoft. +- 3 (Send parameters and safe additional data): Windows Error Reporting automatically sends the minimum data required to check for an existing solution, as well as data which Windows has determined (within a high probability) doesn't contain personally identifiable data, and prompts the user for consent to send any additional data requested by Microsoft. - 4 (Send all data): Any data requested by Microsoft is sent automatically. -- If you disable or do not configure this policy setting, then the default consent settings that are applied are those specified by the user in Control Panel, or in the Configure Default Consent policy setting. +- If you disable or don't configure this policy setting, then the default consent settings that are applied are those specified by the user in Control Panel, or in the Configure Default Consent policy setting. @@ -1066,13 +1047,12 @@ This policy setting determines the consent behavior of Windows Error Reporting f | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1098,7 +1078,7 @@ This policy setting determines the consent behavior of Windows Error Reporting f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1113,7 +1093,7 @@ This policy setting determines the behavior of the Configure Default Consent set - If you enable this policy setting, the default consent levels of Windows Error Reporting always override any other consent policy setting. -- If you disable or do not configure this policy setting, custom consent policy settings for error reporting determine the consent level for specified event types, and the default consent setting determines only the consent level of any other error reports. +- If you disable or don't configure this policy setting, custom consent policy settings for error reporting determine the consent level for specified event types, and the default consent setting determines only the consent level of any other error reports. @@ -1125,13 +1105,12 @@ This policy setting determines the behavior of the Configure Default Consent set | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1158,7 +1137,7 @@ This policy setting determines the behavior of the Configure Default Consent set | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1173,7 +1152,7 @@ This policy setting determines the behavior of the Configure Default Consent set - If you enable this policy setting, the default consent levels of Windows Error Reporting always override any other consent policy setting. -- If you disable or do not configure this policy setting, custom consent policy settings for error reporting determine the consent level for specified event types, and the default consent setting determines only the consent level of any other error reports. +- If you disable or don't configure this policy setting, custom consent policy settings for error reporting determine the consent level for specified event types, and the default consent setting determines only the consent level of any other error reports. @@ -1185,13 +1164,12 @@ This policy setting determines the behavior of the Configure Default Consent set | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1218,7 +1196,7 @@ This policy setting determines the behavior of the Configure Default Consent set | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1235,9 +1213,9 @@ This policy setting determines the default consent behavior of Windows Error Rep - Always ask before sending data: Windows prompts users for consent to send reports. -- Send parameters: Only the minimum data that is required to check for an existing solution is sent automatically, and Windows prompts users for consent to send any additional data that is requested by Microsoft. +- Send parameters: Only the minimum data that's required to check for an existing solution is sent automatically, and Windows prompts users for consent to send any additional data that's requested by Microsoft. -- Send parameters and safe additional data: the minimum data that is required to check for an existing solution, along with data which Windows has determined (within a high probability) does not contain personally-identifiable information is sent automatically, and Windows prompts the user for consent to send any additional data that is requested by Microsoft. +- Send parameters and safe additional data: the minimum data that's required to check for an existing solution, along with data which Windows has determined (within a high probability) doesn't contain personally-identifiable information is sent automatically, and Windows prompts the user for consent to send any additional data that's requested by Microsoft. - Send all data: any error reporting data requested by Microsoft is sent automatically. @@ -1253,13 +1231,12 @@ This policy setting determines the default consent behavior of Windows Error Rep | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1285,7 +1262,7 @@ This policy setting determines the default consent behavior of Windows Error Rep | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1302,9 +1279,9 @@ This policy setting determines the default consent behavior of Windows Error Rep - Always ask before sending data: Windows prompts users for consent to send reports. -- Send parameters: Only the minimum data that is required to check for an existing solution is sent automatically, and Windows prompts users for consent to send any additional data that is requested by Microsoft. +- Send parameters: Only the minimum data that's required to check for an existing solution is sent automatically, and Windows prompts users for consent to send any additional data that's requested by Microsoft. -- Send parameters and safe additional data: the minimum data that is required to check for an existing solution, along with data which Windows has determined (within a high probability) does not contain personally-identifiable information is sent automatically, and Windows prompts the user for consent to send any additional data that is requested by Microsoft. +- Send parameters and safe additional data: the minimum data that's required to check for an existing solution, along with data which Windows has determined (within a high probability) doesn't contain personally-identifiable information is sent automatically, and Windows prompts the user for consent to send any additional data that's requested by Microsoft. - Send all data: any error reporting data requested by Microsoft is sent automatically. @@ -1320,13 +1297,12 @@ This policy setting determines the default consent behavior of Windows Error Rep | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1352,7 +1328,7 @@ This policy setting determines the default consent behavior of Windows Error Rep | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1363,11 +1339,11 @@ This policy setting determines the default consent behavior of Windows Error Rep -This policy setting turns off Windows Error Reporting, so that reports are not collected or sent to either Microsoft or internal servers within your organization when software unexpectedly stops working or fails. +This policy setting turns off Windows Error Reporting, so that reports aren't collected or sent to either Microsoft or internal servers within your organization when software unexpectedly stops working or fails. -- If you enable this policy setting, Windows Error Reporting does not send any problem information to Microsoft. Additionally, solution information is not available in Security and Maintenance in Control Panel. +- If you enable this policy setting, Windows Error Reporting doesn't send any problem information to Microsoft. Additionally, solution information isn't available in Security and Maintenance in Control Panel. -- If you disable or do not configure this policy setting, the Turn off Windows Error Reporting policy setting in Computer Configuration/Administrative Templates/System/Internet Communication Management/Internet Communication settings takes precedence. If Turn off Windows Error Reporting is also either disabled or not configured, user settings in Control Panel for Windows Error Reporting are applied. +- If you disable or don't configure this policy setting, the Turn off Windows Error Reporting policy setting in Computer Configuration/Administrative Templates/System/Internet Communication Management/Internet Communication settings takes precedence. If Turn off Windows Error Reporting is also either disabled or not configured, user settings in Control Panel for Windows Error Reporting are applied. @@ -1379,13 +1355,12 @@ This policy setting turns off Windows Error Reporting, so that reports are not c | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1412,7 +1387,7 @@ This policy setting turns off Windows Error Reporting, so that reports are not c | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1429,7 +1404,7 @@ This policy setting limits Windows Error Reporting behavior for errors in genera - If this policy setting is enabled, the Exclude errors for applications on this list setting takes precedence. -- If you disable or do not configure this policy setting, errors are reported on all Microsoft and Windows applications by default. +- If you disable or don't configure this policy setting, errors are reported on all Microsoft and Windows applications by default. @@ -1441,13 +1416,12 @@ This policy setting limits Windows Error Reporting behavior for errors in genera | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1473,7 +1447,7 @@ This policy setting limits Windows Error Reporting behavior for errors in genera | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1490,7 +1464,7 @@ This policy setting limits Windows Error Reporting behavior for errors in genera - If this policy setting is enabled, the Exclude errors for applications on this list setting takes precedence. -- If you disable or do not configure this policy setting, errors are reported on all Microsoft and Windows applications by default. +- If you disable or don't configure this policy setting, errors are reported on all Microsoft and Windows applications by default. @@ -1502,13 +1476,12 @@ This policy setting limits Windows Error Reporting behavior for errors in genera | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1534,7 +1507,7 @@ This policy setting limits Windows Error Reporting behavior for errors in genera | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1547,9 +1520,9 @@ This policy setting limits Windows Error Reporting behavior for errors in genera This policy setting controls whether Windows Error Reporting saves its own events and error messages to the system event log. -- If you enable this policy setting, Windows Error Reporting events are not recorded in the system event log. +- If you enable this policy setting, Windows Error Reporting events aren't recorded in the system event log. -- If you disable or do not configure this policy setting, Windows Error Reporting events and errors are logged to the system event log, as with other Windows-based programs. +- If you disable or don't configure this policy setting, Windows Error Reporting events and errors are logged to the system event log, as with other Windows-based programs. @@ -1561,13 +1534,12 @@ This policy setting controls whether Windows Error Reporting saves its own event | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1594,7 +1566,7 @@ This policy setting controls whether Windows Error Reporting saves its own event | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1607,9 +1579,9 @@ This policy setting controls whether Windows Error Reporting saves its own event This policy setting controls whether Windows Error Reporting saves its own events and error messages to the system event log. -- If you enable this policy setting, Windows Error Reporting events are not recorded in the system event log. +- If you enable this policy setting, Windows Error Reporting events aren't recorded in the system event log. -- If you disable or do not configure this policy setting, Windows Error Reporting events and errors are logged to the system event log, as with other Windows-based programs. +- If you disable or don't configure this policy setting, Windows Error Reporting events and errors are logged to the system event log, as with other Windows-based programs. @@ -1621,13 +1593,12 @@ This policy setting controls whether Windows Error Reporting saves its own event | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1654,7 +1625,7 @@ This policy setting controls whether Windows Error Reporting saves its own event | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1669,7 +1640,7 @@ This policy setting controls whether additional data in support of error reports - If you enable this policy setting, any additional data requests from Microsoft in response to a Windows Error Reporting report are automatically declined, without notification to the user. -- If you disable or do not configure this policy setting, then consent policy settings in Computer Configuration/Administrative Templates/Windows Components/Windows Error Reporting/Consent take precedence. +- If you disable or don't configure this policy setting, then consent policy settings in Computer Configuration/Administrative Templates/Windows Components/Windows Error Reporting/Consent take precedence. @@ -1681,13 +1652,12 @@ This policy setting controls whether additional data in support of error reports | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1714,7 +1684,7 @@ This policy setting controls whether additional data in support of error reports | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1731,7 +1701,7 @@ This policy setting determines the behavior of the Windows Error Reporting repor The Maximum number of reports to queue setting determines how many reports can be queued before older reports are automatically deleted. The setting for Number of days between solution check reminders determines the interval time between the display of system notifications that remind the user to check for solutions to problems. A value of 0 disables the reminder. -- If you disable or do not configure this policy setting, Windows Error Reporting reports are not queued, and users can only send reports at the time that a problem occurs. +- If you disable or don't configure this policy setting, Windows Error Reporting reports aren't queued, and users can only send reports at the time that a problem occurs. @@ -1743,13 +1713,12 @@ The Maximum number of reports to queue setting determines how many reports can b | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1776,7 +1745,7 @@ The Maximum number of reports to queue setting determines how many reports can b | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1793,7 +1762,7 @@ This policy setting determines the behavior of the Windows Error Reporting repor The Maximum number of reports to queue setting determines how many reports can be queued before older reports are automatically deleted. The setting for Number of days between solution check reminders determines the interval time between the display of system notifications that remind the user to check for solutions to problems. A value of 0 disables the reminder. -- If you disable or do not configure this policy setting, Windows Error Reporting reports are not queued, and users can only send reports at the time that a problem occurs. +- If you disable or don't configure this policy setting, Windows Error Reporting reports aren't queued, and users can only send reports at the time that a problem occurs. @@ -1805,13 +1774,12 @@ The Maximum number of reports to queue setting determines how many reports can b | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-eventforwarding.md b/windows/client-management/mdm/policy-csp-admx-eventforwarding.md index 4a0513e2d2..b510d5bbff 100644 --- a/windows/client-management/mdm/policy-csp-admx-eventforwarding.md +++ b/windows/client-management/mdm/policy-csp-admx-eventforwarding.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_EventForwarding Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_EventForwarding -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,7 +43,7 @@ This policy setting controls resource usage for the forwarder (source computer) - If you enable this policy setting, you can control the volume of events sent to the Event Collector by the source computer. This may be required in high volume environments. -- If you disable or do not configure this policy setting, forwarder resource usage is not specified. +- If you disable or don't configure this policy setting, forwarder resource usage isn't specified. This setting applies across all subscriptions for the forwarder (source computer). @@ -60,13 +57,12 @@ This setting applies across all subscriptions for the forwarder (source computer | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -92,7 +88,7 @@ This setting applies across all subscriptions for the forwarder (source computer | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -108,9 +104,10 @@ This policy setting allows you to configure the server address, refresh interval - If you enable this policy setting, you can configure the Source Computer to contact a specific FQDN (Fully Qualified Domain Name) or IP Address and request subscription specifics. Use the following syntax when using the HTTPS protocol: + Server=https://``:5986/wsman/SubscriptionManager/WEC,Refresh=``,IssuerCA=``. When using the HTTP protocol, use port 5985. -- If you disable or do not configure this policy setting, the Event Collector computer will not be specified. +- If you disable or don't configure this policy setting, the Event Collector computer won't be specified. @@ -122,13 +119,12 @@ Server=https://``:5986/wsman/SubscriptionManager/WEC,Refr | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-eventlog.md b/windows/client-management/mdm/policy-csp-admx-eventlog.md index 1164b582ab..95133de171 100644 --- a/windows/client-management/mdm/policy-csp-admx-eventlog.md +++ b/windows/client-management/mdm/policy-csp-admx-eventlog.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_EventLog Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_EventLog -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,11 +41,11 @@ ms.topic: reference This policy setting controls Event Log behavior when the log file reaches its maximum size and takes effect only if the "Retain old events" policy setting is enabled. -- If you enable this policy setting and the "Retain old events" policy setting is enabled, the Event Log file is automatically closed and renamed when it is full. A new file is then started. +- If you enable this policy setting and the "Retain old events" policy setting is enabled, the Event Log file is automatically closed and renamed when it's full. A new file is then started. - If you disable this policy setting and the "Retain old events" policy setting is enabled, new events are discarded and old events are retained. -- If you do not configure this policy setting and the "Retain old events" policy setting is enabled, new events are discarded and the old events are retained. +- If you don't configure this policy setting and the "Retain old events" policy setting is enabled, new events are discarded and the old events are retained. @@ -60,13 +57,12 @@ This policy setting controls Event Log behavior when the log file reaches its ma | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -93,7 +89,7 @@ This policy setting controls Event Log behavior when the log file reaches its ma | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -106,11 +102,11 @@ This policy setting controls Event Log behavior when the log file reaches its ma This policy setting controls Event Log behavior when the log file reaches its maximum size and takes effect only if the "Retain old events" policy setting is enabled. -- If you enable this policy setting and the "Retain old events" policy setting is enabled, the Event Log file is automatically closed and renamed when it is full. A new file is then started. +- If you enable this policy setting and the "Retain old events" policy setting is enabled, the Event Log file is automatically closed and renamed when it's full. A new file is then started. - If you disable this policy setting and the "Retain old events" policy setting is enabled, new events are discarded and old events are retained. -- If you do not configure this policy setting and the "Retain old events" policy setting is enabled, new events are discarded and the old events are retained. +- If you don't configure this policy setting and the "Retain old events" policy setting is enabled, new events are discarded and the old events are retained. @@ -122,13 +118,12 @@ This policy setting controls Event Log behavior when the log file reaches its ma | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -155,7 +150,7 @@ This policy setting controls Event Log behavior when the log file reaches its ma | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -168,11 +163,11 @@ This policy setting controls Event Log behavior when the log file reaches its ma This policy setting controls Event Log behavior when the log file reaches its maximum size and takes effect only if the "Retain old events" policy setting is enabled. -- If you enable this policy setting and the "Retain old events" policy setting is enabled, the Event Log file is automatically closed and renamed when it is full. A new file is then started. +- If you enable this policy setting and the "Retain old events" policy setting is enabled, the Event Log file is automatically closed and renamed when it's full. A new file is then started. - If you disable this policy setting and the "Retain old events" policy setting is enabled, new events are discarded and old events are retained. -- If you do not configure this policy setting and the "Retain old events" policy setting is enabled, new events are discarded and the old events are retained. +- If you don't configure this policy setting and the "Retain old events" policy setting is enabled, new events are discarded and the old events are retained. @@ -184,13 +179,12 @@ This policy setting controls Event Log behavior when the log file reaches its ma | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -217,7 +211,7 @@ This policy setting controls Event Log behavior when the log file reaches its ma | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -230,11 +224,11 @@ This policy setting controls Event Log behavior when the log file reaches its ma This policy setting controls Event Log behavior when the log file reaches its maximum size and takes effect only if the "Retain old events" policy setting is enabled. -- If you enable this policy setting and the "Retain old events" policy setting is enabled, the Event Log file is automatically closed and renamed when it is full. A new file is then started. +- If you enable this policy setting and the "Retain old events" policy setting is enabled, the Event Log file is automatically closed and renamed when it's full. A new file is then started. - If you disable this policy setting and the "Retain old events" policy setting is enabled, new events are discarded and old events are retained. -- If you do not configure this policy setting and the "Retain old events" policy setting is enabled, new events are discarded and the old events are retained. +- If you don't configure this policy setting and the "Retain old events" policy setting is enabled, new events are discarded and the old events are retained. @@ -246,13 +240,12 @@ This policy setting controls Event Log behavior when the log file reaches its ma | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -279,7 +272,7 @@ This policy setting controls Event Log behavior when the log file reaches its ma | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -294,7 +287,7 @@ This policy setting specifies the security descriptor to use for the log using t - If you enable this policy setting, only those users matching the security descriptor can access the log. -- If you disable or do not configure this policy setting, all authenticated users and system services can write, read, or clear this log. +- If you disable or don't configure this policy setting, all authenticated users and system services can write, read, or clear this log. > [!NOTE] > If you enable this policy setting, some tools and APIs may ignore it. The same change should be made to the "Configure log access (legacy)" policy setting to enforce this change across all tools and APIs. @@ -309,13 +302,12 @@ This policy setting specifies the security descriptor to use for the log using t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -341,7 +333,7 @@ This policy setting specifies the security descriptor to use for the log using t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -352,11 +344,11 @@ This policy setting specifies the security descriptor to use for the log using t -This policy setting specifies the security descriptor to use for the log using the Security Descriptor Definition Language (SDDL) string. You cannot configure write permissions for this log. You must set both "configure log access" policy settings for this log in order to affect the both modern and legacy tools. +This policy setting specifies the security descriptor to use for the log using the Security Descriptor Definition Language (SDDL) string. You can't configure write permissions for this log. You must set both "configure log access" policy settings for this log in order to affect the both modern and legacy tools. - If you enable this policy setting, only those users whose security descriptor matches the configured specified value can access the log. -- If you disable or do not configure this policy setting, only system software and administrators can read or clear this log. +- If you disable or don't configure this policy setting, only system software and administrators can read or clear this log. > [!NOTE] > If you enable this policy setting, some tools and APIs may ignore it. The same change should be made to the "Configure log access (legacy)" policy setting to enforce this change across all tools and APIs. @@ -371,13 +363,12 @@ This policy setting specifies the security descriptor to use for the log using t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -403,7 +394,7 @@ This policy setting specifies the security descriptor to use for the log using t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -418,7 +409,7 @@ This policy setting specifies the security descriptor to use for the log using t - If you enable this policy setting, only those users matching the security descriptor can access the log. -- If you disable or do not configure this policy setting, all authenticated users and system services can write, read, or clear this log. +- If you disable or don't configure this policy setting, all authenticated users and system services can write, read, or clear this log. > [!NOTE] > If you enable this policy setting, some tools and APIs may ignore it. The same change should be made to the "Configure log access (legacy)" policy setting to enforce this change across all tools and APIs. @@ -433,13 +424,12 @@ This policy setting specifies the security descriptor to use for the log using t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -465,7 +455,7 @@ This policy setting specifies the security descriptor to use for the log using t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -480,7 +470,7 @@ This policy setting specifies the security descriptor to use for the log using t - If you enable this policy setting, only users whose security descriptor matches the configured value can access the log. -- If you disable or do not configure this policy setting, only system software and administrators can write or clear this log, and any authenticated user can read events from it. +- If you disable or don't configure this policy setting, only system software and administrators can write or clear this log, and any authenticated user can read events from it. > [!NOTE] > If you enable this policy setting, some tools and APIs may ignore it. The same change should be made to the "Configure log access (legacy)" policy setting to enforce this change across all tools and APIs. @@ -495,13 +485,12 @@ This policy setting specifies the security descriptor to use for the log using t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -527,7 +516,7 @@ This policy setting specifies the security descriptor to use for the log using t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -544,7 +533,7 @@ This policy setting specifies the security descriptor to use for the log using t - If you disable this policy setting, all authenticated users and system services can write, read, or clear this log. -- If you do not configure this policy setting, the previous policy setting configuration remains in effect. +- If you don't configure this policy setting, the previous policy setting configuration remains in effect. @@ -556,13 +545,12 @@ This policy setting specifies the security descriptor to use for the log using t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -588,7 +576,7 @@ This policy setting specifies the security descriptor to use for the log using t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -599,13 +587,13 @@ This policy setting specifies the security descriptor to use for the log using t -This policy setting specifies the security descriptor to use for the log using the Security Descriptor Definition Language (SDDL) string. You cannot configure write permissions for this log. +This policy setting specifies the security descriptor to use for the log using the Security Descriptor Definition Language (SDDL) string. You can't configure write permissions for this log. - If you enable this policy setting, only those users whose security descriptor matches the configured specified value can access the log. - If you disable this policy setting, only system software and administrators can read or clear this log. -- If you do not configure this policy setting, the previous policy setting configuration remains in effect. +- If you don't configure this policy setting, the previous policy setting configuration remains in effect. @@ -617,13 +605,12 @@ This policy setting specifies the security descriptor to use for the log using t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -649,7 +636,7 @@ This policy setting specifies the security descriptor to use for the log using t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -666,7 +653,7 @@ This policy setting specifies the security descriptor to use for the log using t - If you disable this policy setting, all authenticated users and system services can write, read, or clear this log. -- If you do not configure this policy setting, the previous policy setting configuration remains in effect. +- If you don't configure this policy setting, the previous policy setting configuration remains in effect. @@ -678,13 +665,12 @@ This policy setting specifies the security descriptor to use for the log using t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -710,7 +696,7 @@ This policy setting specifies the security descriptor to use for the log using t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -727,7 +713,7 @@ This policy setting specifies the security descriptor to use for the log using t - If you disable this policy setting, only system software and administrators can write or clear this log, and any authenticated user can read events from it. -- If you do not configure this policy setting, the previous policy setting configuration remains in effect. +- If you don't configure this policy setting, the previous policy setting configuration remains in effect. @@ -739,13 +725,12 @@ This policy setting specifies the security descriptor to use for the log using t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -771,7 +756,7 @@ This policy setting specifies the security descriptor to use for the log using t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -784,9 +769,9 @@ This policy setting specifies the security descriptor to use for the log using t This policy setting controls Event Log behavior when the log file reaches its maximum size. -- If you enable this policy setting and a log file reaches its maximum size, new events are not written to the log and are lost. +- If you enable this policy setting and a log file reaches its maximum size, new events aren't written to the log and are lost. -- If you disable or do not configure this policy setting and a log file reaches its maximum size, new events overwrite old events. +- If you disable or don't configure this policy setting and a log file reaches its maximum size, new events overwrite old events. > [!NOTE] > Old events may or may not be retained according to the "Backup log automatically when full" policy setting. @@ -801,13 +786,12 @@ This policy setting controls Event Log behavior when the log file reaches its ma | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -834,7 +818,7 @@ This policy setting controls Event Log behavior when the log file reaches its ma | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -847,9 +831,9 @@ This policy setting controls Event Log behavior when the log file reaches its ma This policy setting controls Event Log behavior when the log file reaches its maximum size. -- If you enable this policy setting and a log file reaches its maximum size, new events are not written to the log and are lost. +- If you enable this policy setting and a log file reaches its maximum size, new events aren't written to the log and are lost. -- If you disable or do not configure this policy setting and a log file reaches its maximum size, new events overwrite old events. +- If you disable or don't configure this policy setting and a log file reaches its maximum size, new events overwrite old events. > [!NOTE] > Old events may or may not be retained according to the "Backup log automatically when full" policy setting. @@ -864,13 +848,12 @@ This policy setting controls Event Log behavior when the log file reaches its ma | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -897,7 +880,7 @@ This policy setting controls Event Log behavior when the log file reaches its ma | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -910,9 +893,9 @@ This policy setting controls Event Log behavior when the log file reaches its ma This policy setting controls Event Log behavior when the log file reaches its maximum size. -- If you enable this policy setting and a log file reaches its maximum size, new events are not written to the log and are lost. +- If you enable this policy setting and a log file reaches its maximum size, new events aren't written to the log and are lost. -- If you disable or do not configure this policy setting and a log file reaches its maximum size, new events overwrite old events. +- If you disable or don't configure this policy setting and a log file reaches its maximum size, new events overwrite old events. > [!NOTE] > Old events may or may not be retained according to the "Backup log automatically when full" policy setting. @@ -927,13 +910,12 @@ This policy setting controls Event Log behavior when the log file reaches its ma | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -960,7 +942,7 @@ This policy setting controls Event Log behavior when the log file reaches its ma | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -973,7 +955,7 @@ This policy setting controls Event Log behavior when the log file reaches its ma This policy setting turns on logging. -If you enable or do not configure this policy setting, then events can be written to this log. +If you enable or don't configure this policy setting, then events can be written to this log. If the policy setting is disabled, then no new events can be logged. Events can always be read from the log, regardless of this policy setting. @@ -987,13 +969,12 @@ If the policy setting is disabled, then no new events can be logged. Events can | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1020,7 +1001,7 @@ If the policy setting is disabled, then no new events can be logged. Events can | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1035,7 +1016,7 @@ This policy setting controls the location of the log file. The location of the f - If you enable this policy setting, the Event Log uses the path specified in this policy setting. -- If you disable or do not configure this policy setting, the Event Log uses the folder %SYSTEMROOT%\System32\winevt\Logs. +- If you disable or don't configure this policy setting, the Event Log uses the folder %SYSTEMROOT%\System32\winevt\Logs. @@ -1047,13 +1028,12 @@ This policy setting controls the location of the log file. The location of the f | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1079,7 +1059,7 @@ This policy setting controls the location of the log file. The location of the f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1094,7 +1074,7 @@ This policy setting controls the location of the log file. The location of the f - If you enable this policy setting, the Event Log uses the path specified in this policy setting. -- If you disable or do not configure this policy setting, the Event Log uses the folder %SYSTEMROOT%\System32\winevt\Logs. +- If you disable or don't configure this policy setting, the Event Log uses the folder %SYSTEMROOT%\System32\winevt\Logs. @@ -1106,13 +1086,12 @@ This policy setting controls the location of the log file. The location of the f | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1138,7 +1117,7 @@ This policy setting controls the location of the log file. The location of the f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1153,7 +1132,7 @@ This policy setting controls the location of the log file. The location of the f - If you enable this policy setting, the Event Log uses the path specified in this policy setting. -- If you disable or do not configure this policy setting, the Event Log uses the folder %SYSTEMROOT%\System32\winevt\Logs. +- If you disable or don't configure this policy setting, the Event Log uses the folder %SYSTEMROOT%\System32\winevt\Logs. @@ -1165,13 +1144,12 @@ This policy setting controls the location of the log file. The location of the f | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1197,7 +1175,7 @@ This policy setting controls the location of the log file. The location of the f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1212,7 +1190,7 @@ This policy setting controls the location of the log file. The location of the f - If you enable this policy setting, the Event Log uses the path specified in this policy setting. -- If you disable or do not configure this policy setting, the Event Log uses the folder %SYSTEMROOT%\System32\winevt\Logs. +- If you disable or don't configure this policy setting, the Event Log uses the folder %SYSTEMROOT%\System32\winevt\Logs. @@ -1224,13 +1202,12 @@ This policy setting controls the location of the log file. The location of the f | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1256,7 +1233,7 @@ This policy setting controls the location of the log file. The location of the f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1271,7 +1248,7 @@ This policy setting specifies the maximum size of the log file in kilobytes. - If you enable this policy setting, you can configure the maximum log file size to be between 1 megabyte (1024 kilobytes) and 2 terabytes (2147483647 kilobytes), in kilobyte increments. -- If you disable or do not configure this policy setting, the maximum size of the log file will be set to the locally configured value. This value can be changed by the local administrator using the Log Properties dialog, and it defaults to 1 megabyte. +- If you disable or don't configure this policy setting, the maximum size of the log file will be set to the locally configured value. This value can be changed by the local administrator using the Log Properties dialog, and it defaults to 1 megabyte. @@ -1283,13 +1260,12 @@ This policy setting specifies the maximum size of the log file in kilobytes. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-eventlogging.md b/windows/client-management/mdm/policy-csp-admx-eventlogging.md index b49b9259de..5e2a32c92c 100644 --- a/windows/client-management/mdm/policy-csp-admx-eventlogging.md +++ b/windows/client-management/mdm/policy-csp-admx-eventlogging.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_EventLogging Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_EventLogging -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,7 +43,7 @@ This policy setting lets you configure Protected Event Logging. - If you enable this policy setting, components that support it will use the certificate you supply to encrypt potentially sensitive event log data before writing it to the event log. Data will be encrypted using the Cryptographic Message Syntax (CMS) standard and the public key you provide. You can use the Unprotect-CmsMessage PowerShell cmdlet to decrypt these encrypted messages, provided that you have access to the private key corresponding to the public key that they were encrypted with. -- If you disable or do not configure this policy setting, components will not encrypt event log messages before writing them to the event log. +- If you disable or don't configure this policy setting, components won't encrypt event log messages before writing them to the event log. @@ -58,13 +55,12 @@ This policy setting lets you configure Protected Event Logging. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-eventviewer.md b/windows/client-management/mdm/policy-csp-admx-eventviewer.md index ec7f4e721d..4152b2d2b5 100644 --- a/windows/client-management/mdm/policy-csp-admx-eventviewer.md +++ b/windows/client-management/mdm/policy-csp-admx-eventviewer.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_EventViewer Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_EventViewer -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -54,13 +51,12 @@ This is the program that will be invoked when the user clicks the events.asp lin | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -86,7 +82,7 @@ This is the program that will be invoked when the user clicks the events.asp lin | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -109,13 +105,12 @@ This specifies the command line parameters that will be passed to the events.asp | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -141,7 +136,7 @@ This specifies the command line parameters that will be passed to the events.asp | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -164,13 +159,12 @@ This is the URL that will be passed to the Description area in the Event Propert | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-explorer.md b/windows/client-management/mdm/policy-csp-admx-explorer.md index 1508b4ca33..6596872ac7 100644 --- a/windows/client-management/mdm/policy-csp-admx-explorer.md +++ b/windows/client-management/mdm/policy-csp-admx-explorer.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_Explorer Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_Explorer -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -42,7 +39,7 @@ ms.topic: reference -Sets the target of the More Information link that will be displayed when the user attempts to run a program that is blocked by policy. +Sets the target of the More Information link that will be displayed when the user attempts to run a program that's blocked by policy. @@ -54,13 +51,12 @@ Sets the target of the More Information link that will be displayed when the use | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -86,7 +82,7 @@ Sets the target of the More Information link that will be displayed when the use | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -100,14 +96,14 @@ Sets the target of the More Information link that will be displayed when the use This policy setting configures File Explorer to always display the menu bar. > [!NOTE] -> By default, the menu bar is not displayed in File Explorer. +> By default, the menu bar isn't displayed in File Explorer. - If you enable this policy setting, the menu bar will be displayed in File Explorer. -- If you disable or do not configure this policy setting, the menu bar will not be displayed in File Explorer. +- If you disable or don't configure this policy setting, the menu bar won't be displayed in File Explorer. > [!NOTE] -> When the menu bar is not displayed, users can access the menu bar by pressing the 'ALT' key. +> When the menu bar isn't displayed, users can access the menu bar by pressing the 'ALT' key. @@ -119,13 +115,12 @@ This policy setting configures File Explorer to always display the menu bar. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -152,7 +147,7 @@ This policy setting configures File Explorer to always display the menu bar. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -163,9 +158,9 @@ This policy setting configures File Explorer to always display the menu bar. -This policy setting allows administrators who have configured roaming profile in conjunction with Delete Cached Roaming Profile Group Policy setting to ensure that Explorer will not reinitialize default program associations and other settings to default values. +This policy setting allows administrators who have configured roaming profile in conjunction with Delete Cached Roaming Profile Group Policy setting to ensure that Explorer won't reinitialize default program associations and other settings to default values. -If you enable this policy setting on a machine that does not contain all programs installed in the same manner as it was on the machine on which the user had last logged on, unexpected behavior could occur. +If you enable this policy setting on a machine that doesn't contain all programs installed in the same manner as it was on the machine on which the user had last logged on, unexpected behavior could occur. @@ -177,13 +172,12 @@ If you enable this policy setting on a machine that does not contain all program | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -210,7 +204,7 @@ If you enable this policy setting on a machine that does not contain all program | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -225,10 +219,10 @@ This policy setting allows administrators to prevent users from adding new items - If you enable this policy setting, users will no longer be able to add new items such as files or folders to the root of their Users Files folder in File Explorer. -- If you disable or do not configure this policy setting, users will be able to add new items such as files or folders to the root of their Users Files folder in File Explorer. +- If you disable or don't configure this policy setting, users will be able to add new items such as files or folders to the root of their Users Files folder in File Explorer. > [!NOTE] -> Enabling this policy setting does not prevent the user from being able to add new items such as files and folders to their actual file system profile folder at %userprofile%. +> Enabling this policy setting doesn't prevent the user from being able to add new items such as files and folders to their actual file system profile folder at %userprofile%. @@ -240,13 +234,12 @@ This policy setting allows administrators to prevent users from adding new items | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -273,7 +266,7 @@ This policy setting allows administrators to prevent users from adding new items | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -296,13 +289,12 @@ This policy is similar to settings directly available to computer users. Disabli | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-externalboot.md b/windows/client-management/mdm/policy-csp-admx-externalboot.md index de3e5d8181..11eda286b9 100644 --- a/windows/client-management/mdm/policy-csp-admx-externalboot.md +++ b/windows/client-management/mdm/policy-csp-admx-externalboot.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_ExternalBoot Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_ExternalBoot -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -58,13 +55,12 @@ Specifies whether the PC can use the hibernation sleep state (S4) when started f | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -91,7 +87,7 @@ Specifies whether the PC can use the hibernation sleep state (S4) when started f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -104,11 +100,11 @@ Specifies whether the PC can use the hibernation sleep state (S4) when started f This policy setting controls whether the PC will boot to Windows To Go if a USB device containing a Windows To Go workspace is connected, and controls whether users can make changes using the Windows To Go Startup Options Control Panel item. -- If you enable this setting, booting to Windows To Go when a USB device is connected will be enabled, and users will not be able to make changes using the Windows To Go Startup Options Control Panel item. +- If you enable this setting, booting to Windows To Go when a USB device is connected will be enabled, and users won't be able to make changes using the Windows To Go Startup Options Control Panel item. -- If you disable this setting, booting to Windows To Go when a USB device is connected will not be enabled unless a user configures the option manually in the BIOS or other boot order configuration. +- If you disable this setting, booting to Windows To Go when a USB device is connected won't be enabled unless a user configures the option manually in the BIOS or other boot order configuration. -- If you do not configure this setting, users who are members of the Administrators group can make changes using the Windows To Go Startup Options Control Panel item. +- If you don't configure this setting, users who are members of the Administrators group can make changes using the Windows To Go Startup Options Control Panel item. @@ -120,13 +116,12 @@ This policy setting controls whether the PC will boot to Windows To Go if a USB | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -153,7 +148,7 @@ This policy setting controls whether the PC will boot to Windows To Go if a USB | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -180,13 +175,12 @@ Specifies whether the PC can use standby sleep states (S1-S3) when starting from | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-filerecovery.md b/windows/client-management/mdm/policy-csp-admx-filerecovery.md index b645c3d188..97a587ead0 100644 --- a/windows/client-management/mdm/policy-csp-admx-filerecovery.md +++ b/windows/client-management/mdm/policy-csp-admx-filerecovery.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_FileRecovery Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_FileRecovery -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -48,18 +45,18 @@ Regular: Detection, troubleshooting, and recovery of corrupted files will automa Silent: Detection, troubleshooting, and recovery of corrupted files will automatically start with no UI. Windows will log an administrator event when a system restart is required. This behavior is recommended for headless operation. -Troubleshooting Only: Detection and troubleshooting of corrupted files will automatically start with no UI. Recovery is not attempted automatically. Windows will log an administrator event with instructions if manual recovery is possible. +Troubleshooting Only: Detection and troubleshooting of corrupted files will automatically start with no UI. Recovery isn't attempted automatically. Windows will log an administrator event with instructions if manual recovery is possible. - If you enable this setting, the recovery behavior for corrupted files will be set to either the regular (default), silent, or troubleshooting only state. - If you disable this setting, the recovery behavior for corrupted files will be disabled. No troubleshooting or resolution will be attempted. -- If you do not configure this setting, the recovery behavior for corrupted files will be set to the regular recovery behavior. +- If you don't configure this setting, the recovery behavior for corrupted files will be set to the regular recovery behavior. No system or service restarts are required for changes to this policy to take immediate effect after a Group Policy refresh. > [!NOTE] -> This policy setting will take effect only when the Diagnostic Policy Service (DPS) is in the running state. When the service is stopped or disabled, system file recovery will not be attempted. The DPS can be configured with the Services snap-in to the Microsoft Management Console. +> This policy setting will take effect only when the Diagnostic Policy Service (DPS) is in the running state. When the service is stopped or disabled, system file recovery won't be attempted. The DPS can be configured with the Services snap-in to the Microsoft Management Console. @@ -72,13 +69,12 @@ No system or service restarts are required for changes to this policy to take im | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-filerevocation.md b/windows/client-management/mdm/policy-csp-admx-filerevocation.md index a23152f09a..bf73c35e40 100644 --- a/windows/client-management/mdm/policy-csp-admx-filerevocation.md +++ b/windows/client-management/mdm/policy-csp-admx-filerevocation.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_FileRevocation Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_FileRevocation -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -42,14 +39,15 @@ ms.topic: reference -Windows Runtime applications can protect content which has been associated with an enterprise identifier (EID), but can only revoke access to content it protected. To allow an application to revoke access to all content on the device that is protected by a particular enterprise, add an entry to the list on a new line that contains the enterprise identifier, separated by a comma, and the Package Family Name of the application. The EID must be an internet domain belonging to the enterprise in standard international domain name format. +Windows Runtime applications can protect content which has been associated with an enterprise identifier (EID), but can only revoke access to content it protected. To allow an application to revoke access to all content on the device that's protected by a particular enterprise, add an entry to the list on a new line that contains the enterprise identifier, separated by a comma, and the Package Family Name of the application. The EID must be an internet domain belonging to the enterprise in standard international domain name format. Example value: -Contoso.com,ContosoIT. HumanResourcesApp_m5g0r7arhahqy + +Contoso.com,ContosoIT. HumanResourcesApp_m5g0r7arhahqy. - If you enable this policy setting, the application identified by the Package Family Name will be permitted to revoke access to all content protected using the specified EID on the device. -- If you disable or do not configure this policy setting, the only Windows Runtime applications that can revoke access to all enterprise-protected content on the device are Windows Mail and the user-selected mailto protocol handler app. Any other Windows Runtime application will only be able to revoke access to content it protected. +- If you disable or don't configure this policy setting, the only Windows Runtime applications that can revoke access to all enterprise-protected content on the device are Windows Mail and the user-selected mailto protocol handler app. Any other Windows Runtime application will only be able to revoke access to content it protected. > [!NOTE] > File revocation applies to all content protected under the same second level domain as the provided enterprise identifier. So, revoking an enterprise ID of mail.contoso.com will revoke the user's access to all content protected under the contoso.com hierarchy. @@ -64,13 +62,12 @@ Contoso.com,ContosoIT. HumanResourcesApp_m5g0r7arhahqy | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-fileservervssprovider.md b/windows/client-management/mdm/policy-csp-admx-fileservervssprovider.md index 2333b8c1fb..e0a97756bf 100644 --- a/windows/client-management/mdm/policy-csp-admx-fileservervssprovider.md +++ b/windows/client-management/mdm/policy-csp-admx-fileservervssprovider.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_FileServerVSSProvider Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_FileServerVSSProvider -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -61,13 +58,12 @@ By default, the RPC protocol message between File Server VSS provider and File S | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-filesys.md b/windows/client-management/mdm/policy-csp-admx-filesys.md index cf01947874..9e086acb53 100644 --- a/windows/client-management/mdm/policy-csp-admx-filesys.md +++ b/windows/client-management/mdm/policy-csp-admx-filesys.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_FileSys Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_FileSys -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -56,13 +53,12 @@ A reboot is required for this setting to take effect. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -89,7 +85,7 @@ A reboot is required for this setting to take effect. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -103,6 +99,7 @@ A reboot is required for this setting to take effect. Delete notification is a feature that notifies the underlying storage device of clusters that are freed due to a file delete operation. A value of 0, the default, will enable delete notifications for all volumes. + A value of 1 will disable delete notifications for all volumes. @@ -115,13 +112,12 @@ A value of 1 will disable delete notifications for all volumes. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -148,7 +144,7 @@ A value of 1 will disable delete notifications for all volumes. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -173,13 +169,12 @@ A reboot is required for this setting to take effect. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -206,7 +201,7 @@ A reboot is required for this setting to take effect. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -229,13 +224,12 @@ Encrypting the page file prevents malicious users from reading data that has bee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -262,7 +256,7 @@ Encrypting the page file prevents malicious users from reading data that has bee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -285,13 +279,12 @@ Enabling Win32 long paths will allow manifested win32 applications and Windows S | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -318,7 +311,7 @@ Enabling Win32 long paths will allow manifested win32 applications and Windows S | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -343,13 +336,12 @@ If you enable short names on all volumes then short names will always be generat | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -375,7 +367,7 @@ If you enable short names on all volumes then short names will always be generat | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -388,12 +380,15 @@ If you enable short names on all volumes then short names will always be generat Symbolic links can introduce vulnerabilities in certain applications. To mitigate this issue, you can selectively enable or disable the evaluation of these types of symbolic links: -Local Link to a Local Target -Local Link to a Remote Target -Remote Link to Remote Target -Remote Link to Local Target +Local Link to a Local Target. -For further information please refer to the Windows Help section +Local Link to a Remote Target. + +Remote Link to Remote Target. + +Remote Link to Local Target. + +For further information please refer to the Windows Help section. > [!NOTE] > If this policy is Disabled or Not Configured, local administrators may select the types of symbolic links to be evaluated. @@ -408,13 +403,12 @@ For further information please refer to the Windows Help section | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -441,7 +435,7 @@ For further information please refer to the Windows Help section | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -464,13 +458,12 @@ TXF deprecated features included savepoints, secondary RM, miniversion and roll | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-folderredirection.md b/windows/client-management/mdm/policy-csp-admx-folderredirection.md index ef355a430a..5bcd0b1a15 100644 --- a/windows/client-management/mdm/policy-csp-admx-folderredirection.md +++ b/windows/client-management/mdm/policy-csp-admx-folderredirection.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_FolderRedirection Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_FolderRedirection -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,13 +43,13 @@ This policy setting allows you to control whether all redirected shell folders, - If you enable this policy setting, users must manually select the files they wish to make available offline. -- If you disable or do not configure this policy setting, redirected shell folders are automatically made available offline. All subfolders within the redirected folders are also made available offline. +- If you disable or don't configure this policy setting, redirected shell folders are automatically made available offline. All subfolders within the redirected folders are also made available offline. > [!NOTE] -> This policy setting does not prevent files from being automatically cached if the network share is configured for "Automatic Caching", nor does it affect the availability of the "Always available offline" menu option in the user interface. +> This policy setting doesn't prevent files from being automatically cached if the network share is configured for "Automatic Caching", nor does it affect the availability of the "Always available offline" menu option in the user interface. > [!NOTE] -> Do not enable this policy setting if users will need access to their redirected files if the network or server holding the redirected files becomes unavailable. +> Don't enable this policy setting if users will need access to their redirected files if the network or server holding the redirected files becomes unavailable. > [!NOTE] > If one or more valid folder GUIDs are specified in the policy setting "Do not automatically make specific redirected folders available offline", that setting will override the configured value of "Do not automatically make all redirected folders available offline". @@ -67,13 +64,12 @@ This policy setting allows you to control whether all redirected shell folders, | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -100,7 +96,7 @@ This policy setting allows you to control whether all redirected shell folders, | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -115,10 +111,10 @@ This policy setting allows you to control whether individual redirected shell fo For the folders affected by this setting, users must manually select the files they wish to make available offline. -If you disable or do not configure this policy setting, all redirected shell folders are automatically made available offline. All subfolders within the redirected folders are also made available offline. +If you disable or don't configure this policy setting, all redirected shell folders are automatically made available offline. All subfolders within the redirected folders are also made available offline. > [!NOTE] -> This policy setting does not prevent files from being automatically cached if the network share is configured for "Automatic Caching", nor does it affect the availability of the "Always available offline" menu option in the user interface. +> This policy setting doesn't prevent files from being automatically cached if the network share is configured for "Automatic Caching", nor does it affect the availability of the "Always available offline" menu option in the user interface. > [!NOTE] > The configuration of this policy for any folder will override the configured value of "Do not automatically make all redirected folders available offline". @@ -133,13 +129,12 @@ If you disable or do not configure this policy setting, all redirected shell fol | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -165,7 +160,7 @@ If you disable or do not configure this policy setting, all redirected shell fol | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -180,7 +175,7 @@ This policy setting controls whether the contents of redirected folders is copie - If you enable this policy setting, when the path to a redirected folder is changed from one network location to another and Folder Redirection is configured to move the content to the new location, instead of copying the content to the new location, the cached content is renamed in the local cache and not copied to the new location. To use this policy setting, you must move or restore the server content to the new network location using a method that preserves the state of the files, including their timestamps, before updating the Folder Redirection location. -- If you disable or do not configure this policy setting, when the path to a redirected folder is changed and Folder Redirection is configured to move the content to the new location, Windows copies the contents of the local cache to the new network location, then deleted the content from the old network location. +- If you disable or don't configure this policy setting, when the path to a redirected folder is changed and Folder Redirection is configured to move the content to the new location, Windows copies the contents of the local cache to the new network location, then deleted the content from the old network location. @@ -192,13 +187,12 @@ This policy setting controls whether the contents of redirected folders is copie | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -225,7 +219,7 @@ This policy setting controls whether the contents of redirected folders is copie | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -255,13 +249,12 @@ This policy setting allows the administrator to define whether Folder Redirectio | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -288,7 +281,7 @@ This policy setting allows the administrator to define whether Folder Redirectio | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -318,13 +311,12 @@ This policy setting allows the administrator to define whether Folder Redirectio | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -351,7 +343,7 @@ This policy setting allows the administrator to define whether Folder Redirectio | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -368,7 +360,7 @@ To designate a user's primary computers, an administrator must use management so - If you enable this policy setting and the user has redirected folders, such as the Documents and Pictures folders, the folders are redirected on the user's primary computer only. -- If you disable or do not configure this policy setting and the user has redirected folders, the folders are redirected on every computer that the user logs on to. +- If you disable or don't configure this policy setting and the user has redirected folders, the folders are redirected on every computer that the user logs on to. > [!NOTE] > If you enable this policy setting in Computer Configuration and User Configuration, the Computer Configuration policy setting takes precedence. @@ -383,13 +375,12 @@ To designate a user's primary computers, an administrator must use management so | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -416,7 +407,7 @@ To designate a user's primary computers, an administrator must use management so | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -433,7 +424,7 @@ To designate a user's primary computers, an administrator must use management so - If you enable this policy setting and the user has redirected folders, such as the Documents and Pictures folders, the folders are redirected on the user's primary computer only. -- If you disable or do not configure this policy setting and the user has redirected folders, the folders are redirected on every computer that the user logs on to. +- If you disable or don't configure this policy setting and the user has redirected folders, the folders are redirected on every computer that the user logs on to. > [!NOTE] > If you enable this policy setting in Computer Configuration and User Configuration, the Computer Configuration policy setting takes precedence. @@ -448,13 +439,12 @@ To designate a user's primary computers, an administrator must use management so | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-framepanes.md b/windows/client-management/mdm/policy-csp-admx-framepanes.md index 00c5fcc190..c4904acf06 100644 --- a/windows/client-management/mdm/policy-csp-admx-framepanes.md +++ b/windows/client-management/mdm/policy-csp-admx-framepanes.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_FramePanes Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_FramePanes -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,14 +41,14 @@ ms.topic: reference This policy setting shows or hides the Details Pane in File Explorer. -If you enable this policy setting and configure it to hide the pane, the Details Pane in File Explorer is hidden and cannot be turned on by the user. +If you enable this policy setting and configure it to hide the pane, the Details Pane in File Explorer is hidden and can't be turned on by the user. -If you enable this policy setting and configure it to show the pane, the Details Pane is always visible and cannot be hidden by the user. +If you enable this policy setting and configure it to show the pane, the Details Pane is always visible and can't be hidden by the user. > [!NOTE] -> This has a side effect of not being able to toggle to the Preview Pane since the two cannot be displayed at the same time. +> This has a side effect of not being able to toggle to the Preview Pane since the two can't be displayed at the same time. -If you disable, or do not configure this policy setting, the Details Pane is hidden by default and can be displayed by the user. This is the default policy setting. +If you disable, or don't configure this policy setting, the Details Pane is hidden by default and can be displayed by the user. This is the default policy setting. @@ -63,13 +60,12 @@ If you disable, or do not configure this policy setting, the Details Pane is hid | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -95,7 +91,7 @@ If you disable, or do not configure this policy setting, the Details Pane is hid | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -108,9 +104,9 @@ If you disable, or do not configure this policy setting, the Details Pane is hid Hides the Preview Pane in File Explorer. -If you enable this policy setting, the Preview Pane in File Explorer is hidden and cannot be turned on by the user. +If you enable this policy setting, the Preview Pane in File Explorer is hidden and can't be turned on by the user. -If you disable, or do not configure this setting, the Preview Pane is hidden by default and can be displayed by the user. +If you disable, or don't configure this setting, the Preview Pane is hidden by default and can be displayed by the user. @@ -122,13 +118,12 @@ If you disable, or do not configure this setting, the Preview Pane is hidden by | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-fthsvc.md b/windows/client-management/mdm/policy-csp-admx-fthsvc.md index 79f96e961d..986c171695 100644 --- a/windows/client-management/mdm/policy-csp-admx-fthsvc.md +++ b/windows/client-management/mdm/policy-csp-admx-fthsvc.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_fthsvc Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_fthsvc -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,13 +43,13 @@ This policy setting permits or prohibits the Diagnostic Policy Service (DPS) fro - If you enable this policy setting, the DPS detects, troubleshoots, and attempts to resolve automatically any heap corruption problems. -- If you disable this policy setting, Windows cannot detect, troubleshoot, and attempt to resolve automatically any heap corruption problems that are handled by the DPS. +- If you disable this policy setting, Windows can't detect, troubleshoot, and attempt to resolve automatically any heap corruption problems that are handled by the DPS. -- If you do not configure this policy setting, the DPS enables Fault Tolerant Heap for resolution by default. +- If you don't configure this policy setting, the DPS enables Fault Tolerant Heap for resolution by default. -This policy setting takes effect only if the diagnostics-wide scenario execution policy is not configured. +This policy setting takes effect only if the diagnostics-wide scenario execution policy isn't configured. -This policy setting takes effect only when the Diagnostic Policy Service is in the running state. When the service is stopped or disabled, diagnostic scenarios are not executed. The DPS can be configured with the Services snap-in to the Microsoft Management Console. +This policy setting takes effect only when the Diagnostic Policy Service is in the running state. When the service is stopped or disabled, diagnostic scenarios aren't executed. The DPS can be configured with the Services snap-in to the Microsoft Management Console. No system restart or service restart is required for this policy setting to take effect: changes take effect immediately. @@ -66,13 +63,12 @@ No system restart or service restart is required for this policy setting to take | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-globalization.md b/windows/client-management/mdm/policy-csp-admx-globalization.md index 9a730ad116..07132d5d80 100644 --- a/windows/client-management/mdm/policy-csp-admx-globalization.md +++ b/windows/client-management/mdm/policy-csp-admx-globalization.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_Globalization Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_Globalization -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,7 +41,7 @@ ms.topic: reference This policy prevents automatic copying of user input methods to the system account for use on the sign-in screen. The user is restricted to the set of input methods that are enabled in the system account. -**Note** this does not affect the availability of user input methods on the lock screen or with the UAC prompt. +Note this doesn't affect the availability of user input methods on the lock screen or with the UAC prompt. - If the policy is enabled, then the user will get input methods enabled for the system account on the sign-in page. @@ -60,13 +57,12 @@ This policy prevents automatic copying of user input methods to the system accou | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -93,7 +89,7 @@ This policy prevents automatic copying of user input methods to the system accou | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -106,19 +102,21 @@ This policy prevents automatic copying of user input methods to the system accou This policy setting prevents a user from selecting a supplemental custom locale as their user locale. The user is restricted to the set of locales that are installed with the operating system. -This does not affect the selection of replacement locales. To prevent the selection of replacement locales, adjust the permissions of the %windir%\Globalization directory to prevent the installation of locales by unauthorized users. +This doesn't affect the selection of replacement locales. To prevent the selection of replacement locales, adjust the permissions of the %windir%\Globalization directory to prevent the installation of locales by unauthorized users. -The policy setting "Restrict user locales" can also be enabled to disallow selection of a custom locale, even if this policy setting is not configured. +The policy setting "Restrict user locales" can also be enabled to disallow selection of a custom locale, even if this policy setting isn't configured. -- If you enable this policy setting, the user cannot select a custom locale as their user locale, but they can still select a replacement locale if one is installed. +- If you enable this policy setting, the user can't select a custom locale as their user locale, but they can still select a replacement locale if one is installed. -- If you disable or do not configure this policy setting, the user can select a custom locale as their user locale. +- If you disable or don't configure this policy setting, the user can select a custom locale as their user locale. + +- If this policy setting is enabled at the machine level, it can't be disabled by a per-user policy setting. -- If this policy setting is enabled at the machine level, it cannot be disabled by a per-user policy setting. - If this policy setting is disabled at the machine level, the per-user policy setting will be ignored. -- If this policy setting is not configured at the machine level, restrictions will be based on per-user policy settings. -To set this policy setting on a per-user basis, make sure that you do not configure the per-machine policy setting. +- If this policy setting isn't configured at the machine level, restrictions will be based on per-user policy settings. + +To set this policy setting on a per-user basis, make sure that you don't configure the per-machine policy setting. @@ -130,13 +128,12 @@ To set this policy setting on a per-user basis, make sure that you do not config | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -163,7 +160,7 @@ To set this policy setting on a per-user basis, make sure that you do not config | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -176,19 +173,21 @@ To set this policy setting on a per-user basis, make sure that you do not config This policy setting prevents a user from selecting a supplemental custom locale as their user locale. The user is restricted to the set of locales that are installed with the operating system. -This does not affect the selection of replacement locales. To prevent the selection of replacement locales, adjust the permissions of the %windir%\Globalization directory to prevent the installation of locales by unauthorized users. +This doesn't affect the selection of replacement locales. To prevent the selection of replacement locales, adjust the permissions of the %windir%\Globalization directory to prevent the installation of locales by unauthorized users. -The policy setting "Restrict user locales" can also be enabled to disallow selection of a custom locale, even if this policy setting is not configured. +The policy setting "Restrict user locales" can also be enabled to disallow selection of a custom locale, even if this policy setting isn't configured. -- If you enable this policy setting, the user cannot select a custom locale as their user locale, but they can still select a replacement locale if one is installed. +- If you enable this policy setting, the user can't select a custom locale as their user locale, but they can still select a replacement locale if one is installed. -- If you disable or do not configure this policy setting, the user can select a custom locale as their user locale. +- If you disable or don't configure this policy setting, the user can select a custom locale as their user locale. + +- If this policy setting is enabled at the machine level, it can't be disabled by a per-user policy setting. -- If this policy setting is enabled at the machine level, it cannot be disabled by a per-user policy setting. - If this policy setting is disabled at the machine level, the per-user policy setting will be ignored. -- If this policy setting is not configured at the machine level, restrictions will be based on per-user policy settings. -To set this policy setting on a per-user basis, make sure that you do not configure the per-machine policy setting. +- If this policy setting isn't configured at the machine level, restrictions will be based on per-user policy settings. + +To set this policy setting on a per-user basis, make sure that you don't configure the per-machine policy setting. @@ -200,13 +199,12 @@ To set this policy setting on a per-user basis, make sure that you do not config | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -233,7 +231,7 @@ To set this policy setting on a per-user basis, make sure that you do not config | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -248,9 +246,9 @@ This policy setting removes the Administrative options from the Region settings This policy setting is used only to simplify the Regional Options control panel. -- If you enable this policy setting, the user cannot see the Administrative options. +- If you enable this policy setting, the user can't see the Administrative options. -- If you disable or do not configure this policy setting, the user can see the Administrative options. +- If you disable or don't configure this policy setting, the user can see the Administrative options. > [!NOTE] > Even if a user can see the Administrative options, other policies may prevent them from modifying the values. @@ -265,13 +263,12 @@ This policy setting is used only to simplify the Regional Options control panel. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -298,7 +295,7 @@ This policy setting is used only to simplify the Regional Options control panel. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -313,9 +310,9 @@ This policy setting removes the option to change the user's geographical locatio This policy setting is used only to simplify the Regional Options control panel. -- If you enable this policy setting, the user does not see the option to change the GeoID. This does not prevent the user or an application from changing the GeoID programmatically. +- If you enable this policy setting, the user doesn't see the option to change the GeoID. This doesn't prevent the user or an application from changing the GeoID programmatically. -- If you disable or do not configure this policy setting, the user sees the option for changing the user location (GeoID). +- If you disable or don't configure this policy setting, the user sees the option for changing the user location (GeoID). > [!NOTE] > Even if a user can see the GeoID option, the "Disallow changing of geographical location" option can prevent them from actually changing their current geographical location. @@ -330,13 +327,12 @@ This policy setting is used only to simplify the Regional Options control panel. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -363,7 +359,7 @@ This policy setting is used only to simplify the Regional Options control panel. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -378,9 +374,9 @@ This policy setting removes the option to change the user's menus and dialogs (U This policy setting is used only to simplify the Regional Options control panel. -- If you enable this policy setting, the user does not see the option for changing the UI language. This does not prevent the user or an application from changing the UI language programmatically. +- If you enable this policy setting, the user doesn't see the option for changing the UI language. This doesn't prevent the user or an application from changing the UI language programmatically. -- If you disable or do not configure this policy setting, the user sees the option for changing the UI language. +- If you disable or don't configure this policy setting, the user sees the option for changing the UI language. > [!NOTE] > Even if a user can see the option to change the UI language, other policy settings can prevent them from changing their UI language. @@ -395,13 +391,12 @@ This policy setting is used only to simplify the Regional Options control panel. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -428,7 +423,7 @@ This policy setting is used only to simplify the Regional Options control panel. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -443,9 +438,9 @@ This policy setting removes the regional formats interface from the Region setti This policy setting is used only to simplify the Regional and Language Options control panel. -- If you enable this policy setting, the user does not see the regional formats options. This does not prevent the user or an application from changing their user locale or user overrides programmatically. +- If you enable this policy setting, the user doesn't see the regional formats options. This doesn't prevent the user or an application from changing their user locale or user overrides programmatically. -- If you disable or do not configure this policy setting, the user sees the regional formats options for changing and customizing the user locale. +- If you disable or don't configure this policy setting, the user sees the regional formats options for changing and customizing the user locale. @@ -457,13 +452,12 @@ This policy setting is used only to simplify the Regional and Language Options c | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -490,7 +484,7 @@ This policy setting is used only to simplify the Regional and Language Options c | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -505,16 +499,16 @@ This policy setting turns off the automatic learning component of handwriting re Automatic learning enables the collection and storage of text and ink written by the user in order to help adapt handwriting recognition to the vocabulary and handwriting style of the user. -Text that is collected includes all outgoing messages in Windows Mail, and MAPI enabled email clients, as well as URLs from the Internet Explorer browser history. The information that is stored includes word frequency and new words not already known to the handwriting recognition engines (for example, proper names and acronyms). Deleting email content or the browser history does not delete the stored personalization data. Ink entered through Input Panel is collected and stored. +Text that's collected includes all outgoing messages in Windows Mail, and MAPI enabled email clients, as well as URLs from the Internet Explorer browser history. The information that's stored includes word frequency and new words not already known to the handwriting recognition engines (for example, proper names and acronyms). Deleting email content or the browser history doesn't delete the stored personalization data. Ink entered through Input Panel is collected and stored. > [!NOTE] > Automatic learning of both text and ink might not be available for all languages, even when handwriting personalization is available. See Tablet PC Help for more information. -- If you enable this policy setting, automatic learning stops and any stored data is deleted. Users cannot configure this setting in Control Panel. +- If you enable this policy setting, automatic learning stops and any stored data is deleted. Users can't configure this setting in Control Panel. -- If you disable this policy setting, automatic learning is turned on. Users cannot configure this policy setting in Control Panel. Collected data is only used for handwriting recognition, if handwriting personalization is turned on. +- If you disable this policy setting, automatic learning is turned on. Users can't configure this policy setting in Control Panel. Collected data is only used for handwriting recognition, if handwriting personalization is turned on. -- If you do not configure this policy, users can choose to enable or disable automatic learning either from the Handwriting tab in the Tablet Settings in Control Panel or from the opt-in dialog. +- If you don't configure this policy, users can choose to enable or disable automatic learning either from the Handwriting tab in the Tablet Settings in Control Panel or from the opt-in dialog. This policy setting is related to the "Turn off handwriting personalization" policy setting. @@ -534,13 +528,12 @@ This policy setting is related to the "Turn off handwriting personalization" pol | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -566,7 +559,7 @@ This policy setting is related to the "Turn off handwriting personalization" pol | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -581,16 +574,16 @@ This policy setting turns off the automatic learning component of handwriting re Automatic learning enables the collection and storage of text and ink written by the user in order to help adapt handwriting recognition to the vocabulary and handwriting style of the user. -Text that is collected includes all outgoing messages in Windows Mail, and MAPI enabled email clients, as well as URLs from the Internet Explorer browser history. The information that is stored includes word frequency and new words not already known to the handwriting recognition engines (for example, proper names and acronyms). Deleting email content or the browser history does not delete the stored personalization data. Ink entered through Input Panel is collected and stored. +Text that's collected includes all outgoing messages in Windows Mail, and MAPI enabled email clients, as well as URLs from the Internet Explorer browser history. The information that's stored includes word frequency and new words not already known to the handwriting recognition engines (for example, proper names and acronyms). Deleting email content or the browser history doesn't delete the stored personalization data. Ink entered through Input Panel is collected and stored. > [!NOTE] > Automatic learning of both text and ink might not be available for all languages, even when handwriting personalization is available. See Tablet PC Help for more information. -- If you enable this policy setting, automatic learning stops and any stored data is deleted. Users cannot configure this setting in Control Panel. +- If you enable this policy setting, automatic learning stops and any stored data is deleted. Users can't configure this setting in Control Panel. -- If you disable this policy setting, automatic learning is turned on. Users cannot configure this policy setting in Control Panel. Collected data is only used for handwriting recognition, if handwriting personalization is turned on. +- If you disable this policy setting, automatic learning is turned on. Users can't configure this policy setting in Control Panel. Collected data is only used for handwriting recognition, if handwriting personalization is turned on. -- If you do not configure this policy, users can choose to enable or disable automatic learning either from the Handwriting tab in the Tablet Settings in Control Panel or from the opt-in dialog. +- If you don't configure this policy, users can choose to enable or disable automatic learning either from the Handwriting tab in the Tablet Settings in Control Panel or from the opt-in dialog. This policy setting is related to the "Turn off handwriting personalization" policy setting. @@ -610,13 +603,12 @@ This policy setting is related to the "Turn off handwriting personalization" pol | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -642,7 +634,7 @@ This policy setting is related to the "Turn off handwriting personalization" pol | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -653,13 +645,13 @@ This policy setting is related to the "Turn off handwriting personalization" pol -This policy setting restricts the permitted system locales to the specified list. If the list is empty, it locks the system locale to its current value. This policy setting does not change the existing system locale; however, the next time that an administrator attempts to change the computer's system locale, they will be restricted to the specified list. +This policy setting restricts the permitted system locales to the specified list. If the list is empty, it locks the system locale to its current value. This policy setting doesn't change the existing system locale; however, the next time that an administrator attempts to change the computer's system locale, they will be restricted to the specified list. The locale list is specified using language names, separated by a semicolon (;). For example, en-US is English (United States). Specifying "en-US;en-CA" would restrict the system locale to English (United States) and English (Canada). - If you enable this policy setting, administrators can select a system locale only from the specified system locale list. -- If you disable or do not configure this policy setting, administrators can select any system locale shipped with the operating system. +- If you disable or don't configure this policy setting, administrators can select any system locale shipped with the operating system. @@ -671,13 +663,12 @@ The locale list is specified using language names, separated by a semicolon (;). | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -704,7 +695,7 @@ The locale list is specified using language names, separated by a semicolon (;). | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -715,19 +706,21 @@ The locale list is specified using language names, separated by a semicolon (;). -This policy setting restricts users on a computer to the specified list of user locales. If the list is empty, it locks all user locales to their current values. This policy setting does not change existing user locale settings; however, the next time a user attempts to change their user locale, their choices will be restricted to locales in this list. +This policy setting restricts users on a computer to the specified list of user locales. If the list is empty, it locks all user locales to their current values. This policy setting doesn't change existing user locale settings; however, the next time a user attempts to change their user locale, their choices will be restricted to locales in this list. -To set this policy setting on a per-user basis, make sure that you do not configure the per-computer policy setting. +To set this policy setting on a per-user basis, make sure that you don't configure the per-computer policy setting. The locale list is specified using language tags, separated by a semicolon (;). For example, en-US is English (United States). Specifying "en-CA;fr-CA" would restrict the user locale to English (Canada) and French (Canada). - If you enable this policy setting, only locales in the specified locale list can be selected by users. -- If you disable or do not configure this policy setting, users can select any locale installed on the computer, unless restricted by the "Disallow selection of Custom Locales" policy setting. +- If you disable or don't configure this policy setting, users can select any locale installed on the computer, unless restricted by the "Disallow selection of Custom Locales" policy setting. + +- If this policy setting is enabled at the computer level, it can't be disabled by a per-user policy. -- If this policy setting is enabled at the computer level, it cannot be disabled by a per-user policy. - If this policy setting is disabled at the computer level, the per-user policy is ignored. -- If this policy setting is not configured at the computer level, restrictions are based on per-user policies. + +- If this policy setting isn't configured at the computer level, restrictions are based on per-user policies. @@ -739,13 +732,12 @@ The locale list is specified using language tags, separated by a semicolon (;). | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -772,7 +764,7 @@ The locale list is specified using language tags, separated by a semicolon (;). | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -783,19 +775,21 @@ The locale list is specified using language tags, separated by a semicolon (;). -This policy setting restricts users on a computer to the specified list of user locales. If the list is empty, it locks all user locales to their current values. This policy setting does not change existing user locale settings; however, the next time a user attempts to change their user locale, their choices will be restricted to locales in this list. +This policy setting restricts users on a computer to the specified list of user locales. If the list is empty, it locks all user locales to their current values. This policy setting doesn't change existing user locale settings; however, the next time a user attempts to change their user locale, their choices will be restricted to locales in this list. -To set this policy setting on a per-user basis, make sure that you do not configure the per-computer policy setting. +To set this policy setting on a per-user basis, make sure that you don't configure the per-computer policy setting. The locale list is specified using language tags, separated by a semicolon (;). For example, en-US is English (United States). Specifying "en-CA;fr-CA" would restrict the user locale to English (Canada) and French (Canada). - If you enable this policy setting, only locales in the specified locale list can be selected by users. -- If you disable or do not configure this policy setting, users can select any locale installed on the computer, unless restricted by the "Disallow selection of Custom Locales" policy setting. +- If you disable or don't configure this policy setting, users can select any locale installed on the computer, unless restricted by the "Disallow selection of Custom Locales" policy setting. + +- If this policy setting is enabled at the computer level, it can't be disabled by a per-user policy. -- If this policy setting is enabled at the computer level, it cannot be disabled by a per-user policy. - If this policy setting is disabled at the computer level, the per-user policy is ignored. -- If this policy setting is not configured at the computer level, restrictions are based on per-user policies. + +- If this policy setting isn't configured at the computer level, restrictions are based on per-user policies. @@ -807,13 +801,12 @@ The locale list is specified using language tags, separated by a semicolon (;). | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -840,7 +833,7 @@ The locale list is specified using language tags, separated by a semicolon (;). | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -855,9 +848,9 @@ This policy setting restricts the Windows UI language for all users. This is a policy setting for computers with more than one UI language installed. -- If you enable this policy setting, the UI language of Windows menus and dialogs for systems with more than one language will follow the language specified by the administrator as the system UI languages. The UI language selected by the user will be ignored if it is different than any of the system UI languages. +- If you enable this policy setting, the UI language of Windows menus and dialogs for systems with more than one language will follow the language specified by the administrator as the system UI languages. The UI language selected by the user will be ignored if it's different than any of the system UI languages. -- If you disable or do not configure this policy setting, the user can specify which UI language is used. +- If you disable or don't configure this policy setting, the user can specify which UI language is used. @@ -869,13 +862,12 @@ This is a policy setting for computers with more than one UI language installed. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -901,7 +893,7 @@ This is a policy setting for computers with more than one UI language installed. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -916,9 +908,9 @@ This policy setting restricts the Windows UI language for specific users. This policy setting applies to computers with more than one UI language installed. -- If you enable this policy setting, the UI language of Windows menus and dialogs for systems with more than one language is restricted to a specified language for the selected user. If the specified language is not installed on the target computer or you disable this policy setting, the language selection defaults to the language selected by the user. +- If you enable this policy setting, the UI language of Windows menus and dialogs for systems with more than one language is restricted to a specified language for the selected user. If the specified language isn't installed on the target computer or you disable this policy setting, the language selection defaults to the language selected by the user. -- If you disable or do not configure this policy setting, there is no restriction on which language users should use. +- If you disable or don't configure this policy setting, there is no restriction on which language users should use. To enable this policy setting in Windows Server 2003, Windows XP, or Windows 2000, to use the "Restrict selection of Windows menus and dialogs language" policy setting. @@ -932,13 +924,12 @@ To enable this policy setting in Windows Server 2003, Windows XP, or Windows 200 | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -964,7 +955,7 @@ To enable this policy setting in Windows Server 2003, Windows XP, or Windows 200 | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -977,15 +968,17 @@ To enable this policy setting in Windows Server 2003, Windows XP, or Windows 200 This policy setting prevents users from changing their user geographical location (GeoID). -- If you enable this policy setting, users cannot change their GeoID. +- If you enable this policy setting, users can't change their GeoID. -- If you disable or do not configure this policy setting, users may select any GeoID. +- If you disable or don't configure this policy setting, users may select any GeoID. + +- If you enable this policy setting at the computer level, it can't be disabled by a per-user policy setting. -- If you enable this policy setting at the computer level, it cannot be disabled by a per-user policy setting. - If you disable this policy setting at the computer level, the per-user policy is ignored. -- If you do not configure this policy setting at the computer level, restrictions are based on per-user policy settings. -To set this policy setting on a per-user basis, make sure that the per-computer policy setting is not configured. +- If you don't configure this policy setting at the computer level, restrictions are based on per-user policy settings. + +To set this policy setting on a per-user basis, make sure that the per-computer policy setting isn't configured. @@ -997,13 +990,12 @@ To set this policy setting on a per-user basis, make sure that the per-computer | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1030,7 +1022,7 @@ To set this policy setting on a per-user basis, make sure that the per-computer | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1043,15 +1035,17 @@ To set this policy setting on a per-user basis, make sure that the per-computer This policy setting prevents users from changing their user geographical location (GeoID). -- If you enable this policy setting, users cannot change their GeoID. +- If you enable this policy setting, users can't change their GeoID. -- If you disable or do not configure this policy setting, users may select any GeoID. +- If you disable or don't configure this policy setting, users may select any GeoID. + +- If you enable this policy setting at the computer level, it can't be disabled by a per-user policy setting. -- If you enable this policy setting at the computer level, it cannot be disabled by a per-user policy setting. - If you disable this policy setting at the computer level, the per-user policy is ignored. -- If you do not configure this policy setting at the computer level, restrictions are based on per-user policy settings. -To set this policy setting on a per-user basis, make sure that the per-computer policy setting is not configured. +- If you don't configure this policy setting at the computer level, restrictions are based on per-user policy settings. + +To set this policy setting on a per-user basis, make sure that the per-computer policy setting isn't configured. @@ -1063,13 +1057,12 @@ To set this policy setting on a per-user basis, make sure that the per-computer | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1096,7 +1089,7 @@ To set this policy setting on a per-user basis, make sure that the per-computer | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1111,12 +1104,14 @@ This policy setting prevents the user from customizing their locale by changing Any existing overrides in place when this policy is enabled will be frozen. To remove existing user overrides, first reset the user(s) values to the defaults and then apply this policy. -When this policy setting is enabled, users can still choose alternate locales installed on the system unless prevented by other policies, however, they will be unable to customize those choices. The user cannot customize their user locale with user overrides. +When this policy setting is enabled, users can still choose alternate locales installed on the system unless prevented by other policies, however, they will be unable to customize those choices. The user can't customize their user locale with user overrides. - If this policy setting is disabled or not configured, then the user can customize their user locale overrides. -- If this policy is set to Enabled at the computer level, then it cannot be disabled by a per-User policy. +- If this policy is set to Enabled at the computer level, then it can't be disabled by a per-User policy. + - If this policy is set to Disabled at the computer level, then the per-User policy will be ignored. + - If this policy is set to Not Configured at the computer level, then restrictions will be based on per-User policies. To set this policy on a per-user basis, make sure that the per-computer policy is set to Not Configured. @@ -1131,13 +1126,12 @@ To set this policy on a per-user basis, make sure that the per-computer policy i | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1164,7 +1158,7 @@ To set this policy on a per-user basis, make sure that the per-computer policy i | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1179,12 +1173,14 @@ This policy setting prevents the user from customizing their locale by changing Any existing overrides in place when this policy is enabled will be frozen. To remove existing user overrides, first reset the user(s) values to the defaults and then apply this policy. -When this policy setting is enabled, users can still choose alternate locales installed on the system unless prevented by other policies, however, they will be unable to customize those choices. The user cannot customize their user locale with user overrides. +When this policy setting is enabled, users can still choose alternate locales installed on the system unless prevented by other policies, however, they will be unable to customize those choices. The user can't customize their user locale with user overrides. - If this policy setting is disabled or not configured, then the user can customize their user locale overrides. -- If this policy is set to Enabled at the computer level, then it cannot be disabled by a per-User policy. +- If this policy is set to Enabled at the computer level, then it can't be disabled by a per-User policy. + - If this policy is set to Disabled at the computer level, then the per-User policy will be ignored. + - If this policy is set to Not Configured at the computer level, then restrictions will be based on per-User policies. To set this policy on a per-user basis, make sure that the per-computer policy is set to Not Configured. @@ -1199,13 +1195,12 @@ To set this policy on a per-user basis, make sure that the per-computer policy i | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1232,7 +1227,7 @@ To set this policy on a per-user basis, make sure that the per-computer policy i | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1243,13 +1238,13 @@ To set this policy on a per-user basis, make sure that the per-computer policy i -This policy setting restricts users to the specified language by disabling the menus and dialog box controls in the Region settings control panel. If the specified language is not installed on the target computer, the language selection defaults to English. +This policy setting restricts users to the specified language by disabling the menus and dialog box controls in the Region settings control panel. If the specified language isn't installed on the target computer, the language selection defaults to English. -- If you enable this policy setting, the dialog box controls in the Regional and Language Options control panel are not accessible to the logged on user. This prevents users from specifying a language different than the one used. +- If you enable this policy setting, the dialog box controls in the Regional and Language Options control panel aren't accessible to the logged-on user. This prevents users from specifying a language different than the one used. To enable this policy setting in Windows Vista, use the "Restricts the UI languages Windows should use for the selected user" policy setting. -- If you disable or do not configure this policy setting, the logged-on user can access the dialog box controls in the Regional and Language Options control panel to select any available UI language. +- If you disable or don't configure this policy setting, the logged-on user can access the dialog box controls in the Regional and Language Options control panel to select any available UI language. @@ -1261,13 +1256,12 @@ To enable this policy setting in Windows Vista, use the "Restricts the UI langua | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1293,7 +1287,7 @@ To enable this policy setting in Windows Vista, use the "Restricts the UI langua | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1312,7 +1306,7 @@ The autocorrect misspelled words option controls whether or not errors in typed - If the policy is disabled or Not Configured, then the user will be free to change the setting according to their preference. -**Note** that the availability and function of this setting is dependent on supported languages being enabled. +Note that the availability and function of this setting is dependent on supported languages being enabled. @@ -1324,13 +1318,12 @@ The autocorrect misspelled words option controls whether or not errors in typed | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1357,7 +1350,7 @@ The autocorrect misspelled words option controls whether or not errors in typed | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1376,7 +1369,7 @@ The highlight misspelled words option controls whether or next spelling errors i - If the policy is disabled or Not Configured, then the user will be free to change the setting according to their preference. -**Note** that the availability and function of this setting is dependent on supported languages being enabled. +Note that the availability and function of this setting is dependent on supported languages being enabled. @@ -1388,13 +1381,12 @@ The highlight misspelled words option controls whether or next spelling errors i | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1421,7 +1413,7 @@ The highlight misspelled words option controls whether or next spelling errors i | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1440,7 +1432,7 @@ The insert a space after selecting a text prediction option controls whether or - If the policy is disabled or Not Configured, then the user will be free to change the setting according to their preference. -**Note** that the availability and function of this setting is dependent on supported languages being enabled. +Note that the availability and function of this setting is dependent on supported languages being enabled. @@ -1452,13 +1444,12 @@ The insert a space after selecting a text prediction option controls whether or | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1485,7 +1476,7 @@ The insert a space after selecting a text prediction option controls whether or | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1504,7 +1495,7 @@ The offer text predictions as I type option controls whether or not text predict - If the policy is disabled or Not Configured, then the user will be free to change the setting according to their preference. -**Note** that the availability and function of this setting is dependent on supported languages being enabled. +Note that the availability and function of this setting is dependent on supported languages being enabled. @@ -1516,13 +1507,12 @@ The offer text predictions as I type option controls whether or not text predict | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1549,7 +1539,7 @@ The offer text predictions as I type option controls whether or not text predict | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1562,13 +1552,13 @@ The offer text predictions as I type option controls whether or not text predict This policy setting determines how programs interpret two-digit years. -This policy setting affects only the programs that use this Windows feature to interpret two-digit years. If a program does not interpret two-digit years correctly, consult the documentation or manufacturer of the program. +This policy setting affects only the programs that use this Windows feature to interpret two-digit years. If a program doesn't interpret two-digit years correctly, consult the documentation or manufacturer of the program. - If you enable this policy setting, the system specifies the largest two-digit year interpreted as being preceded by 20. All numbers less than or equal to the specified value are interpreted as being preceded by 20. All numbers greater than the specified value are interpreted as being preceded by 19. -For example, the default value, 2029, specifies that all two-digit years less than or equal to 29 (00 to 29) are interpreted as being preceded by 20, that is 2000 to 2029. Conversely, all two-digit years greater than 29 (30 to 99) are interpreted as being preceded by 19, that is, 1930 to 1999. +For example, the default value, 2029, specifies that all two-digit years less than or equal to 29 (00 to 29) are interpreted as being preceded by 20, that's 2000 to 2029. Conversely, all two-digit years greater than 29 (30 to 99) are interpreted as being preceded by 19, that is, 1930 to 1999. -- If you disable or do not configure this policy setting, Windows does not interpret two-digit year formats using this scheme for the program. +- If you disable or don't configure this policy setting, Windows doesn't interpret two-digit year formats using this scheme for the program. @@ -1580,13 +1570,12 @@ For example, the default value, 2029, specifies that all two-digit years less th | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-grouppolicy.md b/windows/client-management/mdm/policy-csp-admx-grouppolicy.md index f1ef50e530..e1d7e4f64b 100644 --- a/windows/client-management/mdm/policy-csp-admx-grouppolicy.md +++ b/windows/client-management/mdm/policy-csp-admx-grouppolicy.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_GroupPolicy Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,22 +16,19 @@ ms.topic: reference # Policy CSP - ADMX_GroupPolicy -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] -##### AllowX/ForestPolicy/and/RUP +2 AllowX/ForestPolicy/and/RUP | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,15 +43,19 @@ This policy setting allows user-based policy processing, roaming user profiles, This policy setting affects all user accounts that interactively log on to a computer in a different forest when a trust across forests or a two-way forest trust exists. -- If you do not configure this policy setting: - - No user-based policy settings are applied from the user's forest. - - Users do not receive their roaming profiles; they receive a local profile on the computer from the local forest. A warning message appears to the user, and an event log message (1529) is posted. - - Loopback Group Policy processing is applied, using the Group Policy Objects (GPOs) that are scoped to the computer. - - An event log message (1109) is posted, stating that loopback was invoked in Replace mode. +- If you don't configure this policy setting: + +- No user-based policy settings are applied from the user's forest. + +- Users don't receive their roaming profiles; they receive a local profile on the computer from the local forest. A warning message appears to the user, and an event log message (1529) is posted. + +- Loopback Group Policy processing is applied, using the Group Policy Objects (GPOs) that are scoped to the computer. + +- An event log message (1109) is posted, stating that loopback was invoked in Replace mode. - If you enable this policy setting, the behavior is exactly the same as in Windows 2000: user policy is applied, and a roaming user profile is allowed from the trusted forest. -- If you disable this policy setting, the behavior is the same as if it is not configured. +- If you disable this policy setting, the behavior is the same as if it isn't configured. @@ -66,13 +67,12 @@ This policy setting affects all user accounts that interactively log on to a com | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -99,7 +99,7 @@ This policy setting affects all user accounts that interactively log on to a com | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -110,11 +110,11 @@ This policy setting affects all user accounts that interactively log on to a com -This policy setting specifies how long Group Policy should wait for workplace connectivity notifications during startup policy processing. If the startup policy processing is synchronous, the computer is blocked until workplace connectivity is available or the wait time is reached. If the startup policy processing is asynchronous, the computer is not blocked and policy processing will occur in the background. In either case, configuring this policy setting overrides any system-computed wait times. +This policy setting specifies how long Group Policy should wait for workplace connectivity notifications during startup policy processing. If the startup policy processing is synchronous, the computer is blocked until workplace connectivity is available or the wait time is reached. If the startup policy processing is asynchronous, the computer isn't blocked and policy processing will occur in the background. In either case, configuring this policy setting overrides any system-computed wait times. - If you enable this policy setting, Group Policy uses this administratively configured maximum wait time for workplace connectivity, and overrides any default or system-computed wait time. -- If you disable or do not configure this policy setting, Group Policy will use the default wait time of 60 seconds on computers running Windows operating systems greater than Windows 7 configured for workplace connectivity. +- If you disable or don't configure this policy setting, Group Policy will use the default wait time of 60 seconds on computers running Windows operating systems greater than Windows 7 configured for workplace connectivity. @@ -126,13 +126,12 @@ This policy setting specifies how long Group Policy should wait for workplace co | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -158,7 +157,7 @@ This policy setting specifies how long Group Policy should wait for workplace co | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -176,11 +175,12 @@ This policy setting affects all policy settings that use the software installati This policy setting overrides customized settings that the program implementing the software installation policy set when it was installed. - If you enable this policy setting, you can use the check boxes provided to change the options. -- If you disable or do not configure this policy setting, it has no effect on the system. + +- If you disable or don't configure this policy setting, it has no effect on the system. The "Allow processing across a slow network connection" option updates the policies even when the update is being transmitted across a slow network connection, such as a telephone line. Updates across slow connections can cause significant delays. -The "Process even if the Group Policy objects have not changed" option updates and reapplies the policies even if the policies have not changed. Many policy setting implementations specify that they are updated only when changed. However, you might want to update unchanged policy settings, such as reapplying a desired policies in case a user has changed it. +The "Process even if the Group Policy objects haven't changed" option updates and reapplies the policies even if the policies haven't changed. Many policy setting implementations specify that they're updated only when changed. However, you might want to update unchanged policy settings, such as reapplying a desired policies in case a user has changed it. @@ -192,13 +192,12 @@ The "Process even if the Group Policy objects have not changed" option updates a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -224,7 +223,7 @@ The "Process even if the Group Policy objects have not changed" option updates a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -242,13 +241,14 @@ This policy setting affects all policies that use the disk quota component of Gr This policy setting overrides customized settings that the program implementing the disk quota policy set when it was installed. - If you enable this policy setting, you can use the check boxes provided to change the options. -- If you disable or do not configure this policy setting, it has no effect on the system. + +- If you disable or don't configure this policy setting, it has no effect on the system. The "Allow processing across a slow network connection" option updates the policies even when the update is being transmitted across a slow network connection, such as a telephone line. Updates across slow connections can cause significant delays. -The "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. When background updates are disabled, policy changes will not take effect until the next user logon or system restart. +The "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. When background updates are disabled, policy changes won't take effect until the next user logon or system restart. -The "Process even if the Group Policy objects have not changed" option updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they are updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it. +The "Process even if the Group Policy objects haven't changed" option updates and reapplies the policies even if the policies haven't changed. Many policy implementations specify that they're updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it. @@ -260,13 +260,12 @@ The "Process even if the Group Policy objects have not changed" option updates a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -292,7 +291,7 @@ The "Process even if the Group Policy objects have not changed" option updates a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -310,13 +309,14 @@ This policy setting affects all policies that use the encryption component of Gr It overrides customized settings that the program implementing the encryption policy set when it was installed. - If you enable this policy setting, you can use the check boxes provided to change the options. -- If you disable or do not configure this policy setting, it has no effect on the system. + +- If you disable or don't configure this policy setting, it has no effect on the system. The "Allow processing across a slow network connection" option updates the policies even when the update is being transmitted across a slow network connection, such as a telephone line. Updates across slow connections can cause significant delays. -The "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. When background updates are disabled, policy changes will not take effect until the next user logon or system restart. +The "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. When background updates are disabled, policy changes won't take effect until the next user logon or system restart. -The "Process even if the Group Policy objects have not changed" option updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they are updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it. +The "Process even if the Group Policy objects haven't changed" option updates and reapplies the policies even if the policies haven't changed. Many policy implementations specify that they're updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it. @@ -328,13 +328,12 @@ The "Process even if the Group Policy objects have not changed" option updates a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -360,7 +359,7 @@ The "Process even if the Group Policy objects have not changed" option updates a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -378,11 +377,12 @@ This policy setting affects all policies that use the folder redirection compone This policy setting overrides customized settings that the program implementing the folder redirection policy setting set when it was installed. - If you enable this policy setting, you can use the check boxes provided to change the options. -- If you disable or do not configure this policy setting, it has no effect on the system. + +- If you disable or don't configure this policy setting, it has no effect on the system. The "Allow processing across a slow network connection" option updates the policies even when the update is being transmitted across a slow network connection, such as a telephone line. Updates across slow connections can cause significant delays. -The "Process even if the Group Policy objects have not changed" option updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they are updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it. +The "Process even if the Group Policy objects haven't changed" option updates and reapplies the policies even if the policies haven't changed. Many policy implementations specify that they're updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it. @@ -394,13 +394,12 @@ The "Process even if the Group Policy objects have not changed" option updates a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -426,7 +425,7 @@ The "Process even if the Group Policy objects have not changed" option updates a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -444,13 +443,14 @@ This policy setting affects all policies that use the Internet Explorer Maintena This policy setting overrides customized settings that the program implementing the Internet Explorer Maintenance policy set when it was installed. - If you enable this policy setting, you can use the check boxes provided to change the options. -- If you disable or do not configure this policy setting, it has no effect on the system. + +- If you disable or don't configure this policy setting, it has no effect on the system. The "Allow processing across a slow network connection" option updates the policies even when the update is being transmitted across a slow network connection, such as a telephone line. Updates across slow connections can cause significant delays. -The "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. When background updates are disabled, policy changes will not take effect until the next user logon or system restart. +The "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. When background updates are disabled, policy changes won't take effect until the next user logon or system restart. -The "Process even if the Group Policy objects have not changed" option updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they are updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired policy setting in case a user has changed it. +The "Process even if the Group Policy objects haven't changed" option updates and reapplies the policies even if the policies haven't changed. Many policy implementations specify that they're updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired policy setting in case a user has changed it. @@ -462,13 +462,12 @@ The "Process even if the Group Policy objects have not changed" option updates a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -494,7 +493,7 @@ The "Process even if the Group Policy objects have not changed" option updates a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -512,13 +511,14 @@ This policy setting affects all policies that use the IP security component of G This policy setting overrides customized settings that the program implementing the IP security policy set when it was installed. - If you enable this policy setting, you can use the check boxes provided to change the options. -- If you disable or do not configure this policy setting, it has no effect on the system. + +- If you disable or don't configure this policy setting, it has no effect on the system. The "Allow processing across a slow network connection" option updates the policies even when the update is being transmitted across a slow network connection, such as a telephone line. Updates across slow connections can cause significant delays. -The "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. When background updates are disabled, policy changes will not take effect until the next user logon or system restart. +The "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. When background updates are disabled, policy changes won't take effect until the next user logon or system restart. -The "Process even if the Group Policy objects have not changed" option updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they are updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired policy setting in case a user has changed it. +The "Process even if the Group Policy objects haven't changed" option updates and reapplies the policies even if the policies haven't changed. Many policy implementations specify that they're updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired policy setting in case a user has changed it. @@ -530,13 +530,12 @@ The "Process even if the Group Policy objects have not changed" option updates a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -562,7 +561,7 @@ The "Process even if the Group Policy objects have not changed" option updates a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -578,11 +577,12 @@ This policy setting determines when registry policies are updated. This policy setting affects all policies in the Administrative Templates folder and any other policies that store values in the registry. It overrides customized settings that the program implementing a registry policy set when it was installed. - If you enable this policy setting, you can use the check boxes provided to change the options. -- If you disable or do not configure this policy setting, it has no effect on the system. -The "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. When background updates are disabled, policy changes will not take effect until the next user logon or system restart. +- If you disable or don't configure this policy setting, it has no effect on the system. -The "Process even if the Group Policy objects have not changed" option updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they are updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired policy setting in case a user has changed it. +The "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. When background updates are disabled, policy changes won't take effect until the next user logon or system restart. + +The "Process even if the Group Policy objects haven't changed" option updates and reapplies the policies even if the policies haven't changed. Many policy implementations specify that they're updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired policy setting in case a user has changed it. @@ -594,13 +594,12 @@ The "Process even if the Group Policy objects have not changed" option updates a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -626,7 +625,7 @@ The "Process even if the Group Policy objects have not changed" option updates a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -642,13 +641,14 @@ This policy setting determines when policies that assign shared scripts are upda This policy setting affects all policies that use the scripts component of Group Policy, such as those in WindowsSettings\Scripts. It overrides customized settings that the program implementing the scripts policy set when it was installed. - If you enable this policy setting, you can use the check boxes provided to change the options. -- If you disable or do not configure this setting, it has no effect on the system. + +- If you disable or don't configure this setting, it has no effect on the system. The "Allow processing across a slow network connection" option updates the policies even when the update is being transmitted across a slow network connection, such as a telephone line. Updates across slow connections can cause significant delays. -The "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. When background updates are disabled, policy changes will not take effect until the next user logon or system restart. +The "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. When background updates are disabled, policy changes won't take effect until the next user logon or system restart. -The "Process even if the Group Policy objects have not changed" option updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they are updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired policy setting in case a user has changed it. +The "Process even if the Group Policy objects haven't changed" option updates and reapplies the policies even if the policies haven't changed. Many policy implementations specify that they're updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired policy setting in case a user has changed it. @@ -660,13 +660,12 @@ The "Process even if the Group Policy objects have not changed" option updates a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -692,7 +691,7 @@ The "Process even if the Group Policy objects have not changed" option updates a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -710,11 +709,12 @@ This policy setting affects all policies that use the security component of Grou This policy setting overrides customized settings that the program implementing the security policy set when it was installed. - If you enable this policy setting, you can use the check boxes provided to change the options. -- If you disable or do not configure this policy setting, it has no effect on the system. -The "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. When background updates are disabled, policy changes will not take effect until the next user logon or system restart. +- If you disable or don't configure this policy setting, it has no effect on the system. -The "Process even if the Group Policy objects have not changed" option updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they be updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired policy setting in case a user has changed it. +The "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. When background updates are disabled, policy changes won't take effect until the next user logon or system restart. + +The "Process even if the Group Policy objects haven't changed" option updates and reapplies the policies even if the policies haven't changed. Many policy implementations specify that they be updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired policy setting in case a user has changed it. @@ -726,13 +726,12 @@ The "Process even if the Group Policy objects have not changed" option updates a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -758,7 +757,7 @@ The "Process even if the Group Policy objects have not changed" option updates a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -777,13 +776,13 @@ It overrides customized settings that the program implementing the wired network - If you enable this policy, you can use the check boxes provided to change the options. -- If you disable this setting or do not configure it, it has no effect on the system. +- If you disable this setting or don't configure it, it has no effect on the system. The "Allow processing across a slow network connection" option updates the policies even when the update is being transmitted across a slow network connection, such as a telephone line. Updates across slow connections can cause significant delays. -The "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. When background updates are disabled, policy changes will not take effect until the next user logon or system restart. +The "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. When background updates are disabled, policy changes won't take effect until the next user logon or system restart. -The "Process even if the Group Policy objects have not changed" option updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they are updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it. +The "Process even if the Group Policy objects haven't changed" option updates and reapplies the policies even if the policies haven't changed. Many policy implementations specify that they're updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it. @@ -795,13 +794,12 @@ The "Process even if the Group Policy objects have not changed" option updates a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -827,7 +825,7 @@ The "Process even if the Group Policy objects have not changed" option updates a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -846,13 +844,13 @@ It overrides customized settings that the program implementing the wireless netw - If you enable this policy, you can use the check boxes provided to change the options. -- If you disable this setting or do not configure it, it has no effect on the system. +- If you disable this setting or don't configure it, it has no effect on the system. The "Allow processing across a slow network connection" option updates the policies even when the update is being transmitted across a slow network connection, such as a telephone line. Updates across slow connections can cause significant delays. -The "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. When background updates are disabled, policy changes will not take effect until the next user logon or system restart. +The "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. When background updates are disabled, policy changes won't take effect until the next user logon or system restart. -The "Process even if the Group Policy objects have not changed" option updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they are updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it. +The "Process even if the Group Policy objects haven't changed" option updates and reapplies the policies even if the policies haven't changed. Many policy implementations specify that they're updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it. @@ -864,13 +862,12 @@ The "Process even if the Group Policy objects have not changed" option updates a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -896,7 +893,7 @@ The "Process even if the Group Policy objects have not changed" option updates a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -909,17 +906,17 @@ The "Process even if the Group Policy objects have not changed" option updates a This policy setting controls the ability of users to view their Resultant Set of Policy (RSoP) data. -By default, interactively logged on users can view their own Resultant Set of Policy (RSoP) data. +By default, interactively logged-on users can view their own Resultant Set of Policy (RSoP) data. -- If you enable this policy setting, interactive users cannot generate RSoP data. +- If you enable this policy setting, interactive users can't generate RSoP data. -- If you disable or do not configure this policy setting, interactive users can generate RSoP. +- If you disable or don't configure this policy setting, interactive users can generate RSoP. > [!NOTE] -> This policy setting does not affect administrators. If you enable or disable this policy setting, by default administrators can view RSoP data. +> This policy setting doesn't affect administrators. If you enable or disable this policy setting, by default administrators can view RSoP data. > [!NOTE] -> To view RSoP data on a client computer, use the RSoP snap-in for the Microsoft Management Console. You can launch the RSoP snap-in from the command line by typing RSOP.msc +> To view RSoP data on a client computer, use the RSoP snap-in for the Microsoft Management Console. You can launch the RSoP snap-in from the command line by typing RSOP.msc. > [!NOTE] > This policy setting exists as both a User Configuration and Computer Configuration setting. @@ -936,13 +933,12 @@ Also, see the "Turn off Resultant set of Policy logging" policy setting in Compu | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -969,7 +965,7 @@ Also, see the "Turn off Resultant set of Policy logging" policy setting in Compu | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -982,17 +978,17 @@ Also, see the "Turn off Resultant set of Policy logging" policy setting in Compu This policy setting controls the ability of users to view their Resultant Set of Policy (RSoP) data. -By default, interactively logged on users can view their own Resultant Set of Policy (RSoP) data. +By default, interactively logged-on users can view their own Resultant Set of Policy (RSoP) data. -- If you enable this policy setting, interactive users cannot generate RSoP data. +- If you enable this policy setting, interactive users can't generate RSoP data. -- If you disable or do not configure this policy setting, interactive users can generate RSoP. +- If you disable or don't configure this policy setting, interactive users can generate RSoP. > [!NOTE] -> This policy setting does not affect administrators. If you enable or disable this policy setting, by default administrators can view RSoP data. +> This policy setting doesn't affect administrators. If you enable or disable this policy setting, by default administrators can view RSoP data. > [!NOTE] -> To view RSoP data on a client computer, use the RSoP snap-in for the Microsoft Management Console. You can launch the RSoP snap-in from the command line by typing RSOP.msc +> To view RSoP data on a client computer, use the RSoP snap-in for the Microsoft Management Console. You can launch the RSoP snap-in from the command line by typing RSOP.msc. > [!NOTE] > This policy setting exists as both a User Configuration and Computer Configuration setting. @@ -1009,13 +1005,12 @@ Also, see the "Turn off Resultant set of Policy logging" policy setting in Compu | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1042,7 +1037,7 @@ Also, see the "Turn off Resultant set of Policy logging" policy setting in Compu | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1065,13 +1060,12 @@ This policy setting prevents the Group Policy Client Service from stopping when | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1098,7 +1092,7 @@ This policy setting prevents the Group Policy Client Service from stopping when | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1109,13 +1103,13 @@ This policy setting prevents the Group Policy Client Service from stopping when -Prevents the system from updating the Administrative Templates source files automatically when you open the Group Policy Object Editor. Administrators might want to use this if they are concerned about the amount of space used on the system volume of a DC. +Prevents the system from updating the Administrative Templates source files automatically when you open the Group Policy Object Editor. Administrators might want to use this if they're concerned about the amount of space used on the system volume of a DC. -By default, when you start the Group Policy Object Editor, a timestamp comparison is performed on the source files in the local %SYSTEMROOT%\inf directory and the source files stored in the GPO. If the local files are newer, they are copied into the GPO. +By default, when you start the Group Policy Object Editor, a timestamp comparison is performed on the source files in the local %SYSTEMROOT%\inf directory and the source files stored in the GPO. If the local files are newer, they're copied into the GPO. Changing the status of this setting to Enabled will keep any source files from copying to the GPO. -Changing the status of this setting to Disabled will enforce the default behavior. Files will always be copied to the GPO if they have a later timestamp. +Changing the status of this setting to Disabled will enforce the default behavior. Files will always be copied to the GPO if they've a later timestamp. > [!NOTE] > If the Computer Configuration policy setting, "Always use local ADM files for the Group Policy Object Editor" is enabled, the state of this setting is ignored and always treated as Enabled. @@ -1130,13 +1124,12 @@ Changing the status of this setting to Disabled will enforce the default behavio | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1163,7 +1156,7 @@ Changing the status of this setting to Disabled will enforce the default behavio | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1178,7 +1171,7 @@ This policy setting prevents Group Policy from being updated while the computer - If you enable this policy setting, the system waits until the current user logs off the system before updating the computer and user settings. -- If you disable or do not configure this policy setting, updates can be applied while users are working. The frequency of updates is determined by the "Set Group Policy refresh interval for computers" and "Set Group Policy refresh interval for users" policy settings. +- If you disable or don't configure this policy setting, updates can be applied while users are working. The frequency of updates is determined by the "Set Group Policy refresh interval for computers" and "Set Group Policy refresh interval for users" policy settings. > [!NOTE] > If you make changes to this policy setting, you must restart your computer for it to take effect. @@ -1193,13 +1186,12 @@ This policy setting prevents Group Policy from being updated while the computer | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1226,7 +1218,7 @@ This policy setting prevents Group Policy from being updated while the computer | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1241,12 +1233,12 @@ This policy setting prevents Local Group Policy Objects (Local GPOs) from being By default, the policy settings in Local GPOs are applied before any domain-based GPO policy settings. These policy settings can apply to both users and the local computer. You can disable the processing and application of all Local GPOs to ensure that only domain-based GPOs are applied. -- If you enable this policy setting, the system does not process and apply any Local GPOs. +- If you enable this policy setting, the system doesn't process and apply any Local GPOs. -- If you disable or do not configure this policy setting, Local GPOs continue to be applied. +- If you disable or don't configure this policy setting, Local GPOs continue to be applied. > [!NOTE] -> For computers joined to a domain, it is strongly recommended that you only configure this policy setting in domain-based GPOs. This policy setting will be ignored on computers that are joined to a workgroup. +> For computers joined to a domain, it's strongly recommended that you only configure this policy setting in domain-based GPOs. This policy setting will be ignored on computers that are joined to a workgroup. @@ -1258,13 +1250,12 @@ By default, the policy settings in Local GPOs are applied before any domain-base | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1291,7 +1282,7 @@ By default, the policy settings in Local GPOs are applied before any domain-base | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1304,9 +1295,9 @@ By default, the policy settings in Local GPOs are applied before any domain-base This policy setting allows you to control a user's ability to invoke a computer policy refresh. -- If you enable this policy setting, users are not able to invoke a refresh of computer policy. Computer policy will still be applied at startup or when an official policy refresh occurs. +- If you enable this policy setting, users aren't able to invoke a refresh of computer policy. Computer policy will still be applied at startup or when an official policy refresh occurs. -- If you disable or do not configure this policy setting, the default behavior applies. By default, computer policy is applied when the computer starts up. It also applies at a specified refresh interval or when manually invoked by the user. +- If you disable or don't configure this policy setting, the default behavior applies. By default, computer policy is applied when the computer starts up. It also applies at a specified refresh interval or when manually invoked by the user. > [!NOTE] > This policy setting applies only to non-administrators. Administrators can still invoke a refresh of computer policy at any time, no matter how this policy setting is configured. @@ -1326,13 +1317,12 @@ Also, see the "Set Group Policy refresh interval for computers" policy setting t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1359,7 +1349,7 @@ Also, see the "Set Group Policy refresh interval for computers" policy setting t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1374,9 +1364,9 @@ This policy setting determines whether the Windows device is allowed to particip - If you enable this policy setting, the Windows device is discoverable by other Windows devices that belong to the same user, and can participate in cross-device experiences. -- If you disable this policy setting, the Windows device is not discoverable by other devices, and cannot participate in cross-device experiences. +- If you disable this policy setting, the Windows device isn't discoverable by other devices, and can't participate in cross-device experiences. -- If you do not configure this policy setting, the default behavior depends on the Windows edition. Changes to this policy take effect on reboot. +- If you don't configure this policy setting, the default behavior depends on the Windows edition. Changes to this policy take effect on reboot. @@ -1388,13 +1378,12 @@ This policy setting determines whether the Windows device is allowed to particip | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1421,7 +1410,7 @@ This policy setting determines whether the Windows device is allowed to particip | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1434,13 +1423,13 @@ This policy setting determines whether the Windows device is allowed to particip This policy setting allows you to configure Group Policy caching behavior. -- If you enable or do not configure this policy setting, Group Policy caches policy information after every background processing session. This cache saves applicable GPOs and the settings contained within them. When Group Policy runs in synchronous foreground mode, it refers to this cache, which enables it to run faster. When the cache is read, Group Policy attempts to contact a logon domain controller to determine the link speed. When Group Policy runs in background mode or asynchronous foreground mode, it continues to download the latest version of the policy information, and it uses a bandwidth estimate to determine slow link thresholds. (See the "Configure Group Policy Slow Link Detection" policy setting to configure asynchronous foreground behavior.) +- If you enable or don't configure this policy setting, Group Policy caches policy information after every background processing session. This cache saves applicable GPOs and the settings contained within them. When Group Policy runs in synchronous foreground mode, it refers to this cache, which enables it to run faster. When the cache is read, Group Policy attempts to contact a logon domain controller to determine the link speed. When Group Policy runs in background mode or asynchronous foreground mode, it continues to download the latest version of the policy information, and it uses a bandwidth estimate to determine slow link thresholds. (See the "Configure Group Policy Slow Link Detection" policy setting to configure asynchronous foreground behavior). -The slow link value that is defined in this policy setting determines how long Group Policy will wait for a response from the domain controller before reporting the link speed as slow. The default is 500 milliseconds. +The slow link value that's defined in this policy setting determines how long Group Policy will wait for a response from the domain controller before reporting the link speed as slow. The default is 500 milliseconds. -The timeout value that is defined in this policy setting determines how long Group Policy will wait for a response from the domain controller before determining that there is no network connectivity. This stops the current Group Policy processing. Group Policy will run in the background the next time a connection to a domain controller is established. Setting this value too high might result in longer waits for the user at boot or logon. The default is 5000 milliseconds. +The timeout value that's defined in this policy setting determines how long Group Policy will wait for a response from the domain controller before determining that there is no network connectivity. This stops the current Group Policy processing. Group Policy will run in the background the next time a connection to a domain controller is established. Setting this value too high might result in longer waits for the user at boot or logon. The default is 5000 milliseconds. -- If you disable this policy setting, the Group Policy client will not cache applicable GPOs or settings that are contained within the GPOs. When Group Policy runs synchronously, it downloads the latest version of the policy from the network and uses bandwidth estimates to determine slow link thresholds. (See the "Configure Group Policy Slow Link Detection" policy setting to configure asynchronous foreground behavior.) +- If you disable this policy setting, the Group Policy client won't cache applicable GPOs or settings that are contained within the GPOs. When Group Policy runs synchronously, it downloads the latest version of the policy from the network and uses bandwidth estimates to determine slow link thresholds. (See the "Configure Group Policy Slow Link Detection" policy setting to configure asynchronous foreground behavior). @@ -1452,13 +1441,12 @@ The timeout value that is defined in this policy setting determines how long Gro | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1485,7 +1473,7 @@ The timeout value that is defined in this policy setting determines how long Gro | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1498,10 +1486,13 @@ The timeout value that is defined in this policy setting determines how long Gro This policy setting allows you to configure Group Policy caching behavior on Windows Server machines. -- If you enable this policy setting, Group Policy caches policy information after every background processing session. This cache saves applicable GPOs and the settings contained within them. When Group Policy runs in synchronous foreground mode, it refers to this cache, which enables it to run faster. When the cache is read, Group Policy attempts to contact a logon domain controller to determine the link speed. When Group Policy runs in background mode or asynchronous foreground mode, it continues to download the latest version of the policy information, and it uses a bandwidth estimate to determine slow link thresholds. (See the "Configure Group Policy Slow Link Detection" policy setting to configure asynchronous foreground behavior.) -The slow link value that is defined in this policy setting determines how long Group Policy will wait for a response from the domain controller before reporting the link speed as slow. The default is 500 milliseconds. -The timeout value that is defined in this policy setting determines how long Group Policy will wait for a response from the domain controller before determining that there is no network connectivity. This stops the current Group Policy processing. Group Policy will run in the background the next time a connection to a domain controller is established. Setting this value too high might result in longer waits for the user at boot or logon. The default is 5000 milliseconds. -- If you disable or do not configure this policy setting, the Group Policy client will not cache applicable GPOs or settings that are contained within the GPOs. When Group Policy runs synchronously, it downloads the latest version of the policy from the network and uses bandwidth estimates to determine slow link thresholds. (See the "Configure Group Policy Slow Link Detection" policy setting to configure asynchronous foreground behavior.) +- If you enable this policy setting, Group Policy caches policy information after every background processing session. This cache saves applicable GPOs and the settings contained within them. When Group Policy runs in synchronous foreground mode, it refers to this cache, which enables it to run faster. When the cache is read, Group Policy attempts to contact a logon domain controller to determine the link speed. When Group Policy runs in background mode or asynchronous foreground mode, it continues to download the latest version of the policy information, and it uses a bandwidth estimate to determine slow link thresholds. (See the "Configure Group Policy Slow Link Detection" policy setting to configure asynchronous foreground behavior). + +The slow link value that's defined in this policy setting determines how long Group Policy will wait for a response from the domain controller before reporting the link speed as slow. The default is 500 milliseconds. + +The timeout value that's defined in this policy setting determines how long Group Policy will wait for a response from the domain controller before determining that there is no network connectivity. This stops the current Group Policy processing. Group Policy will run in the background the next time a connection to a domain controller is established. Setting this value too high might result in longer waits for the user at boot or logon. The default is 5000 milliseconds. + +- If you disable or don't configure this policy setting, the Group Policy client won't cache applicable GPOs or settings that are contained within the GPOs. When Group Policy runs synchronously, it downloads the latest version of the policy from the network and uses bandwidth estimates to determine slow link thresholds. (See the "Configure Group Policy Slow Link Detection" policy setting to configure asynchronous foreground behavior). @@ -1513,13 +1504,12 @@ The timeout value that is defined in this policy setting determines how long Gro | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1546,7 +1536,7 @@ The timeout value that is defined in this policy setting determines how long Gro | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1561,9 +1551,9 @@ This policy allows IT admins to turn off the ability to Link a Phone with a PC t - If you enable this policy setting, the Windows device will be able to enroll in Phone-PC linking functionality and participate in Continue on PC experiences. -- If you disable this policy setting, the Windows device is not allowed to be linked to Phones, will remove itself from the device list of any linked Phones, and cannot participate in Continue on PC experiences. +- If you disable this policy setting, the Windows device isn't allowed to be linked to Phones, will remove itself from the device list of any linked Phones, and can't participate in Continue on PC experiences. -- If you do not configure this policy setting, the default behavior depends on the Windows edition. Changes to this policy take effect on reboot. +- If you don't configure this policy setting, the default behavior depends on the Windows edition. Changes to this policy take effect on reboot. @@ -1575,13 +1565,12 @@ This policy allows IT admins to turn off the ability to Link a Phone with a PC t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1608,7 +1597,7 @@ This policy allows IT admins to turn off the ability to Link a Phone with a PC t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1621,14 +1610,14 @@ This policy allows IT admins to turn off the ability to Link a Phone with a PC t This policy setting prevents administrators from viewing or using Group Policy preferences. -A Group Policy administration (.adm) file can contain both true settings and preferences. True settings, which are fully supported by Group Policy, must use registry entries in the Software\Policies or Software\Microsoft\Windows\CurrentVersion\Policies registry subkeys. Preferences, which are not fully supported, use registry entries in other subkeys. +A Group Policy administration (.adm) file can contain both true settings and preferences. True settings, which are fully supported by Group Policy, must use registry entries in the Software\Policies or Software\Microsoft\Windows\CurrentVersion\Policies registry subkeys. Preferences, which aren't fully supported, use registry entries in other subkeys. -- If you enable this policy setting, the "Show Policies Only" command is turned on, and administrators cannot turn it off. As a result, Group Policy Object Editor displays only true settings; preferences do not appear. +- If you enable this policy setting, the "Show Policies Only" command is turned on, and administrators can't turn it off. As a result, Group Policy Object Editor displays only true settings; preferences don't appear. -- If you disable or do not configure this policy setting, the "Show Policies Only" command is turned on by default, but administrators can view preferences by turning off the "Show Policies Only" command. +- If you disable or don't configure this policy setting, the "Show Policies Only" command is turned on by default, but administrators can view preferences by turning off the "Show Policies Only" command. > [!NOTE] -> To find the "Show Policies Only" command, in Group Policy Object Editor, click the Administrative Templates folder (either one), right-click the same folder, and then point to "View." +> To find the "Show Policies Only" command, in Group Policy Object Editor, click the Administrative Templates folder (either one), right-click the same folder, and then point to "View". In Group Policy Object Editor, preferences have a red icon to distinguish them from true settings, which have a blue icon. @@ -1642,13 +1631,12 @@ In Group Policy Object Editor, preferences have a red icon to distinguish them f | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1675,7 +1663,7 @@ In Group Policy Object Editor, preferences have a red icon to distinguish them f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1686,7 +1674,7 @@ In Group Policy Object Editor, preferences have a red icon to distinguish them f -This security feature provides a global setting to prevent programs from loading untrusted fonts. Untrusted fonts are any font installed outside of the %windir%\Fonts directory. This feature can be configured to be in 3 modes: On, Off, and Audit. By default, it is Off and no fonts are blocked. If you aren't quite ready to deploy this feature into your organization, you can run it in Audit mode to see if blocking untrusted fonts causes any usability or compatibility issues. +This security feature provides a global setting to prevent programs from loading untrusted fonts. Untrusted fonts are any font installed outside of the %windir%\Fonts directory. This feature can be configured to be in 3 modes: On, Off, and Audit. By default, it's Off and no fonts are blocked. If you aren't quite ready to deploy this feature into your organization, you can run it in Audit mode to see if blocking untrusted fonts causes any usability or compatibility issues. @@ -1698,13 +1686,12 @@ This security feature provides a global setting to prevent programs from loading | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1730,7 +1717,7 @@ This security feature provides a global setting to prevent programs from loading | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1751,10 +1738,10 @@ This policy setting determines which domain controller the Group Policy Object E "Use any available domain controller" indicates that the Group Policy Object Editor snap-in can read and write changes to any available domain controller. -- If you disable this setting or do not configure it, the Group Policy Object Editor snap-in uses the domain controller designated as the PDC Operations Master for the domain. +- If you disable this setting or don't configure it, the Group Policy Object Editor snap-in uses the domain controller designated as the PDC Operations Master for the domain. > [!NOTE] -> To change the PDC Operations Master for a domain, in Active Directory Users and Computers, right-click a domain, and then click "Operations Masters." +> To change the PDC Operations Master for a domain, in Active Directory Users and Computers, right-click a domain, and then click "Operations Masters". @@ -1766,13 +1753,12 @@ This policy setting determines which domain controller the Group Policy Object E | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1798,7 +1784,7 @@ This policy setting determines which domain controller the Group Policy Object E | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1817,14 +1803,14 @@ The system's response to a slow policy connection varies among policies. The pro - If you enable this setting, you can, in the "Connection speed" box, type a decimal number between 0 and 4,294,967,200, indicating a transfer rate in kilobits per second. Any connection slower than this rate is considered to be slow. If you type 0, all connections are considered to be fast. -- If you disable this setting or do not configure it, the system uses the default value of 500 kilobits per second. +- If you disable this setting or don't configure it, the system uses the default value of 500 kilobits per second. This setting appears in the Computer Configuration and User Configuration folders. The setting in Computer Configuration defines a slow link for policies in the Computer Configuration folder. The setting in User Configuration defines a slow link for settings in the User Configuration folder. Also, see the "Do not detect slow network connections" and related policies in Computer Configuration\Administrative Templates\System\User Profile. > [!NOTE] -> If the profile server has IP connectivity, the connection speed setting is used. If the profile server does not have IP connectivity, the SMB timing is used. +> If the profile server has IP connectivity, the connection speed setting is used. If the profile server doesn't have IP connectivity, the SMB timing is used. @@ -1836,13 +1822,12 @@ Also, see the "Do not detect slow network connections" and related policies in C | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1868,7 +1853,7 @@ Also, see the "Do not detect slow network connections" and related policies in C | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1887,14 +1872,14 @@ The system's response to a slow policy connection varies among policies. The pro - If you enable this setting, you can, in the "Connection speed" box, type a decimal number between 0 and 4,294,967,200, indicating a transfer rate in kilobits per second. Any connection slower than this rate is considered to be slow. If you type 0, all connections are considered to be fast. -- If you disable this setting or do not configure it, the system uses the default value of 500 kilobits per second. +- If you disable this setting or don't configure it, the system uses the default value of 500 kilobits per second. This setting appears in the Computer Configuration and User Configuration folders. The setting in Computer Configuration defines a slow link for policies in the Computer Configuration folder. The setting in User Configuration defines a slow link for settings in the User Configuration folder. Also, see the "Do not detect slow network connections" and related policies in Computer Configuration\Administrative Templates\System\User Profile. > [!NOTE] -> If the profile server has IP connectivity, the connection speed setting is used. If the profile server does not have IP connectivity, the SMB timing is used. +> If the profile server has IP connectivity, the connection speed setting is used. If the profile server doesn't have IP connectivity, the SMB timing is used. @@ -1906,13 +1891,12 @@ Also, see the "Do not detect slow network connections" and related policies in C | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1938,7 +1922,7 @@ Also, see the "Do not detect slow network connections" and related policies in C | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1955,7 +1939,7 @@ In addition to background updates, Group Policy for the computer is always updat By default, computer Group Policy is updated in the background every 90 minutes, with a random offset of 0 to 30 minutes. -- If you enable this setting, you can specify an update rate from 0 to 64,800 minutes (45 days). If you select 0 minutes, the computer tries to update Group Policy every 7 seconds. However, because updates might interfere with users' work and increase network traffic, very short update intervals are not appropriate for most installations. +- If you enable this setting, you can specify an update rate from 0 to 64,800 minutes (45 days). If you select 0 minutes, the computer tries to update Group Policy every 7 seconds. However, because updates might interfere with users' work and increase network traffic, very short update intervals aren't appropriate for most installations. - If you disable this setting, Group Policy is updated every 90 minutes (the default). To specify that Group Policy should never be updated while the computer is in use, select the "Turn off background refresh of Group Policy" policy. @@ -1963,7 +1947,7 @@ The Set Group Policy refresh interval for computers policy also lets you specify This setting establishes the update rate for computer Group Policy. To set an update rate for user policies, use the "Set Group Policy refresh interval for users" setting (located in User Configuration\Administrative Templates\System\Group Policy). -This setting is only used when the "Turn off background refresh of Group Policy" setting is not enabled. +This setting is only used when the "Turn off background refresh of Group Policy" setting isn't enabled. > [!NOTE] > Consider notifying users that their policy is updated periodically so that they recognize the signs of a policy update. When Group Policy is updated, the Windows desktop is refreshed; it flickers briefly and closes open menus. Also, restrictions imposed by Group Policies, such as those that limit the programs users can run, might interfere with tasks in progress. @@ -1978,13 +1962,12 @@ This setting is only used when the "Turn off background refresh of Group Policy" | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2010,7 +1993,7 @@ This setting is only used when the "Turn off background refresh of Group Policy" | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2021,13 +2004,13 @@ This setting is only used when the "Turn off background refresh of Group Policy" -This policy setting specifies how often Group Policy is updated on domain controllers while they are running (in the background). The updates specified by this setting occur in addition to updates performed when the system starts. +This policy setting specifies how often Group Policy is updated on domain controllers while they're running (in the background). The updates specified by this setting occur in addition to updates performed when the system starts. By default, Group Policy on the domain controllers is updated every five minutes. -- If you enable this setting, you can specify an update rate from 0 to 64,800 minutes (45 days). If you select 0 minutes, the domain controller tries to update Group Policy every 7 seconds. However, because updates might interfere with users' work and increase network traffic, very short update intervals are not appropriate for most installations. +- If you enable this setting, you can specify an update rate from 0 to 64,800 minutes (45 days). If you select 0 minutes, the domain controller tries to update Group Policy every 7 seconds. However, because updates might interfere with users' work and increase network traffic, very short update intervals aren't appropriate for most installations. -- If you disable or do not configure this setting, the domain controller updates Group Policy every 5 minutes (the default). To specify that Group Policies for users should never be updated while the computer is in use, select the "Turn off background refresh of Group Policy" setting. +- If you disable or don't configure this setting, the domain controller updates Group Policy every 5 minutes (the default). To specify that Group Policies for users should never be updated while the computer is in use, select the "Turn off background refresh of Group Policy" setting. This setting also lets you specify how much the actual update interval varies. To prevent domain controllers with the same update interval from requesting updates simultaneously, the system varies the update interval for each controller by a random number of minutes. The number you type in the random time box sets the upper limit for the range of variance. For example, if you type 30 minutes, the system selects a variance of 0 to 30 minutes. Typing a large number establishes a broad range and makes it less likely that update requests overlap. However, updates might be delayed significantly. @@ -2044,13 +2027,12 @@ This setting also lets you specify how much the actual update interval varies. T | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2076,7 +2058,7 @@ This setting also lets you specify how much the actual update interval varies. T | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2093,7 +2075,7 @@ In addition to background updates, Group Policy for users is always updated when By default, user Group Policy is updated in the background every 90 minutes, with a random offset of 0 to 30 minutes. -- If you enable this setting, you can specify an update rate from 0 to 64,800 minutes (45 days). If you select 0 minutes, the computer tries to update user Group Policy every 7 seconds. However, because updates might interfere with users' work and increase network traffic, very short update intervals are not appropriate for most installations. +- If you enable this setting, you can specify an update rate from 0 to 64,800 minutes (45 days). If you select 0 minutes, the computer tries to update user Group Policy every 7 seconds. However, because updates might interfere with users' work and increase network traffic, very short update intervals aren't appropriate for most installations. - If you disable this setting, user Group Policy is updated every 90 minutes (the default). To specify that Group Policy for users should never be updated while the computer is in use, select the "Turn off background refresh of Group Policy" setting. @@ -2118,13 +2100,12 @@ This setting also lets you specify how much the actual update interval varies. T | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2150,7 +2131,7 @@ This setting also lets you specify how much the actual update interval varies. T | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2171,7 +2152,7 @@ By default, the Group Policy client waits five minutes before running logon scri - If you disable this policy setting, Group Policy will run scripts immediately after logon. -- If you do not configure this policy setting, Group Policy will wait five minutes before running logon scripts. +- If you don't configure this policy setting, Group Policy will wait five minutes before running logon scripts. @@ -2183,13 +2164,12 @@ By default, the Group Policy client waits five minutes before running logon scri | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2216,7 +2196,7 @@ By default, the Group Policy client waits five minutes before running logon scri | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2245,13 +2225,12 @@ If this setting is Disabled or Not Configured, the default display name of New G | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2277,7 +2256,7 @@ If this setting is Disabled or Not Configured, the default display name of New G | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2292,7 +2271,7 @@ This policy setting allows you to create new Group Policy object links in the di - If you enable this setting, you can create all new Group Policy object links in the disabled state by default. After you configure and test the new object links by using a policy compliant Group Policy management tool such as Active Directory Users and Computers or Active Directory Sites and Services, you can enable the object links for use on the system. -- If you disable this setting or do not configure it, new Group Policy object links are created in the enabled state. If you do not want them to be effective until they are configured and tested, you must disable the object link. +- If you disable this setting or don't configure it, new Group Policy object links are created in the enabled state. If you don't want them to be effective until they're configured and tested, you must disable the object link. @@ -2304,13 +2283,12 @@ This policy setting allows you to create new Group Policy object links in the di | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2337,7 +2315,7 @@ This policy setting allows you to create new Group Policy object links in the di | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2366,10 +2344,10 @@ This leads to the following behavior: - If you had originally created the GPO with an English system, and then you edit the GPO with a Japanese system, the Group Policy Object Editor snap-in uses the local Japanese ADM files, and you see the text in Japanese under Administrative Templates. -- If you disable or do not configure this setting, the Group Policy Object Editor snap-in always loads all ADM files from the actual GPO. +- If you disable or don't configure this setting, the Group Policy Object Editor snap-in always loads all ADM files from the actual GPO. > [!NOTE] -> If the ADMs that you require are not all available locally in your %windir%\inf directory, you might not be able to see all the settings that have been configured in the GPO that you are editing. +> If the ADMs that you require aren't all available locally in your %windir%\inf directory, you might not be able to see all the settings that have been configured in the GPO that you are editing. @@ -2381,13 +2359,12 @@ This leads to the following behavior: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2414,7 +2391,7 @@ This leads to the following behavior: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2432,7 +2409,7 @@ This leads to the following behavior: This security feature provides a means to override individual process MitigationOptions settings. This can be used to enforce a number of security policies specific to applications. The application name is specified as the Value name, including extension. The Value is specified as a bit field with a series of flags in particular positions. Bits can be set to either 0 (setting is forced off), 1 (setting is forced on), or ? (setting retains its existing value prior to GPO evaluation). The recognized bit locations are: PROCESS_CREATION_MITIGATION_POLICY_DEP_ENABLE (0x00000001) -Enables data execution prevention (DEP) for the child process +Enables data execution prevention (DEP) for the child process. PROCESS_CREATION_MITIGATION_POLICY_DEP_ATL_THUNK_ENABLE (0x00000002) Enables DEP-ATL thunk emulation for the child process. DEP-ATL thunk emulation causes the system to intercept NX faults that originate from the Active Template Library (ATL) thunk layer. @@ -2441,13 +2418,14 @@ PROCESS_CREATION_MITIGATION_POLICY_SEHOP_ENABLE (0x00000004) Enables structured exception handler overwrite protection (SEHOP) for the child process. SEHOP blocks exploits that use the structured exception handler (SEH) overwrite technique. PROCESS_CREATION_MITIGATION_POLICY_FORCE_RELOCATE_IMAGES_ALWAYS_ON (0x00000100) -The force Address Space Layout Randomization (ASLR) policy forcibly rebases images that are not dynamic base compatible by acting as though an image base collision happened at load time. If relocations are required, images that do not have a base relocation section will not be loaded. +The force Address Space Layout Randomization (ASLR) policy forcibly rebases images that aren't dynamic base compatible by acting as though an image base collision happened at load time. If relocations are required, images that don't have a base relocation section won't be loaded. PROCESS_CREATION_MITIGATION_POLICY_BOTTOM_UP_ASLR_ALWAYS_ON (0x00010000) PROCESS_CREATION_MITIGATION_POLICY_BOTTOM_UP_ASLR_ALWAYS_OFF (0x00020000) The bottom-up randomization policy, which includes stack randomization options, causes a random location to be used as the lowest user address. For instance, to enable PROCESS_CREATION_MITIGATION_POLICY_DEP_ENABLE and PROCESS_CREATION_MITIGATION_POLICY_FORCE_RELOCATE_IMAGES_ALWAYS_ON, disable PROCESS_CREATION_MITIGATION_POLICY_BOTTOM_UP_ASLR_ALWAYS_OFF, and to leave all other options at their default values, specify a value of: + ???????????????0???????1???????1 Setting flags not specified here to any value other than ? results in undefined behavior. @@ -2462,13 +2440,12 @@ Setting flags not specified here to any value other than ? results in undefined | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2494,7 +2471,7 @@ Setting flags not specified here to any value other than ? results in undefined | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2517,13 +2494,12 @@ Enabling this setting will cause the Group Policy Client to connect to the same | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2550,7 +2526,7 @@ Enabling this setting will cause the Group Policy Client to connect to the same | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2567,10 +2543,10 @@ RSoP logs information on Group Policy settings that have been applied to the cli - If you enable this setting, RSoP logging is turned off. -- If you disable or do not configure this setting, RSoP logging is turned on. By default, RSoP logging is always on. +- If you disable or don't configure this setting, RSoP logging is turned on. By default, RSoP logging is always on. > [!NOTE] -> To view the RSoP information logged on a client computer, you can use the RSoP snap-in in the Microsoft Management Console (MMC). +> To view the RSoP information logged-on a client computer, you can use the RSoP snap-in in the Microsoft Management Console (MMC). @@ -2582,13 +2558,12 @@ RSoP logs information on Group Policy settings that have been applied to the cli | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2615,7 +2590,7 @@ RSoP logs information on Group Policy settings that have been applied to the cli | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2633,9 +2608,9 @@ When Group Policy detects the bandwidth speed of a Direct Access connection, the > [!NOTE] > When Group Policy detects a slow network connection, Group Policy will only process those client side extensions configured for processing across a slow link (slow network connection). -- If you enable this policy, when Group Policy cannot determine the bandwidth speed across Direct Access, Group Policy will evaluate the network connection as a fast link and process all client side extensions. +- If you enable this policy, when Group Policy can't determine the bandwidth speed across Direct Access, Group Policy will evaluate the network connection as a fast link and process all client side extensions. -- If you disable this setting or do not configure it, Group Policy will evaluate the network connection as a slow link and process only those client side extensions configured to process over a slow link. +- If you disable this setting or don't configure it, Group Policy will evaluate the network connection as a slow link and process only those client side extensions configured to process over a slow link. @@ -2647,13 +2622,12 @@ When Group Policy detects the bandwidth speed of a Direct Access connection, the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2680,7 +2654,7 @@ When Group Policy detects the bandwidth speed of a Direct Access connection, the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2694,16 +2668,18 @@ When Group Policy detects the bandwidth speed of a Direct Access connection, the This policy directs Group Policy processing to skip processing any client side extension that requires synchronous processing (that is, whether computers wait for the network to be fully initialized during computer startup and user logon) when a slow network connection is detected. - If you enable this policy setting, when a slow network connection is detected, Group Policy processing will always run in an asynchronous manner. -Client computers will not wait for the network to be fully initialized at startup and logon. Existing users will be logged on using cached credentials, -which will result in shorter logon times. Group Policy will be applied in the background after the network becomes available. -**Note** that because this is a background refresh, extensions requiring synchronous processing such as Software Installation, Folder Redirection -and Drive Maps preference extension will not be applied. -**Note** There are two conditions that will cause Group Policy to be processed synchronously even if this policy setting is enabled: +Client computers won't wait for the network to be fully initialized at startup and logon. Existing users will be logged-on using cached credentials, which will result in shorter logon times. Group Policy will be applied in the background after the network becomes available. + +Note that because this is a background refresh, extensions requiring synchronous processing such as Software Installation, Folder Redirection and Drive Maps preference extension won't be applied. + +Note There are two conditions that will cause Group Policy to be processed synchronously even if this policy setting is enabled: + 1 - At the first computer startup after the client computer has joined the domain. + 2 - If the policy setting "Always wait for the network at computer startup and logon" is enabled. -- If you disable or do not configure this policy setting, detecting a slow network connection will not affect whether Group Policy processing will be synchronous or asynchronous. +- If you disable or don't configure this policy setting, detecting a slow network connection won't affect whether Group Policy processing will be synchronous or asynchronous. @@ -2715,13 +2691,12 @@ and Drive Maps preference extension will not be applied. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2748,7 +2723,7 @@ and Drive Maps preference extension will not be applied. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2759,11 +2734,11 @@ and Drive Maps preference extension will not be applied. -This policy setting specifies how long Group Policy should wait for network availability notifications during startup policy processing. If the startup policy processing is synchronous, the computer is blocked until the network is available or the default wait time is reached. If the startup policy processing is asynchronous, the computer is not blocked and policy processing will occur in the background. In either case, configuring this policy setting overrides any system-computed wait times. +This policy setting specifies how long Group Policy should wait for network availability notifications during startup policy processing. If the startup policy processing is synchronous, the computer is blocked until the network is available or the default wait time is reached. If the startup policy processing is asynchronous, the computer isn't blocked and policy processing will occur in the background. In either case, configuring this policy setting overrides any system-computed wait times. - If you enable this policy setting, Group Policy will use this administratively configured maximum wait time and override any default or system-computed wait time. -- If you disable or do not configure this policy setting, Group Policy will use the default wait time of 30 seconds on computers running Windows Vista operating system. +- If you disable or don't configure this policy setting, Group Policy will use the default wait time of 30 seconds on computers running Windows Vista operating system. @@ -2775,13 +2750,12 @@ This policy setting specifies how long Group Policy should wait for network avai | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2807,7 +2781,7 @@ This policy setting specifies how long Group Policy should wait for network avai | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2818,7 +2792,7 @@ This policy setting specifies how long Group Policy should wait for network avai -This policy setting directs the system to apply the set of Group Policy objects for the computer to any user who logs on to a computer affected by this setting. It is intended for special-use computers, such as those in public places, laboratories, and classrooms, where you must modify the user setting based on the computer that is being used. +This policy setting directs the system to apply the set of Group Policy objects for the computer to any user who logs on to a computer affected by this setting. It's intended for special-use computers, such as those in public places, laboratories, and classrooms, where you must modify the user setting based on the computer that's being used. By default, the user's Group Policy Objects determine which user settings apply. @@ -2830,7 +2804,7 @@ By default, the user's Group Policy Objects determine which user settings apply. "Merge" indicates that the user settings defined in the computer's Group Policy Objects and the user settings normally applied to the user are combined. If the settings conflict, the user settings in the computer's Group Policy Objects take precedence over the user's normal settings. -- If you disable this setting or do not configure it, the user's Group Policy Objects determines which user settings apply. +- If you disable this setting or don't configure it, the user's Group Policy Objects determines which user settings apply. > [!NOTE] > This setting is effective only when both the computer account and the user account are in at least Windows 2000 domains. @@ -2845,13 +2819,12 @@ By default, the user's Group Policy Objects determine which user settings apply. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-help.md b/windows/client-management/mdm/policy-csp-admx-help.md index c125af97bc..dabc23d834 100644 --- a/windows/client-management/mdm/policy-csp-admx-help.md +++ b/windows/client-management/mdm/policy-csp-admx-help.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_Help Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_Help -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -48,7 +45,7 @@ Data Execution Prevention (DEP) is designed to block malicious code that takes a - If you enable this policy setting, DEP for HTML Help Executable is turned off. This will allow certain legacy ActiveX controls to function without DEP shutting down HTML Help Executable. -- If you disable or do not configure this policy setting, DEP is turned on for HTML Help Executable. This provides an additional security benefit, but HTLM Help stops if DEP detects system memory abnormalities. +- If you disable or don't configure this policy setting, DEP is turned on for HTML Help Executable. This provides an additional security benefit, but HTLM Help stops if DEP detects system memory abnormalities. @@ -60,13 +57,12 @@ Data Execution Prevention (DEP) is designed to block malicious code that takes a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -93,7 +89,7 @@ Data Execution Prevention (DEP) is designed to block malicious code that takes a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -104,23 +100,23 @@ Data Execution Prevention (DEP) is designed to block malicious code that takes a -This policy setting allows you to restrict certain HTML Help commands to function only in HTML Help (.chm) files within specified folders and their subfolders. Alternatively, you can disable these commands on the entire system. It is strongly recommended that only folders requiring administrative privileges be added to this policy setting. +This policy setting allows you to restrict certain HTML Help commands to function only in HTML Help (.chm) files within specified folders and their subfolders. Alternatively, you can disable these commands on the entire system. It's strongly recommended that only folders requiring administrative privileges be added to this policy setting. - If you enable this policy setting, the commands function only for .chm files in the specified folders and their subfolders. To restrict the commands to one or more folders, enable the policy setting and enter the desired folders in the text box on the Settings tab of the Policy Properties dialog box. Use a semicolon to separate folders. For example, to restrict the commands to only .chm files in the %windir%\help folder and D:\somefolder, add the following string to the edit box: "%windir%\help;D:\somefolder". > [!NOTE] -> An environment variable may be used, (for example, %windir%), as long as it is defined on the system. For example, %programfiles% is not defined on some early versions of Windows. +> An environment variable may be used, (for example, %windir%), as long as it's defined on the system. For example, %programfiles% isn't defined on some early versions of Windows. The "Shortcut" command is used to add a link to a Help topic, and runs executables that are external to the Help file. The "WinHelp" command is used to add a link to a Help topic, and runs a WinHLP32.exe Help (.hlp) file. To disallow the "Shortcut" and "WinHelp" commands on the entire local system, enable the policy setting and leave the text box on the Settings tab of the Policy Properties dialog box blank. -- If you disable or do not configure this policy setting, these commands are fully functional for all Help files. +- If you disable or don't configure this policy setting, these commands are fully functional for all Help files. > [!NOTE] -> Only folders on the local computer can be specified in this policy setting. You cannot use this policy setting to enable the "Shortcut" and "WinHelp" commands for .chm files that are stored on mapped drives or accessed using UNC paths. +> Only folders on the local computer can be specified in this policy setting. You can't use this policy setting to enable the "Shortcut" and "WinHelp" commands for .chm files that are stored on mapped drives or accessed using UNC paths. For additional options, see the "Restrict these programs from being launched from Help" policy. @@ -134,13 +130,12 @@ For additional options, see the "Restrict these programs from being launched fro | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -166,7 +161,7 @@ For additional options, see the "Restrict these programs from being launched fro | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -181,13 +176,13 @@ This policy setting allows you to restrict programs from being run from online H - If you enable this policy setting, you can prevent specified programs from being run from Help. When you enable this policy setting, enter the file names names of the programs you want to restrict, separated by commas. -- If you disable or do not configure this policy setting, users can run all applications from online Help. +- If you disable or don't configure this policy setting, users can run all applications from online Help. > [!NOTE] > You can also restrict users from running applications by using the Software Restriction Policy settings available in Computer Configuration\Security Settings. > [!NOTE] -> This policy setting is available under Computer Configuration and User Configuration. If both are settings are used, any programs listed in either of these locations cannot launched from Help. +> This policy setting is available under Computer Configuration and User Configuration. If both are settings are used, any programs listed in either of these locations can't launched from Help. @@ -199,13 +194,12 @@ This policy setting allows you to restrict programs from being run from online H | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -231,7 +225,7 @@ This policy setting allows you to restrict programs from being run from online H | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -246,13 +240,13 @@ This policy setting allows you to restrict programs from being run from online H - If you enable this policy setting, you can prevent specified programs from being run from Help. When you enable this policy setting, enter the file names names of the programs you want to restrict, separated by commas. -- If you disable or do not configure this policy setting, users can run all applications from online Help. +- If you disable or don't configure this policy setting, users can run all applications from online Help. > [!NOTE] > You can also restrict users from running applications by using the Software Restriction Policy settings available in Computer Configuration\Security Settings. > [!NOTE] -> This policy setting is available under Computer Configuration and User Configuration. If both are settings are used, any programs listed in either of these locations cannot launched from Help. +> This policy setting is available under Computer Configuration and User Configuration. If both are settings are used, any programs listed in either of these locations can't launched from Help. @@ -264,13 +258,12 @@ This policy setting allows you to restrict programs from being run from online H | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-helpandsupport.md b/windows/client-management/mdm/policy-csp-admx-helpandsupport.md index 2fa008cfe0..a0c5be299f 100644 --- a/windows/client-management/mdm/policy-csp-admx-helpandsupport.md +++ b/windows/client-management/mdm/policy-csp-admx-helpandsupport.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_HelpAndSupport Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_HelpAndSupport -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,9 +41,9 @@ ms.topic: reference This policy setting specifies whether active content links in trusted assistance content are rendered. By default, the Help viewer renders trusted assistance content with active elements such as ShellExecute links and Guided Help links. -- If you enable this policy setting, active content links are not rendered. The text is displayed, but there are no clickable links for these elements. +- If you enable this policy setting, active content links aren't rendered. The text is displayed, but there are no clickable links for these elements. -- If you disable or do not configure this policy setting, the default behavior applies (Help viewer renders trusted assistance content with active elements). +- If you disable or don't configure this policy setting, the default behavior applies (Help viewer renders trusted assistance content with active elements). @@ -58,13 +55,12 @@ This policy setting specifies whether active content links in trusted assistance | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -91,7 +87,7 @@ This policy setting specifies whether active content links in trusted assistance | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -104,9 +100,9 @@ This policy setting specifies whether active content links in trusted assistance This policy setting specifies whether users can provide ratings for Help content. -- If you enable this policy setting, ratings controls are not added to Help content. +- If you enable this policy setting, ratings controls aren't added to Help content. -- If you disable or do not configure this policy setting, ratings controls are added to Help topics. +- If you disable or don't configure this policy setting, ratings controls are added to Help topics. Users can use the control to provide feedback on the quality and usefulness of the Help and Support content. @@ -120,13 +116,12 @@ Users can use the control to provide feedback on the quality and usefulness of t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -153,7 +148,7 @@ Users can use the control to provide feedback on the quality and usefulness of t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -166,9 +161,9 @@ Users can use the control to provide feedback on the quality and usefulness of t This policy setting specifies whether users can participate in the Help Experience Improvement program. The Help Experience Improvement program collects information about how customers use Windows Help so that Microsoft can improve it. -- If you enable this policy setting, users cannot participate in the Help Experience Improvement program. +- If you enable this policy setting, users can't participate in the Help Experience Improvement program. -- If you disable or do not configure this policy setting, users can turn on the Help Experience Improvement program feature from the Help and Support settings page. +- If you disable or don't configure this policy setting, users can turn on the Help Experience Improvement program feature from the Help and Support settings page. @@ -180,13 +175,12 @@ This policy setting specifies whether users can participate in the Help Experien | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -213,7 +207,7 @@ This policy setting specifies whether users can participate in the Help Experien | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -228,7 +222,7 @@ This policy setting specifies whether users can search and view content from Win - If you enable this policy setting, users are prevented from accessing online assistance content from Windows Online. -- If you disable or do not configure this policy setting, users can access online assistance if they have a connection to the Internet and have not disabled Windows Online from the Help and Support Options page. +- If you disable or don't configure this policy setting, users can access online assistance if they've a connection to the Internet and haven't disabled Windows Online from the Help and Support Options page. @@ -240,13 +234,12 @@ This policy setting specifies whether users can search and view content from Win | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-hotspotauth.md b/windows/client-management/mdm/policy-csp-admx-hotspotauth.md index b16c585854..639fa6323a 100644 --- a/windows/client-management/mdm/policy-csp-admx-hotspotauth.md +++ b/windows/client-management/mdm/policy-csp-admx-hotspotauth.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_hotspotauth Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_hotspotauth -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,9 +43,9 @@ This policy setting defines whether WLAN hotspots are probed for Wireless Intern If a WLAN hotspot supports the WISPr protocol, users can submit credentials when manually connecting to the network. If authentication is successful, users will be connected automatically on subsequent attempts. Credentials can also be configured by network operators. -- If you enable this policy setting, or if you do not configure this policy setting, WLAN hotspots are automatically probed for WISPR protocol support. +- If you enable this policy setting, or if you don't configure this policy setting, WLAN hotspots are automatically probed for WISPR protocol support. -- If you disable this policy setting, WLAN hotspots are not probed for WISPr protocol support, and users can only authenticate with WLAN hotspots using a web browser. +- If you disable this policy setting, WLAN hotspots aren't probed for WISPr protocol support, and users can only authenticate with WLAN hotspots using a web browser. @@ -60,13 +57,12 @@ If a WLAN hotspot supports the WISPr protocol, users can submit credentials when | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-icm.md b/windows/client-management/mdm/policy-csp-admx-icm.md index 962e5c380e..d9bba74952 100644 --- a/windows/client-management/mdm/policy-csp-admx-icm.md +++ b/windows/client-management/mdm/policy-csp-admx-icm.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_ICM Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_ICM -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -42,13 +39,13 @@ ms.topic: reference -This policy setting turns off the Windows Customer Experience Improvement Program. The Windows Customer Experience Improvement Program collects information about your hardware configuration and how you use our software and services to identify trends and usage patterns. Microsoft will not collect your name, address, or any other personally identifiable information. There are no surveys to complete, no salesperson will call, and you can continue working without interruption. It is simple and user-friendly. +This policy setting turns off the Windows Customer Experience Improvement Program. The Windows Customer Experience Improvement Program collects information about your hardware configuration and how you use our software and services to identify trends and usage patterns. Microsoft won't collect your name, address, or any other personally identifiable information. There are no surveys to complete, no salesperson will call, and you can continue working without interruption. It's simple and user-friendly. - If you enable this policy setting, all users are opted out of the Windows Customer Experience Improvement Program. - If you disable this policy setting, all users are opted into the Windows Customer Experience Improvement Program. -- If you do not configure this policy setting, the administrator can use the Problem Reports and Solutions component in Control Panel to enable Windows Customer Experience Improvement Program for all users. +- If you don't configure this policy setting, the administrator can use the Problem Reports and Solutions component in Control Panel to enable Windows Customer Experience Improvement Program for all users. @@ -60,13 +57,12 @@ This policy setting turns off the Windows Customer Experience Improvement Progra | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -93,7 +89,7 @@ This policy setting turns off the Windows Customer Experience Improvement Progra | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -108,9 +104,9 @@ This policy setting specifies whether to automatically update root certificates Typically, a certificate is used when you use a secure website or when you send and receive secure email. Anyone can issue certificates, but to have transactions that are as secure as possible, certificates must be issued by a trusted certificate authority (CA). Microsoft has included a list in Windows XP and other products of companies and organizations that it considers trusted authorities. -- If you enable this policy setting, when you are presented with a certificate issued by an untrusted root authority, your computer will not contact the Windows Update website to see if Microsoft has added the CA to its list of trusted authorities. +- If you enable this policy setting, when you are presented with a certificate issued by an untrusted root authority, your computer won't contact the Windows Update website to see if Microsoft has added the CA to its list of trusted authorities. -- If you disable or do not configure this policy setting, your computer will contact the Windows Update website. +- If you disable or don't configure this policy setting, your computer will contact the Windows Update website. @@ -122,13 +118,12 @@ Typically, a certificate is used when you use a secure website or when you send | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -155,7 +150,7 @@ Typically, a certificate is used when you use a secure website or when you send | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -171,11 +166,11 @@ This policy setting specifies whether to allow printing over HTTP from this clie Printing over HTTP allows a client to print to printers on the intranet as well as the Internet. > [!NOTE] -> This policy setting affects the client side of Internet printing only. It does not prevent this computer from acting as an Internet Printing server and making its shared printers available via HTTP. +> This policy setting affects the client side of Internet printing only. It doesn't prevent this computer from acting as an Internet Printing server and making its shared printers available via HTTP. - If you enable this policy setting, it prevents this client from printing to Internet printers over HTTP. -- If you disable or do not configure this policy setting, users can choose to print to Internet printers over HTTP. +- If you disable or don't configure this policy setting, users can choose to print to Internet printers over HTTP. Also, see the "Web-based printing" policy setting in Computer Configuration/Administrative Templates/Printers. @@ -189,13 +184,12 @@ Also, see the "Web-based printing" policy setting in Computer Configuration/Admi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -222,7 +216,7 @@ Also, see the "Web-based printing" policy setting in Computer Configuration/Admi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -238,11 +232,11 @@ This policy setting specifies whether to allow this client to download print dri To set up HTTP printing, non-inbox drivers need to be downloaded over HTTP. > [!NOTE] -> This policy setting does not prevent the client from printing to printers on the Intranet or the Internet over HTTP. It only prohibits downloading drivers that are not already installed locally. +> This policy setting doesn't prevent the client from printing to printers on the Intranet or the Internet over HTTP. It only prohibits downloading drivers that aren't already installed locally. -- If you enable this policy setting, print drivers cannot be downloaded over HTTP. +- If you enable this policy setting, print drivers can't be downloaded over HTTP. -- If you disable or do not configure this policy setting, users can download print drivers over HTTP. +- If you disable or don't configure this policy setting, users can download print drivers over HTTP. @@ -254,13 +248,12 @@ To set up HTTP printing, non-inbox drivers need to be downloaded over HTTP. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -287,7 +280,7 @@ To set up HTTP printing, non-inbox drivers need to be downloaded over HTTP. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -300,13 +293,13 @@ To set up HTTP printing, non-inbox drivers need to be downloaded over HTTP. This policy setting specifies whether Windows searches Windows Update for device drivers when no local drivers for a device are present. -- If you enable this policy setting, Windows Update is not searched when a new device is installed. +- If you enable this policy setting, Windows Update isn't searched when a new device is installed. - If you disable this policy setting, Windows Update is always searched for drivers when no local drivers are present. -- If you do not configure this policy setting, searching Windows Update is optional when installing a device. +- If you don't configure this policy setting, searching Windows Update is optional when installing a device. -Also see "Turn off Windows Update device driver search prompt" in "Administrative Templates/System," which governs whether an administrator is prompted before searching Windows Update for device drivers if a driver is not found locally. +Also see "Turn off Windows Update device driver search prompt" in "Administrative Templates/System," which governs whether an administrator is prompted before searching Windows Update for device drivers if a driver isn't found locally. > [!NOTE] > This policy setting is replaced by "Specify Driver Source Search Order" in "Administrative Templates/System/Device Installation" on newer versions of Windows. @@ -321,13 +314,12 @@ Also see "Turn off Windows Update device driver search prompt" in "Administrativ | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -354,7 +346,7 @@ Also see "Turn off Windows Update device driver search prompt" in "Administrativ | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -369,9 +361,9 @@ This policy setting specifies whether "Events.asp" hyperlinks are available for The Event Viewer normally makes all HTTP(S) URLs into hyperlinks that activate the Internet browser when clicked. In addition, "More Information" is placed at the end of the description text if the event is created by a Microsoft component. This text contains a link (URL) that, if clicked, sends information about the event to Microsoft, and allows users to learn more about why that event occurred. -- If you enable this policy setting, event description hyperlinks are not activated and the text "More Information" is not displayed at the end of the description. +- If you enable this policy setting, event description hyperlinks aren't activated and the text "More Information" isn't displayed at the end of the description. -- If you disable or do not configure this policy setting, the user can click the hyperlink, which prompts the user and then sends information about the event over the Internet to Microsoft. Also, see "Events.asp URL", "Events.asp program", and "Events.asp Program Command Line Parameters" settings in "Administrative Templates/Windows Components/Event Viewer". +- If you disable or don't configure this policy setting, the user can click the hyperlink, which prompts the user and then sends information about the event over the Internet to Microsoft. Also, see "Events.asp URL", "Events.asp program", and "Events.asp Program Command Line Parameters" settings in "Administrative Templates/Windows Components/Event Viewer". @@ -383,13 +375,12 @@ The Event Viewer normally makes all HTTP(S) URLs into hyperlinks that activate t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -416,7 +407,7 @@ The Event Viewer normally makes all HTTP(S) URLs into hyperlinks that activate t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -433,9 +424,9 @@ This content is dynamically updated when users who are connected to the Internet - If you enable this policy setting, the Help and Support Center no longer retrieves nor displays "Did you know?" content. -- If you disable or do not configure this policy setting, the Help and Support Center retrieves and displays "Did you know?" content. +- If you disable or don't configure this policy setting, the Help and Support Center retrieves and displays "Did you know?" content. -You might want to enable this policy setting for users who do not have Internet access, because the content in the "Did you know?" section will remain static indefinitely without an Internet connection. +You might want to enable this policy setting for users who don't have Internet access, because the content in the "Did you know?" section will remain static indefinitely without an Internet connection. @@ -447,13 +438,12 @@ You might want to enable this policy setting for users who do not have Internet | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -480,7 +470,7 @@ You might want to enable this policy setting for users who do not have Internet | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -497,7 +487,7 @@ The Knowledge Base is an online source of technical support information and self - If you enable this policy setting, it removes the Knowledge Base section from the Help and Support Center "Set search options" page, and only Help content on the local computer is searched. -- If you disable or do not configure this policy setting, the Knowledge Base is searched if the user has a connection to the Internet and has not disabled the Knowledge Base search from the Search Options page. +- If you disable or don't configure this policy setting, the Knowledge Base is searched if the user has a connection to the Internet and hasn't disabled the Knowledge Base search from the Search Options page. @@ -509,13 +499,12 @@ The Knowledge Base is an online source of technical support information and self | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -542,7 +531,7 @@ The Knowledge Base is an online source of technical support information and self | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -555,11 +544,11 @@ The Knowledge Base is an online source of technical support information and self This policy setting specifies whether Windows can access the Internet to accomplish tasks that require Internet resources. -- If you enable this setting, all of the policy settings listed in the "Internet Communication settings" section are set such that their respective features cannot access the Internet. +- If you enable this setting, all of the policy settings listed in the "Internet Communication settings" section are set such that their respective features can't access the Internet. - If you disable this policy setting, all of the policy settings listed in the "Internet Communication settings" section are set such that their respective features can access the Internet. -- If you do not configure this policy setting, all of the policy settings in the "Internet Communication settings" section are set to not configured. +- If you don't configure this policy setting, all of the policy settings in the "Internet Communication settings" section are set to not configured. @@ -571,13 +560,12 @@ This policy setting specifies whether Windows can access the Internet to accompl | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -604,7 +592,7 @@ This policy setting specifies whether Windows can access the Internet to accompl | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -617,11 +605,11 @@ This policy setting specifies whether Windows can access the Internet to accompl This policy setting specifies whether Windows can access the Internet to accomplish tasks that require Internet resources. -- If you enable this setting, all of the policy settings listed in the "Internet Communication settings" section are set such that their respective features cannot access the Internet. +- If you enable this setting, all of the policy settings listed in the "Internet Communication settings" section are set such that their respective features can't access the Internet. - If you disable this policy setting, all of the policy settings listed in the "Internet Communication settings" section are set such that their respective features can access the Internet. -- If you do not configure this policy setting, all of the policy settings in the "Internet Communication settings" section are set to not configured. +- If you don't configure this policy setting, all of the policy settings in the "Internet Communication settings" section are set to not configured. @@ -633,13 +621,12 @@ This policy setting specifies whether Windows can access the Internet to accompl | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -666,7 +653,7 @@ This policy setting specifies whether Windows can access the Internet to accompl | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -681,7 +668,7 @@ This policy setting specifies whether the Internet Connection Wizard can connect - If you enable this policy setting, the "Choose a list of Internet Service Providers" path in the Internet Connection Wizard causes the wizard to exit. This prevents users from retrieving the list of ISPs, which resides on Microsoft servers. -- If you disable or do not configure this policy setting, users can connect to Microsoft to download a list of ISPs for their area. +- If you disable or don't configure this policy setting, users can connect to Microsoft to download a list of ISPs for their area. @@ -693,13 +680,12 @@ This policy setting specifies whether the Internet Connection Wizard can connect | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -726,7 +712,7 @@ This policy setting specifies whether the Internet Connection Wizard can connect | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -739,11 +725,11 @@ This policy setting specifies whether the Internet Connection Wizard can connect This policy setting specifies whether the Windows Registration Wizard connects to Microsoft.com for online registration. -- If you enable this policy setting, it blocks users from connecting to Microsoft.com for online registration and users cannot register their copy of Windows online. +- If you enable this policy setting, it blocks users from connecting to Microsoft.com for online registration and users can't register their copy of Windows online. -- If you disable or do not configure this policy setting, users can connect to Microsoft.com to complete the online Windows Registration. +- If you disable or don't configure this policy setting, users can connect to Microsoft.com to complete the online Windows Registration. -**Note** that registration is optional and involves submitting some personal information to Microsoft. However, Windows Product Activation is required but does not involve submitting any personal information (except the country/region you live in). +Note that registration is optional and involves submitting some personal information to Microsoft. However, Windows Product Activation is required but doesn't involve submitting any personal information (except the country/region you live in). @@ -755,13 +741,12 @@ This policy setting specifies whether the Windows Registration Wizard connects t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -788,7 +773,7 @@ This policy setting specifies whether the Windows Registration Wizard connects t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -803,9 +788,9 @@ This policy setting controls whether or not errors are reported to Microsoft. Error Reporting is used to report information about a system or application that has failed or has stopped responding and is used to improve the quality of the product. -- If you enable this policy setting, users are not given the option to report errors. +- If you enable this policy setting, users aren't given the option to report errors. -- If you disable or do not configure this policy setting, the errors may be reported to Microsoft via the Internet or to a corporate file share. +- If you disable or don't configure this policy setting, the errors may be reported to Microsoft via the Internet or to a corporate file share. This policy setting overrides any user setting made from the Control Panel for error reporting. @@ -821,13 +806,12 @@ Also see the "Configure Error Reporting", "Display Error Notification" and "Disa | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -853,7 +837,7 @@ Also see the "Configure Error Reporting", "Display Error Notification" and "Disa | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -866,9 +850,9 @@ Also see the "Configure Error Reporting", "Display Error Notification" and "Disa This policy setting allows you to remove access to Windows Update. -- If you enable this policy setting, all Windows Update features are removed. This includes blocking access to the Windows Update website at , from the Windows Update hyperlink on the Start menu, and also on the Tools menu in Internet Explorer. Windows automatic updating is also disabled; you will neither be notified about nor will you receive critical updates from Windows Update. This policy setting also prevents Device Manager from automatically installing driver updates from the Windows Update website. +- If you enable this policy setting, all Windows Update features are removed. This includes blocking access to the Windows Update website at , from the Windows Update hyperlink on the Start menu, and also on the Tools menu in Internet Explorer. Windows automatic updating is also disabled; you'll neither be notified about nor will you receive critical updates from Windows Update. This policy setting also prevents Device Manager from automatically installing driver updates from the Windows Update website. -- If you disable or do not configure this policy setting, users can access the Windows Update website and enable automatic updating to receive notifications and critical updates from Windows Update. +- If you disable or don't configure this policy setting, users can access the Windows Update website and enable automatic updating to receive notifications and critical updates from Windows Update. > [!NOTE] > This policy applies only when this PC is configured to connect to an intranet update service using the "Specify intranet Microsoft update service location" policy. @@ -883,13 +867,12 @@ This policy setting allows you to remove access to Windows Update. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -916,7 +899,7 @@ This policy setting allows you to remove access to Windows Update. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -931,9 +914,9 @@ This policy setting specifies whether Search Companion should automatically down When users search the local computer or the Internet, Search Companion occasionally connects to Microsoft to download an updated privacy policy and additional content files used to format and display results. -- If you enable this policy setting, Search Companion does not download content updates during searches. +- If you enable this policy setting, Search Companion doesn't download content updates during searches. -- If you disable or do not configure this policy setting, Search Companion downloads content updates unless the user is using Classic Search. +- If you disable or don't configure this policy setting, Search Companion downloads content updates unless the user is using Classic Search. > [!NOTE] > Internet searches still send the search text and information about the search to Microsoft and the chosen search provider. Choosing Classic Search turns off the Search Companion feature completely. @@ -948,13 +931,12 @@ When users search the local computer or the Internet, Search Companion occasiona | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -981,7 +963,7 @@ When users search the local computer or the Internet, Search Companion occasiona | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -994,11 +976,11 @@ When users search the local computer or the Internet, Search Companion occasiona This policy setting specifies whether to use the Microsoft Web service for finding an application to open a file with an unhandled file association. -When a user opens a file that has an extension that is not associated with any applications on the computer, the user is given the choice to select a local application or use the Web service to find an application. +When a user opens a file that has an extension that isn't associated with any applications on the computer, the user is given the choice to select a local application or use the Web service to find an application. - If you enable this policy setting, the link and the dialog for using the Web service to open an unhandled file association are removed. -- If you disable or do not configure this policy setting, the user is allowed to use the Web service. +- If you disable or don't configure this policy setting, the user is allowed to use the Web service. @@ -1010,13 +992,12 @@ When a user opens a file that has an extension that is not associated with any a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1043,7 +1024,7 @@ When a user opens a file that has an extension that is not associated with any a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1056,11 +1037,11 @@ When a user opens a file that has an extension that is not associated with any a This policy setting specifies whether to use the Microsoft Web service for finding an application to open a file with an unhandled file association. -When a user opens a file that has an extension that is not associated with any applications on the computer, the user is given the choice to select a local application or use the Web service to find an application. +When a user opens a file that has an extension that isn't associated with any applications on the computer, the user is given the choice to select a local application or use the Web service to find an application. - If you enable this policy setting, the link and the dialog for using the Web service to open an unhandled file association are removed. -- If you disable or do not configure this policy setting, the user is allowed to use the Web service. +- If you disable or don't configure this policy setting, the user is allowed to use the Web service. @@ -1072,13 +1053,12 @@ When a user opens a file that has an extension that is not associated with any a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1105,7 +1085,7 @@ When a user opens a file that has an extension that is not associated with any a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1118,11 +1098,11 @@ When a user opens a file that has an extension that is not associated with any a This policy setting specifies whether to use the Store service for finding an application to open a file with an unhandled file type or protocol association. -When a user opens a file type or protocol that is not associated with any applications on the computer, the user is given the choice to select a local application or use the Store service to find an application. +When a user opens a file type or protocol that isn't associated with any applications on the computer, the user is given the choice to select a local application or use the Store service to find an application. - If you enable this policy setting, the "Look for an app in the Store" item in the Open With dialog is removed. -- If you disable or do not configure this policy setting, the user is allowed to use the Store service and the Store item is available in the Open With dialog. +- If you disable or don't configure this policy setting, the user is allowed to use the Store service and the Store item is available in the Open With dialog. @@ -1134,13 +1114,12 @@ When a user opens a file type or protocol that is not associated with any applic | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1167,7 +1146,7 @@ When a user opens a file type or protocol that is not associated with any applic | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1180,11 +1159,11 @@ When a user opens a file type or protocol that is not associated with any applic This policy setting specifies whether to use the Store service for finding an application to open a file with an unhandled file type or protocol association. -When a user opens a file type or protocol that is not associated with any applications on the computer, the user is given the choice to select a local application or use the Store service to find an application. +When a user opens a file type or protocol that isn't associated with any applications on the computer, the user is given the choice to select a local application or use the Store service to find an application. - If you enable this policy setting, the "Look for an app in the Store" item in the Open With dialog is removed. -- If you disable or do not configure this policy setting, the user is allowed to use the Store service and the Store item is available in the Open With dialog. +- If you disable or don't configure this policy setting, the user is allowed to use the Store service and the Store item is available in the Open With dialog. @@ -1196,13 +1175,12 @@ When a user opens a file type or protocol that is not associated with any applic | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1229,7 +1207,7 @@ When a user opens a file type or protocol that is not associated with any applic | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1244,9 +1222,9 @@ This policy setting specifies whether Windows should download a list of provider These wizards allow users to select from a list of companies that provide services such as online storage and photographic printing. By default, Windows displays providers downloaded from a Windows website in addition to providers specified in the registry. -- If you enable this policy setting, Windows does not download providers, and only the service providers that are cached in the local registry are displayed. +- If you enable this policy setting, Windows doesn't download providers, and only the service providers that are cached in the local registry are displayed. -- If you disable or do not configure this policy setting, a list of providers are downloaded when the user uses the web publishing or online ordering wizards. +- If you disable or don't configure this policy setting, a list of providers are downloaded when the user uses the web publishing or online ordering wizards. See the documentation for the web publishing and online ordering wizards for more information, including details on specifying service providers in the registry. @@ -1260,13 +1238,12 @@ See the documentation for the web publishing and online ordering wizards for mor | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1293,7 +1270,7 @@ See the documentation for the web publishing and online ordering wizards for mor | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1310,7 +1287,7 @@ The Order Prints Online Wizard is used to download a list of providers and allow - If you enable this policy setting, the task "Order Prints Online" is removed from Picture Tasks in File Explorer folders. -- If you disable or do not configure this policy setting, the task is displayed. +- If you disable or don't configure this policy setting, the task is displayed. @@ -1322,13 +1299,12 @@ The Order Prints Online Wizard is used to download a list of providers and allow | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1355,7 +1331,7 @@ The Order Prints Online Wizard is used to download a list of providers and allow | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1372,7 +1348,7 @@ The Order Prints Online Wizard is used to download a list of providers and allow - If you enable this policy setting, the task "Order Prints Online" is removed from Picture Tasks in File Explorer folders. -- If you disable or do not configure this policy setting, the task is displayed. +- If you disable or don't configure this policy setting, the task is displayed. @@ -1384,13 +1360,12 @@ The Order Prints Online Wizard is used to download a list of providers and allow | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1417,7 +1392,7 @@ The Order Prints Online Wizard is used to download a list of providers and allow | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1434,7 +1409,7 @@ The Web Publishing Wizard is used to download a list of providers and allow user - If you enable this policy setting, these tasks are removed from the File and Folder tasks in Windows folders. -- If you disable or do not configure this policy setting, the tasks are shown. +- If you disable or don't configure this policy setting, the tasks are shown. @@ -1446,13 +1421,12 @@ The Web Publishing Wizard is used to download a list of providers and allow user | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1479,7 +1453,7 @@ The Web Publishing Wizard is used to download a list of providers and allow user | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1496,7 +1470,7 @@ The Web Publishing Wizard is used to download a list of providers and allow user - If you enable this policy setting, these tasks are removed from the File and Folder tasks in Windows folders. -- If you disable or do not configure this policy setting, the tasks are shown. +- If you disable or don't configure this policy setting, the tasks are shown. @@ -1508,13 +1482,12 @@ The Web Publishing Wizard is used to download a list of providers and allow user | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1541,7 +1514,7 @@ The Web Publishing Wizard is used to download a list of providers and allow user | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1556,11 +1529,11 @@ This policy setting specifies whether Windows Messenger collects anonymous infor With the Customer Experience Improvement program, users can allow Microsoft to collect anonymous information about how the product is used. This information is used to improve the product in future releases. -- If you enable this policy setting, Windows Messenger does not collect usage information, and the user settings to enable the collection of usage information are not shown. +- If you enable this policy setting, Windows Messenger doesn't collect usage information, and the user settings to enable the collection of usage information aren't shown. -- If you disable this policy setting, Windows Messenger collects anonymous usage information, and the setting is not shown. +- If you disable this policy setting, Windows Messenger collects anonymous usage information, and the setting isn't shown. -- If you do not configure this policy setting, users have the choice to opt in and allow information to be collected. +- If you don't configure this policy setting, users have the choice to opt in and allow information to be collected. @@ -1572,13 +1545,12 @@ With the Customer Experience Improvement program, users can allow Microsoft to c | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1605,7 +1577,7 @@ With the Customer Experience Improvement program, users can allow Microsoft to c | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1620,11 +1592,11 @@ This policy setting specifies whether Windows Messenger collects anonymous infor With the Customer Experience Improvement program, users can allow Microsoft to collect anonymous information about how the product is used. This information is used to improve the product in future releases. -- If you enable this policy setting, Windows Messenger does not collect usage information, and the user settings to enable the collection of usage information are not shown. +- If you enable this policy setting, Windows Messenger doesn't collect usage information, and the user settings to enable the collection of usage information aren't shown. -- If you disable this policy setting, Windows Messenger collects anonymous usage information, and the setting is not shown. +- If you disable this policy setting, Windows Messenger collects anonymous usage information, and the setting isn't shown. -- If you do not configure this policy setting, users have the choice to opt in and allow information to be collected. +- If you don't configure this policy setting, users have the choice to opt in and allow information to be collected. @@ -1636,13 +1608,12 @@ With the Customer Experience Improvement program, users can allow Microsoft to c | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-iis.md b/windows/client-management/mdm/policy-csp-admx-iis.md index 6ac2bb4f65..b886cd2b1a 100644 --- a/windows/client-management/mdm/policy-csp-admx-iis.md +++ b/windows/client-management/mdm/policy-csp-admx-iis.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_IIS Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_IIS -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,8 +41,9 @@ ms.topic: reference "This policy setting prevents installation of Internet Information Services (IIS) on this computer. -- If you enable this policy setting, Internet Information Services (IIS) cannot be installed, and you will not be able to install Windows components or applications that require IIS. Users installing Windows components or applications that require IIS might not receive a warning that IIS cannot be installed because of this Group Policy setting. Enabling this setting will not have any effect on IIS if IIS is already installed on the computer. -- If you disable or do not configure this policy setting, IIS can be installed, as well as all the programs and applications that require IIS to run." +- If you enable this policy setting, Internet Information Services (IIS) can't be installed, and you won't be able to install Windows components or applications that require IIS. Users installing Windows components or applications that require IIS might not receive a warning that IIS can't be installed because of this Group Policy setting. Enabling this setting won't have any effect on IIS if IIS is already installed on the computer. + +- If you disable or don't configure this policy setting, IIS can be installed, as well as all the programs and applications that require IIS to run". @@ -57,13 +55,12 @@ ms.topic: reference | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-iscsi.md b/windows/client-management/mdm/policy-csp-admx-iscsi.md index a7898086b3..ab2b61dabd 100644 --- a/windows/client-management/mdm/policy-csp-admx-iscsi.md +++ b/windows/client-management/mdm/policy-csp-admx-iscsi.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_iSCSI Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_iSCSI -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -54,13 +51,12 @@ If enabled then new iSNS servers may not be added and thus new targets discovere | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -87,7 +83,7 @@ If enabled then new iSNS servers may not be added and thus new targets discovere | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -110,13 +106,12 @@ If enabled then new target portals may not be added and thus new targets discove | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -143,7 +138,7 @@ If enabled then new target portals may not be added and thus new targets discove | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -154,7 +149,7 @@ If enabled then new target portals may not be added and thus new targets discove -If enabled then discovered targets may not be manually configured. If disabled then discovered targets may be manually configured. **Note** if enabled there may be cases where this will break VDS. +If enabled then discovered targets may not be manually configured. If disabled then discovered targets may be manually configured. Note if enabled there may be cases where this will break VDS. @@ -166,13 +161,12 @@ If enabled then discovered targets may not be manually configured. If disabled t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -199,7 +193,7 @@ If enabled then discovered targets may not be manually configured. If disabled t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -210,7 +204,7 @@ If enabled then discovered targets may not be manually configured. If disabled t -If enabled then new targets may not be manually configured by entering the target name and target portal; already discovered targets may be manually configured. If disabled then new and already discovered targets may be manually configured. **Note** if enabled there may be cases where this will break VDS. +If enabled then new targets may not be manually configured by entering the target name and target portal; already discovered targets may be manually configured. If disabled then new and already discovered targets may be manually configured. Note if enabled there may be cases where this will break VDS. @@ -222,13 +216,12 @@ If enabled then new targets may not be manually configured by entering the targe | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -255,7 +248,7 @@ If enabled then new targets may not be manually configured by entering the targe | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -266,7 +259,7 @@ If enabled then new targets may not be manually configured by entering the targe -If enabled then do not allow the initiator iqn name to be changed. If disabled then the initiator iqn name may be changed. +If enabled then don't allow the initiator iqn name to be changed. If disabled then the initiator iqn name may be changed. @@ -278,13 +271,12 @@ If enabled then do not allow the initiator iqn name to be changed. If disabled t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -311,7 +303,7 @@ If enabled then do not allow the initiator iqn name to be changed. If disabled t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -334,13 +326,12 @@ If enabled then only those sessions that are established via a persistent login | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -367,7 +358,7 @@ If enabled then only those sessions that are established via a persistent login | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -378,7 +369,7 @@ If enabled then only those sessions that are established via a persistent login -If enabled then do not allow the initiator CHAP secret to be changed. If disabled then the initiator CHAP secret may be changed. +If enabled then don't allow the initiator CHAP secret to be changed. If disabled then the initiator CHAP secret may be changed. @@ -390,13 +381,12 @@ If enabled then do not allow the initiator CHAP secret to be changed. If disable | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -423,7 +413,7 @@ If enabled then do not allow the initiator CHAP secret to be changed. If disable | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -446,13 +436,12 @@ If enabled then only those connections that are configured for IPSec may be esta | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -479,7 +468,7 @@ If enabled then only those connections that are configured for IPSec may be esta | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -502,13 +491,12 @@ If enabled then only those sessions that are configured for mutual CHAP may be e | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -535,7 +523,7 @@ If enabled then only those sessions that are configured for mutual CHAP may be e | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -546,7 +534,7 @@ If enabled then only those sessions that are configured for mutual CHAP may be e -If enabled then only those sessions that are configured for one-way CHAP may be established. If disabled then sessions that are configured for one-way CHAP or sessions not configured for one-way CHAP may be established. **Note** that if the "Do not allow sessions without mutual CHAP" setting is enabled then that setting overrides this one. +If enabled then only those sessions that are configured for one-way CHAP may be established. If disabled then sessions that are configured for one-way CHAP or sessions not configured for one-way CHAP may be established. Note that if the "Do not allow sessions without mutual CHAP" setting is enabled then that setting overrides this one. @@ -558,13 +546,12 @@ If enabled then only those sessions that are configured for one-way CHAP may be | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-kdc.md b/windows/client-management/mdm/policy-csp-admx-kdc.md index 3a5a0abee3..e31c39dc28 100644 --- a/windows/client-management/mdm/policy-csp-admx-kdc.md +++ b/windows/client-management/mdm/policy-csp-admx-kdc.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_kdc Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_kdc -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,31 +43,37 @@ This policy setting allows you to configure a domain controller to support claim - If you enable this policy setting, client computers that support claims and compound authentication for Dynamic Access Control and are Kerberos armor-aware will use this feature for Kerberos authentication messages. This policy should be applied to all domain controllers to ensure consistent application of this policy in the domain. -- If you disable or do not configure this policy setting, the domain controller does not support claims, compound authentication or armoring. +- If you disable or don't configure this policy setting, the domain controller doesn't support claims, compound authentication or armoring. -If you configure the "Not supported" option, the domain controller does not support claims, compound authentication or armoring which is the default behavior for domain controllers running Windows Server 2008 R2 or earlier operating systems. +If you configure the "Not supported" option, the domain controller doesn't support claims, compound authentication or armoring which is the default behavior for domain controllers running Windows Server 2008 R2 or earlier operating systems. > [!NOTE] -> For the following options of this KDC policy to be effective, the Kerberos Group Policy "Kerberos client support for claims, compound authentication and Kerberos armoring" must be enabled on supported systems. If the Kerberos policy setting is not enabled, Kerberos authentication messages will not use these features. +> For the following options of this KDC policy to be effective, the Kerberos Group Policy "Kerberos client support for claims, compound authentication and Kerberos armoring" must be enabled on supported systems. If the Kerberos policy setting isn't enabled, Kerberos authentication messages won't use these features. If you configure "Supported", the domain controller supports claims, compound authentication and Kerberos armoring. The domain controller advertises to Kerberos client computers that the domain is capable of claims and compound authentication for Dynamic Access Control and Kerberos armoring. -Domain functional level requirements +Domain functional level requirements. + For the options "Always provide claims" and "Fail unarmored authentication requests", when the domain functional level is set to Windows Server 2008 R2 or earlier then domain controllers behave as if the "Supported" option is selected. When the domain functional level is set to Windows Server 2012 then the domain controller advertises to Kerberos client computers that the domain is capable of claims and compound authentication for Dynamic Access Control and Kerberos armoring, and: - - If you set the "Always provide claims" option, always returns claims for accounts and supports the RFC behavior for advertising the flexible authentication secure tunneling (FAST). - - If you set the "Fail unarmored authentication requests" option, rejects unarmored Kerberos messages. + +- If you set the "Always provide claims" option, always returns claims for accounts and supports the RFC behavior for advertising the flexible authentication secure tunneling (FAST). + +- If you set the "Fail unarmored authentication requests" option, rejects unarmored Kerberos messages. > [!WARNING] -> When "Fail unarmored authentication requests" is set, then client computers which do not support Kerberos armoring will fail to authenticate to the domain controller. +> When "Fail unarmored authentication requests" is set, then client computers which don't support Kerberos armoring will fail to authenticate to the domain controller. To ensure this feature is effective, deploy enough domain controllers that support claims and compound authentication for Dynamic Access Control and are Kerberos armor-aware to handle the authentication requests. Insufficient number of domain controllers that support this policy result in authentication failures whenever Dynamic Access Control or Kerberos armoring is required (that is, the "Supported" option is enabled). Impact on domain controller performance when this policy setting is enabled: - - Secure Kerberos domain capability discovery is required resulting in additional message exchanges. - - Claims and compound authentication for Dynamic Access Control increases the size and complexity of the data in the message which results in more processing time and greater Kerberos service ticket size. - - Kerberos armoring fully encrypts Kerberos messages and signs Kerberos errors which results in increased processing time, but does not change the service ticket size. + +- Secure Kerberos domain capability discovery is required resulting in additional message exchanges. + +- Claims and compound authentication for Dynamic Access Control increases the size and complexity of the data in the message which results in more processing time and greater Kerberos service ticket size. + +- Kerberos armoring fully encrypts Kerberos messages and signs Kerberos errors which results in increased processing time, but doesn't change the service ticket size. @@ -82,13 +85,12 @@ Impact on domain controller performance when this policy setting is enabled: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -115,7 +117,7 @@ Impact on domain controller performance when this policy setting is enabled: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -132,10 +134,10 @@ This policy setting controls whether the domain controller provides information For Windows Logon to leverage this feature, the "Display information about previous logons during user logon" policy setting located in the Windows Logon Options node under Windows Components also needs to be enabled. -- If you disable or do not configure this policy setting, the domain controller does not provide information about previous logons unless the "Display information about previous logons during user logon" policy setting is enabled. +- If you disable or don't configure this policy setting, the domain controller doesn't provide information about previous logons unless the "Display information about previous logons during user logon" policy setting is enabled. > [!NOTE] -> Information about previous logons is provided only if the domain functional level is Windows Server 2008. In domains with a domain functional level of Windows Server 2003, Windows 2000 native, or Windows 2000 mixed, domain controllers cannot provide information about previous logons, and enabling this policy setting does not affect anything. +> Information about previous logons is provided only if the domain functional level is Windows Server 2008. In domains with a domain functional level of Windows Server 2003, Windows 2000 native, or Windows 2000 mixed, domain controllers can't provide information about previous logons, and enabling this policy setting doesn't affect anything. @@ -147,13 +149,12 @@ For Windows Logon to leverage this feature, the "Display information about previ | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -180,7 +181,7 @@ For Windows Logon to leverage this feature, the "Display information about previ | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -193,9 +194,9 @@ For Windows Logon to leverage this feature, the "Display information about previ This policy setting defines the list of trusting forests that the Key Distribution Center (KDC) searches when attempting to resolve two-part service principal names (SPNs). -- If you enable this policy setting, the KDC will search the forests in this list if it is unable to resolve a two-part SPN in the local forest. The forest search is performed by using a global catalog or name suffix hints. If a match is found, the KDC will return a referral ticket to the client for the appropriate domain. +- If you enable this policy setting, the KDC will search the forests in this list if it's unable to resolve a two-part SPN in the local forest. The forest search is performed by using a global catalog or name suffix hints. If a match is found, the KDC will return a referral ticket to the client for the appropriate domain. -- If you disable or do not configure this policy setting, the KDC will not search the listed forests to resolve the SPN. If the KDC is unable to resolve the SPN because the name is not found, NTLM authentication might be used. +- If you disable or don't configure this policy setting, the KDC won't search the listed forests to resolve the SPN. If the KDC is unable to resolve the SPN because the name isn't found, NTLM authentication might be used. To ensure consistent behavior, this policy setting must be supported and set identically on all domain controllers in the domain. @@ -209,13 +210,12 @@ To ensure consistent behavior, this policy setting must be supported and set ide | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -242,7 +242,7 @@ To ensure consistent behavior, this policy setting must be supported and set ide | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -253,7 +253,7 @@ To ensure consistent behavior, this policy setting must be supported and set ide -Support for PKInit Freshness Extension requires Windows Server 2016 domain functional level (DFL). If the domain controller's domain is not at Windows Server 2016 DFL or higher this policy will not be applied. +Support for PKInit Freshness Extension requires Windows Server 2016 domain functional level (DFL). If the domain controller's domain isn't at Windows Server 2016 DFL or higher this policy won't be applied. This policy setting allows you to configure a domain controller (DC) to support the PKInit Freshness Extension. @@ -261,7 +261,7 @@ This policy setting allows you to configure a domain controller (DC) to support Supported: PKInit Freshness Extension is supported on request. Kerberos clients successfully authenticating with the PKInit Freshness Extension will get the fresh public key identity SID. -Required: PKInit Freshness Extension is required for successful authentication. Kerberos clients which do not support the PKInit Freshness Extension will always fail when using public key credentials. +Required: PKInit Freshness Extension is required for successful authentication. Kerberos clients which don't support the PKInit Freshness Extension will always fail when using public key credentials. - If you disable or not configure this policy setting, then the DC will never offer the PKInit Freshness Extension and accept valid authentication requests without checking for freshness. Users will never receive the fresh public key identity SID. @@ -275,13 +275,12 @@ Required: PKInit Freshness Extension is required for successful authentication. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -307,7 +306,7 @@ Required: PKInit Freshness Extension is required for successful authentication. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -325,7 +324,7 @@ This policy setting allows you to configure a domain controller to request compo - If you enable this policy setting, domain controllers will request compound authentication. The returned service ticket will contain compound authentication only when the account is explicitly configured. This policy should be applied to all domain controllers to ensure consistent application of this policy in the domain. -- If you disable or do not configure this policy setting, domain controllers will return service tickets that contain compound authentication any time the client sends a compound authentication request regardless of the account configuration. +- If you disable or don't configure this policy setting, domain controllers will return service tickets that contain compound authentication any time the client sends a compound authentication request regardless of the account configuration. @@ -337,13 +336,12 @@ This policy setting allows you to configure a domain controller to request compo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -370,7 +368,7 @@ This policy setting allows you to configure a domain controller to request compo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -383,9 +381,9 @@ This policy setting allows you to configure a domain controller to request compo This policy setting allows you to configure at what size Kerberos tickets will trigger the warning event issued during Kerberos authentication. The ticket size warnings are logged in the System log. -- If you enable this policy setting, you can set the threshold limit for Kerberos ticket which trigger the warning events. If set too high, then authentication failures might be occurring even though warning events are not being logged. If set too low, then there will be too many ticket warnings in the log to be useful for analysis. This value should be set to the same value as the Kerberos policy "Set maximum Kerberos SSPI context token buffer size" or the smallest MaxTokenSize used in your environment if you are not configuring using Group Policy. +- If you enable this policy setting, you can set the threshold limit for Kerberos ticket which trigger the warning events. If set too high, then authentication failures might be occurring even though warning events aren't being logged. If set too low, then there will be too many ticket warnings in the log to be useful for analysis. This value should be set to the same value as the Kerberos policy "Set maximum Kerberos SSPI context token buffer size" or the smallest MaxTokenSize used in your environment if you aren't configuring using Group Policy. -- If you disable or do not configure this policy setting, the threshold value defaults to 12,000 bytes, which is the default Kerberos MaxTokenSize for Windows 7, Windows Server 2008 R2 and prior versions. +- If you disable or don't configure this policy setting, the threshold value defaults to 12,000 bytes, which is the default Kerberos MaxTokenSize for Windows 7, Windows Server 2008 R2 and prior versions. @@ -397,13 +395,12 @@ This policy setting allows you to configure at what size Kerberos tickets will t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-kerberos.md b/windows/client-management/mdm/policy-csp-admx-kerberos.md index 2a492d3afd..51dfef0089 100644 --- a/windows/client-management/mdm/policy-csp-admx-kerberos.md +++ b/windows/client-management/mdm/policy-csp-admx-kerberos.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_Kerberos Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_Kerberos -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -49,7 +46,7 @@ This policy setting controls whether a device always sends a compound authentica - If you enable this policy setting and the resource domain requests compound authentication, devices that support compound authentication always send a compound authentication request. -- If you disable or do not configure this policy setting and the resource domain requests compound authentication, devices will send a non-compounded authentication request first then a compound authentication request when the service requests compound authentication. +- If you disable or don't configure this policy setting and the resource domain requests compound authentication, devices will send a non-compounded authentication request first then a compound authentication request when the service requests compound authentication. @@ -61,13 +58,12 @@ This policy setting controls whether a device always sends a compound authentica | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -94,7 +90,7 @@ This policy setting controls whether a device always sends a compound authentica | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -111,12 +107,13 @@ This policy setting allows you to set support for Kerberos to attempt authentica - If you enable this policy setting, the device’s credentials will be selected based on the following options: -Automatic: Device will attempt to authenticate using its certificate. If the DC does not support computer account authentication using certificates then authentication with password will be attempted. +Automatic: Device will attempt to authenticate using its certificate. If the DC doesn't support computer account authentication using certificates then authentication with password will be attempted. -Force: Device will always authenticate using its certificate. If a DC cannot be found which support computer account authentication using certificates then authentication will fail. +Force: Device will always authenticate using its certificate. If a DC can't be found which support computer account authentication using certificates then authentication will fail. - If you disable this policy setting, certificates will never be used. -- If you do not configure this policy setting, Automatic will be used. + +- If you don't configure this policy setting, Automatic will be used. @@ -128,13 +125,12 @@ Force: Device will always authenticate using its certificate. If a DC cannot be | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -161,7 +157,7 @@ Force: Device will always authenticate using its certificate. If a DC cannot be | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -178,7 +174,7 @@ This policy setting allows you to specify which DNS host names and which DNS suf - If you disable this policy setting, the host name-to-Kerberos realm mappings list defined by Group Policy is deleted. -- If you do not configure this policy setting, the system uses the host name-to-Kerberos realm mappings that are defined in the local registry, if they exist. +- If you don't configure this policy setting, the system uses the host name-to-Kerberos realm mappings that are defined in the local registry, if they exist. @@ -190,13 +186,12 @@ This policy setting allows you to specify which DNS host names and which DNS suf | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -223,7 +218,7 @@ This policy setting allows you to specify which DNS host names and which DNS suf | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -239,9 +234,9 @@ This policy setting allows you to disable revocation check for the SSL certifica - If you enable this policy setting, revocation check for the SSL certificate of the KDC proxy server is ignored by the Kerberos client. This policy setting should only be used in troubleshooting KDC proxy connections. > [!WARNING] -> When revocation check is ignored, the server represented by the certificate is not guaranteed valid. +> When revocation check is ignored, the server represented by the certificate isn't guaranteed valid. -- If you disable or do not configure this policy setting, the Kerberos client enforces the revocation check for the SSL certificate. The connection to the KDC proxy server is not established if the revocation check fails. +- If you disable or don't configure this policy setting, the Kerberos client enforces the revocation check for the SSL certificate. The connection to the KDC proxy server isn't established if the revocation check fails. @@ -253,13 +248,12 @@ This policy setting allows you to disable revocation check for the SSL certifica | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -286,7 +280,7 @@ This policy setting allows you to disable revocation check for the SSL certifica | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -299,9 +293,9 @@ This policy setting allows you to disable revocation check for the SSL certifica This policy setting configures the Kerberos client's mapping to KDC proxy servers for domains based on their DNS suffix names. -- If you enable this policy setting, the Kerberos client will use the KDC proxy server for a domain when a domain controller cannot be located based on the configured mappings. To map a KDC proxy server to a domain, enable the policy setting, click Show, and then map the KDC proxy server name(s) to the DNS name for the domain using the syntax described in the options pane. In the Show Contents dialog box in the Value Name column, type a DNS suffix name. In the Value column, type the list of proxy servers using the appropriate syntax format. To view the list of mappings, enable the policy setting and then click the Show button. To remove a mapping from the list, click the mapping entry to be removed, and then press the DELETE key. To edit a mapping, remove the current entry from the list and add a new one with different parameters. +- If you enable this policy setting, the Kerberos client will use the KDC proxy server for a domain when a domain controller can't be located based on the configured mappings. To map a KDC proxy server to a domain, enable the policy setting, click Show, and then map the KDC proxy server name(s) to the DNS name for the domain using the syntax described in the options pane. In the Show Contents dialog box in the Value Name column, type a DNS suffix name. In the Value column, type the list of proxy servers using the appropriate syntax format. To view the list of mappings, enable the policy setting and then click the Show button. To remove a mapping from the list, click the mapping entry to be removed, and then press the DELETE key. To edit a mapping, remove the current entry from the list and add a new one with different parameters. -- If you disable or do not configure this policy setting, the Kerberos client does not have KDC proxy servers settings defined by Group Policy. +- If you disable or don't configure this policy setting, the Kerberos client doesn't have KDC proxy servers settings defined by Group Policy. @@ -313,13 +307,12 @@ This policy setting configures the Kerberos client's mapping to KDC proxy server | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -346,7 +339,7 @@ This policy setting configures the Kerberos client's mapping to KDC proxy server | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -363,7 +356,7 @@ This policy setting configures the Kerberos client so that it can authenticate w - If you disable this policy setting, the interoperable Kerberos V5 realm settings defined by Group Policy are deleted. -- If you do not configure this policy setting, the system uses the interoperable Kerberos V5 realm settings that are defined in the local registry, if they exist. +- If you don't configure this policy setting, the system uses the interoperable Kerberos V5 realm settings that are defined in the local registry, if they exist. @@ -375,13 +368,12 @@ This policy setting configures the Kerberos client so that it can authenticate w | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -408,7 +400,7 @@ This policy setting configures the Kerberos client so that it can authenticate w | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -432,7 +424,8 @@ Automatic: Compound authentication is provided for this computer account when on Always: Compound authentication is always provided for this computer account. - If you disable this policy setting, Never will be used. -- If you do not configure this policy setting, Automatic will be used. + +- If you don't configure this policy setting, Automatic will be used. @@ -444,13 +437,12 @@ Always: Compound authentication is always provided for this computer account. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -477,7 +469,7 @@ Always: Compound authentication is always provided for this computer account. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -492,7 +484,7 @@ This policy setting allows you to configure this server so that Kerberos can dec - If you enable this policy setting, only services running as LocalSystem or NetworkService are allowed to accept these connections. Services running as identities different from LocalSystem or NetworkService might fail to authenticate. -- If you disable or do not configure this policy setting, any service is allowed to accept incoming connections by using this system-generated SPN. +- If you disable or don't configure this policy setting, any service is allowed to accept incoming connections by using this system-generated SPN. @@ -504,13 +496,12 @@ This policy setting allows you to configure this server so that Kerberos can dec | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-lanmanserver.md b/windows/client-management/mdm/policy-csp-admx-lanmanserver.md index 6db1233f57..b47f82b91f 100644 --- a/windows/client-management/mdm/policy-csp-admx-lanmanserver.md +++ b/windows/client-management/mdm/policy-csp-admx-lanmanserver.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_LanmanServer Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_LanmanServer -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,27 +41,30 @@ ms.topic: reference This policy setting determines the cipher suites used by the SMB server. -- If you enable this policy setting, cipher suites are prioritized in the order specified. +If you enable this policy setting, cipher suites are prioritized in the order specified. -- If you enable this policy setting and do not specify at least one supported cipher suite, or if you disable or do not configure this policy setting, the default cipher suite order is used. +If you enable this policy setting and don't specify at least one supported cipher suite, or if you disable or don't configure this policy setting, the default cipher suite order is used. SMB 3.11 cipher suites: -AES_128_GCM -AES_128_CCM -AES_256_GCM -AES_256_CCM +AES_128_GCM. + +AES_128_CCM. + +AES_256_GCM. + +AES_256_CCM. SMB 3.0 and 3.02 cipher suites: -AES_128_CCM +AES_128_CCM. How to modify this setting: Arrange the desired cipher suites in the edit box, one cipher suite per line, in order from most to least preferred, with the most preferred cipher suite at the top. Remove any cipher suites you don't want to use. > [!NOTE] -> When configuring this security setting, changes will not take effect until you restart Windows. +> When configuring this security setting, changes won't take effect until you restart Windows. @@ -76,13 +76,12 @@ Arrange the desired cipher suites in the edit box, one cipher suite per line, in | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -108,7 +107,7 @@ Arrange the desired cipher suites in the edit box, one cipher suite per line, in | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -119,15 +118,15 @@ Arrange the desired cipher suites in the edit box, one cipher suite per line, in -This policy setting specifies whether a hash generation service generates hashes, also called content information, for data that is stored in shared folders. This policy setting must be applied to server computers that have the File Services role and both the File Server and the BranchCache for Network Files role services installed. +This policy setting specifies whether a hash generation service generates hashes, also called content information, for data that's stored in shared folders. This policy setting must be applied to server computers that have the File Services role and both the File Server and the BranchCache for Network Files role services installed. -Policy configuration +Policy configuration. Select one of the following: -- Not Configured. With this selection, hash publication settings are not applied to file servers. In the circumstance where file servers are domain members but you do not want to enable BranchCache on all file servers, you can specify Not Configured for this domain Group Policy setting, and then configure local machine policy to enable BranchCache on individual file servers. Because the domain Group Policy setting is not configured, it will not over-write the enabled setting that you use on individual servers where you want to enable BranchCache. +- Not Configured. With this selection, hash publication settings aren't applied to file servers. In the circumstance where file servers are domain members but you don't want to enable BranchCache on all file servers, you can specify Not Configured for this domain Group Policy setting, and then configure local machine policy to enable BranchCache on individual file servers. Because the domain Group Policy setting isn't configured, it won't over-write the enabled setting that you use on individual servers where you want to enable BranchCache. -- Enabled. With this selection, hash publication is turned on for all file servers where Group Policy is applied. For example, if Hash Publication for BranchCache is enabled in domain Group Policy, hash publication is turned on for all domain member file servers to which the policy is applied. The file servers are then able to create content information for all content that is stored in BranchCache-enabled file shares. +- Enabled. With this selection, hash publication is turned on for all file servers where Group Policy is applied. For example, if Hash Publication for BranchCache is enabled in domain Group Policy, hash publication is turned on for all domain member file servers to which the policy is applied. The file servers are then able to create content information for all content that's stored in BranchCache-enabled file shares. - Disabled. With this selection, hash publication is turned off for all file servers where Group Policy is applied. @@ -137,7 +136,7 @@ In circumstances where this policy setting is enabled, you can also select the f - Allow hash publication only for shared folders on which BranchCache is enabled. With this option, content information is generated only for shared folders on which BranchCache is enabled. If you use this setting, you must enable BranchCache for individual shares in Share and Storage Management on the file server. -- Disallow hash publication on all shared folders. With this option, BranchCache does not generate content information for any shares on the computer and does not send content information to client computers that request content. +- Disallow hash publication on all shared folders. With this option, BranchCache doesn't generate content information for any shares on the computer and doesn't send content information to client computers that request content. @@ -149,13 +148,12 @@ In circumstances where this policy setting is enabled, you can also select the f | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -181,7 +179,7 @@ In circumstances where this policy setting is enabled, you can also select the f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -194,13 +192,13 @@ In circumstances where this policy setting is enabled, you can also select the f This policy setting specifies whether the BranchCache hash generation service supports version 1 (V1) hashes, version 2 (V2) hashes, or both V1 and V2 hashes. Hashes, also called content information, are created based on the data in shared folders where BranchCache is enabled. -If you specify only one version that is supported, content information for that version is the only type that is generated by BranchCache, and it is the only type of content information that can be retrieved by client computers. For example, if you enable support for V1 hashes, BranchCache generates only V1 hashes and client computers can retrieve only V1 hashes. +If you specify only one version that's supported, content information for that version is the only type that's generated by BranchCache, and it's the only type of content information that can be retrieved by client computers. For example, if you enable support for V1 hashes, BranchCache generates only V1 hashes and client computers can retrieve only V1 hashes. -Policy configuration +Policy configuration. Select one of the following: -- Not Configured. With this selection, BranchCache settings are not applied to client computers by this policy setting. In this circumstance, which is the default, both V1 and V2 hash generation and retrieval are supported. +- Not Configured. With this selection, BranchCache settings aren't applied to client computers by this policy setting. In this circumstance, which is the default, both V1 and V2 hash generation and retrieval are supported. - Enabled. With this selection, the policy setting is applied and the hash version(s) that are specified in "Hash version supported" are generated and retrieved. @@ -226,13 +224,12 @@ Hash version supported: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -258,7 +255,7 @@ Hash version supported: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -273,10 +270,10 @@ This policy setting determines how the SMB server selects a cipher suite when ne - If you enable this policy setting, the SMB server will select the cipher suite it most prefers from the list of client-supported cipher suites, ignoring the client's preferences. -- If you disable or do not configure this policy setting, the SMB server will select the cipher suite the client most prefers from the list of server-supported cipher suites. +- If you disable or don't configure this policy setting, the SMB server will select the cipher suite the client most prefers from the list of server-supported cipher suites. > [!NOTE] -> When configuring this security setting, changes will not take effect until you restart Windows. +> When configuring this security setting, changes won't take effect until you restart Windows. @@ -288,13 +285,12 @@ This policy setting determines how the SMB server selects a cipher suite when ne | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-lanmanworkstation.md b/windows/client-management/mdm/policy-csp-admx-lanmanworkstation.md index 4b3d5a5868..f8be5837ce 100644 --- a/windows/client-management/mdm/policy-csp-admx-lanmanworkstation.md +++ b/windows/client-management/mdm/policy-csp-admx-lanmanworkstation.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_LanmanWorkstation Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_LanmanWorkstation -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,27 +41,30 @@ ms.topic: reference This policy setting determines the cipher suites used by the SMB client. -- If you enable this policy setting, cipher suites are prioritized in the order specified. +If you enable this policy setting, cipher suites are prioritized in the order specified. -- If you enable this policy setting and do not specify at least one supported cipher suite, or if you disable or do not configure this policy setting, the default cipher suite order is used. +If you enable this policy setting and don't specify at least one supported cipher suite, or if you disable or don't configure this policy setting, the default cipher suite order is used. SMB 3.11 cipher suites: -AES_128_GCM -AES_128_CCM -AES_256_GCM -AES_256_CCM +AES_128_GCM. + +AES_128_CCM. + +AES_256_GCM. + +AES_256_CCM. SMB 3.0 and 3.02 cipher suites: -AES_128_CCM +AES_128_CCM. How to modify this setting: Arrange the desired cipher suites in the edit box, one cipher suite per line, in order from most to least preferred, with the most preferred cipher suite at the top. Remove any cipher suites you don't want to use. > [!NOTE] -> When configuring this security setting, changes will not take effect until you restart Windows. +> When configuring this security setting, changes won't take effect until you restart Windows. @@ -77,13 +77,12 @@ AES_256 is not supported on Windows 10 version 20H2 and lower. If you enter only | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -109,7 +108,7 @@ AES_256 is not supported on Windows 10 version 20H2 and lower. If you enter only | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -124,10 +123,10 @@ This policy setting determines the behavior of SMB handle caching for clients co - If you enable this policy setting, the SMB client will allow cached handles to files on CA shares. This may lead to better performance when repeatedly accessing a large number of unstructured data files on CA shares running in Microsoft Azure Files. -- If you disable or do not configure this policy setting, Windows will prevent use of cached handles to files opened through CA shares. +- If you disable or don't configure this policy setting, Windows will prevent use of cached handles to files opened through CA shares. > [!NOTE] -> This policy has no effect when connecting Scale-out File Server shares provided by a Windows Server. Microsoft does not recommend enabling this policy for clients that routinely connect to files hosted on a Windows Failover Cluster with the File Server for General Use role, as it can lead to adverse failover times and increased memory and CPU usage. +> This policy has no effect when connecting Scale-out File Server shares provided by a Windows Server. Microsoft doesn't recommend enabling this policy for clients that routinely connect to files hosted on a Windows Failover Cluster with the File Server for General Use role, as it can lead to adverse failover times and increased memory and CPU usage. @@ -139,13 +138,12 @@ This policy setting determines the behavior of SMB handle caching for clients co | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -172,7 +170,7 @@ This policy setting determines the behavior of SMB handle caching for clients co | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -187,10 +185,10 @@ This policy setting determines the behavior of Offline Files on clients connecti - If you enable this policy setting, the "Always Available offline" option will appear in the File Explorer menu on a Windows computer when connecting to a CA-enabled share. Pinning of files on CA-enabled shares using client-side caching will also be possible. -- If you disable or do not configure this policy setting, Windows will prevent use of Offline Files with CA-enabled shares. +- If you disable or don't configure this policy setting, Windows will prevent use of Offline Files with CA-enabled shares. > [!NOTE] -> Microsoft does not recommend enabling this group policy. Use of CA with Offline Files will lead to very long transition times between the online and offline states. +> Microsoft doesn't recommend enabling this group policy. Use of CA with Offline Files will lead to very long transition times between the online and offline states. @@ -202,13 +200,12 @@ This policy setting determines the behavior of Offline Files on clients connecti | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-leakdiagnostic.md b/windows/client-management/mdm/policy-csp-admx-leakdiagnostic.md index 566b0c5342..772b105ff4 100644 --- a/windows/client-management/mdm/policy-csp-admx-leakdiagnostic.md +++ b/windows/client-management/mdm/policy-csp-admx-leakdiagnostic.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_LeakDiagnostic Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_LeakDiagnostic -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,13 +41,15 @@ ms.topic: reference This policy setting determines whether Diagnostic Policy Service (DPS) diagnoses memory leak problems. -- If you enable or do not configure this policy setting, the DPS enables Windows Memory Leak Diagnosis by default. +- If you enable or don't configure this policy setting, the DPS enables Windows Memory Leak Diagnosis by default. -- If you disable this policy setting, the DPS is not able to diagnose memory leak problems. +- If you disable this policy setting, the DPS isn't able to diagnose memory leak problems. This policy setting takes effect only under the following conditions: - - If the diagnostics-wide scenario execution policy is not configured. - - When the Diagnostic Policy Service is in the running state. When the service is stopped or disabled, diagnostic scenarios are not executed. + +- If the diagnostics-wide scenario execution policy isn't configured. + +- When the Diagnostic Policy Service is in the running state. When the service is stopped or disabled, diagnostic scenarios aren't executed. > [!NOTE] > The DPS can be configured with the Services snap-in to the Microsoft Management Console. @@ -68,13 +67,12 @@ For Windows Server systems, this policy setting applies only if the Desktop Expe | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-linklayertopologydiscovery.md b/windows/client-management/mdm/policy-csp-admx-linklayertopologydiscovery.md index 3d53041435..e2a7738d53 100644 --- a/windows/client-management/mdm/policy-csp-admx-linklayertopologydiscovery.md +++ b/windows/client-management/mdm/policy-csp-admx-linklayertopologydiscovery.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_LinkLayerTopologyDiscovery Area in Policy author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_LinkLayerTopologyDiscovery -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -48,7 +45,7 @@ LLTDIO allows a computer to discover the topology of a network it's connected to - If you enable this policy setting, additional options are available to fine-tune your selection. You may choose the "Allow operation while in domain" option to allow LLTDIO to operate on a network interface that's connected to a managed network. On the other hand, if a network interface is connected to an unmanaged network, you may choose the "Allow operation while in public network" and "Prohibit operation while in private network" options instead. -- If you disable or do not configure this policy setting, the default behavior of LLTDIO will apply. +- If you disable or don't configure this policy setting, the default behavior of LLTDIO will apply. @@ -60,13 +57,12 @@ LLTDIO allows a computer to discover the topology of a network it's connected to | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -93,7 +89,7 @@ LLTDIO allows a computer to discover the topology of a network it's connected to | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -110,7 +106,7 @@ The Responder allows a computer to participate in Link Layer Topology Discovery - If you enable this policy setting, additional options are available to fine-tune your selection. You may choose the "Allow operation while in domain" option to allow the Responder to operate on a network interface that's connected to a managed network. On the other hand, if a network interface is connected to an unmanaged network, you may choose the "Allow operation while in public network" and "Prohibit operation while in private network" options instead. -- If you disable or do not configure this policy setting, the default behavior for the Responder will apply. +- If you disable or don't configure this policy setting, the default behavior for the Responder will apply. @@ -122,13 +118,12 @@ The Responder allows a computer to participate in Link Layer Topology Discovery | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-locationprovideradm.md b/windows/client-management/mdm/policy-csp-admx-locationprovideradm.md index 1bef7d5e63..de0cfbc611 100644 --- a/windows/client-management/mdm/policy-csp-admx-locationprovideradm.md +++ b/windows/client-management/mdm/policy-csp-admx-locationprovideradm.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_LocationProviderAdm Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_LocationProviderAdm -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -33,7 +30,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,9 +43,9 @@ ms.topic: reference This policy setting turns off the Windows Location Provider feature for this computer. -- If you enable this policy setting, the Windows Location Provider feature will be turned off, and all programs on this computer will not be able to use the Windows Location Provider feature. +- If you enable this policy setting, the Windows Location Provider feature will be turned off, and all programs on this computer won't be able to use the Windows Location Provider feature. -- If you disable or do not configure this policy setting, all programs on this computer can use the Windows Location Provider feature. +- If you disable or don't configure this policy setting, all programs on this computer can use the Windows Location Provider feature. @@ -60,13 +57,12 @@ This policy setting turns off the Windows Location Provider feature for this com | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-logon.md b/windows/client-management/mdm/policy-csp-admx-logon.md index 8854f1a0e9..398ad547da 100644 --- a/windows/client-management/mdm/policy-csp-admx-logon.md +++ b/windows/client-management/mdm/policy-csp-admx-logon.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_Logon Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_Logon -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,9 +41,9 @@ ms.topic: reference This policy prevents the user from showing account details (email address or user name) on the sign-in screen. -- If you enable this policy setting, the user cannot choose to show account details on the sign-in screen. +- If you enable this policy setting, the user can't choose to show account details on the sign-in screen. -- If you disable or do not configure this policy setting, the user may choose to show account details on the sign-in screen. +- If you disable or don't configure this policy setting, the user may choose to show account details on the sign-in screen. @@ -58,13 +55,12 @@ This policy prevents the user from showing account details (email address or use | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -91,7 +87,7 @@ This policy prevents the user from showing account details (email address or use | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -105,7 +101,8 @@ This policy prevents the user from showing account details (email address or use This policy setting disables the acrylic blur effect on logon background image. - If you enable this policy, the logon background image shows without blur. -- If you disable or do not configure this policy, the logon background image adopts the acrylic blur effect. + +- If you disable or don't configure this policy, the logon background image adopts the acrylic blur effect. @@ -117,13 +114,12 @@ This policy setting disables the acrylic blur effect on logon background image. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -150,7 +146,7 @@ This policy setting disables the acrylic blur effect on logon background image. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -167,7 +163,7 @@ You can create a customized list of additional programs and documents that the s - If you enable this policy setting, the system ignores the run list for Windows Vista, Windows XP Professional, and Windows 2000 Professional. -- If you disable or do not configure this policy setting, Windows Vista adds any customized run list configured to its run list. +- If you disable or don't configure this policy setting, Windows Vista adds any customized run list configured to its run list. This policy setting appears in the Computer Configuration and User Configuration folders. If both policy settings are configured, the policy setting in Computer Configuration takes precedence over the policy setting in User Configuration. @@ -186,13 +182,12 @@ Also, see the "Do not process the run once list" policy setting. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -219,7 +214,7 @@ Also, see the "Do not process the run once list" policy setting. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -236,7 +231,7 @@ You can create a customized list of additional programs and documents that the s - If you enable this policy setting, the system ignores the run list for Windows Vista, Windows XP Professional, and Windows 2000 Professional. -- If you disable or do not configure this policy setting, Windows Vista adds any customized run list configured to its run list. +- If you disable or don't configure this policy setting, Windows Vista adds any customized run list configured to its run list. This policy setting appears in the Computer Configuration and User Configuration folders. If both policy settings are configured, the policy setting in Computer Configuration takes precedence over the policy setting in User Configuration. @@ -255,13 +250,12 @@ Also, see the "Do not process the run once list" policy setting. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -288,7 +282,7 @@ Also, see the "Do not process the run once list" policy setting. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -305,7 +299,7 @@ You can create a customized list of additional programs and documents that are s - If you enable this policy setting, the system ignores the run-once list. -- If you disable or do not configure this policy setting, the system runs the programs in the run-once list. +- If you disable or don't configure this policy setting, the system runs the programs in the run-once list. This policy setting appears in the Computer Configuration and User Configuration folders. If both policy settings are configured, the policy setting in Computer Configuration takes precedence over the policy setting in User Configuration. @@ -324,13 +318,12 @@ Also, see the "Do not process the legacy run list" policy setting. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -357,7 +350,7 @@ Also, see the "Do not process the legacy run list" policy setting. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -374,7 +367,7 @@ You can create a customized list of additional programs and documents that are s - If you enable this policy setting, the system ignores the run-once list. -- If you disable or do not configure this policy setting, the system runs the programs in the run-once list. +- If you disable or don't configure this policy setting, the system runs the programs in the run-once list. This policy setting appears in the Computer Configuration and User Configuration folders. If both policy settings are configured, the policy setting in Computer Configuration takes precedence over the policy setting in User Configuration. @@ -393,13 +386,12 @@ Also, see the "Do not process the legacy run list" policy setting. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -426,7 +418,7 @@ Also, see the "Do not process the legacy run list" policy setting. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -439,9 +431,9 @@ Also, see the "Do not process the legacy run list" policy setting. This policy setting suppresses system status messages. -- If you enable this setting, the system does not display a message reminding users to wait while their system starts or shuts down, or while users log on or off. +- If you enable this setting, the system doesn't display a message reminding users to wait while their system starts or shuts down, or while users log on or off. -- If you disable or do not configure this policy setting, the system displays the message reminding users to wait while their system starts or shuts down, or while users log on or off. +- If you disable or don't configure this policy setting, the system displays the message reminding users to wait while their system starts or shuts down, or while users log on or off. @@ -453,13 +445,12 @@ This policy setting suppresses system status messages. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -486,7 +477,7 @@ This policy setting suppresses system status messages. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -499,9 +490,9 @@ This policy setting suppresses system status messages. This policy setting prevents connected users from being enumerated on domain-joined computers. -- If you enable this policy setting, the Logon UI will not enumerate any connected users on domain-joined computers. +- If you enable this policy setting, the Logon UI won't enumerate any connected users on domain-joined computers. -- If you disable or do not configure this policy setting, connected users will be enumerated on domain-joined computers. +- If you disable or don't configure this policy setting, connected users will be enumerated on domain-joined computers. @@ -513,13 +504,12 @@ This policy setting prevents connected users from being enumerated on domain-joi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -546,7 +536,7 @@ This policy setting prevents connected users from being enumerated on domain-joi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -557,21 +547,21 @@ This policy setting prevents connected users from being enumerated on domain-joi -This policy setting hides the welcome screen that is displayed on Windows 2000 Professional each time the user logs on. +This policy setting hides the welcome screen that's displayed on Windows 2000 Professional each time the user logs on. - If you enable this policy setting, the welcome screen is hidden from the user logging on to a computer where this policy is applied. Users can still display the welcome screen by selecting it on the Start menu or by typing "Welcome" in the Run dialog box. -- If you disable or do not configure this policy, the welcome screen is displayed each time a user logs on to the computer. +- If you disable or don't configure this policy, the welcome screen is displayed each time a user logs on to the computer. -This setting applies only to Windows 2000 Professional. It does not affect the "Configure Your Server on a Windows 2000 Server" screen on Windows 2000 Server. +This setting applies only to Windows 2000 Professional. It doesn't affect the "Configure Your Server on a Windows 2000 Server" screen on Windows 2000 Server. > [!NOTE] > This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration. > [!TIP] -> To display the welcome screen, click Start, point to Programs, point to Accessories, point to System Tools, and then click "Getting Started." To suppress the welcome screen without specifying a setting, clear the "Show this screen at startup" check box on the welcome screen. +> To display the welcome screen, click Start, point to Programs, point to Accessories, point to System Tools, and then click "Getting Started". To suppress the welcome screen without specifying a setting, clear the "Show this screen at startup" check box on the welcome screen. @@ -583,13 +573,12 @@ This setting applies only to Windows 2000 Professional. It does not affect the " | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -616,7 +605,7 @@ This setting applies only to Windows 2000 Professional. It does not affect the " | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -627,21 +616,21 @@ This setting applies only to Windows 2000 Professional. It does not affect the " -This policy setting hides the welcome screen that is displayed on Windows 2000 Professional each time the user logs on. +This policy setting hides the welcome screen that's displayed on Windows 2000 Professional each time the user logs on. - If you enable this policy setting, the welcome screen is hidden from the user logging on to a computer where this policy is applied. Users can still display the welcome screen by selecting it on the Start menu or by typing "Welcome" in the Run dialog box. -- If you disable or do not configure this policy, the welcome screen is displayed each time a user logs on to the computer. +- If you disable or don't configure this policy, the welcome screen is displayed each time a user logs on to the computer. -This setting applies only to Windows 2000 Professional. It does not affect the "Configure Your Server on a Windows 2000 Server" screen on Windows 2000 Server. +This setting applies only to Windows 2000 Professional. It doesn't affect the "Configure Your Server on a Windows 2000 Server" screen on Windows 2000 Server. > [!NOTE] > This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration. > [!TIP] -> To display the welcome screen, click Start, point to Programs, point to Accessories, point to System Tools, and then click "Getting Started." To suppress the welcome screen without specifying a setting, clear the "Show this screen at startup" check box on the welcome screen. +> To display the welcome screen, click Start, point to Programs, point to Accessories, point to System Tools, and then click "Getting Started". To suppress the welcome screen without specifying a setting, clear the "Show this screen at startup" check box on the welcome screen. @@ -653,13 +642,12 @@ This setting applies only to Windows 2000 Professional. It does not affect the " | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -686,7 +674,7 @@ This setting applies only to Windows 2000 Professional. It does not affect the " | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -703,7 +691,7 @@ This policy setting specifies additional programs or documents that Windows star To specify values for this policy setting, click Show. In the Show Contents dialog box in the Value column, type the name of the executable program (.exe) file or document file. To specify another name, press ENTER, and type the name. Unless the file is located in the %Systemroot% directory, you must specify the fully qualified path to the file. -- If you disable or do not configure this policy setting, the user will have to start the appropriate programs after logon. +- If you disable or don't configure this policy setting, the user will have to start the appropriate programs after logon. > [!NOTE] > This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the system starts the programs specified in the Computer Configuration setting just before it starts the programs specified in the User Configuration setting. @@ -720,13 +708,12 @@ Also, see the "Do not process the legacy run list" and the "Do not process the r | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -752,7 +739,7 @@ Also, see the "Do not process the legacy run list" and the "Do not process the r | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -769,7 +756,7 @@ This policy setting specifies additional programs or documents that Windows star To specify values for this policy setting, click Show. In the Show Contents dialog box in the Value column, type the name of the executable program (.exe) file or document file. To specify another name, press ENTER, and type the name. Unless the file is located in the %Systemroot% directory, you must specify the fully qualified path to the file. -- If you disable or do not configure this policy setting, the user will have to start the appropriate programs after logon. +- If you disable or don't configure this policy setting, the user will have to start the appropriate programs after logon. > [!NOTE] > This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the system starts the programs specified in the Computer Configuration setting just before it starts the programs specified in the User Configuration setting. @@ -786,13 +773,12 @@ Also, see the "Do not process the legacy run list" and the "Do not process the r | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -818,7 +804,7 @@ Also, see the "Do not process the legacy run list" and the "Do not process the r | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -829,26 +815,29 @@ Also, see the "Do not process the legacy run list" and the "Do not process the r -This policy setting determines whether Group Policy processing is synchronous (that is, whether computers wait for the network to be fully initialized during computer startup and user logon). By default, on client computers, Group Policy processing is not synchronous; client computers typically do not wait for the network to be fully initialized at startup and logon. Existing users are logged on using cached credentials, which results in shorter logon times. Group Policy is applied in the background after the network becomes available. +This policy setting determines whether Group Policy processing is synchronous (that is, whether computers wait for the network to be fully initialized during computer startup and user logon). By default, on client computers, Group Policy processing isn't synchronous; client computers typically don't wait for the network to be fully initialized at startup and logon. Existing users are logged-on using cached credentials, which results in shorter logon times. Group Policy is applied in the background after the network becomes available. -**Note** that because this is a background refresh, extensions such as Software Installation and Folder Redirection take two logons to apply changes. To be able to operate safely, these extensions require that no users be logged on. Therefore, they must be processed in the foreground before users are actively using the computer. In addition, changes that are made to the user object, such as adding a roaming profile path, home directory, or user object logon script, may take up to two logons to be detected. +Note that because this is a background refresh, extensions such as Software Installation and Folder Redirection take two logons to apply changes. To be able to operate safely, these extensions require that no users be logged on. Therefore, they must be processed in the foreground before users are actively using the computer. In addition, changes that are made to the user object, such as adding a roaming profile path, home directory, or user object logon script, may take up to two logons to be detected. -If a user with a roaming profile, home directory, or user object logon script logs on to a computer, computers always wait for the network to be initialized before logging the user on. If a user has never logged on to this computer before, computers always wait for the network to be initialized. +If a user with a roaming profile, home directory, or user object logon script logs on to a computer, computers always wait for the network to be initialized before logging the user on. If a user has never logged-on to this computer before, computers always wait for the network to be initialized. - If you enable this policy setting, computers wait for the network to be fully initialized before users are logged on. Group Policy is applied in the foreground, synchronously. On servers running Windows Server 2008 or later, this policy setting is ignored during Group Policy processing at computer startup and Group Policy processing will be synchronous (these servers wait for the network to be initialized during computer startup). If the server is configured as follows, this policy setting takes effect during Group Policy processing at user logon: - - The server is configured as a terminal server (that is, the Terminal Server role service is installed and configured on the server); and - - The "Allow asynchronous user Group Policy processing when logging on through Terminal Services" policy setting is enabled. This policy setting is located under Computer Configuration\Policies\Administrative templates\System\Group Policy\. -If this configuration is not implemented on the server, this policy setting is ignored. In this case, Group Policy processing at user logon is synchronous (these servers wait for the network to be initialized during user logon). +- The server is configured as a terminal server (that is, the Terminal Server role service is installed and configured on the server); and +- The "Allow asynchronous user Group Policy processing when logging on through Terminal Services" policy setting is enabled. This policy setting is located under Computer Configuration\Policies\Administrative templates\System\Group Policy\. -- If you disable or do not configure this policy setting and users log on to a client computer or a server running Windows Server 2008 or later and that is configured as described earlier, the computer typically does not wait for the network to be fully initialized. In this case, users are logged on with cached credentials. Group Policy is applied asynchronously in the background. +If this configuration isn't implemented on the server, this policy setting is ignored. In this case, Group Policy processing at user logon is synchronous (these servers wait for the network to be initialized during user logon). + +- If you disable or don't configure this policy setting and users log on to a client computer or a server running Windows Server 2008 or later and that's configured as described earlier, the computer typically doesn't wait for the network to be fully initialized. In this case, users are logged-on with cached credentials. Group Policy is applied asynchronously in the background. + +Note -**Note**: -If you want to guarantee the application of Folder Redirection, Software Installation, or roaming user profile settings in just one logon, enable this policy setting to ensure that Windows waits for the network to be available before applying policy. + -If Folder Redirection policy will apply during the next logon, security policies will be applied asynchronously during the next update cycle, if network connectivity is available. @@ -861,13 +850,12 @@ If this configuration is not implemented on the server, this policy setting is i | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -894,7 +882,7 @@ If this configuration is not implemented on the server, this policy setting is i | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -911,7 +899,7 @@ This policy setting may be used to make Windows give preference to a custom logo - If you enable this policy setting, the logon screen always attempts to load a custom background instead of the Windows-branded logon background. -- If you disable or do not configure this policy setting, Windows uses the default Windows logon background or custom background. +- If you disable or don't configure this policy setting, Windows uses the default Windows logon background or custom background. @@ -923,13 +911,12 @@ This policy setting may be used to make Windows give preference to a custom logo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -956,7 +943,7 @@ This policy setting may be used to make Windows give preference to a custom logo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -973,7 +960,7 @@ This policy setting is designed for advanced users who require this information. - If you enable this policy setting, the system displays status messages that reflect each step in the process of starting, shutting down, logging on, or logging off the system. -- If you disable or do not configure this policy setting, only the default status messages are displayed to the user during these processes. +- If you disable or don't configure this policy setting, only the default status messages are displayed to the user during these processes. > [!NOTE] > This policy setting is ignored if the "Remove Boot/Shutdown/Logon/Logoff status messages" policy setting is enabled. @@ -988,13 +975,12 @@ This policy setting is designed for advanced users who require this information. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-microsoftdefenderantivirus.md b/windows/client-management/mdm/policy-csp-admx-microsoftdefenderantivirus.md index 07eef1894d..461ddc2f70 100644 --- a/windows/client-management/mdm/policy-csp-admx-microsoftdefenderantivirus.md +++ b/windows/client-management/mdm/policy-csp-admx-microsoftdefenderantivirus.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_MicrosoftDefenderAntivirus Area in Policy author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_MicrosoftDefenderAntivirus -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,7 +41,7 @@ ms.topic: reference This policy setting controls the load priority for the antimalware service. Increasing the load priority will allow for faster service startup, but may impact performance. -- If you enable or do not configure this setting, the antimalware service will load as a normal priority task. +- If you enable or don't configure this setting, the antimalware service will load as a normal priority task. - If you disable this setting, the antimalware service will load as a low priority task. @@ -58,13 +55,12 @@ This policy setting controls the load priority for the antimalware service. Incr | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -91,7 +87,7 @@ This policy setting controls the load priority for the antimalware service. Incr | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -104,17 +100,19 @@ This policy setting controls the load priority for the antimalware service. Incr This policy setting turns off Microsoft Defender Antivirus. -- If you enable this policy setting, Microsoft Defender Antivirus does not run, and will not scan computers for malware or other potentially unwanted software. +- If you enable this policy setting, Microsoft Defender Antivirus doesn't run, and won't scan computers for malware or other potentially unwanted software. - If you disable this policy setting, Microsoft Defender Antivirus will run regardless of any other installed antivirus product. -- If you do not configure this policy setting, Windows will internally manage Microsoft Defender Antivirus. If you install another antivirus program, Windows automatically disables Microsoft Defender Antivirus. Otherwise, Microsoft Defender Antivirus will scan your computers for malware and other potentially unwanted software. +- If you don't configure this policy setting, Windows will internally manage Microsoft Defender Antivirus. If you install another antivirus program, Windows automatically disables Microsoft Defender Antivirus. Otherwise, Microsoft Defender Antivirus will scan your computers for malware and other potentially unwanted software. -Enabling or disabling this policy may lead to unexpected or unsupported behavior. It is recommended that you leave this policy setting unconfigured. +Enabling or disabling this policy may lead to unexpected or unsupported behavior. It's recommended that you leave this policy setting unconfigured. +> [!NOTE] +> Changes to this setting are not applied when [tamper protection][TAMPER-1] is enabled. @@ -122,13 +120,12 @@ Enabling or disabling this policy may lead to unexpected or unsupported behavior | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -155,7 +152,7 @@ Enabling or disabling this policy may lead to unexpected or unsupported behavior | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -169,12 +166,15 @@ Enabling or disabling this policy may lead to unexpected or unsupported behavior Allows an administrator to specify if Automatic Exclusions feature for Server SKUs should be turned off. Disabled (Default): + Microsoft Defender will exclude pre-defined list of paths from the scan to improve performance. Enabled: -Microsoft Defender will not exclude pre-defined list of paths from scans. This can impact machine performance in some scenarios. + +Microsoft Defender won't exclude pre-defined list of paths from scans. This can impact machine performance in some scenarios. Not configured: + Same as Disabled. @@ -187,13 +187,12 @@ Same as Disabled. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -220,7 +219,7 @@ Same as Disabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -231,19 +230,27 @@ Same as Disabled. -This feature ensures the device checks in real time with the Microsoft Active Protection Service (MAPS) before allowing certain content to be run or accessed. If this feature is disabled, the check will not occur, which will lower the protection state of the device. +This feature ensures the device checks in real time with the Microsoft Active Protection Service (MAPS) before allowing certain content to be run or accessed. If this feature is disabled, the check won't occur, which will lower the protection state of the device. + Enabled - The Block at First Sight setting is turned on. + Disabled - The Block at First Sight setting is turned off. This feature requires these Group Policy settings to be set as follows: -MAPS -> The "Join Microsoft MAPS" must be enabled or the "Block at First Sight" feature will not function. -MAPS -> The "Send file samples when further analysis is required" should be set to 1 (Send safe samples) or 3 (Send all samples). Setting to 0 (Always Prompt) will lower the protection state of the device. Setting to 2 (Never send) means the "Block at First Sight" feature will not function. -Real-time Protection -> The "Scan all downloaded files and attachments" policy must be enabled or the "Block at First Sight" feature will not function. -Real-time Protection -> Do not enable the "Turn off real-time protection" policy or the "Block at First Sight" feature will not function. + +MAPS -> The "Join Microsoft MAPS" must be enabled or the "Block at First Sight" feature won't function. + +MAPS -> The "Send file samples when further analysis is required" should be set to 1 (Send safe samples) or 3 (Send all samples). Setting to 0 (Always Prompt) will lower the protection state of the device. Setting to 2 (Never send) means the "Block at First Sight" feature won't function. + +Real-time Protection -> The "Scan all downloaded files and attachments" policy must be enabled or the "Block at First Sight" feature won't function. + +Real-time Protection -> Don't enable the "Turn off real-time protection" policy or the "Block at First Sight" feature won't function. +> [!NOTE] +> Changes to this setting are not applied when [tamper protection][TAMPER-1] is enabled. @@ -251,13 +258,12 @@ Real-time Protection -> Do not enable the "Turn off real-time protection" policy | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -284,7 +290,7 @@ Real-time Protection -> Do not enable the "Turn off real-time protection" policy | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -297,7 +303,7 @@ Real-time Protection -> Do not enable the "Turn off real-time protection" policy This policy setting controls whether or not complex list settings configured by a local administrator are merged with Group Policy settings. This setting applies to lists such as threats and Exclusions. -- If you disable or do not configure this setting, unique items defined in Group Policy and in preference settings configured by the local administrator will be merged into the resulting effective policy. In the case of conflicts, Group policy Settings will override preference settings. +- If you disable or don't configure this setting, unique items defined in Group Policy and in preference settings configured by the local administrator will be merged into the resulting effective policy. In the case of conflicts, Group policy Settings will override preference settings. - If you enable this setting, only items defined by Group Policy will be used in the resulting effective policy. Group Policy settings will override preference settings configured by the local administrator. @@ -311,13 +317,12 @@ This policy setting controls whether or not complex list settings configured by | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -344,7 +349,7 @@ This policy setting controls whether or not complex list settings configured by | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -361,11 +366,13 @@ Real-time protection consists of always-on scanning with file and process behavi - If you enable this policy setting, real-time protection is turned off. -- If you either disable or do not configure this policy setting, real-time protection is turned on. +- If you either disable or don't configure this policy setting, real-time protection is turned on. +> [!NOTE] +> Changes to this setting are not applied when [tamper protection][TAMPER-1] is enabled. @@ -373,13 +380,12 @@ Real-time protection consists of always-on scanning with file and process behavi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -406,7 +412,7 @@ Real-time protection consists of always-on scanning with file and process behavi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -419,13 +425,15 @@ Real-time protection consists of always-on scanning with file and process behavi This policy setting allows you to configure whether Microsoft Defender Antivirus automatically takes action on all detected threats. The action to be taken on a particular threat is determined by the combination of the policy-defined action, user-defined action, and the signature-defined action. -- If you enable this policy setting, Microsoft Defender Antivirus does not automatically take action on the detected threats, but prompts users to choose from the actions available for each threat. +- If you enable this policy setting, Microsoft Defender Antivirus doesn't automatically take action on the detected threats, but prompts users to choose from the actions available for each threat. -- If you disable or do not configure this policy setting, Microsoft Defender Antivirus automatically takes action on all detected threats after a nonconfigurable delay of approximately five seconds. +- If you disable or don't configure this policy setting, Microsoft Defender Antivirus automatically takes action on all detected threats after a nonconfigurable delay of approximately five seconds. +> [!NOTE] +> Changes to this setting are not applied when [tamper protection][TAMPER-1] is enabled. @@ -433,13 +441,12 @@ This policy setting allows you to configure whether Microsoft Defender Antivirus | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -466,7 +473,7 @@ This policy setting allows you to configure whether Microsoft Defender Antivirus | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -477,11 +484,13 @@ This policy setting allows you to configure whether Microsoft Defender Antivirus -This policy setting allows you specify a list of file types that should be excluded from scheduled, custom, and real-time scanning. File types should be added under the Options for this setting. Each entry must be listed as a name value pair, where the name should be a string representation of the file type extension (such as "obj" or "lib"). The value is not used and it is recommended that this be set to 0. +This policy setting allows you specify a list of file types that should be excluded from scheduled, custom, and real-time scanning. File types should be added under the Options for this setting. Each entry must be listed as a name value pair, where the name should be a string representation of the file type extension (such as "obj" or "lib"). The value isn't used and it's recommended that this be set to 0. +> [!NOTE] +> To prevent unauthorized changes to exclusions, apply tamper protection. Tamper protection for exclusions only works when [certain conditions][TAMPER-2] are met. @@ -489,13 +498,12 @@ This policy setting allows you specify a list of file types that should be exclu | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -522,7 +530,7 @@ This policy setting allows you specify a list of file types that should be exclu | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -533,11 +541,13 @@ This policy setting allows you specify a list of file types that should be exclu -This policy setting allows you to disable scheduled and real-time scanning for files under the paths specified or for the fully qualified resources specified. Paths should be added under the Options for this setting. Each entry must be listed as a name value pair, where the name should be a string representation of a path or a fully qualified resource name. As an example, a path might be defined as: "c:\Windows" to exclude all files in this directory. A fully qualified resource name might be defined as: "C:\Windows\App.exe". The value is not used and it is recommended that this be set to 0. +This policy setting allows you to disable scheduled and real-time scanning for files under the paths specified or for the fully qualified resources specified. Paths should be added under the Options for this setting. Each entry must be listed as a name value pair, where the name should be a string representation of a path or a fully qualified resource name. As an example, a path might be defined as: "c:\Windows" to exclude all files in this directory. A fully qualified resource name might be defined as: "C:\Windows\App.exe". The value isn't used and it's recommended that this be set to 0. +> [!NOTE] +> To prevent unauthorized changes to exclusions, apply tamper protection. Tamper protection for exclusions only works when [certain conditions][TAMPER-2] are met. @@ -545,13 +555,12 @@ This policy setting allows you to disable scheduled and real-time scanning for f | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -578,7 +587,7 @@ This policy setting allows you to disable scheduled and real-time scanning for f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -589,11 +598,13 @@ This policy setting allows you to disable scheduled and real-time scanning for f -This policy setting allows you to disable real-time scanning for any file opened by any of the specified processes. This policy does not apply to scheduled scans. The process itself will not be excluded. To exclude the process, use the Path exclusion. Processes should be added under the Options for this setting. Each entry must be listed as a name value pair, where the name should be a string representation of the path to the process image. **Note** that only executables can be excluded. For example, a process might be defined as: "c:\windows\app.exe". The value is not used and it is recommended that this be set to 0. +This policy setting allows you to disable real-time scanning for any file opened by any of the specified processes. This policy doesn't apply to scheduled scans. The process itself won't be excluded. To exclude the process, use the Path exclusion. Processes should be added under the Options for this setting. Each entry must be listed as a name value pair, where the name should be a string representation of the path to the process image. Note that only executables can be excluded. For example, a process might be defined as: "c:\windows\app.exe". The value isn't used and it's recommended that this be set to 0. +> [!NOTE] +> To prevent unauthorized changes to exclusions, apply tamper protection. Tamper protection for exclusions only works when [certain conditions][TAMPER-2] are met. @@ -601,13 +612,12 @@ This policy setting allows you to disable real-time scanning for any file opened | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -634,7 +644,7 @@ This policy setting allows you to disable real-time scanning for any file opened | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -648,15 +658,20 @@ This policy setting allows you to disable real-time scanning for any file opened Exclude files and paths from Attack Surface Reduction (ASR) rules. Enabled: + Specify the folders or files and resources that should be excluded from ASR rules in the Options section. + Enter each rule on a new line as a name-value pair: - - Name column: Enter a folder path or a fully qualified resource name. For example, "C:\Windows" will exclude all files in that directory. "C:\Windows\App.exe" will exclude only that specific file in that specific folder - - Value column: Enter "0" for each item + +- Name column: Enter a folder path or a fully qualified resource name. For example, "C:\Windows" will exclude all files in that directory. "C:\Windows\App.exe" will exclude only that specific file in that specific folder +- Value column: Enter "0" for each item. Disabled: + No exclusions will be applied to the ASR rules. Not configured: + Same as Disabled. You can configure ASR rules in the Configure Attack Surface Reduction rules GP setting. @@ -671,13 +686,12 @@ You can configure ASR rules in the Configure Attack Surface Reduction rules GP s | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -704,7 +718,7 @@ You can configure ASR rules in the Configure Attack Surface Reduction rules GP s | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -718,28 +732,34 @@ You can configure ASR rules in the Configure Attack Surface Reduction rules GP s Set the state for each Attack Surface Reduction (ASR) rule. After enabling this setting, you can set each rule to the following in the Options section: - - Block: the rule will be applied - - Audit Mode: if the rule would normally cause an event, then it will be recorded (although the rule will not actually be applied) - - Off: the rule will not be applied - - Not Configured: the rule is enabled with default values - - Warn: the rule will be applied and the end-user will have the option to bypass the block + +- Block: the rule will be applied +- Audit Mode: if the rule would normally cause an event, then it will be recorded (although the rule won't actually be applied) +- Off: the rule won't be applied +- Not Configured: the rule is enabled with default values +- Warn: the rule will be applied and the end-user will have the option to bypass the block. Unless the ASR rule is disabled, a subsample of audit events are collected for ASR rules with the value of not configured. Enabled: + Specify the state for each ASR rule under the Options section for this setting. + Enter each rule on a new line as a name-value pair: - - Name column: Enter a valid ASR rule ID - - Value column: Enter the status ID that relates to state you want to specify for the associated rule + +- Name column: Enter a valid ASR rule ID +- Value column: Enter the status ID that relates to state you want to specify for the associated rule. The following status IDs are permitted under the value column: - - 1 (Block) - - 0 (Off) - - 2 (Audit) - - 5 (Not Configured) - - 6 (Warn) + +- 1 (Block) +- 0 (Off) +- 2 (Audit) +- 5 (Not Configured) +- 6 (Warn) Example: + xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx 0 xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx @@ -748,9 +768,11 @@ xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx 2 Disabled: + No ASR rules will be configured. Not configured: + Same as Disabled. You can exclude folders or files in the "Exclude files and paths from Attack Surface Reduction Rules" GP setting. @@ -765,13 +787,12 @@ You can exclude folders or files in the "Exclude files and paths from Attack Sur | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -798,7 +819,7 @@ You can exclude folders or files in the "Exclude files and paths from Attack Sur | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -816,12 +837,15 @@ These applications are allowed to modify or delete files in controlled folder ac Microsoft Defender Antivirus automatically determines which applications should be trusted. You can configure this setting to add additional applications. Enabled: + Specify additional allowed applications in the Options section.. Disabled: + No additional applications will be added to the trusted list. Not configured: + Same as Disabled. You can enable controlled folder access in the Configure controlled folder access GP setting. @@ -838,13 +862,12 @@ Default system folders are automatically guarded, but you can add folders in the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -871,7 +894,7 @@ Default system folders are automatically guarded, but you can add folders in the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -884,18 +907,22 @@ Default system folders are automatically guarded, but you can add folders in the Specify additional folders that should be guarded by the Controlled folder access feature. -Files in these folders cannot be modified or deleted by untrusted applications. +Files in these folders can't be modified or deleted by untrusted applications. Default system folders are automatically protected. You can configure this setting to add additional folders. + The list of default system folders that are protected is shown in Windows Security. Enabled: + Specify additional folders that should be protected in the Options section. Disabled: + No additional folders will be protected. Not configured: + Same as Disabled. You can enable controlled folder access in the Configure controlled folder access GP setting. @@ -912,13 +939,12 @@ Microsoft Defender Antivirus automatically determines which applications can be | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -945,7 +971,7 @@ Microsoft Defender Antivirus automatically determines which applications can be | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -959,12 +985,15 @@ Microsoft Defender Antivirus automatically determines which applications can be Enable or disable file hash computation feature. Enabled: + When this feature is enabled Microsoft Defender will compute hash value for files it scans. Disabled: -File hash value is not computed + +File hash value isn't computed. Not configured: + Same as Disabled. @@ -977,13 +1006,12 @@ Same as Disabled. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1010,7 +1038,7 @@ Same as Disabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1021,9 +1049,9 @@ Same as Disabled. -This policy setting allows you to configure definition retirement for network protection against exploits of known vulnerabilities. Definition retirement checks to see if a computer has the required security updates necessary to protect it against a particular vulnerability. If the system is not vulnerable to the exploit detected by a definition, then that definition is "retired". If all security intelligence for a given protocal are retired then that protocol is no longer parsed. Enabling this feature helps to improve performance. On a computer that is up-to-date with all the latest security updates, network protection will have no impact on network performance. +This policy setting allows you to configure definition retirement for network protection against exploits of known vulnerabilities. Definition retirement checks to see if a computer has the required security updates necessary to protect it against a particular vulnerability. If the system isn't vulnerable to the exploit detected by a definition, then that definition is "retired". If all security intelligence for a given protocal are retired then that protocol is no longer parsed. Enabling this feature helps to improve performance. On a computer that's up-to-date with all the latest security updates, network protection will have no impact on network performance. -- If you enable or do not configure this setting, definition retirement will be enabled. +- If you enable or don't configure this setting, definition retirement will be enabled. - If you disable this setting, definition retirement will be disabled. @@ -1037,13 +1065,12 @@ This policy setting allows you to configure definition retirement for network pr | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1070,7 +1097,7 @@ This policy setting allows you to configure definition retirement for network pr | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1081,7 +1108,7 @@ This policy setting allows you to configure definition retirement for network pr -This policy setting defines additional definition sets to enable for network traffic inspection. Definition set GUIDs should be added under the Options for this setting. Each entry must be listed as a name value pair, where the name should be a string representation of a definition set GUID. As an example, the definition set GUID to enable test security intelligence is defined as: "{b54b6ac9-a737-498e-9120-6616ad3bf590}". The value is not used and it is recommended that this be set to 0. +This policy setting defines additional definition sets to enable for network traffic inspection. Definition set GUIDs should be added under the Options for this setting. Each entry must be listed as a name value pair, where the name should be a string representation of a definition set GUID. As an example, the definition set GUID to enable test security intelligence is defined as: "{b54b6ac9-a737-498e-9120-6616ad3bf590}". The value isn't used and it's recommended that this be set to 0. @@ -1093,13 +1120,12 @@ This policy setting defines additional definition sets to enable for network tra | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1126,7 +1152,7 @@ This policy setting defines additional definition sets to enable for network tra | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1139,7 +1165,7 @@ This policy setting defines additional definition sets to enable for network tra This policy setting allows you to configure protocol recognition for network protection against exploits of known vulnerabilities. -- If you enable or do not configure this setting, protocol recognition will be enabled. +- If you enable or don't configure this setting, protocol recognition will be enabled. - If you disable this setting, protocol recognition will be disabled. @@ -1153,13 +1179,12 @@ This policy setting allows you to configure protocol recognition for network pro | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1186,7 +1211,7 @@ This policy setting allows you to configure protocol recognition for network pro | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1201,7 +1226,7 @@ This policy, if defined, will prevent antimalware from using the configured prox - If you enable this setting, the proxy server will be bypassed for the specified addresses. -- If you disable or do not configure this setting, the proxy server will not be bypassed for the specified addresses. +- If you disable or don't configure this setting, the proxy server won't be bypassed for the specified addresses. @@ -1213,13 +1238,12 @@ This policy, if defined, will prevent antimalware from using the configured prox | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1245,7 +1269,7 @@ This policy, if defined, will prevent antimalware from using the configured prox | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1257,17 +1281,18 @@ This policy, if defined, will prevent antimalware from using the configured prox This policy setting defines the URL of a proxy .pac file that should be used when the client attempts to connect the network for security intelligence updates and MAPS reporting. If the proxy auto-config fails or if there is no proxy auto-config specified, the client will fall back to the alternative options (in order): + 1. Proxy server (if specified) 2. Proxy .pac URL (if specified) 3. None -4. Internet Explorer proxy settings +4. Internet Explorer proxy settings. -5. Autodetect +5. Autodetect. - If you enable this setting, the proxy setting will be set to use the specified proxy .pac according to the order specified above. -- If you disable or do not configure this setting, the proxy will skip over this fallback step according to the order specified above. +- If you disable or don't configure this setting, the proxy will skip over this fallback step according to the order specified above. @@ -1279,13 +1304,12 @@ This policy setting defines the URL of a proxy .pac file that should be used whe | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1311,7 +1335,7 @@ This policy setting defines the URL of a proxy .pac file that should be used whe | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1323,17 +1347,18 @@ This policy setting defines the URL of a proxy .pac file that should be used whe This policy setting allows you to configure the named proxy that should be used when the client attempts to connect to the network for security intelligence updates and MAPS reporting. If the named proxy fails or if there is no proxy specified, the client will fall back to the alternative options (in order): + 1. Proxy server (if specified) 2. Proxy .pac URL (if specified) 3. None -4. Internet Explorer proxy settings +4. Internet Explorer proxy settings. -5. Autodetect +5. Autodetect. - If you enable this setting, the proxy will be set to the specified URL according to the order specified above. The URL should be proceeded with either https:// or https://. -- If you disable or do not configure this setting, the proxy will skip over this fallback step according to the order specified above. +- If you disable or don't configure this setting, the proxy will skip over this fallback step according to the order specified above. @@ -1345,13 +1370,12 @@ This policy setting allows you to configure the named proxy that should be used | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1377,7 +1401,7 @@ This policy setting allows you to configure the named proxy that should be used | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1392,7 +1416,7 @@ This policy setting configures a local override for the configuration of the num - If you enable this setting, the local preference setting will take priority over Group Policy. -- If you disable or do not configure this setting, Group Policy will take priority over the local preference setting. +- If you disable or don't configure this setting, Group Policy will take priority over the local preference setting. @@ -1404,13 +1428,12 @@ This policy setting configures a local override for the configuration of the num | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1437,7 +1460,7 @@ This policy setting configures a local override for the configuration of the num | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1452,7 +1475,7 @@ This policy setting defines the number of days items should be kept in the Quara - If you enable this setting, items will be removed from the Quarantine folder after the number of days specified. -- If you disable or do not configure this setting, items will be kept in the quarantine folder indefinitely and will not be automatically removed. +- If you disable or don't configure this setting, items will be kept in the quarantine folder indefinitely and won't be automatically removed. @@ -1464,13 +1487,12 @@ This policy setting defines the number of days items should be kept in the Quara | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1497,7 +1519,7 @@ This policy setting defines the number of days items should be kept in the Quara | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1510,7 +1532,7 @@ This policy setting defines the number of days items should be kept in the Quara This policy setting allows you to configure the scheduled scan, and the scheduled security intelligence update, start time window in hours. -- If you disable or do not configure this setting, scheduled tasks will begin at a random time within 4 hours after the time specified in Task Scheduler. +- If you disable or don't configure this setting, scheduled tasks will begin at a random time within 4 hours after the time specified in Task Scheduler. - If you enable this setting, you can widen, or narrow, this randomization period. Specify a randomization window of between 1 and 23 hours. @@ -1524,13 +1546,12 @@ This policy setting allows you to configure the scheduled scan, and the schedule | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1557,7 +1578,7 @@ This policy setting allows you to configure the scheduled scan, and the schedule | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1570,13 +1591,15 @@ This policy setting allows you to configure the scheduled scan, and the schedule This policy setting allows you to configure behavior monitoring. -- If you enable or do not configure this setting, behavior monitoring will be enabled. +- If you enable or don't configure this setting, behavior monitoring will be enabled. - If you disable this setting, behavior monitoring will be disabled. +> [!NOTE] +> Changes to this setting are not applied when [tamper protection][TAMPER-1] is enabled. @@ -1584,13 +1607,12 @@ This policy setting allows you to configure behavior monitoring. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1617,7 +1639,7 @@ This policy setting allows you to configure behavior monitoring. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1630,13 +1652,15 @@ This policy setting allows you to configure behavior monitoring. This policy setting allows you to configure scanning for all downloaded files and attachments. -- If you enable or do not configure this setting, scanning for all downloaded files and attachments will be enabled. +- If you enable or don't configure this setting, scanning for all downloaded files and attachments will be enabled. - If you disable this setting, scanning for all downloaded files and attachments will be disabled. +> [!NOTE] +> Changes to this setting are not applied when [tamper protection][TAMPER-1] is enabled. @@ -1644,13 +1668,12 @@ This policy setting allows you to configure scanning for all downloaded files an | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1677,7 +1700,7 @@ This policy setting allows you to configure scanning for all downloaded files an | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1690,13 +1713,15 @@ This policy setting allows you to configure scanning for all downloaded files an This policy setting allows you to configure monitoring for file and program activity. -- If you enable or do not configure this setting, monitoring for file and program activity will be enabled. +- If you enable or don't configure this setting, monitoring for file and program activity will be enabled. - If you disable this setting, monitoring for file and program activity will be disabled. +> [!NOTE] +> Changes to this setting are not applied when [tamper protection][TAMPER-1] is enabled. @@ -1704,13 +1729,12 @@ This policy setting allows you to configure monitoring for file and program acti | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1737,7 +1761,7 @@ This policy setting allows you to configure monitoring for file and program acti | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1750,7 +1774,7 @@ This policy setting allows you to configure monitoring for file and program acti This policy setting controls whether raw volume write notifications are sent to behavior monitoring. -- If you enable or do not configure this setting, raw write notifications will be enabled. +- If you enable or don't configure this setting, raw write notifications will be enabled. - If you disable this setting, raw write notifications be disabled. @@ -1764,13 +1788,12 @@ This policy setting controls whether raw volume write notifications are sent to | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1797,7 +1820,7 @@ This policy setting controls whether raw volume write notifications are sent to | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1810,13 +1833,15 @@ This policy setting controls whether raw volume write notifications are sent to This policy setting allows you to configure process scanning when real-time protection is turned on. This helps to catch malware which could start when real-time protection is turned off. -- If you enable or do not configure this setting, a process scan will be initiated when real-time protection is turned on. +- If you enable or don't configure this setting, a process scan will be initiated when real-time protection is turned on. -- If you disable this setting, a process scan will not be initiated when real-time protection is turned on. +- If you disable this setting, a process scan won't be initiated when real-time protection is turned on. +> [!NOTE] +> Changes to this setting are not applied when [tamper protection][TAMPER-1] is enabled. @@ -1824,13 +1849,12 @@ This policy setting allows you to configure process scanning when real-time prot | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1857,7 +1881,7 @@ This policy setting allows you to configure process scanning when real-time prot | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1872,7 +1896,7 @@ This policy setting defines the maximum size (in kilobytes) of downloaded files - If you enable this setting, downloaded files and attachments smaller than the size specified will be scanned. -- If you disable or do not configure this setting, a default size will be applied. +- If you disable or don't configure this setting, a default size will be applied. @@ -1884,13 +1908,12 @@ This policy setting defines the maximum size (in kilobytes) of downloaded files | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1917,7 +1940,7 @@ This policy setting defines the maximum size (in kilobytes) of downloaded files | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1932,7 +1955,7 @@ This policy setting configures a local override for the configuration of behavio - If you enable this setting, the local preference setting will take priority over Group Policy. -- If you disable or do not configure this setting, Group Policy will take priority over the local preference setting. +- If you disable or don't configure this setting, Group Policy will take priority over the local preference setting. @@ -1944,13 +1967,12 @@ This policy setting configures a local override for the configuration of behavio | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1977,7 +1999,7 @@ This policy setting configures a local override for the configuration of behavio | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1992,7 +2014,7 @@ This policy setting configures a local override for the configuration of scannin - If you enable this setting, the local preference setting will take priority over Group Policy. -- If you disable or do not configure this setting, Group Policy will take priority over the local preference setting. +- If you disable or don't configure this setting, Group Policy will take priority over the local preference setting. @@ -2004,13 +2026,12 @@ This policy setting configures a local override for the configuration of scannin | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2037,7 +2058,7 @@ This policy setting configures a local override for the configuration of scannin | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2052,7 +2073,7 @@ This policy setting configures a local override for the configuration of monitor - If you enable this setting, the local preference setting will take priority over Group Policy. -- If you disable or do not configure this setting, Group Policy will take priority over the local preference setting. +- If you disable or don't configure this setting, Group Policy will take priority over the local preference setting. @@ -2064,13 +2085,12 @@ This policy setting configures a local override for the configuration of monitor | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2097,7 +2117,7 @@ This policy setting configures a local override for the configuration of monitor | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2112,7 +2132,7 @@ This policy setting configures a local override for the configuration to turn on - If you enable this setting, the local preference setting will take priority over Group Policy. -- If you disable or do not configure this setting, Group Policy will take priority over the local preference setting. +- If you disable or don't configure this setting, Group Policy will take priority over the local preference setting. @@ -2124,13 +2144,12 @@ This policy setting configures a local override for the configuration to turn on | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2157,7 +2176,7 @@ This policy setting configures a local override for the configuration to turn on | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2172,7 +2191,7 @@ This policy setting configures a local override for the configuration of monitor - If you enable this setting, the local preference setting will take priority over Group Policy. -- If you disable or do not configure this setting, Group Policy will take priority over the local preference setting. +- If you disable or don't configure this setting, Group Policy will take priority over the local preference setting. @@ -2184,13 +2203,12 @@ This policy setting configures a local override for the configuration of monitor | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2217,7 +2235,7 @@ This policy setting configures a local override for the configuration of monitor | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2232,7 +2250,7 @@ This policy setting configures a local override for the configuration of the tim - If you enable this setting, the local preference setting will take priority over Group Policy. -- If you disable or do not configure this setting, Group Policy will take priority over the local preference setting. +- If you disable or don't configure this setting, Group Policy will take priority over the local preference setting. @@ -2244,13 +2262,12 @@ This policy setting configures a local override for the configuration of the tim | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2277,7 +2294,7 @@ This policy setting configures a local override for the configuration of the tim | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2291,19 +2308,12 @@ This policy setting configures a local override for the configuration of the tim This policy setting allows you to specify the day of the week on which to perform a scheduled full scan in order to complete remediation. The scan can also be configured to run every day or to never run at all. This setting can be configured with the following ordinal number values: -(0x0) Every Day -(0x1) Sunday -(0x2) Monday -(0x3) Tuesday -(0x4) Wednesday -(0x5) Thursday -(0x6) Friday -(0x7) Saturday -(0x8) Never (default) + +(0x0) Every Day (0x1) Sunday (0x2) Monday (0x3) Tuesday (0x4) Wednesday (0x5) Thursday (0x6) Friday (0x7) Saturday (0x8) Never (default) - If you enable this setting, a scheduled full scan to complete remediation will run at the frequency specified. -- If you disable or do not configure this setting, a scheduled full scan to complete remediation will run at a default frequency. +- If you disable or don't configure this setting, a scheduled full scan to complete remediation will run at a default frequency. @@ -2315,13 +2325,12 @@ This setting can be configured with the following ordinal number values: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2348,7 +2357,7 @@ This setting can be configured with the following ordinal number values: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2363,7 +2372,7 @@ This policy setting allows you to specify the time of day at which to perform a - If you enable this setting, a scheduled full scan to complete remediation will run at the time of day specified. -- If you disable or do not configure this setting, a scheduled full scan to complete remediation will run at a default time. +- If you disable or don't configure this setting, a scheduled full scan to complete remediation will run at a default time. @@ -2375,13 +2384,12 @@ This policy setting allows you to specify the time of day at which to perform a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2408,7 +2416,7 @@ This policy setting allows you to specify the time of day at which to perform a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2431,13 +2439,12 @@ This policy setting configures the time in minutes before a detection in the "ad | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2464,7 +2471,7 @@ This policy setting configures the time in minutes before a detection in the "ad | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2487,13 +2494,12 @@ This policy setting configures the time in minutes before a detection in the "cr | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2520,7 +2526,7 @@ This policy setting configures the time in minutes before a detection in the "cr | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2533,13 +2539,15 @@ This policy setting configures the time in minutes before a detection in the "cr Use this policy setting to specify if you want Microsoft Defender Antivirus enhanced notifications to display on clients. -- If you disable or do not configure this setting, Microsoft Defender Antivirus enhanced notifications will display on clients. +- If you disable or don't configure this setting, Microsoft Defender Antivirus enhanced notifications will display on clients. -- If you enable this setting, Microsoft Defender Antivirus enhanced notifications will not display on clients. +- If you enable this setting, Microsoft Defender Antivirus enhanced notifications won't display on clients. +> [!NOTE] +> Changes to this setting are not applied when [tamper protection][TAMPER-1] is enabled. @@ -2547,13 +2555,12 @@ Use this policy setting to specify if you want Microsoft Defender Antivirus enha | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2580,7 +2587,7 @@ Use this policy setting to specify if you want Microsoft Defender Antivirus enha | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2593,9 +2600,9 @@ Use this policy setting to specify if you want Microsoft Defender Antivirus enha This policy setting allows you to configure whether or not Watson events are sent. -- If you enable or do not configure this setting, Watson events will be sent. +- If you enable or don't configure this setting, Watson events will be sent. -- If you disable this setting, Watson events will not be sent. +- If you disable this setting, Watson events won't be sent. @@ -2607,13 +2614,12 @@ This policy setting allows you to configure whether or not Watson events are sen | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2640,7 +2646,7 @@ This policy setting allows you to configure whether or not Watson events are sen | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2663,13 +2669,12 @@ This policy setting configures the time in minutes before a detection in the "no | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2696,7 +2701,7 @@ This policy setting configures the time in minutes before a detection in the "no | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2719,13 +2724,12 @@ This policy setting configures the time in minutes before a detection in the "co | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2752,7 +2756,7 @@ This policy setting configures the time in minutes before a detection in the "co | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2775,13 +2779,12 @@ This policy configures Windows software trace preprocessor (WPP Software Tracing | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2808,7 +2811,7 @@ This policy configures Windows software trace preprocessor (WPP Software Tracing | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2820,7 +2823,9 @@ This policy configures Windows software trace preprocessor (WPP Software Tracing This policy allows you to configure tracing levels for Windows software trace preprocessor (WPP Software Tracing). + Tracing levels are defined as: + 1 - Error 2 - Warning 3 - Info @@ -2836,13 +2841,12 @@ Tracing levels are defined as: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2869,7 +2873,7 @@ Tracing levels are defined as: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2882,9 +2886,9 @@ Tracing levels are defined as: This policy setting allows you to manage whether or not end users can pause a scan in progress. -- If you enable or do not configure this setting, a new context menu will be added to the task tray icon to allow the user to pause a scan. +- If you enable or don't configure this setting, a new context menu will be added to the task tray icon to allow the user to pause a scan. -- If you disable this setting, users will not be able to pause scans. +- If you disable this setting, users won't be able to pause scans. @@ -2896,13 +2900,12 @@ This policy setting allows you to manage whether or not end users can pause a sc | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2929,7 +2932,7 @@ This policy setting allows you to manage whether or not end users can pause a sc | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2944,7 +2947,7 @@ This policy setting allows you to configure the maximum directory depth level in - If you enable this setting, archive files will be scanned to the directory depth level specified. -- If you disable or do not configure this setting, archive files will be scanned to the default directory depth level. +- If you disable or don't configure this setting, archive files will be scanned to the default directory depth level. @@ -2956,13 +2959,12 @@ This policy setting allows you to configure the maximum directory depth level in | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2989,7 +2991,7 @@ This policy setting allows you to configure the maximum directory depth level in | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3004,7 +3006,7 @@ This policy setting allows you to configure the maximum size of archive files su - If you enable this setting, archive files less than or equal to the size specified will be scanned. -- If you disable or do not configure this setting, archive files will be scanned according to the default value. +- If you disable or don't configure this setting, archive files will be scanned according to the default value. @@ -3016,13 +3018,12 @@ This policy setting allows you to configure the maximum size of archive files su | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3049,7 +3050,7 @@ This policy setting allows you to configure the maximum size of archive files su | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3062,13 +3063,15 @@ This policy setting allows you to configure the maximum size of archive files su This policy setting allows you to configure scans for malicious software and unwanted software in archive files such as . ZIP or . CAB files. -- If you enable or do not configure this setting, archive files will be scanned. +- If you enable or don't configure this setting, archive files will be scanned. -- If you disable this setting, archive files will not be scanned. However, archives are always scanned during directed scans. +- If you disable this setting, archive files won't be scanned. However, archives are always scanned during directed scans. +> [!NOTE] +> Changes to this setting are not applied when [tamper protection][TAMPER-1] is enabled. @@ -3076,13 +3079,12 @@ This policy setting allows you to configure scans for malicious software and unw | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3109,7 +3111,7 @@ This policy setting allows you to configure scans for malicious software and unw | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3120,11 +3122,11 @@ This policy setting allows you to configure scans for malicious software and unw -This policy setting allows you to configure e-mail scanning. When e-mail scanning is enabled, the engine will parse the mailbox and mail files, according to their specific format, in order to analyze the mail bodies and attachments. Several e-mail formats are currently supported, for example: pst (Outlook), dbx, mbx, mime (Outlook Express), binhex (Mac). Email scanning is not supported on modern email clients. +This policy setting allows you to configure e-mail scanning. When e-mail scanning is enabled, the engine will parse the mailbox and mail files, according to their specific format, in order to analyze the mail bodies and attachments. Several e-mail formats are currently supported, for example: pst (Outlook), dbx, mbx, mime (Outlook Express), binhex (Mac). Email scanning isn't supported on modern email clients. - If you enable this setting, e-mail scanning will be enabled. -- If you disable or do not configure this setting, e-mail scanning will be disabled. +- If you disable or don't configure this setting, e-mail scanning will be disabled. @@ -3136,13 +3138,12 @@ This policy setting allows you to configure e-mail scanning. When e-mail scannin | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3169,7 +3170,7 @@ This policy setting allows you to configure e-mail scanning. When e-mail scannin | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3180,9 +3181,9 @@ This policy setting allows you to configure e-mail scanning. When e-mail scannin -This policy setting allows you to configure heuristics. Suspicious detections will be suppressed right before reporting to the engine client. Turning off heuristics will reduce the capability to flag new threats. It is recommended that you do not turn off heuristics. +This policy setting allows you to configure heuristics. Suspicious detections will be suppressed right before reporting to the engine client. Turning off heuristics will reduce the capability to flag new threats. It's recommended that you don't turn off heuristics. -- If you enable or do not configure this setting, heuristics will be enabled. +- If you enable or don't configure this setting, heuristics will be enabled. - If you disable this setting, heuristics will be disabled. @@ -3196,13 +3197,12 @@ This policy setting allows you to configure heuristics. Suspicious detections wi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3229,7 +3229,7 @@ This policy setting allows you to configure heuristics. Suspicious detections wi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3251,14 +3251,13 @@ This policy setting allows you to configure heuristics. Suspicious detections wi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3280,7 +3279,7 @@ This policy setting allows you to configure heuristics. Suspicious detections wi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3295,7 +3294,7 @@ This policy setting allows you to manage whether or not to scan for malicious so - If you enable this setting, removable drives will be scanned during any type of scan. -- If you disable or do not configure this setting, removable drives will not be scanned during a full scan. Removable drives may still be scanned during quick scan and custom scan. +- If you disable or don't configure this setting, removable drives won't be scanned during a full scan. Removable drives may still be scanned during quick scan and custom scan. @@ -3307,13 +3306,12 @@ This policy setting allows you to manage whether or not to scan for malicious so | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3340,7 +3338,7 @@ This policy setting allows you to manage whether or not to scan for malicious so | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3355,7 +3353,7 @@ This policy setting allows you to configure reparse point scanning. If you allow - If you enable this setting, reparse point scanning will be enabled. -- If you disable or do not configure this setting, reparse point scanning will be disabled. +- If you disable or don't configure this setting, reparse point scanning will be disabled. @@ -3367,13 +3365,12 @@ This policy setting allows you to configure reparse point scanning. If you allow | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3400,7 +3397,7 @@ This policy setting allows you to configure reparse point scanning. If you allow | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3415,7 +3412,7 @@ This policy setting allows you to create a system restore point on the computer - If you enable this setting, a system restore point will be created. -- If you disable or do not configure this setting, a system restore point will not be created. +- If you disable or don't configure this setting, a system restore point won't be created. @@ -3427,13 +3424,12 @@ This policy setting allows you to create a system restore point on the computer | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3460,7 +3456,7 @@ This policy setting allows you to create a system restore point on the computer | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3475,7 +3471,7 @@ This policy setting allows you to configure scanning mapped network drives. - If you enable this setting, mapped network drives will be scanned. -- If you disable or do not configure this setting, mapped network drives will not be scanned. +- If you disable or don't configure this setting, mapped network drives won't be scanned. @@ -3487,13 +3483,12 @@ This policy setting allows you to configure scanning mapped network drives. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3520,7 +3515,7 @@ This policy setting allows you to configure scanning mapped network drives. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3531,11 +3526,11 @@ This policy setting allows you to configure scanning mapped network drives. -This policy setting allows you to configure scanning for network files. It is recommended that you do not enable this setting. +This policy setting allows you to configure scanning for network files. It's recommended that you don't enable this setting. - If you enable this setting, network files will be scanned. -- If you disable or do not configure this setting, network files will not be scanned. +- If you disable or don't configure this setting, network files won't be scanned. @@ -3547,13 +3542,12 @@ This policy setting allows you to configure scanning for network files. It is re | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3580,7 +3574,7 @@ This policy setting allows you to configure scanning for network files. It is re | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3595,7 +3589,7 @@ This policy setting configures a local override for the configuration of maximum - If you enable this setting, the local preference setting will take priority over Group Policy. -- If you disable or do not configure this setting, Group Policy will take priority over the local preference setting. +- If you disable or don't configure this setting, Group Policy will take priority over the local preference setting. @@ -3607,13 +3601,12 @@ This policy setting configures a local override for the configuration of maximum | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3640,7 +3633,7 @@ This policy setting configures a local override for the configuration of maximum | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3655,7 +3648,7 @@ This policy setting configures a local override for the configuration of the sca - If you enable this setting, the local preference setting will take priority over Group Policy. -- If you disable or do not configure this setting, Group Policy will take priority over the local preference setting. +- If you disable or don't configure this setting, Group Policy will take priority over the local preference setting. @@ -3667,13 +3660,12 @@ This policy setting configures a local override for the configuration of the sca | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3700,7 +3692,7 @@ This policy setting configures a local override for the configuration of the sca | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3715,7 +3707,7 @@ This policy setting configures a local override for the configuration of schedul - If you enable this setting, the local preference setting will take priority over Group Policy. -- If you disable or do not configure this setting, Group Policy will take priority over the local preference setting. +- If you disable or don't configure this setting, Group Policy will take priority over the local preference setting. @@ -3727,13 +3719,12 @@ This policy setting configures a local override for the configuration of schedul | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3760,7 +3751,7 @@ This policy setting configures a local override for the configuration of schedul | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3775,7 +3766,7 @@ This policy setting configures a local override for the configuration of schedul - If you enable this setting, the local preference setting will take priority over Group Policy. -- If you disable or do not configure this setting, Group Policy will take priority over the local preference setting. +- If you disable or don't configure this setting, Group Policy will take priority over the local preference setting. @@ -3787,13 +3778,12 @@ This policy setting configures a local override for the configuration of schedul | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3820,7 +3810,7 @@ This policy setting configures a local override for the configuration of schedul | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3835,7 +3825,7 @@ This policy setting configures a local override for the configuration of schedul - If you enable this setting, the local preference setting will take priority over Group Policy. -- If you disable or do not configure this setting, Group Policy will take priority over the local preference setting. +- If you disable or don't configure this setting, Group Policy will take priority over the local preference setting. @@ -3847,13 +3837,12 @@ This policy setting configures a local override for the configuration of schedul | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3880,7 +3869,7 @@ This policy setting configures a local override for the configuration of schedul | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3895,7 +3884,7 @@ This policy setting allows you to enable or disable low CPU priority for schedul - If you enable this setting, low CPU priority will be used during scheduled scans. -- If you disable or do not configure this setting, not changes will be made to CPU priority for scheduled scans. +- If you disable or don't configure this setting, not changes will be made to CPU priority for scheduled scans. @@ -3907,13 +3896,12 @@ This policy setting allows you to enable or disable low CPU priority for schedul | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3940,7 +3928,7 @@ This policy setting allows you to enable or disable low CPU priority for schedul | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3955,7 +3943,7 @@ This policy setting allows you to define the number of consecutive scheduled sca - If you enable this setting, a catch-up scan will occur after the specified number consecutive missed scheduled scans. -- If you disable or do not configure this setting, a catch-up scan will occur after the 2 consecutive missed scheduled scans. +- If you disable or don't configure this setting, a catch-up scan will occur after the 2 consecutive missed scheduled scans. @@ -3967,13 +3955,12 @@ This policy setting allows you to define the number of consecutive scheduled sca | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4000,7 +3987,7 @@ This policy setting allows you to define the number of consecutive scheduled sca | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4011,11 +3998,11 @@ This policy setting allows you to define the number of consecutive scheduled sca -This policy setting defines the number of days items should be kept in the scan history folder before being permanently removed. The value represents the number of days to keep items in the folder. If set to zero, items will be kept forever and will not be automatically removed. By default, the value is set to 30 days. +This policy setting defines the number of days items should be kept in the scan history folder before being permanently removed. The value represents the number of days to keep items in the folder. If set to zero, items will be kept forever and won't be automatically removed. By default, the value is set to 30 days. - If you enable this setting, items will be removed from the scan history folder after the number of days specified. -- If you disable or do not configure this setting, items will be kept in the scan history folder for the default number of days. +- If you disable or don't configure this setting, items will be kept in the scan history folder for the default number of days. @@ -4027,13 +4014,12 @@ This policy setting defines the number of days items should be kept in the scan | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4060,7 +4046,7 @@ This policy setting defines the number of days items should be kept in the scan | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4071,11 +4057,11 @@ This policy setting defines the number of days items should be kept in the scan -This policy setting allows you to specify an interval at which to perform a quick scan. The time value is represented as the number of hours between quick scans. Valid values range from 1 (every hour) to 24 (once per day). If set to zero, interval quick scans will not occur. By default, this setting is set to 0. +This policy setting allows you to specify an interval at which to perform a quick scan. The time value is represented as the number of hours between quick scans. Valid values range from 1 (every hour) to 24 (once per day). If set to zero, interval quick scans won't occur. By default, this setting is set to 0. - If you enable this setting, a quick scan will run at the interval specified. -- If you disable or do not configure this setting, quick scan controlled by this config will not be run. +- If you disable or don't configure this setting, quick scan controlled by this config won't be run. @@ -4087,13 +4073,12 @@ This policy setting allows you to specify an interval at which to perform a quic | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4120,7 +4105,7 @@ This policy setting allows you to specify an interval at which to perform a quic | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4133,7 +4118,7 @@ This policy setting allows you to specify an interval at which to perform a quic This policy setting allows you to configure scheduled scans to start only when your computer is on but not in use. -- If you enable or do not configure this setting, scheduled scans will only run when the computer is on but not in use. +- If you enable or don't configure this setting, scheduled scans will only run when the computer is on but not in use. - If you disable this setting, scheduled scans will run at the scheduled time. @@ -4147,13 +4132,12 @@ This policy setting allows you to configure scheduled scans to start only when y | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4180,7 +4164,7 @@ This policy setting allows you to configure scheduled scans to start only when y | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4194,19 +4178,12 @@ This policy setting allows you to configure scheduled scans to start only when y This policy setting allows you to specify the day of the week on which to perform a scheduled scan. The scan can also be configured to run every day or to never run at all. This setting can be configured with the following ordinal number values: -(0x0) Every Day -(0x1) Sunday -(0x2) Monday -(0x3) Tuesday -(0x4) Wednesday -(0x5) Thursday -(0x6) Friday -(0x7) Saturday -(0x8) Never (default) + +(0x0) Every Day (0x1) Sunday (0x2) Monday (0x3) Tuesday (0x4) Wednesday (0x5) Thursday (0x6) Friday (0x7) Saturday (0x8) Never (default) - If you enable this setting, a scheduled scan will run at the frequency specified. -- If you disable or do not configure this setting, a scheduled scan will run at a default frequency. +- If you disable or don't configure this setting, a scheduled scan will run at a default frequency. @@ -4218,13 +4195,12 @@ This setting can be configured with the following ordinal number values: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4251,7 +4227,7 @@ This setting can be configured with the following ordinal number values: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4266,7 +4242,7 @@ This policy setting allows you to specify the time of day at which to perform a - If you enable this setting, a scheduled scan will run at the time of day specified. -- If you disable or do not configure this setting, a scheduled scan will run at a default time. +- If you disable or don't configure this setting, a scheduled scan will run at a default time. @@ -4278,13 +4254,12 @@ This policy setting allows you to specify the time of day at which to perform a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4311,7 +4286,7 @@ This policy setting allows you to specify the time of day at which to perform a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4322,11 +4297,11 @@ This policy setting allows you to specify the time of day at which to perform a -This policy setting allows you to configure whether or not the antimalware service remains running when antivirus and antispyware security intelligence is disabled. It is recommended that this setting remain disabled. +This policy setting allows you to configure whether or not the antimalware service remains running when antivirus and antispyware security intelligence is disabled. It's recommended that this setting remain disabled. - If you enable this setting, the antimalware service will always remain running even if both antivirus and antispyware security intelligence is disabled. -- If you disable or do not configure this setting, the antimalware service will be stopped when both antivirus and antispyware security intelligence is disabled. If the computer is restarted, the service will be started if it is set to Automatic startup. After the service has started, there will be a check to see if antivirus and antispyware security intelligence is enabled. If at least one is enabled, the service will remain running. If both are disabled, the service will be stopped. +- If you disable or don't configure this setting, the antimalware service will be stopped when both antivirus and antispyware security intelligence is disabled. If the computer is restarted, the service will be started if it's set to Automatic startup. After the service has started, there will be a check to see if antivirus and antispyware security intelligence is enabled. If at least one is enabled, the service will remain running. If both are disabled, the service will be stopped. @@ -4338,13 +4313,12 @@ This policy setting allows you to configure whether or not the antimalware servi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4371,7 +4345,7 @@ This policy setting allows you to configure whether or not the antimalware servi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4386,7 +4360,7 @@ This policy setting allows you to define the number of days that must pass befor - If you enable this setting, spyware security intelligence will be considered out of date after the number of days specified have passed without an update. -- If you disable or do not configure this setting, spyware security intelligence will be considered out of date after the default number of days have passed without an update. +- If you disable or don't configure this setting, spyware security intelligence will be considered out of date after the default number of days have passed without an update. @@ -4398,13 +4372,12 @@ This policy setting allows you to define the number of days that must pass befor | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4431,7 +4404,7 @@ This policy setting allows you to define the number of days that must pass befor | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4446,7 +4419,7 @@ This policy setting allows you to define the number of days that must pass befor - If you enable this setting, virus security intelligence will be considered out of date after the number of days specified have passed without an update. -- If you disable or do not configure this setting, virus security intelligence will be considered out of date after the default number of days have passed without an update. +- If you disable or don't configure this setting, virus security intelligence will be considered out of date after the default number of days have passed without an update. @@ -4458,13 +4431,12 @@ This policy setting allows you to define the number of days that must pass befor | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4491,7 +4463,7 @@ This policy setting allows you to define the number of days that must pass befor | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4502,11 +4474,11 @@ This policy setting allows you to define the number of days that must pass befor -This policy setting allows you to configure UNC file share sources for downloading security intelligence updates. Sources will be contacted in the order specified. The value of this setting should be entered as a pipe-separated string enumerating the security intelligence update sources. For example: "{\\unc1 | \\unc2 }". The list is empty by default. +This policy setting allows you to configure UNC file share sources for downloading security intelligence updates. Sources will be contacted in the order specified. The value of this setting should be entered as a pipe-separated string enumerating the security intelligence update sources. For example: "`{\\unc1 | \\unc2 }`". The list is empty by default. -- If you enable this setting, the specified sources will be contacted for security intelligence updates. Once security intelligence updates have been successfully downloaded from one specified source, the remaining sources in the list will not be contacted. +- If you enable this setting, the specified sources will be contacted for security intelligence updates. Once security intelligence updates have been successfully downloaded from one specified source, the remaining sources in the list won't be contacted. -- If you disable or do not configure this setting, the list will remain empty by default and no sources will be contacted. +- If you disable or don't configure this setting, the list will remain empty by default and no sources will be contacted. @@ -4518,13 +4490,12 @@ This policy setting allows you to configure UNC file share sources for downloadi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4550,7 +4521,7 @@ This policy setting allows you to configure UNC file share sources for downloadi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4563,9 +4534,9 @@ This policy setting allows you to configure UNC file share sources for downloadi This policy setting allows you to configure the automatic scan which starts after a security intelligence update has occurred. -- If you enable or do not configure this setting, a scan will start following a security intelligence update. +- If you enable or don't configure this setting, a scan will start following a security intelligence update. -- If you disable this setting, a scan will not start following a security intelligence update. +- If you disable this setting, a scan won't start following a security intelligence update. @@ -4577,13 +4548,12 @@ This policy setting allows you to configure the automatic scan which starts afte | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4610,7 +4580,7 @@ This policy setting allows you to configure the automatic scan which starts afte | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4623,7 +4593,7 @@ This policy setting allows you to configure the automatic scan which starts afte This policy setting allows you to configure security intelligence updates when the computer is running on battery power. -- If you enable or do not configure this setting, security intelligence updates will occur as usual regardless of power state. +- If you enable or don't configure this setting, security intelligence updates will occur as usual regardless of power state. - If you disable this setting, security intelligence updates will be turned off while the computer is running on battery power. @@ -4637,13 +4607,12 @@ This policy setting allows you to configure security intelligence updates when t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4670,7 +4639,7 @@ This policy setting allows you to configure security intelligence updates when t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4683,9 +4652,9 @@ This policy setting allows you to configure security intelligence updates when t This policy setting allows you to configure security intelligence updates on startup when there is no antimalware engine present. -- If you enable or do not configure this setting, security intelligence updates will be initiated on startup when there is no antimalware engine present. +- If you enable or don't configure this setting, security intelligence updates will be initiated on startup when there is no antimalware engine present. -- If you disable this setting, security intelligence updates will not be initiated on startup when there is no antimalware engine present. +- If you disable this setting, security intelligence updates won't be initiated on startup when there is no antimalware engine present. @@ -4697,13 +4666,12 @@ This policy setting allows you to configure security intelligence updates on sta | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4730,7 +4698,7 @@ This policy setting allows you to configure security intelligence updates on sta | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4741,13 +4709,13 @@ This policy setting allows you to configure security intelligence updates on sta -This policy setting allows you to define the order in which different security intelligence update sources should be contacted. The value of this setting should be entered as a pipe-separated string enumerating the security intelligence update sources in order. Possible values are: "InternalDefinitionUpdateServer", "MicrosoftUpdateServer", "MMPC", and "FileShares" +This policy setting allows you to define the order in which different security intelligence update sources should be contacted. The value of this setting should be entered as a pipe-separated string enumerating the security intelligence update sources in order. Possible values are: "InternalDefinitionUpdateServer", "MicrosoftUpdateServer", "MMPC", and "FileShares". For Example: `{ InternalDefinitionUpdateServer | MicrosoftUpdateServer | MMPC }` -- If you enable this setting, security intelligence update sources will be contacted in the order specified. Once security intelligence updates have been successfully downloaded from one specified source, the remaining sources in the list will not be contacted. +- If you enable this setting, security intelligence update sources will be contacted in the order specified. Once security intelligence updates have been successfully downloaded from one specified source, the remaining sources in the list won't be contacted. -- If you disable or do not configure this setting, security intelligence update sources will be contacted in a default order. +- If you disable or don't configure this setting, security intelligence update sources will be contacted in a default order. @@ -4759,13 +4727,12 @@ For Example: `{ InternalDefinitionUpdateServer | MicrosoftUpdateServer | MMPC }` | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4791,7 +4758,7 @@ For Example: `{ InternalDefinitionUpdateServer | MicrosoftUpdateServer | MMPC }` | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4806,7 +4773,7 @@ This policy setting allows you to enable download of security intelligence updat - If you enable this setting, security intelligence updates will be downloaded from Microsoft Update. -- If you disable or do not configure this setting, security intelligence updates will be downloaded from the configured download source. +- If you disable or don't configure this setting, security intelligence updates will be downloaded from the configured download source. @@ -4818,13 +4785,12 @@ This policy setting allows you to enable download of security intelligence updat | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4851,7 +4817,7 @@ This policy setting allows you to enable download of security intelligence updat | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4864,7 +4830,7 @@ This policy setting allows you to enable download of security intelligence updat This policy setting allows you to enable real-time security intelligence updates in response to reports sent to Microsoft MAPS. If the service reports a file as an unknown and Microsoft MAPS finds that the latest security intelligence update has security intelligence for a threat involving that file, the service will receive all of the latest security intelligence for that threat immediately. You must have configured your computer to join Microsoft MAPS for this functionality to work. -- If you enable or do not configure this setting, real-time security intelligence updates will be enabled. +- If you enable or don't configure this setting, real-time security intelligence updates will be enabled. - If you disable this setting, real-time security intelligence updates will disabled. @@ -4878,13 +4844,12 @@ This policy setting allows you to enable real-time security intelligence updates | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4911,7 +4876,7 @@ This policy setting allows you to enable real-time security intelligence updates | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4925,19 +4890,13 @@ This policy setting allows you to enable real-time security intelligence updates This policy setting allows you to specify the day of the week on which to check for security intelligence updates. The check can also be configured to run every day or to never run at all. This setting can be configured with the following ordinal number values: + (0x0) Every Day (default) -(0x1) Sunday -(0x2) Monday -(0x3) Tuesday -(0x4) Wednesday -(0x5) Thursday -(0x6) Friday -(0x7) Saturday -(0x8) Never +(0x1) Sunday (0x2) Monday (0x3) Tuesday (0x4) Wednesday (0x5) Thursday (0x6) Friday (0x7) Saturday (0x8) Never. - If you enable this setting, the check for security intelligence updates will occur at the frequency specified. -- If you disable or do not configure this setting, the check for security intelligence updates will occur at a default frequency. +- If you disable or don't configure this setting, the check for security intelligence updates will occur at a default frequency. @@ -4949,13 +4908,12 @@ This setting can be configured with the following ordinal number values: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4982,7 +4940,7 @@ This setting can be configured with the following ordinal number values: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4997,7 +4955,7 @@ This policy setting allows you to specify the time of day at which to check for - If you enable this setting, the check for security intelligence updates will occur at the time of day specified. -- If you disable or do not configure this setting, the check for security intelligence updates will occur at the default time. +- If you disable or don't configure this setting, the check for security intelligence updates will occur at the default time. @@ -5009,13 +4967,12 @@ This policy setting allows you to specify the time of day at which to check for | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5042,7 +4999,7 @@ This policy setting allows you to specify the time of day at which to check for | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5055,7 +5012,7 @@ This policy setting allows you to specify the time of day at which to check for This policy setting allows you to define the security intelligence location for VDI-configured computers. -If you disable or do not configure this setting, security intelligence will be referred from the default local source. +If you disable or don't configure this setting, security intelligence will be referred from the default local source. @@ -5067,13 +5024,12 @@ If you disable or do not configure this setting, security intelligence will be r | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5099,7 +5055,7 @@ If you disable or do not configure this setting, security intelligence will be r | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5112,9 +5068,9 @@ If you disable or do not configure this setting, security intelligence will be r This policy setting allows you to configure the antimalware service to receive notifications to disable individual security intelligence in response to reports it sends to Microsoft MAPS. Microsoft MAPS uses these notifications to disable security intelligence that are causing false positive reports. You must have configured your computer to join Microsoft MAPS for this functionality to work. -- If you enable this setting or do not configure, the antimalware service will receive notifications to disable security intelligence. +- If you enable this setting or don't configure, the antimalware service will receive notifications to disable security intelligence. -- If you disable this setting, the antimalware service will not receive notifications to disable security intelligence. +- If you disable this setting, the antimalware service won't receive notifications to disable security intelligence. @@ -5126,13 +5082,12 @@ This policy setting allows you to configure the antimalware service to receive n | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5159,7 +5114,7 @@ This policy setting allows you to configure the antimalware service to receive n | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5174,7 +5129,7 @@ This policy setting allows you to define the number of days after which a catch- - If you enable this setting, a catch-up security intelligence update will occur after the specified number of days. -- If you disable or do not configure this setting, a catch-up security intelligence update will be required after the default number of days. +- If you disable or don't configure this setting, a catch-up security intelligence update will be required after the default number of days. @@ -5186,13 +5141,12 @@ This policy setting allows you to define the number of days after which a catch- | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5219,7 +5173,7 @@ This policy setting allows you to define the number of days after which a catch- | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5234,7 +5188,7 @@ This policy setting allows you to manage whether a check for new virus and spywa - If you enable this setting, a check for new security intelligence will occur after service startup. -- If you disable this setting or do not configure this setting, a check for new security intelligence will not occur after service startup. +- If you disable this setting or don't configure this setting, a check for new security intelligence won't occur after service startup. @@ -5246,13 +5200,12 @@ This policy setting allows you to manage whether a check for new virus and spywa | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5279,7 +5232,7 @@ This policy setting allows you to manage whether a check for new virus and spywa | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5294,7 +5247,7 @@ This policy setting configures a local override for the configuration to join Mi - If you enable this setting, the local preference setting will take priority over Group Policy. -- If you disable or do not configure this setting, Group Policy will take priority over the local preference setting. +- If you disable or don't configure this setting, Group Policy will take priority over the local preference setting. @@ -5306,13 +5259,12 @@ This policy setting configures a local override for the configuration to join Mi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5339,7 +5291,7 @@ This policy setting configures a local override for the configuration to join Mi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5352,20 +5304,20 @@ This policy setting configures a local override for the configuration to join Mi This policy setting allows you to join Microsoft MAPS. Microsoft MAPS is the online community that helps you choose how to respond to potential threats. The community also helps stop the spread of new malicious software infections. -You can choose to send basic or additional information about detected software. Additional information helps Microsoft create new security intelligence and help it to protect your computer. This information can include things like location of detected items on your computer if harmful software was removed. The information will be automatically collected and sent. In some instances, personal information might unintentionally be sent to Microsoft. However, Microsoft will not use this information to identify you or contact you. +You can choose to send basic or additional information about detected software. Additional information helps Microsoft create new security intelligence and help it to protect your computer. This information can include things like location of detected items on your computer if harmful software was removed. The information will be automatically collected and sent. In some instances, personal information might unintentionally be sent to Microsoft. However, Microsoft won't use this information to identify you or contact you. Possible options are: + (0x0) Disabled (default) -(0x1) Basic membership -(0x2) Advanced membership +(0x1) Basic membership (0x2) Advanced membership. Basic membership will send basic information to Microsoft about software that has been detected, including where the software came from, the actions that you apply or that are applied automatically, and whether the actions were successful. Advanced membership, in addition to basic information, will send more information to Microsoft about malicious software, spyware, and potentially unwanted software, including the location of the software, file names, how the software operates, and how it has impacted your computer. -- If you enable this setting, you will join Microsoft MAPS with the membership specified. +- If you enable this setting, you'll join Microsoft MAPS with the membership specified. -- If you disable or do not configure this setting, you will not join Microsoft MAPS. +- If you disable or don't configure this setting, you won't join Microsoft MAPS. In Windows 10, Basic membership is no longer available, so setting the value to 1 or 2 enrolls the device into Advanced membership. @@ -5379,13 +5331,12 @@ In Windows 10, Basic membership is no longer available, so setting the value to | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5412,7 +5363,7 @@ In Windows 10, Basic membership is no longer available, so setting the value to | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5423,9 +5374,10 @@ In Windows 10, Basic membership is no longer available, so setting the value to -This policy setting customize which remediation action will be taken for each listed Threat ID when it is detected during a scan. Threats should be added under the Options for this setting. Each entry must be listed as a name value pair. The name defines a valid Threat ID, while the value contains the action ID for the remediation action that should be taken. +This policy setting customize which remediation action will be taken for each listed Threat ID when it's detected during a scan. Threats should be added under the Options for this setting. Each entry must be listed as a name value pair. The name defines a valid Threat ID, while the value contains the action ID for the remediation action that should be taken. Valid remediation action values are: + 2 = Quarantine 3 = Remove 6 = Ignore. @@ -5440,13 +5392,12 @@ Valid remediation action values are: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5473,7 +5424,7 @@ Valid remediation action values are: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5488,7 +5439,7 @@ This policy setting allows you to configure whether or not to display additional - If you enable this setting, the additional text specified will be displayed. -- If you disable or do not configure this setting, there will be no additional text displayed. +- If you disable or don't configure this setting, there will be no additional text displayed. @@ -5500,13 +5451,12 @@ This policy setting allows you to configure whether or not to display additional | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5532,7 +5482,7 @@ This policy setting allows you to configure whether or not to display additional | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5544,13 +5494,16 @@ This policy setting allows you to configure whether or not to display additional Use this policy setting to specify if you want Microsoft Defender Antivirus notifications to display on clients. -- If you disable or do not configure this setting, Microsoft Defender Antivirus notifications will display on clients. -- If you enable this setting, Microsoft Defender Antivirus notifications will not display on clients. +- If you disable or don't configure this setting, Microsoft Defender Antivirus notifications will display on clients. + +- If you enable this setting, Microsoft Defender Antivirus notifications won't display on clients. +> [!NOTE] +> Changes to this setting are not applied when [tamper protection][TAMPER-1] is enabled. @@ -5558,13 +5511,12 @@ Use this policy setting to specify if you want Microsoft Defender Antivirus noti | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5591,7 +5543,7 @@ Use this policy setting to specify if you want Microsoft Defender Antivirus noti | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5609,6 +5561,8 @@ If you enable this setting AM UI won't show reboot notifications. +> [!NOTE] +> Changes to this setting are not applied when [tamper protection][TAMPER-1] is enabled. @@ -5616,13 +5570,12 @@ If you enable this setting AM UI won't show reboot notifications. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5649,7 +5602,7 @@ If you enable this setting AM UI won't show reboot notifications. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5661,6 +5614,7 @@ If you enable this setting AM UI won't show reboot notifications. This policy setting allows you to configure whether or not to display AM UI to the users. + If you enable this setting AM UI won't be available to users. @@ -5673,13 +5627,12 @@ If you enable this setting AM UI won't be available to users. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5702,6 +5655,9 @@ If you enable this setting AM UI won't be available to users. + +[TAMPER-1]: /microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection +[TAMPER-2]: /microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection#what-about-exclusions diff --git a/windows/client-management/mdm/policy-csp-admx-mmc.md b/windows/client-management/mdm/policy-csp-admx-mmc.md index 1a28b481b0..82283dcdcc 100644 --- a/windows/client-management/mdm/policy-csp-admx-mmc.md +++ b/windows/client-management/mdm/policy-csp-admx-mmc.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_MMC Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_MMC -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,17 +43,17 @@ Permits or prohibits use of this snap-in. If you enable this setting, the snap-in is permitted. If you disable the setting, the snap-in is prohibited. -If this setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +If this setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. +- If "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. -To explicitly permit use of this snap-in, enable this setting. If this setting is not configured (or disabled), this snap-in is prohibited. +To explicitly permit use of this snap-in, enable this setting. If this setting isn't configured (or disabled), this snap-in is prohibited. - If "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. -To explicitly prohibit use of this snap-in, disable this setting. If this setting is not configured (or enabled), the snap-in is permitted. +To explicitly prohibit use of this snap-in, disable this setting. If this setting isn't configured (or enabled), the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -68,13 +65,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -101,7 +97,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -116,17 +112,17 @@ Permits or prohibits use of this snap-in. If you enable this setting, the snap-in is permitted. If you disable the setting, the snap-in is prohibited. -If this setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +If this setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. +- If "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. -To explicitly permit use of this snap-in, enable this setting. If this setting is not configured (or disabled), this snap-in is prohibited. +To explicitly permit use of this snap-in, enable this setting. If this setting isn't configured (or disabled), this snap-in is prohibited. - If "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. -To explicitly prohibit use of this snap-in, disable this setting. If this setting is not configured (or enabled), the snap-in is permitted. +To explicitly prohibit use of this snap-in, disable this setting. If this setting isn't configured (or enabled), the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -138,13 +134,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -171,7 +166,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -186,17 +181,17 @@ Permits or prohibits use of this snap-in. If you enable this setting, the snap-in is permitted. If you disable the setting, the snap-in is prohibited. -If this setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +If this setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. +- If "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. -To explicitly permit use of this snap-in, enable this setting. If this setting is not configured (or disabled), this snap-in is prohibited. +To explicitly permit use of this snap-in, enable this setting. If this setting isn't configured (or disabled), this snap-in is prohibited. - If "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. -To explicitly prohibit use of this snap-in, disable this setting. If this setting is not configured (or enabled), the snap-in is permitted. +To explicitly prohibit use of this snap-in, disable this setting. If this setting isn't configured (or enabled), the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -208,13 +203,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -241,7 +235,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -256,11 +250,11 @@ Prevents users from entering author mode. This setting prevents users from opening the Microsoft Management Console (MMC) in author mode, explicitly opening console files in author mode, and opening any console files that open in author mode by default. -As a result, users cannot create console files or add or remove snap-ins. Also, because they cannot open author-mode console files, they cannot use the tools that the files contain. +As a result, users can't create console files or add or remove snap-ins. Also, because they can't open author-mode console files, they can't use the tools that the files contain. -This setting permits users to open MMC user-mode console files, such as those on the Administrative Tools menu in Windows 2000 Server family or Windows Server 2003 family. However, users cannot open a blank MMC console window on the Start menu. (To open the MMC, click Start, click Run, and type mmc.) Users also cannot open a blank MMC console window from a command prompt. +This setting permits users to open MMC user-mode console files, such as those on the Administrative Tools menu in Windows 2000 Server family or Windows Server 2003 family. However, users can't open a blank MMC console window on the Start menu. (To open the MMC, click Start, click Run, and type mmc.) Users also can't open a blank MMC console window from a command prompt. -If you disable this setting or do not configure it, users can enter author mode and open author-mode console files. +If you disable this setting or don't configure it, users can enter author mode and open author-mode console files. @@ -272,13 +266,12 @@ If you disable this setting or do not configure it, users can enter author mode | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -305,7 +298,7 @@ If you disable this setting or do not configure it, users can enter author mode | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -322,14 +315,14 @@ Lets you selectively permit or prohibit the use of Microsoft Management Console To explicitly permit a snap-in, open the Restricted/Permitted snap-ins setting folder and enable the settings representing the snap-in you want to permit. If a snap-in setting in the folder is disabled or not configured, the snap-in is prohibited. -- If you disable this setting or do not configure it, all snap-ins are permitted, except those that you explicitly prohibit. Use this setting if you plan to permit use of most snap-ins. +- If you disable this setting or don't configure it, all snap-ins are permitted, except those that you explicitly prohibit. Use this setting if you plan to permit use of most snap-ins. To explicitly prohibit a snap-in, open the Restricted/Permitted snap-ins setting folder and then disable the settings representing the snap-ins you want to prohibit. If a snap-in setting in the folder is enabled or not configured, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. > [!NOTE] -> If you enable this setting, and you do not enable any settings in the Restricted/Permitted snap-ins folder, users cannot use any MMC snap-ins. +> If you enable this setting, and you don't enable any settings in the Restricted/Permitted snap-ins folder, users can't use any MMC snap-ins. @@ -341,13 +334,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-mmcsnapins.md b/windows/client-management/mdm/policy-csp-admx-mmcsnapins.md index 4bd4f1a4d1..37c2d9166e 100644 --- a/windows/client-management/mdm/policy-csp-admx-mmcsnapins.md +++ b/windows/client-management/mdm/policy-csp-admx-mmcsnapins.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_MMCSnapins Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_MMCSnapins -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,17 +43,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -68,13 +67,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -101,7 +99,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -116,17 +114,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -138,13 +138,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -171,7 +170,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -186,17 +185,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -208,13 +209,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -241,7 +241,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -256,17 +256,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -278,13 +280,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -311,7 +312,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -326,17 +327,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -348,13 +351,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -381,7 +383,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -396,17 +398,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -418,13 +422,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -451,7 +454,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -466,17 +469,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -488,13 +493,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -521,7 +525,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -536,17 +540,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -558,13 +564,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -591,7 +596,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -606,17 +611,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -628,13 +635,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -661,7 +667,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -676,17 +682,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -698,13 +706,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -731,7 +738,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -746,17 +753,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -768,13 +777,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -801,7 +809,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -816,17 +824,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -838,13 +848,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -871,7 +880,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -886,17 +895,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -908,13 +919,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -941,7 +951,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -956,17 +966,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -978,13 +990,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1011,7 +1022,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1026,17 +1037,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -1048,13 +1061,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1081,7 +1093,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1096,17 +1108,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -1118,13 +1132,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1151,7 +1164,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1166,17 +1179,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -1188,13 +1203,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1221,7 +1235,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1236,17 +1250,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -1258,13 +1274,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1291,7 +1306,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1306,17 +1321,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -1328,13 +1345,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1361,7 +1377,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1376,17 +1392,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -1398,13 +1416,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1431,7 +1448,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1446,17 +1463,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -1468,13 +1487,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1501,7 +1519,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1516,17 +1534,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -1538,13 +1558,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1571,7 +1590,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1586,17 +1605,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -1608,13 +1629,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1641,7 +1661,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1656,17 +1676,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -1678,13 +1700,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1711,7 +1732,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1726,17 +1747,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -1748,13 +1771,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1781,7 +1803,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1796,17 +1818,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -1818,13 +1842,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1851,7 +1874,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1866,17 +1889,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -1888,13 +1913,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1921,7 +1945,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1936,17 +1960,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -1958,13 +1984,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1991,7 +2016,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2006,17 +2031,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -2028,13 +2055,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2061,7 +2087,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2076,17 +2102,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -2098,13 +2126,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2131,7 +2158,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2146,17 +2173,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -2168,13 +2197,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2201,7 +2229,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2216,17 +2244,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -2238,13 +2268,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2271,7 +2300,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2286,17 +2315,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -2308,13 +2339,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2341,7 +2371,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2356,17 +2386,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -2378,13 +2410,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2411,7 +2442,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2426,17 +2457,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -2448,13 +2481,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2481,7 +2513,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2496,17 +2528,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -2518,13 +2552,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2551,7 +2584,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2564,19 +2597,19 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo Permits or prohibits use of the Group Policy tab in property sheets for the Active Directory Users and Computers and Active Directory Sites and Services snap-ins. -If you enable this setting, the Group Policy tab is displayed in the property sheet for a site, domain, or organizational unit displayed by the Active Directory Users and Computers and Active Directory Sites and Services snap-ins. If you disable the setting, the Group Policy tab is not displayed in those snap-ins. +If you enable this setting, the Group Policy tab is displayed in the property sheet for a site, domain, or organizational unit displayed by the Active Directory Users and Computers and Active Directory Sites and Services snap-ins. If you disable the setting, the Group Policy tab isn't displayed in those snap-ins. -If this setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this tab is displayed. +If this setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this tab is displayed. -- If "Restrict users to the explicitly permitted list of snap-ins" is enabled, users will not have access to the Group Policy tab. +- If "Restrict users to the explicitly permitted list of snap-ins" is enabled, users won't have access to the Group Policy tab. -To explicitly permit use of the Group Policy tab, enable this setting. If this setting is not configured (or disabled), the Group Policy tab is inaccessible. +To explicitly permit use of the Group Policy tab, enable this setting. If this setting isn't configured (or disabled), the Group Policy tab is inaccessible. - If "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users will have access to the Group Policy tab. -To explicitly prohibit use of the Group Policy tab, disable this setting. If this setting is not configured (or enabled), the Group Policy tab is accessible. +To explicitly prohibit use of the Group Policy tab, disable this setting. If this setting isn't configured (or enabled), the Group Policy tab is accessible. -When the Group Policy tab is inaccessible, it does not appear in the site, domain, or organizational unit property sheets. +When the Group Policy tab is inaccessible, it doesn't appear in the site, domain, or organizational unit property sheets. @@ -2588,13 +2621,12 @@ When the Group Policy tab is inaccessible, it does not appear in the site, domai | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2621,7 +2653,7 @@ When the Group Policy tab is inaccessible, it does not appear in the site, domai | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2636,17 +2668,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -2658,13 +2692,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2691,7 +2724,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2706,17 +2739,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -2728,13 +2763,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2761,7 +2795,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2776,17 +2810,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -2798,13 +2834,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2831,7 +2866,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2846,17 +2881,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -2868,13 +2905,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2901,7 +2937,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2916,17 +2952,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -2938,13 +2976,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2971,7 +3008,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2986,17 +3023,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -3008,13 +3047,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3041,7 +3079,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3056,17 +3094,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -3078,13 +3118,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3111,7 +3150,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3126,17 +3165,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -3148,13 +3189,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3181,7 +3221,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3196,17 +3236,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -3218,13 +3260,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3251,7 +3292,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3266,17 +3307,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -3288,13 +3331,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3321,7 +3363,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3336,17 +3378,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -3358,13 +3402,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3391,7 +3434,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3406,17 +3449,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -3428,13 +3473,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3461,7 +3505,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3476,17 +3520,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -3498,13 +3544,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3531,7 +3576,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3546,17 +3591,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -3568,13 +3615,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3601,7 +3647,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3616,17 +3662,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -3638,13 +3686,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3671,7 +3718,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3686,17 +3733,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -3708,13 +3757,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3741,7 +3789,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3756,17 +3804,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -3778,13 +3828,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3811,7 +3860,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3826,17 +3875,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -3848,13 +3899,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3881,7 +3931,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3896,17 +3946,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -3918,13 +3970,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3951,7 +4002,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3966,17 +4017,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -3988,13 +4041,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4021,7 +4073,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4036,17 +4088,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -4058,13 +4112,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4091,7 +4144,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4106,17 +4159,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -4128,13 +4183,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4161,7 +4215,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4176,17 +4230,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -4198,13 +4254,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4231,7 +4286,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4246,17 +4301,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -4268,13 +4325,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4301,7 +4357,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4316,17 +4372,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -4338,13 +4396,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4371,7 +4428,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4386,17 +4443,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -4408,13 +4467,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4441,7 +4499,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4456,17 +4514,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -4478,13 +4538,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4511,7 +4570,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4526,17 +4585,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -4548,13 +4609,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4581,7 +4641,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4596,17 +4656,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -4618,13 +4680,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4651,7 +4712,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4666,17 +4727,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -4688,13 +4751,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4721,7 +4783,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4736,17 +4798,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -4758,13 +4822,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4791,7 +4854,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4806,17 +4869,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -4828,13 +4893,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4861,7 +4925,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4876,17 +4940,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -4898,13 +4964,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4931,7 +4996,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4946,17 +5011,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -4968,13 +5035,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5001,7 +5067,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5016,17 +5082,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -5038,13 +5106,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5071,7 +5138,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5086,17 +5153,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -5108,13 +5177,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5141,7 +5209,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5156,17 +5224,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -5178,13 +5248,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5211,7 +5280,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5226,17 +5295,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -5248,13 +5319,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5281,7 +5351,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5296,17 +5366,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -5318,13 +5390,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5351,7 +5422,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5366,17 +5437,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -5388,13 +5461,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5421,7 +5493,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5436,17 +5508,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -5458,13 +5532,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5491,7 +5564,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5506,17 +5579,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -5528,13 +5603,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5561,7 +5635,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5576,17 +5650,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -5598,13 +5674,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5631,7 +5706,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5646,17 +5721,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -5668,13 +5745,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5701,7 +5777,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5716,17 +5792,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -5738,13 +5816,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5771,7 +5848,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5786,17 +5863,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -5808,13 +5887,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5841,7 +5919,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5856,17 +5934,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -5878,13 +5958,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5911,7 +5990,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5926,17 +6005,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -5948,13 +6029,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5981,7 +6061,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5996,17 +6076,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -6018,13 +6100,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6051,7 +6132,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -6066,17 +6147,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -6088,13 +6171,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6121,7 +6203,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -6136,17 +6218,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -6158,13 +6242,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6191,7 +6274,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -6206,17 +6289,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -6228,13 +6313,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6261,7 +6345,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -6276,17 +6360,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -6298,13 +6384,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6331,7 +6416,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -6346,17 +6431,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -6368,13 +6455,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6401,7 +6487,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -6416,17 +6502,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -6438,13 +6526,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6471,7 +6558,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -6486,17 +6573,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -6508,13 +6597,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6541,7 +6629,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -6556,17 +6644,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -6578,13 +6668,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6611,7 +6700,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -6626,17 +6715,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -6648,13 +6739,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6681,7 +6771,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -6696,17 +6786,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -6718,13 +6810,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6751,7 +6842,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -6766,17 +6857,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -6788,13 +6881,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6821,7 +6913,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -6836,17 +6928,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -6858,13 +6952,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6891,7 +6984,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -6906,17 +6999,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -6928,13 +7023,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6961,7 +7055,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -6976,17 +7070,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -6998,13 +7094,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7031,7 +7126,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -7046,17 +7141,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -7068,13 +7165,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7101,7 +7197,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -7116,17 +7212,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -7138,13 +7236,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7171,7 +7268,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -7186,17 +7283,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -7208,13 +7307,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7241,7 +7339,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -7256,17 +7354,19 @@ This policy setting permits or prohibits the use of this snap-in. - If you enable this policy setting, the snap-in is permitted and can be added into the Microsoft Management Console or run from the command line as a standalone console. -- If you disable this policy setting, the snap-in is prohibited and cannot be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. +- If you disable this policy setting, the snap-in is prohibited and can't be added into the Microsoft Management Console or run from the command line as a standalone console. An error message is displayed stating that policy is prohibiting the use of this snap-in. -- If this policy setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. +- If this policy setting isn't configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited. -- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. -- If this policy setting is not configured or disabled, this snap-in is prohibited. +- If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is enabled, users can't use any snap-in except those explicitly permitted. To explicitly permit use of this snap-in, enable this policy setting. + +- If this policy setting isn't configured or disabled, this snap-in is prohibited. - If the policy setting "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited. To explicitly prohibit use of this snap-in, disable this policy setting. -- If this policy setting is not configured or enabled, the snap-in is permitted. -When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear. +- If this policy setting isn't configured or enabled, the snap-in is permitted. + +When a snap-in is prohibited, it doesn't appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in doesn't appear. @@ -7278,13 +7378,12 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-mobilepcmobilitycenter.md b/windows/client-management/mdm/policy-csp-admx-mobilepcmobilitycenter.md index 3e4935741b..2ae1fe9ece 100644 --- a/windows/client-management/mdm/policy-csp-admx-mobilepcmobilitycenter.md +++ b/windows/client-management/mdm/policy-csp-admx-mobilepcmobilitycenter.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_MobilePCMobilityCenter Area in Policy CSP author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_MobilePCMobilityCenter -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,11 +41,11 @@ ms.topic: reference This policy setting turns off Windows Mobility Center. -- If you enable this policy setting, the user is unable to invoke Windows Mobility Center. The Windows Mobility Center UI is removed from all shell entry points and the .exe file does not launch it. +- If you enable this policy setting, the user is unable to invoke Windows Mobility Center. The Windows Mobility Center UI is removed from all shell entry points and the .exe file doesn't launch it. - If you disable this policy setting, the user is able to invoke Windows Mobility Center and the .exe file launches it. -- If you do not configure this policy setting, Windows Mobility Center is on by default. +- If you don't configure this policy setting, Windows Mobility Center is on by default. @@ -60,13 +57,12 @@ This policy setting turns off Windows Mobility Center. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -93,7 +89,7 @@ This policy setting turns off Windows Mobility Center. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -106,11 +102,11 @@ This policy setting turns off Windows Mobility Center. This policy setting turns off Windows Mobility Center. -- If you enable this policy setting, the user is unable to invoke Windows Mobility Center. The Windows Mobility Center UI is removed from all shell entry points and the .exe file does not launch it. +- If you enable this policy setting, the user is unable to invoke Windows Mobility Center. The Windows Mobility Center UI is removed from all shell entry points and the .exe file doesn't launch it. - If you disable this policy setting, the user is able to invoke Windows Mobility Center and the .exe file launches it. -- If you do not configure this policy setting, Windows Mobility Center is on by default. +- If you don't configure this policy setting, Windows Mobility Center is on by default. @@ -122,13 +118,12 @@ This policy setting turns off Windows Mobility Center. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-mobilepcpresentationsettings.md b/windows/client-management/mdm/policy-csp-admx-mobilepcpresentationsettings.md index ad7d9672ac..1ddbf7a393 100644 --- a/windows/client-management/mdm/policy-csp-admx-mobilepcpresentationsettings.md +++ b/windows/client-management/mdm/policy-csp-admx-mobilepcpresentationsettings.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_MobilePCPresentationSettings Area in Poli author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_MobilePCPresentationSettings -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,14 +41,14 @@ ms.topic: reference This policy setting turns off Windows presentation settings. -- If you enable this policy setting, Windows presentation settings cannot be invoked. +- If you enable this policy setting, Windows presentation settings can't be invoked. - If you disable this policy setting, Windows presentation settings can be invoked. The presentation settings icon will be displayed in the notification area. This will give users a quick and easy way to configure their system settings before a presentation to block system notifications and screen blanking, adjust speaker volume, and apply a custom background image. > [!NOTE] > Users will be able to customize their system settings for presentations in Windows Mobility Center. -- If you do not configure this policy setting, Windows presentation settings can be invoked. +- If you don't configure this policy setting, Windows presentation settings can be invoked. @@ -63,13 +60,12 @@ This policy setting turns off Windows presentation settings. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -96,7 +92,7 @@ This policy setting turns off Windows presentation settings. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -109,14 +105,14 @@ This policy setting turns off Windows presentation settings. This policy setting turns off Windows presentation settings. -- If you enable this policy setting, Windows presentation settings cannot be invoked. +- If you enable this policy setting, Windows presentation settings can't be invoked. - If you disable this policy setting, Windows presentation settings can be invoked. The presentation settings icon will be displayed in the notification area. This will give users a quick and easy way to configure their system settings before a presentation to block system notifications and screen blanking, adjust speaker volume, and apply a custom background image. > [!NOTE] > Users will be able to customize their system settings for presentations in Windows Mobility Center. -- If you do not configure this policy setting, Windows presentation settings can be invoked. +- If you don't configure this policy setting, Windows presentation settings can be invoked. @@ -128,13 +124,12 @@ This policy setting turns off Windows presentation settings. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-msapolicy.md b/windows/client-management/mdm/policy-csp-admx-msapolicy.md index 6d4c737e5b..2be7fd3549 100644 --- a/windows/client-management/mdm/policy-csp-admx-msapolicy.md +++ b/windows/client-management/mdm/policy-csp-admx-msapolicy.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_MSAPolicy Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_MSAPolicy -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -45,10 +42,14 @@ ms.topic: reference This setting controls whether users can provide Microsoft accounts for authentication for applications or services. - If this setting is enabled, all applications and services on the device are prevented from using Microsoft accounts for authentication. -This applies both to existing users of a device and new users who may be added. However, any application or service that has already authenticated a user will not be affected by enabling this setting until the authentication cache expires. -It is recommended to enable this setting before any user signs in to a device to prevent cached tokens from being present. + +This applies both to existing users of a device and new users who may be added. However, any application or service that has already authenticated a user won't be affected by enabling this setting until the authentication cache expires. + +It's recommended to enable this setting before any user signs in to a device to prevent cached tokens from being present. + - If this setting is disabled or not configured, applications and services can use Microsoft accounts for authentication. -By default, this setting is Disabled. This setting does not affect whether users can sign in to devices by using Microsoft accounts, or the ability for users to provide Microsoft accounts via the browser for authentication with web-based applications. + +By default, this setting is Disabled. This setting doesn't affect whether users can sign in to devices by using Microsoft accounts, or the ability for users to provide Microsoft accounts via the browser for authentication with web-based applications. @@ -60,13 +61,12 @@ By default, this setting is Disabled. This setting does not affect whether users | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-msched.md b/windows/client-management/mdm/policy-csp-admx-msched.md index a42f6715cd..a422431082 100644 --- a/windows/client-management/mdm/policy-csp-admx-msched.md +++ b/windows/client-management/mdm/policy-csp-admx-msched.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_msched Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_msched -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,11 +41,11 @@ ms.topic: reference This policy setting allows you to configure Automatic Maintenance activation boundary. -The maintenance activation boundary is the daily schduled time at which Automatic Maintenance starts +The maintenance activation boundary is the daily schduled time at which Automatic Maintenance starts. - If you enable this policy setting, this will override the default daily scheduled time as specified in Security and Maintenance/Automatic Maintenance Control Panel. -- If you disable or do not configure this policy setting, the daily scheduled time as specified in Security and Maintenance/Automatic Maintenance Control Panel will apply. +- If you disable or don't configure this policy setting, the daily scheduled time as specified in Security and Maintenance/Automatic Maintenance Control Panel will apply. @@ -60,13 +57,12 @@ The maintenance activation boundary is the daily schduled time at which Automati | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -92,7 +88,7 @@ The maintenance activation boundary is the daily schduled time at which Automati | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -109,7 +105,7 @@ The maintenance random delay is the amount of time up to which Automatic Mainten - If you enable this policy setting, Automatic Maintenance will delay starting from its Activation Boundary, by upto this time. -- If you do not configure this policy setting, 4 hour random delay will be applied to Automatic Maintenance. +- If you don't configure this policy setting, 4 hour random delay will be applied to Automatic Maintenance. - If you disable this policy setting, no random delay will be applied to Automatic Maintenance. @@ -123,13 +119,12 @@ The maintenance random delay is the amount of time up to which Automatic Mainten | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-msdt.md b/windows/client-management/mdm/policy-csp-admx-msdt.md index 5dee7d69dd..76b49c1861 100644 --- a/windows/client-management/mdm/policy-csp-admx-msdt.md +++ b/windows/client-management/mdm/policy-csp-admx-msdt.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_MSDT Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_MSDT -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -48,9 +45,9 @@ This policy setting configures Microsoft Support Diagnostic Tool (MSDT) interact By default, the support provider is set to Microsoft Corporation. -- If you disable this policy setting, MSDT cannot run in support mode, and no data can be collected or sent to the support provider. +- If you disable this policy setting, MSDT can't run in support mode, and no data can be collected or sent to the support provider. -- If you do not configure this policy setting, MSDT support mode is enabled by default. +- If you don't configure this policy setting, MSDT support mode is enabled by default. No reboots or service restarts are required for this policy setting to take effect. Changes take effect immediately. @@ -64,13 +61,12 @@ No reboots or service restarts are required for this policy setting to take effe | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -97,7 +93,7 @@ No reboots or service restarts are required for this policy setting to take effe | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -120,13 +116,13 @@ These tools are required to completely troubleshoot the problem. If tool downloa - If you disable this policy setting, MSDT never downloads tools, and is unable to diagnose problems on remote computers. -- If you do not configure this policy setting, MSDT prompts the user before downloading any additional tools. +- If you don't configure this policy setting, MSDT prompts the user before downloading any additional tools. No reboots or service restarts are required for this policy setting to take effect. Changes take effect immediately. This policy setting will take effect only when MSDT is enabled. -This policy setting will only take effect when the Diagnostic Policy Service (DPS) is in the running state. When the service is stopped or disabled, diagnostic scenarios are not executed. The DPS can be configured with the Services snap-in to the Microsoft Management Console. +This policy setting will only take effect when the Diagnostic Policy Service (DPS) is in the running state. When the service is stopped or disabled, diagnostic scenarios aren't executed. The DPS can be configured with the Services snap-in to the Microsoft Management Console. @@ -138,13 +134,12 @@ This policy setting will only take effect when the Diagnostic Policy Service (DP | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -171,7 +166,7 @@ This policy setting will only take effect when the Diagnostic Policy Service (DP | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -188,15 +183,15 @@ Microsoft Support Diagnostic Tool (MSDT) gathers diagnostic data for analysis by - If you enable this policy setting, administrators can use MSDT to collect and send diagnostic data to a support professional to resolve a problem. -- If you disable this policy setting, MSDT cannot gather diagnostic data. +- If you disable this policy setting, MSDT can't gather diagnostic data. -- If you do not configure this policy setting, MSDT is turned on by default. +- If you don't configure this policy setting, MSDT is turned on by default. -This policy setting takes effect only if the diagnostics-wide scenario execution policy is not configured. +This policy setting takes effect only if the diagnostics-wide scenario execution policy isn't configured. No reboots or service restarts are required for this policy setting to take effect. Changes take effect immediately. -This policy setting will only take effect when the Diagnostic Policy Service (DPS) is in the running state. When the service is stopped or disabled, diagnostic scenarios will not be executed. The DPS can be configured with the Services snap-in to the Microsoft Management Console. +This policy setting will only take effect when the Diagnostic Policy Service (DPS) is in the running state. When the service is stopped or disabled, diagnostic scenarios won't be executed. The DPS can be configured with the Services snap-in to the Microsoft Management Console. @@ -208,13 +203,12 @@ This policy setting will only take effect when the Diagnostic Policy Service (DP | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-msi.md b/windows/client-management/mdm/policy-csp-admx-msi.md index 6b3d9e67e1..c8e0918d6f 100644 --- a/windows/client-management/mdm/policy-csp-admx-msi.md +++ b/windows/client-management/mdm/policy-csp-admx-msi.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_MSI Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_MSI -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,11 +43,11 @@ This policy setting allows users to search for installation files during privile - If you enable this policy setting, the Browse button in the "Use feature from" dialog box is enabled. As a result, users can search for installation files even when the installation program is running with elevated system privileges. -Because the installation is running with elevated system privileges, users can browse through directories that their own permissions would not allow. +Because the installation is running with elevated system privileges, users can browse through directories that their own permissions wouldn't allow. -This policy setting does not affect installations that run in the user's security context. Also, see the "Remove browse dialog box for new source" policy setting. +This policy setting doesn't affect installations that run in the user's security context. Also, see the "Remove browse dialog box for new source" policy setting. -- If you disable or do not configure this policy setting, by default, only system administrators can browse during installations with elevated privileges, such as installations offered on the desktop or displayed in Add or Remove Programs. +- If you disable or don't configure this policy setting, by default, only system administrators can browse during installations with elevated privileges, such as installations offered on the desktop or displayed in Add or Remove Programs. @@ -62,13 +59,12 @@ This policy setting does not affect installations that run in the user's securit | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -95,7 +91,7 @@ This policy setting does not affect installations that run in the user's securit | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -110,9 +106,9 @@ This policy setting allows users to install programs from removable media during - If you enable this policy setting, all users are permitted to install programs from removable media, such as floppy disks and CD-ROMs, even when the installation program is running with elevated system privileges. -This policy setting does not affect installations that run in the user's security context. By default, users can install from removable media when the installation runs in their own security context. +This policy setting doesn't affect installations that run in the user's security context. By default, users can install from removable media when the installation runs in their own security context. -- If you disable or do not configure this policy setting, by default, users can install programs from removable media only when the installation runs in the user's security context. During privileged installations, such as those offered on the desktop or displayed in Add or Remove Programs, only system administrators can install from removable media. +- If you disable or don't configure this policy setting, by default, users can install programs from removable media only when the installation runs in the user's security context. During privileged installations, such as those offered on the desktop or displayed in Add or Remove Programs, only system administrators can install from removable media. Also, see the "Prevent removable media source for any install" policy setting. @@ -126,13 +122,12 @@ Also, see the "Prevent removable media source for any install" policy setting. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -159,7 +154,7 @@ Also, see the "Prevent removable media source for any install" policy setting. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -174,9 +169,9 @@ This policy setting allows users to patch elevated products. - If you enable this policy setting, all users are permitted to install patches, even when the installation program is running with elevated system privileges. Patches are updates or upgrades that replace only those program files that have changed. Because patches can easily be vehicles for malicious programs, some installations prohibit their use. -- If you disable or do not configure this policy setting, by default, only system administrators can apply patches during installations with elevated privileges, such as installations offered on the desktop or displayed in Add or Remove Programs. +- If you disable or don't configure this policy setting, by default, only system administrators can apply patches during installations with elevated privileges, such as installations offered on the desktop or displayed in Add or Remove Programs. -This policy setting does not affect installations that run in the user's security context. By default, users can install patches to programs that run in their own security context. Also, see the "Prohibit patching" policy setting. +This policy setting doesn't affect installations that run in the user's security context. By default, users can install patches to programs that run in their own security context. Also, see the "Prohibit patching" policy setting. @@ -188,13 +183,12 @@ This policy setting does not affect installations that run in the user's securit | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -221,7 +215,7 @@ This policy setting does not affect installations that run in the user's securit | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -242,7 +236,7 @@ This policy setting controls Windows Installer's interaction with the Restart Ma - The "Restart Manager Off for Legacy App Setup" option applies to packages that were created for Windows Installer versions lesser than 4.0. This option lets those packages display the legacy files in use UI while still using Restart Manager for detection. -- If you disable or do not configure this policy setting, Windows Installer will use Restart Manager to detect files in use and mitigate a system restart, when possible. +- If you disable or don't configure this policy setting, Windows Installer will use Restart Manager to detect files in use and mitigate a system restart, when possible. @@ -254,13 +248,12 @@ This policy setting controls Windows Installer's interaction with the Restart Ma | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -286,7 +279,7 @@ This policy setting controls Windows Installer's interaction with the Restart Ma | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -303,9 +296,9 @@ This policy setting prevents users from searching for installation files when th This policy setting applies even when the installation is running in the user's security context. -- If you disable or do not configure this policy setting, the Browse button is enabled when an installation is running in the user's security context. But only system administrators can browse when an installation is running with elevated system privileges, such as installations offered on the desktop or in Add or Remove Programs. +- If you disable or don't configure this policy setting, the Browse button is enabled when an installation is running in the user's security context. But only system administrators can browse when an installation is running with elevated system privileges, such as installations offered on the desktop or in Add or Remove Programs. -This policy setting affects Windows Installer only. It does not prevent users from selecting other browsers, such as File Explorer or Network Locations, to search for installation files. +This policy setting affects Windows Installer only. It doesn't prevent users from selecting other browsers, such as File Explorer or Network Locations, to search for installation files. Also, see the "Enable user to browse for source while elevated" policy setting. @@ -319,13 +312,12 @@ Also, see the "Enable user to browse for source while elevated" policy setting. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -352,7 +344,7 @@ Also, see the "Enable user to browse for source while elevated" policy setting. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -367,7 +359,7 @@ This policy setting controls the ability to turn off all patch optimizations. - If you enable this policy setting, all Patch Optimization options are turned off during the installation. -- If you disable or do not configure this policy setting, it enables faster application of patches by removing execution of unnecessary actions. The flyweight patching mode is primarily designed for patches that just update a few files or registry values. The Installer will analyze the patch for specific changes to determine if optimization is possible. If so, the patch will be applied using a minimal set of processing. +- If you disable or don't configure this policy setting, it enables faster application of patches by removing execution of unnecessary actions. The flyweight patching mode is primarily designed for patches that just update a few files or registry values. The Installer will analyze the patch for specific changes to determine if optimization is possible. If so, the patch will be applied using a minimal set of processing. @@ -379,13 +371,12 @@ This policy setting controls the ability to turn off all patch optimizations. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -411,7 +402,7 @@ This policy setting controls the ability to turn off all patch optimizations. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -430,7 +421,7 @@ This policy setting controls Windows Installer's processing of the MsiLogging pr - The "Logging via package settings off" option turns off the automatic logging behavior when specified via the MsiLogging policy. Log files can still be generated using the logging command line switch or the Logging policy. -- If you disable or do not configure this policy setting, Windows Installer will automatically generate log files for those packages that include the MsiLogging property. +- If you disable or don't configure this policy setting, Windows Installer will automatically generate log files for those packages that include the MsiLogging property. @@ -442,13 +433,12 @@ This policy setting controls Windows Installer's processing of the MsiLogging pr | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -474,7 +464,7 @@ This policy setting controls Windows Installer's processing of the MsiLogging pr | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -487,11 +477,11 @@ This policy setting controls Windows Installer's processing of the MsiLogging pr This policy setting prevents users from installing any programs from removable media. -- If you enable this policy setting, if a user tries to install a program from removable media, such as CD-ROMs, floppy disks, and DVDs, a message appears stating that the feature cannot be found. +- If you enable this policy setting, if a user tries to install a program from removable media, such as CD-ROMs, floppy disks, and DVDs, a message appears stating that the feature can't be found. This policy setting applies even when the installation is running in the user's security context. -- If you disable or do not configure this policy setting, users can install from removable media when the installation is running in their own security context, but only system administrators can use removable media when an installation is running with elevated system privileges, such as installations offered on the desktop or in Add or Remove Programs. +- If you disable or don't configure this policy setting, users can install from removable media when the installation is running in their own security context, but only system administrators can use removable media when an installation is running with elevated system privileges, such as installations offered on the desktop or in Add or Remove Programs. Also, see the "Enable user to use media source while elevated" and "Hide the 'Add a program from CD-ROM or floppy disk' option" policy settings. @@ -505,13 +495,12 @@ Also, see the "Enable user to use media source while elevated" and "Hide the 'Ad | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -538,7 +527,7 @@ Also, see the "Enable user to use media source while elevated" and "Hide the 'Ad | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -553,13 +542,13 @@ This policy setting restricts the use of Windows Installer. If you enable this policy setting, you can prevent users from installing software on their systems or permit users to install only those programs offered by a system administrator. You can use the options in the Disable Windows Installer box to establish an installation setting. -- The "Never" option indicates Windows Installer is fully enabled. Users can install and upgrade software. This is the default behavior for Windows Installer on Windows 2000 Professional, Windows XP Professional and Windows Vista when the policy is not configured. +- The "Never" option indicates Windows Installer is fully enabled. Users can install and upgrade software. This is the default behavior for Windows Installer on Windows 2000 Professional, Windows XP Professional and Windows Vista when the policy isn't configured. -- The "For non-managed applications only" option permits users to install only those programs that a system administrator assigns (offers on the desktop) or publishes (adds them to Add or Remove Programs). This is the default behavior of Windows Installer on Windows Server 2003 family when the policy is not configured. +- The "For non-managed applications only" option permits users to install only those programs that a system administrator assigns (offers on the desktop) or publishes (adds them to Add or Remove Programs). This is the default behavior of Windows Installer on Windows Server 2003 family when the policy isn't configured. - The "Always" option indicates that Windows Installer is disabled. -This policy setting affects Windows Installer only. It does not prevent users from using other methods to install and upgrade programs. +This policy setting affects Windows Installer only. It doesn't prevent users from using other methods to install and upgrade programs. @@ -571,13 +560,12 @@ This policy setting affects Windows Installer only. It does not prevent users fr | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -603,7 +591,7 @@ This policy setting affects Windows Installer only. It does not prevent users fr | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -621,7 +609,7 @@ This policy setting prevents users from using Windows Installer to install patch > [!NOTE] > This policy setting applies only to installations that run in the user's security context. -- If you disable or do not configure this policy setting, by default, users who are not system administrators cannot apply patches to installations that run with elevated system privileges, such as those offered on the desktop or in Add or Remove Programs. +- If you disable or don't configure this policy setting, by default, users who aren't system administrators can't apply patches to installations that run with elevated system privileges, such as those offered on the desktop or in Add or Remove Programs. Also, see the "Enable user to patch elevated products" policy setting. @@ -635,13 +623,12 @@ Also, see the "Enable user to patch elevated products" policy setting. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -668,7 +655,7 @@ Also, see the "Enable user to patch elevated products" policy setting. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -681,11 +668,11 @@ Also, see the "Enable user to patch elevated products" policy setting. This policy setting prohibits Windows Installer from generating and saving the files it needs to reverse an interrupted or unsuccessful installation. -If you enable this policy setting, Windows Installer is prevented from recording the original state of the system and sequence of changes it makes during installation. It also prevents Windows Installer from retaining files it intends to delete later. As a result, Windows Installer cannot restore the computer to its original state if the installation does not complete. +If you enable this policy setting, Windows Installer is prevented from recording the original state of the system and sequence of changes it makes during installation. It also prevents Windows Installer from retaining files it intends to delete later. As a result, Windows Installer can't restore the computer to its original state if the installation doesn't complete. -This policy setting is designed to reduce the amount of temporary disk space required to install programs. Also, it prevents malicious users from interrupting an installation to gather data about the internal state of the computer or to search secure system files. However, because an incomplete installation can render the system or a program inoperable, do not use this policy setting unless it is essential. +This policy setting is designed to reduce the amount of temporary disk space required to install programs. Also, it prevents malicious users from interrupting an installation to gather data about the internal state of the computer or to search secure system files. However, because an incomplete installation can render the system or a program inoperable, don't use this policy setting unless it's essential. -This policy setting appears in the Computer Configuration and User Configuration folders. If the policy setting is enabled in either folder, it is considered be enabled, even if it is explicitly disabled in the other folder. +This policy setting appears in the Computer Configuration and User Configuration folders. If the policy setting is enabled in either folder, it's considered be enabled, even if it's explicitly disabled in the other folder. @@ -697,13 +684,12 @@ This policy setting appears in the Computer Configuration and User Configuration | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -730,7 +716,7 @@ This policy setting appears in the Computer Configuration and User Configuration | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -743,11 +729,11 @@ This policy setting appears in the Computer Configuration and User Configuration This policy setting prohibits Windows Installer from generating and saving the files it needs to reverse an interrupted or unsuccessful installation. -If you enable this policy setting, Windows Installer is prevented from recording the original state of the system and sequence of changes it makes during installation. It also prevents Windows Installer from retaining files it intends to delete later. As a result, Windows Installer cannot restore the computer to its original state if the installation does not complete. +If you enable this policy setting, Windows Installer is prevented from recording the original state of the system and sequence of changes it makes during installation. It also prevents Windows Installer from retaining files it intends to delete later. As a result, Windows Installer can't restore the computer to its original state if the installation doesn't complete. -This policy setting is designed to reduce the amount of temporary disk space required to install programs. Also, it prevents malicious users from interrupting an installation to gather data about the internal state of the computer or to search secure system files. However, because an incomplete installation can render the system or a program inoperable, do not use this policy setting unless it is essential. +This policy setting is designed to reduce the amount of temporary disk space required to install programs. Also, it prevents malicious users from interrupting an installation to gather data about the internal state of the computer or to search secure system files. However, because an incomplete installation can render the system or a program inoperable, don't use this policy setting unless it's essential. -This policy setting appears in the Computer Configuration and User Configuration folders. If the policy setting is enabled in either folder, it is considered be enabled, even if it is explicitly disabled in the other folder. +This policy setting appears in the Computer Configuration and User Configuration folders. If the policy setting is enabled in either folder, it's considered be enabled, even if it's explicitly disabled in the other folder. @@ -759,13 +745,12 @@ This policy setting appears in the Computer Configuration and User Configuration | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -792,7 +777,7 @@ This policy setting appears in the Computer Configuration and User Configuration | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -807,7 +792,7 @@ This policy setting controls the ability to turn off shared components. - If you enable this policy setting, no packages on the system get the shared component functionality enabled by the msidbComponentAttributesShared attribute in the Component Table. -- If you disable or do not configure this policy setting, by default, the shared component functionality is allowed. +- If you disable or don't configure this policy setting, by default, the shared component functionality is allowed. @@ -819,13 +804,12 @@ This policy setting controls the ability to turn off shared components. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -852,7 +836,7 @@ This policy setting controls the ability to turn off shared components. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -869,7 +853,7 @@ Non-administrator updates provide a mechanism for the author of an application t - If you enable this policy setting, only administrators or users with administrative privileges can apply updates to Windows Installer based applications. -- If you disable or do not configure this policy setting, users without administrative privileges can install non-administrator updates. +- If you disable or don't configure this policy setting, users without administrative privileges can install non-administrator updates. @@ -881,13 +865,12 @@ Non-administrator updates provide a mechanism for the author of an application t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -914,7 +897,7 @@ Non-administrator updates provide a mechanism for the author of an application t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -927,11 +910,11 @@ Non-administrator updates provide a mechanism for the author of an application t This policy setting controls the ability for users or administrators to remove Windows Installer based updates. -This policy setting should be used if you need to maintain a tight control over updates. One example is a lockdown environment where you want to ensure that updates once installed cannot be removed by users or administrators. +This policy setting should be used if you need to maintain a tight control over updates. One example is a lockdown environment where you want to ensure that updates once installed can't be removed by users or administrators. -- If you enable this policy setting, updates cannot be removed from the computer by a user or an administrator. The Windows Installer can still remove an update that is no longer applicable to the product. +- If you enable this policy setting, updates can't be removed from the computer by a user or an administrator. The Windows Installer can still remove an update that's no longer applicable to the product. -- If you disable or do not configure this policy setting, a user can remove an update from the computer only if the user has been granted privileges to remove the update. This can depend on whether the user is an administrator, whether "Disable Windows Installer" and "Always install with elevated privileges" policy settings are set, and whether the update was installed in a per-user managed, per-user unmanaged, or per-machine context." +- If you disable or don't configure this policy setting, a user can remove an update from the computer only if the user has been granted privileges to remove the update. This can depend on whether the user is an administrator, whether "Disable Windows Installer" and "Always install with elevated privileges" policy settings are set, and whether the update was installed in a per-user managed, per-user unmanaged, or per-machine context". @@ -943,13 +926,12 @@ This policy setting should be used if you need to maintain a tight control over | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -976,7 +958,7 @@ This policy setting should be used if you need to maintain a tight control over | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -989,9 +971,9 @@ This policy setting should be used if you need to maintain a tight control over This policy setting prevents Windows Installer from creating a System Restore checkpoint each time an application is installed. System Restore enables users, in the event of a problem, to restore their computers to a previous state without losing personal data files. -- If you enable this policy setting, the Windows Installer does not generate System Restore checkpoints when installing applications. +- If you enable this policy setting, the Windows Installer doesn't generate System Restore checkpoints when installing applications. -- If you disable or do not configure this policy setting, by default, the Windows Installer automatically creates a System Restore checkpoint each time an application is installed, so that users can restore their computer to the state it was in before installing the application. +- If you disable or don't configure this policy setting, by default, the Windows Installer automatically creates a System Restore checkpoint each time an application is installed, so that users can restore their computer to the state it was in before installing the application. @@ -1003,13 +985,12 @@ This policy setting prevents Windows Installer from creating a System Restore ch | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1036,7 +1017,7 @@ This policy setting prevents Windows Installer from creating a System Restore ch | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1049,7 +1030,7 @@ This policy setting prevents Windows Installer from creating a System Restore ch This policy setting allows you to configure user installs. To configure this policy setting, set it to enabled and use the drop-down list to select the behavior you want. -- If you do not configure this policy setting, or if the policy setting is enabled and "Allow User Installs" is selected, the installer allows and makes use of products that are installed per user, and products that are installed per computer. If the installer finds a per-user install of an application, this hides a per-computer installation of that same product. +- If you don't configure this policy setting, or if the policy setting is enabled and "Allow User Installs" is selected, the installer allows and makes use of products that are installed per user, and products that are installed per computer. If the installer finds a per-user install of an application, this hides a per-computer installation of that same product. - If you enable this policy setting and "Hide User Installs" is selected, the installer ignores per-user applications. This causes a per-computer installed application to be visible to users, even if those users have a per-user install of the product registered in their user profile. @@ -1063,13 +1044,12 @@ This policy setting allows you to configure user installs. To configure this pol | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1095,7 +1075,7 @@ This policy setting allows you to configure user installs. To configure this pol | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1111,12 +1091,14 @@ This policy setting causes the Windows Installer to enforce strict rules for com - If you enable this policy setting, strict upgrade rules will be enforced by the Windows Installer which may cause some upgrades to fail. Upgrades can fail if they attempt to do one of the following: (1) Remove a component from a feature. + This can also occur if you change the GUID of a component. The component identified by the original GUID appears to be removed and the component as identified by the new GUID appears as a new component. (2) Add a new feature to the top or middle of an existing feature tree. + The new feature must be added as a new leaf feature to an existing feature tree. -- If you disable or do not configure this policy setting, the Windows Installer will use less restrictive rules for component upgrades. +- If you disable or don't configure this policy setting, the Windows Installer will use less restrictive rules for component upgrades. @@ -1128,13 +1110,12 @@ The new feature must be added as a new leaf feature to an existing feature tree. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1161,7 +1142,7 @@ The new feature must be added as a new leaf feature to an existing feature tree. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1182,7 +1163,7 @@ If you set the baseline cache size to 0, the Windows Installer will stop populat If you set the baseline cache to 100, the Windows Installer will use available free space for the baseline file cache. -- If you disable or do not configure this policy setting, the Windows Installer will uses a default value of 10 percent for the baseline file cache maximum size. +- If you disable or don't configure this policy setting, the Windows Installer will uses a default value of 10 percent for the baseline file cache maximum size. @@ -1194,13 +1175,12 @@ If you set the baseline cache to 100, the Windows Installer will use available f | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1226,7 +1206,7 @@ If you set the baseline cache to 100, the Windows Installer will use available f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1241,7 +1221,7 @@ This policy setting controls the ability to prevent embedded UI. - If you enable this policy setting, no packages on the system can run embedded UI. -- If you disable or do not configure this policy setting, embedded UI is allowed to run. +- If you disable or don't configure this policy setting, embedded UI is allowed to run. @@ -1253,13 +1233,12 @@ This policy setting controls the ability to prevent embedded UI. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1286,7 +1265,7 @@ This policy setting controls the ability to prevent embedded UI. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1303,7 +1282,7 @@ When you enable this policy setting, you can specify the types of events you wan To disable logging, delete all of the letters from the box. -If you disable or do not configure this policy setting, Windows Installer logs the default event types, represented by the letters "iweap." +If you disable or don't configure this policy setting, Windows Installer logs the default event types, represented by the letters "iweap". @@ -1315,13 +1294,12 @@ If you disable or do not configure this policy setting, Windows Installer logs t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1347,7 +1325,7 @@ If you disable or do not configure this policy setting, Windows Installer logs t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1360,7 +1338,7 @@ If you disable or do not configure this policy setting, Windows Installer logs t This policy setting allows Web-based programs to install software on the computer without notifying the user. -- If you disable or do not configure this policy setting, by default, when a script hosted by an Internet browser tries to install a program on the system, the system warns users and allows them to select or refuse the installation. +- If you disable or don't configure this policy setting, by default, when a script hosted by an Internet browser tries to install a program on the system, the system warns users and allows them to select or refuse the installation. - If you enable this policy setting, the warning is suppressed and allows the installation to proceed. @@ -1376,13 +1354,12 @@ This policy setting is designed for enterprises that use Web-based tools to dist | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1409,7 +1386,7 @@ This policy setting is designed for enterprises that use Web-based tools to dist | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1422,7 +1399,7 @@ This policy setting is designed for enterprises that use Web-based tools to dist This policy setting specifies the order in which Windows Installer searches for installation files. -- If you disable or do not configure this policy setting, by default, the Windows Installer searches the network first, then removable media (floppy drive, CD-ROM, or DVD), and finally, the Internet (URL). +- If you disable or don't configure this policy setting, by default, the Windows Installer searches the network first, then removable media (floppy drive, CD-ROM, or DVD), and finally, the Internet (URL). - If you enable this policy setting, you can change the search order by specifying the letters representing each file source in the order that you want Windows Installer to search: @@ -1444,13 +1421,12 @@ To exclude a file source, omit or delete the letter representing that source typ | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1476,7 +1452,7 @@ To exclude a file source, omit or delete the letter representing that source typ | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1493,13 +1469,13 @@ Transform files consist of instructions to modify or customize a program during - If you enable this policy setting, the transform file is saved in a secure location on the user's computer. -- If you do not configure this policy setting on Windows Server 2003, Windows Installer requires the transform file in order to repeat an installation in which the transform file was used, therefore, the user must be using the same computer or be connected to the original or identical media to reinstall, remove, or repair the installation. +- If you don't configure this policy setting on Windows Server 2003, Windows Installer requires the transform file in order to repeat an installation in which the transform file was used, therefore, the user must be using the same computer or be connected to the original or identical media to reinstall, remove, or repair the installation. This policy setting is designed for enterprises to prevent unauthorized or malicious editing of transform files. - If you disable this policy setting, Windows Installer stores transform files in the Application Data directory in the user's profile. -- If you do not configure this policy setting on Windows 2000 Professional, Windows XP Professional and Windows Vista, when a user reinstalls, removes, or repairs an installation, the transform file is available, even if the user is on a different computer or is not connected to the network. +- If you don't configure this policy setting on Windows 2000 Professional, Windows XP Professional and Windows Vista, when a user reinstalls, removes, or repairs an installation, the transform file is available, even if the user is on a different computer or isn't connected to the network. @@ -1511,13 +1487,12 @@ This policy setting is designed for enterprises to prevent unauthorized or malic | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-msifilerecovery.md b/windows/client-management/mdm/policy-csp-admx-msifilerecovery.md index 6875c3fba2..e7fead69d7 100644 --- a/windows/client-management/mdm/policy-csp-admx-msifilerecovery.md +++ b/windows/client-management/mdm/policy-csp-admx-msifilerecovery.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_MsiFileRecovery Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_MsiFileRecovery -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -48,18 +45,18 @@ Prompt for Resolution: Detection, troubleshooting, and recovery of corrupted MSI Silent: Detection, troubleshooting, and notification of MSI application to reinstall will occur with no UI. Windows will log an event when corruption is determined and will suggest the application that should be re-installed. This behavior is recommended for headless operation and is the default recovery behavior on Windows server. -Troubleshooting Only: Detection and verification of file corruption will be performed without UI. Recovery is not attempted. +Troubleshooting Only: Detection and verification of file corruption will be performed without UI. Recovery isn't attempted. - If you enable this policy setting, the recovery behavior for corrupted files is set to either the Prompt For Resolution (default on Windows client), Silent (default on Windows server), or Troubleshooting Only. - If you disable this policy setting, the troubleshooting and recovery behavior for corrupted files will be disabled. No troubleshooting or resolution will be attempted. -- If you do not configure this policy setting, the recovery behavior for corrupted files will be set to the default recovery behavior. +- If you don't configure this policy setting, the recovery behavior for corrupted files will be set to the default recovery behavior. No system or service restarts are required for changes to this policy setting to take immediate effect after a Group Policy refresh. > [!NOTE] -> This policy setting will take effect only when the Diagnostic Policy Service (DPS) is in the running state. When the service is stopped or disabled, system file recovery will not be attempted. The DPS can be configured with the Services snap-in to the Microsoft Management Console. +> This policy setting will take effect only when the Diagnostic Policy Service (DPS) is in the running state. When the service is stopped or disabled, system file recovery won't be attempted. The DPS can be configured with the Services snap-in to the Microsoft Management Console. @@ -71,13 +68,12 @@ No system or service restarts are required for changes to this policy setting to | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-mss-legacy.md b/windows/client-management/mdm/policy-csp-admx-mss-legacy.md index 6b4d108e89..00f68b6aeb 100644 --- a/windows/client-management/mdm/policy-csp-admx-mss-legacy.md +++ b/windows/client-management/mdm/policy-csp-admx-mss-legacy.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_MSS-legacy Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_MSS-legacy -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -54,14 +51,13 @@ Enable Automatic Logon (not recommended). | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -83,7 +79,7 @@ Enable Automatic Logon (not recommended). | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -106,14 +102,13 @@ Allow Windows to automatically restart after a system crash (recommended except | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -135,7 +130,7 @@ Allow Windows to automatically restart after a system crash (recommended except | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -158,14 +153,13 @@ Enable administrative shares on servers (recommended except for highly secure en | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -187,7 +181,7 @@ Enable administrative shares on servers (recommended except for highly secure en | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -210,14 +204,13 @@ Enable administrative shares on workstations (recommended except for highly secu | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -239,7 +232,7 @@ Enable administrative shares on workstations (recommended except for highly secu | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -261,14 +254,13 @@ Enable administrative shares on workstations (recommended except for highly secu | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -291,7 +283,7 @@ Prevent the dial-up password from being saved (recommended). | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -314,14 +306,13 @@ Allow automatic detection of dead network gateways (could lead to DoS). | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -343,7 +334,7 @@ Allow automatic detection of dead network gateways (could lead to DoS). | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -366,14 +357,13 @@ Hide Computer From the Browse List (not recommended except for highly secure env | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -395,7 +385,7 @@ Hide Computer From the Browse List (not recommended except for highly secure env | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -418,14 +408,13 @@ Define how often keep-alive packets are sent in milliseconds. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -447,7 +436,7 @@ Define how often keep-alive packets are sent in milliseconds. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -470,14 +459,13 @@ Configure IPSec exemptions for various types of network traffic. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -499,7 +487,7 @@ Configure IPSec exemptions for various types of network traffic. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -522,14 +510,13 @@ Enable the computer to stop generating 8.3 style filenames. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -551,7 +538,7 @@ Enable the computer to stop generating 8.3 style filenames. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -574,14 +561,13 @@ Enable the computer to stop generating 8.3 style filenames. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -603,7 +589,7 @@ Enable the computer to stop generating 8.3 style filenames. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -626,14 +612,13 @@ Enable Safe DLL search mode (recommended). | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -655,7 +640,7 @@ Enable Safe DLL search mode (recommended). | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -678,14 +663,13 @@ he time in seconds before the screen saver grace period expires (0 recommended). | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -707,7 +691,7 @@ he time in seconds before the screen saver grace period expires (0 recommended). | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -730,14 +714,13 @@ Syn attack protection level (protects against DoS). | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -759,7 +742,7 @@ Syn attack protection level (protects against DoS). | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -782,14 +765,13 @@ SYN-ACK retransmissions when a connection request is not acknowledged. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -811,7 +793,7 @@ SYN-ACK retransmissions when a connection request is not acknowledged. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -834,14 +816,13 @@ Define how many times unacknowledged data is retransmitted (3 recommended, 5 is | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -863,7 +844,7 @@ Define how many times unacknowledged data is retransmitted (3 recommended, 5 is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -886,14 +867,13 @@ Define how many times unacknowledged data is retransmitted (3 recommended, 5 is | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -915,7 +895,7 @@ Define how many times unacknowledged data is retransmitted (3 recommended, 5 is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -938,14 +918,13 @@ Percentage threshold for the security event log at which the system will generat | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-nca.md b/windows/client-management/mdm/policy-csp-admx-nca.md index 4f0aa3bb0a..b94826a3c0 100644 --- a/windows/client-management/mdm/policy-csp-admx-nca.md +++ b/windows/client-management/mdm/policy-csp-admx-nca.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_nca Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_nca -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -48,17 +45,17 @@ Each string can be one of the following types: - A DNS name or IPv6 address that NCA pings. The syntax is "PING:" followed by a fully qualified domain name (FQDN) that resolves to an IPv6 address, or an IPv6 address. Examples: PING:myserver.corp.contoso.com or PING:2002:836b:1::1. -**Note** +Note. We recommend that you use FQDNs instead of IPv6 addresses wherever possible. -**Important** +Important. At least one of the entries must be a PING: resource. -- A Uniform Resource Locator (URL) that NCA queries with a Hypertext Transfer Protocol (HTTP) request. The contents of the web page do not matter. The syntax is "HTTP:" followed by a URL. The host portion of the URL must resolve to an IPv6 address of a Web server or contain an IPv6 address. Examples: HTTP:https://myserver.corp.contoso.com/ or HTTP:https://2002:836b:1::1/. +- A Uniform Resource Locator (URL) that NCA queries with a Hypertext Transfer Protocol (HTTP) request. The contents of the web page don't matter. The syntax is "HTTP:" followed by a URL. The host portion of the URL must resolve to an IPv6 address of a Web server or contain an IPv6 address. Examples: HTTP:https://myserver.corp.contoso.com/ or HTTP:https://2002:836b:1::1/. -- A Universal Naming Convention (UNC) path to a file that NCA checks for existence. The contents of the file do not matter. The syntax is "FILE:" followed by a UNC path. The ComputerName portion of the UNC path must resolve to an IPv6 address or contain an IPv6 address. Examples: FILE:\\myserver\myshare\test.txt or FILE:\\2002:836b:1::1\myshare\test.txt. +- A Universal Naming Convention (UNC) path to a file that NCA checks for existence. The contents of the file don't matter. The syntax is "FILE:" followed by a UNC path. The ComputerName portion of the UNC path must resolve to an IPv6 address or contain an IPv6 address. Examples: FILE:\\myserver\myshare\test.txt or FILE:\\2002:836b:1::1\myshare\test.txt. You must configure this setting to have complete NCA functionality. @@ -72,13 +69,12 @@ You must configure this setting to have complete NCA functionality. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -104,7 +100,7 @@ You must configure this setting to have complete NCA functionality. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -127,13 +123,12 @@ Specifies commands configured by the administrator for custom logging. These com | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -159,7 +154,7 @@ Specifies commands configured by the administrator for custom logging. These com | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -188,13 +183,12 @@ You must configure this setting to have complete NCA functionality. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -220,7 +214,7 @@ You must configure this setting to have complete NCA functionality. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -233,7 +227,7 @@ You must configure this setting to have complete NCA functionality. Specifies the string that appears for DirectAccess connectivity when the user clicks the Networking notification area icon. For example, you can specify "Contoso Intranet Access" for the DirectAccess clients of the Contoso Corporation. -If this setting is not configured, the string that appears for DirectAccess connectivity is "Corporate Connection". +If this setting isn't configured, the string that appears for DirectAccess connectivity is "Corporate Connection". @@ -245,13 +239,12 @@ If this setting is not configured, the string that appears for DirectAccess conn | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -277,7 +270,7 @@ If this setting is not configured, the string that appears for DirectAccess conn | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -290,16 +283,17 @@ If this setting is not configured, the string that appears for DirectAccess conn Specifies whether the user has Connect and Disconnect options for the DirectAccess entry when the user clicks the Networking notification area icon. -If the user clicks the Disconnect option, NCA removes the DirectAccess rules from the [Name Resolution Policy Table](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn593632(v=ws.11)) (NRPT) and the DirectAccess client computer uses whatever normal name resolution is available to the client computer in its current network configuration, including sending all DNS queries to the local intranet or Internet DNS servers. **Note** that NCA does not remove the existing IPsec tunnels and users can still access intranet resources across the DirectAccess server by specifying IPv6 addresses rather than names. +If the user clicks the Disconnect option, NCA removes the DirectAccess rules from the [Name Resolution Policy Table](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn593632(v=ws.11)) (NRPT) and the DirectAccess client computer uses whatever normal name resolution is available to the client computer in its current network configuration, including sending all DNS queries to the local intranet or Internet DNS servers. Note that NCA doesn't remove the existing IPsec tunnels and users can still access intranet resources across the DirectAccess server by specifying IPv6 addresses rather than names. -The ability to disconnect allows users to specify single-label, unqualified names (such as "PRINTSVR") for local resources when connected to a different intranet and for temporary access to intranet resources when network location detection has not correctly determined that the DirectAccess client computer is connected to its own intranet. +The ability to disconnect allows users to specify single-label, unqualified names (such as "PRINTSVR") for local resources when connected to a different intranet and for temporary access to intranet resources when network location detection hasn't correctly determined that the DirectAccess client computer is connected to its own intranet. To restore the DirectAccess rules to the NRPT and resume normal DirectAccess functionality, the user clicks Connect. -**Note** +Note. + If the DirectAccess client computer is on the intranet and has correctly determined its network location, the Disconnect option has no effect because the rules for DirectAccess are already removed from the NRPT. -If this setting is not configured, users do not have Connect or Disconnect options. +If this setting isn't configured, users don't have Connect or Disconnect options. @@ -311,13 +305,12 @@ If this setting is not configured, users do not have Connect or Disconnect optio | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -344,7 +337,7 @@ If this setting is not configured, users do not have Connect or Disconnect optio | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -357,7 +350,7 @@ If this setting is not configured, users do not have Connect or Disconnect optio Specifies whether NCA service runs in Passive Mode or not. -Set this to Disabled to keep NCA probing actively all the time. If this setting is not configured, NCA probing is in active mode by default. +Set this to Disabled to keep NCA probing actively all the time. If this setting isn't configured, NCA probing is in active mode by default. @@ -369,13 +362,12 @@ Set this to Disabled to keep NCA probing actively all the time. If this setting | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -402,7 +394,7 @@ Set this to Disabled to keep NCA probing actively all the time. If this setting | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -417,7 +409,7 @@ Specifies whether an entry for DirectAccess connectivity appears when the user c Set this to Disabled to prevent user confusion when you are just using DirectAccess to remotely manage DirectAccess client computers from your intranet and not providing seamless intranet access. -If this setting is not configured, the entry for DirectAccess connectivity appears. +If this setting isn't configured, the entry for DirectAccess connectivity appears. @@ -429,13 +421,12 @@ If this setting is not configured, the entry for DirectAccess connectivity appea | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -462,7 +453,7 @@ If this setting is not configured, the entry for DirectAccess connectivity appea | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -487,13 +478,12 @@ When the user sends the log files to the Administrator, NCA uses the default e-m | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-ncsi.md b/windows/client-management/mdm/policy-csp-admx-ncsi.md index 4fbd4d3169..ccb12eb3e6 100644 --- a/windows/client-management/mdm/policy-csp-admx-ncsi.md +++ b/windows/client-management/mdm/policy-csp-admx-ncsi.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_NCSI Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_NCSI -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -56,13 +53,12 @@ This policy setting enables you to specify the expected address of the host name | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -88,7 +84,7 @@ This policy setting enables you to specify the expected address of the host name | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -113,13 +109,12 @@ This policy setting enables you to specify the host name of a computer known to | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -145,7 +140,7 @@ This policy setting enables you to specify the host name of a computer known to | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -170,13 +165,12 @@ This policy setting enables you to specify the list of IPv6 corporate site prefi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -202,7 +196,7 @@ This policy setting enables you to specify the list of IPv6 corporate site prefi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -227,13 +221,12 @@ This policy setting enables you to specify the URL of the corporate website, aga | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -259,7 +252,7 @@ This policy setting enables you to specify the URL of the corporate website, aga | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -270,7 +263,7 @@ This policy setting enables you to specify the URL of the corporate website, aga -This policy setting enables you to specify the HTTPS URL of the corporate website that clients use to determine the current domain location (i.e. whether the computer is inside or outside the corporate network). Reachability of the URL destination indicates that the client location is inside corporate network; otherwise it is outside the network. +This policy setting enables you to specify the HTTPS URL of the corporate website that clients use to determine the current domain location (i.e. whether the computer is inside or outside the corporate network). Reachability of the URL destination indicates that the client location is inside corporate network; otherwise it's outside the network. @@ -284,13 +277,12 @@ This policy setting enables you to specify the HTTPS URL of the corporate websit | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -316,7 +308,7 @@ This policy setting enables you to specify the HTTPS URL of the corporate websit | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -327,7 +319,7 @@ This policy setting enables you to specify the HTTPS URL of the corporate websit -This policy setting enables you to specify DNS binding behavior. NCSI by default will restrict DNS lookups to the interface it is currently probing on. If you enable this setting, NCSI will allow the DNS lookups to happen on any interface. +This policy setting enables you to specify DNS binding behavior. NCSI by default will restrict DNS lookups to the interface it's currently probing on. If you enable this setting, NCSI will allow the DNS lookups to happen on any interface. @@ -339,13 +331,12 @@ This policy setting enables you to specify DNS binding behavior. NCSI by default | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -371,7 +362,7 @@ This policy setting enables you to specify DNS binding behavior. NCSI by default | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -394,13 +385,12 @@ This Policy setting enables you to specify passive polling behavior. NCSI polls | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-netlogon.md b/windows/client-management/mdm/policy-csp-admx-netlogon.md index 2b76aaec77..13d24d1bfc 100644 --- a/windows/client-management/mdm/policy-csp-admx-netlogon.md +++ b/windows/client-management/mdm/policy-csp-admx-netlogon.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_Netlogon Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_Netlogon -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -42,19 +39,21 @@ ms.topic: reference -This policy setting configures how a domain controller (DC) behaves when responding to a client whose IP address does not map to any configured site. +This policy setting configures how a domain controller (DC) behaves when responding to a client whose IP address doesn't map to any configured site. Domain controllers use the client IP address during a DC locator ping request to compute which Active Directory site the client belongs to. If no site mapping can be computed, the DC may do an address lookup on the client network name to discover other IP addresses which may then be used to compute a matching site for the client. The allowable values for this setting result in the following behaviors: 0 - DCs will never perform address lookups. + 1 - DCs will perform an exhaustive address lookup to discover additional client IP addresses. + 2 - DCs will perform a fast, DNS-only address lookup to discover additional client IP addresses. To specify this behavior in the DC Locator DNS SRV records, click Enabled, and then enter a value. The range of values is from 0 to 2. -If you do not configure this policy setting, it is not applied to any DCs, and DCs use their local configuration. +If you don't configure this policy setting, it isn't applied to any DCs, and DCs use their local configuration. @@ -66,13 +65,12 @@ If you do not configure this policy setting, it is not applied to any DCs, and D | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -98,7 +96,7 @@ If you do not configure this policy setting, it is not applied to any DCs, and D | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -109,7 +107,7 @@ If you do not configure this policy setting, it is not applied to any DCs, and D -This policy setting detremines the type of IP address that is returned for a domain controller. The DC Locator APIs return the IP address of the DC with the other parts of information. Before the support of IPv6, the returned DC IP address was IPv4. But with the support of IPv6, the DC Locator APIs can return IPv6 DC address. The returned IPv6 DC address may not be correctly handled by some of the existing applications. So this policy is provided to support such scenarios. +This policy setting detremines the type of IP address that's returned for a domain controller. The DC Locator APIs return the IP address of the DC with the other parts of information. Before the support of IPv6, the returned DC IP address was IPv4. But with the support of IPv6, the DC Locator APIs can return IPv6 DC address. The returned IPv6 DC address may not be correctly handled by some of the existing applications. So this policy is provided to support such scenarios. By default, DC Locator APIs can return IPv4/IPv6 DC address. But if some applications are broken due to the returned IPv6 DC address, this policy can be used to disable the default behavior and enforce to return only IPv4 DC address. Once applications are fixed, this policy can be used to enable the default behavior. @@ -117,7 +115,7 @@ By default, DC Locator APIs can return IPv4/IPv6 DC address. But if some applica - If you disable this policy setting, DC Locator APIs will ONLY return IPv4 DC address if any. So if the domain controller supports both IPv4 and IPv6 addresses, DC Locator APIs will return IPv4 address. But if the domain controller supports only IPv6 address, then DC Locator APIs will fail. -- If you do not configure this policy setting, DC Locator APIs can return IPv4/IPv6 DC address. This is the default behavior of the DC Locator. +- If you don't configure this policy setting, DC Locator APIs can return IPv4/IPv6 DC address. This is the default behavior of the DC Locator. @@ -129,13 +127,12 @@ By default, DC Locator APIs can return IPv4/IPv6 DC address. But if some applica | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -162,7 +159,7 @@ By default, DC Locator APIs can return IPv4/IPv6 DC address. But if some applica | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -173,13 +170,13 @@ By default, DC Locator APIs can return IPv4/IPv6 DC address. But if some applica -This policy setting specifies whether the computers to which this setting is applied attemps DNS name resolution of single-lablel domain names, by appending different registered DNS suffixes, and uses NetBIOS name resolution only if DNS name resolution fails. This policy, including the specified default behavior, is not used if the AllowSingleLabelDnsDomain policy setting is enabled. +This policy setting specifies whether the computers to which this setting is applied attemps DNS name resolution of single-lablel domain names, by appending different registered DNS suffixes, and uses NetBIOS name resolution only if DNS name resolution fails. This policy, including the specified default behavior, isn't used if the AllowSingleLabelDnsDomain policy setting is enabled. By default, when no setting is specified for this policy, the behavior is the same as explicitly enabling this policy, unless the AllowSingleLabelDnsDomain policy setting is enabled. -- If you enable this policy setting, when the AllowSingleLabelDnsDomain policy is not enabled, computers to which this policy is applied, will locate a domain controller hosting an Active Directory domain specified with a single-label name, by appending different registered DNS suffixes to perform DNS name resolution. The single-label name is not used without appending DNS suffixes unless the computer is joined to a domain that has a single-label DNS name in the Active Directory forest. NetBIOS name resolution is performed on the single-label name only, in the event that DNS resolution fails. +- If you enable this policy setting, when the AllowSingleLabelDnsDomain policy isn't enabled, computers to which this policy is applied, will locate a domain controller hosting an Active Directory domain specified with a single-label name, by appending different registered DNS suffixes to perform DNS name resolution. The single-label name isn't used without appending DNS suffixes unless the computer is joined to a domain that has a single-label DNS name in the Active Directory forest. NetBIOS name resolution is performed on the single-label name only, in the event that DNS resolution fails. -- If you disable this policy setting, when the AllowSingleLabelDnsDomain policy is not enabled, computers to which this policy is applied, will only use NetBIOS name resolution to attempt to locate a domain controller hosting an Active Directory domain specified with a single-label name. The computers will not attempt DNS name resolution in this case, unless the computer is searching for a domain with a single label DNS name to which this computer is joined, in the Active Directory forest. +- If you disable this policy setting, when the AllowSingleLabelDnsDomain policy isn't enabled, computers to which this policy is applied, will only use NetBIOS name resolution to attempt to locate a domain controller hosting an Active Directory domain specified with a single-label name. The computers won't attempt DNS name resolution in this case, unless the computer is searching for a domain with a single label DNS name to which this computer is joined, in the Active Directory forest. @@ -191,13 +188,12 @@ By default, when no setting is specified for this policy, the behavior is the sa | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -224,7 +220,7 @@ By default, when no setting is specified for this policy, the behavior is the sa | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -235,15 +231,15 @@ By default, when no setting is specified for this policy, the behavior is the sa -This policy setting controls whether the Net Logon service will allow the use of older cryptography algorithms that are used in Windows NT 4.0. The cryptography algorithms used in Windows NT 4.0 and earlier are not as secure as newer algorithms used in Windows 2000 or later, including this version of Windows. +This policy setting controls whether the Net Logon service will allow the use of older cryptography algorithms that are used in Windows NT 4.0. The cryptography algorithms used in Windows NT 4.0 and earlier aren't as secure as newer algorithms used in Windows 2000 or later, including this version of Windows. -By default, Net Logon will not allow the older cryptography algorithms to be used and will not include them in the negotiation of cryptography algorithms. Therefore, computers running Windows NT 4.0 will not be able to establish a connection to this domain controller. +By default, Net Logon won't allow the older cryptography algorithms to be used and won't include them in the negotiation of cryptography algorithms. Therefore, computers running Windows NT 4.0 won't be able to establish a connection to this domain controller. - If you enable this policy setting, Net Logon will allow the negotiation and use of older cryptography algorithms compatible with Windows NT 4.0. However, using the older algorithms represents a potential security risk. -- If you disable this policy setting, Net Logon will not allow the negotiation and use of older cryptography algorithms. +- If you disable this policy setting, Net Logon won't allow the negotiation and use of older cryptography algorithms. -- If you do not configure this policy setting, Net Logon will not allow the negotiation and use of older cryptography algorithms. +- If you don't configure this policy setting, Net Logon won't allow the negotiation and use of older cryptography algorithms. @@ -255,13 +251,12 @@ By default, Net Logon will not allow the older cryptography algorithms to be use | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -288,7 +283,7 @@ By default, Net Logon will not allow the older cryptography algorithms to be use | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -305,9 +300,9 @@ By default, the behavior specified in the AllowDnsSuffixSearch is used. If the A - If you enable this policy setting, computers to which this policy is applied will attempt to locate a domain controller hosting an Active Directory domain specified with a single-label name using DNS name resolution. -- If you disable this policy setting, computers to which this setting is applied will use the AllowDnsSuffixSearch policy, if it is not disabled or perform NetBIOS name resolution otherwise, to attempt to locate a domain controller that hosts an Active Directory domain specified with a single-label name. the computers will not the DNS name resolution in this case, unless the computer is searching for a domain with a single label DNS name that exists in the Active Directory forest to which this computer is joined. +- If you disable this policy setting, computers to which this setting is applied will use the AllowDnsSuffixSearch policy, if it isn't disabled or perform NetBIOS name resolution otherwise, to attempt to locate a domain controller that hosts an Active Directory domain specified with a single-label name. the computers won't the DNS name resolution in this case, unless the computer is searching for a domain with a single label DNS name that exists in the Active Directory forest to which this computer is joined. -- If you do not configure this policy setting, it is not applied to any computers, and computers use their local configuration. +- If you don't configure this policy setting, it isn't applied to any computers, and computers use their local configuration. @@ -319,13 +314,12 @@ By default, the behavior specified in the AllowDnsSuffixSearch is used. If the A | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -352,7 +346,7 @@ By default, the behavior specified in the AllowDnsSuffixSearch is used. If the A | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -363,13 +357,13 @@ By default, the behavior specified in the AllowDnsSuffixSearch is used. If the A -This policy setting determines whether domain controllers (DC) will dynamically register DC Locator site-specific SRV records for the closest sites where no DC for the same domain exists (or no Global Catalog for the same forest exists). These DNS records are dynamically registered by the Net Logon service, and they are used to locate the DC. +This policy setting determines whether domain controllers (DC) will dynamically register DC Locator site-specific SRV records for the closest sites where no DC for the same domain exists (or no Global Catalog for the same forest exists). These DNS records are dynamically registered by the Net Logon service, and they're used to locate the DC. - If you enable this policy setting, the DCs to which this setting is applied dynamically register DC Locator site-specific DNS SRV records for the closest sites where no DC for the same domain, or no Global Catalog for the same forest, exists. -- If you disable this policy setting, the DCs will not register site-specific DC Locator DNS SRV records for any other sites but their own. +- If you disable this policy setting, the DCs won't register site-specific DC Locator DNS SRV records for any other sites but their own. -- If you do not configure this policy setting, it is not applied to any DCs, and DCs use their local configuration. +- If you don't configure this policy setting, it isn't applied to any DCs, and DCs use their local configuration. @@ -381,13 +375,12 @@ This policy setting determines whether domain controllers (DC) will dynamically | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -414,7 +407,7 @@ This policy setting determines whether domain controllers (DC) will dynamically | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -427,11 +420,11 @@ This policy setting determines whether domain controllers (DC) will dynamically This policy setting allows you to control the domain controller (DC) location algorithm. By default, the DC location algorithm prefers DNS-based discovery if the DNS domain name is known. If DNS-based discovery fails and the NetBIOS domain name is known, the algorithm then uses NetBIOS-based discovery as a fallback mechanism. -NetBIOS-based discovery uses a WINS server and mailslot messages but does not use site information. Hence it does not ensure that clients will discover the closest DC. It also allows a hub-site client to discover a branch-site DC even if the branch-site DC only registers site-specific DNS records (as recommended). For these reasons, NetBIOS-based discovery is not recommended. +NetBIOS-based discovery uses a WINS server and mailslot messages but doesn't use site information. Hence it doesn't ensure that clients will discover the closest DC. It also allows a hub-site client to discover a branch-site DC even if the branch-site DC only registers site-specific DNS records (as recommended). For these reasons, NetBIOS-based discovery isn't recommended. -**Note** that this policy setting does not affect NetBIOS-based discovery for DC location if only the NetBIOS domain name is known. +Note that this policy setting doesn't affect NetBIOS-based discovery for DC location if only the NetBIOS domain name is known. -- If you enable or do not configure this policy setting, the DC location algorithm does not use NetBIOS-based discovery as a fallback mechanism when DNS-based discovery fails. This is the default behavior. +- If you enable or don't configure this policy setting, the DC location algorithm doesn't use NetBIOS-based discovery as a fallback mechanism when DNS-based discovery fails. This is the default behavior. - If you disable this policy setting, the DC location algorithm can use NetBIOS-based discovery as a fallback mechanism when DNS based discovery fails. @@ -445,13 +438,12 @@ NetBIOS-based discovery uses a WINS server and mailslot messages but does not us | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -478,7 +470,7 @@ NetBIOS-based discovery uses a WINS server and mailslot messages but does not us | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -491,13 +483,13 @@ NetBIOS-based discovery uses a WINS server and mailslot messages but does not us This policy setting defines whether a domain controller (DC) should attempt to verify the password provided by a client with the PDC emulator if the DC failed to validate the password. -Contacting the PDC emulator is useful in case the client's password was recently changed and did not propagate to the DC yet. Users may want to disable this feature if the PDC emulator is located over a slow WAN connection. +Contacting the PDC emulator is useful in case the client's password was recently changed and didn't propagate to the DC yet. Users may want to disable this feature if the PDC emulator is located over a slow WAN connection. - If you enable this policy setting, the DCs to which this policy setting applies will attempt to verify a password with the PDC emulator if the DC fails to validate the password. -- If you disable this policy setting, the DCs will not attempt to verify any passwords with the PDC emulator. +- If you disable this policy setting, the DCs won't attempt to verify any passwords with the PDC emulator. -- If you do not configure this policy setting, it is not applied to any DCs. +- If you don't configure this policy setting, it isn't applied to any DCs. @@ -509,13 +501,12 @@ Contacting the PDC emulator is useful in case the client's password was recently | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -542,7 +533,7 @@ Contacting the PDC emulator is useful in case the client's password was recently | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -562,7 +553,7 @@ This setting is relevant only to those callers of DsGetDcName that have specifie If the value of this setting is less than the value specified in the NegativeCachePeriod subkey, the value in the NegativeCachePeriod subkey is used. > [!WARNING] -> If the value for this setting is too large, a client will not attempt to find any DCs that were initially unavailable. If the value set in this setting is very small and the DC is not available, the traffic caused by periodic DC discoveries may be excessive. +> If the value for this setting is too large, a client won't attempt to find any DCs that were initially unavailable. If the value set in this setting is very small and the DC isn't available, the traffic caused by periodic DC discoveries may be excessive. @@ -574,13 +565,12 @@ If the value of this setting is less than the value specified in the NegativeCac | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -606,7 +596,7 @@ If the value of this setting is less than the value specified in the NegativeCac | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -628,7 +618,7 @@ If the value for this setting is smaller than the value specified for the Initia > [!WARNING] > If the value for this setting is too large, a client may take very long periods to try to find a DC. -If the value for this setting is too small and the DC is not available, the frequent retries may produce excessive network traffic. +If the value for this setting is too small and the DC isn't available, the frequent retries may produce excessive network traffic. @@ -640,13 +630,12 @@ If the value for this setting is too small and the DC is not available, the freq | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -672,7 +661,7 @@ If the value for this setting is too small and the DC is not available, the freq | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -700,13 +689,12 @@ The default value for this setting is to not quit retrying (0). The maximum valu | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -732,7 +720,7 @@ The default value for this setting is to not quit retrying (0). The maximum valu | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -743,7 +731,7 @@ The default value for this setting is to not quit retrying (0). The maximum valu -This policy setting determines when a successful DC cache entry is refreshed. This policy setting is applied to caller programs that periodically attempt to locate DCs, and it is applied before returning the DC information to the caller program. The default value for this setting is infinite (4294967200). The maximum value for this setting is (4294967200), while the maximum that is not treated as infinity is 49 days (49*24*60*60=4233600). Any larger value is treated as infinity. The minimum value for this setting is to always refresh (0). +This policy setting determines when a successful DC cache entry is refreshed. This policy setting is applied to caller programs that periodically attempt to locate DCs, and it's applied before returning the DC information to the caller program. The default value for this setting is infinite (4294967200). The maximum value for this setting is (4294967200), while the maximum that isn't treated as infinity is 49 days (49*24*60*60=4233600). Any larger value is treated as infinity. The minimum value for this setting is to always refresh (0). @@ -755,13 +743,12 @@ This policy setting determines when a successful DC cache entry is refreshed. Th | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -787,7 +774,7 @@ This policy setting determines when a successful DC cache entry is refreshed. Th | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -806,7 +793,7 @@ The Net Logon service outputs debug information to the log file netlogon.log in If you specify zero for this policy setting, the default behavior occurs as described above. -- If you disable this policy setting or do not configure it, the default behavior occurs as described above. +- If you disable this policy setting or don't configure it, the default behavior occurs as described above. @@ -818,13 +805,12 @@ If you specify zero for this policy setting, the default behavior occurs as desc | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -850,7 +836,7 @@ If you specify zero for this policy setting, the default behavior occurs as desc | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -903,13 +889,12 @@ This policy setting determines which DC Locator DNS records aren't registered by | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -935,7 +920,7 @@ This policy setting determines which DC Locator DNS records aren't registered by | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -948,14 +933,14 @@ This policy setting determines which DC Locator DNS records aren't registered by This policy setting specifies the Refresh Interval of the DC Locator DNS resource records for DCs to which this setting is applied. These DNS records are dynamically registered by the Net Logon service and are used by the DC Locator algorithm to locate the DC. This setting may be applied only to DCs using dynamic update. -DCs configured to perform dynamic registration of the DC Locator DNS resource records periodically reregister their records with DNS servers, even if their records' data has not changed. If authoritative DNS servers are configured to perform scavenging of the stale records, this reregistration is required to instruct the DNS servers configured to automatically remove (scavenge) stale records that these records are current and should be preserved in the database. +DCs configured to perform dynamic registration of the DC Locator DNS resource records periodically reregister their records with DNS servers, even if their records' data hasn't changed. If authoritative DNS servers are configured to perform scavenging of the stale records, this reregistration is required to instruct the DNS servers configured to automatically remove (scavenge) stale records that these records are current and should be preserved in the database. > [!WARNING] > If the DNS resource records are registered in zones with scavenging enabled, the value of this setting should never be longer than the Refresh Interval configured for these zones. Setting the Refresh Interval of the DC Locator DNS records to longer than the Refresh Interval of the DNS zones may result in the undesired deletion of DNS resource records. To specify the Refresh Interval of the DC records, click Enabled, and then enter a value larger than 1800. This value specifies the Refresh Interval of the DC records in seconds (for example, the value 3600 is 60 minutes). -If you do not configure this policy setting, it is not applied to any DCs, and DCs use their local configuration. +If you don't configure this policy setting, it isn't applied to any DCs, and DCs use their local configuration. @@ -967,13 +952,12 @@ If you do not configure this policy setting, it is not applied to any DCs, and D | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -999,7 +983,7 @@ If you do not configure this policy setting, it is not applied to any DCs, and D | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1020,7 +1004,7 @@ If not configured, domain controllers will default to using their local configur The default local configuration is enabled. -A reboot is not required for changes to this setting to take effect. +A reboot isn't required for changes to this setting to take effect. More information is available at @@ -1034,13 +1018,12 @@ More information is available at | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1067,7 +1050,7 @@ More information is available at | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1078,11 +1061,11 @@ More information is available at -This policy setting specifies the value for the Time-To-Live (TTL) field in SRV resource records that are registered by the Net Logon service. These DNS records are dynamically registered, and they are used to locate the domain controller (DC). +This policy setting specifies the value for the Time-To-Live (TTL) field in SRV resource records that are registered by the Net Logon service. These DNS records are dynamically registered, and they're used to locate the domain controller (DC). To specify the TTL for DC Locator DNS records, click Enabled, and then enter a value in seconds (for example, the value "900" is 15 minutes). -If you do not configure this policy setting, it is not applied to any DCs, and DCs use their local configuration. +If you don't configure this policy setting, it isn't applied to any DCs, and DCs use their local configuration. @@ -1094,13 +1077,12 @@ If you do not configure this policy setting, it is not applied to any DCs, and D | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1126,7 +1108,7 @@ If you do not configure this policy setting, it is not applied to any DCs, and D | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1141,7 +1123,7 @@ This policy setting specifies the additional time for the computer to wait for t To specify the expected dial-up delay at logon, click Enabled, and then enter the desired value in seconds (for example, the value "60" is 1 minute). -If you do not configure this policy setting, it is not applied to any computers, and computers use their local configuration. +If you don't configure this policy setting, it isn't applied to any computers, and computers use their local configuration. @@ -1153,13 +1135,12 @@ If you do not configure this policy setting, it is not applied to any computers, | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1185,7 +1166,7 @@ If you do not configure this policy setting, it is not applied to any computers, | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1204,7 +1185,7 @@ The Domain Controller Locator (DC Locator) service is used by clients to find do - If you disable this policy setting, Force Rediscovery will be used by default for the machine at every 12 hour interval. -- If you do not configure this policy setting, Force Rediscovery will be used by default for the machine at every 12 hour interval, unless the local machine setting in the registry is a different value. +- If you don't configure this policy setting, Force Rediscovery will be used by default for the machine at every 12 hour interval, unless the local machine setting in the registry is a different value. @@ -1216,13 +1197,12 @@ The Domain Controller Locator (DC Locator) service is used by clients to find do | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1248,7 +1228,7 @@ The Domain Controller Locator (DC Locator) service is used by clients to find do | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1261,11 +1241,11 @@ The Domain Controller Locator (DC Locator) service is used by clients to find do This policy setting specifies the sites for which the global catalogs (GC) should register site-specific GC locator DNS SRV resource records. These records are registered in addition to the site-specific SRV records registered for the site where the GC resides, and records registered by a GC configured to register GC Locator DNS SRV records for those sites without a GC that are closest to it. -The GC Locator DNS records and the site-specific SRV records are dynamically registered by the Net Logon service, and they are used to locate the GC. An Active Directory site is one or more well-connected TCP/IP subnets that allow administrators to configure Active Directory access and replication. A GC is a domain controller that contains a partial replica of every domain in Active Directory. +The GC Locator DNS records and the site-specific SRV records are dynamically registered by the Net Logon service, and they're used to locate the GC. An Active Directory site is one or more well-connected TCP/IP subnets that allow administrators to configure Active Directory access and replication. A GC is a domain controller that contains a partial replica of every domain in Active Directory. To specify the sites covered by the GC Locator DNS SRV records, click Enabled, and enter the sites' names in a space-delimited format. -If you do not configure this policy setting, it is not applied to any GCs, and GCs use their local configuration. +If you don't configure this policy setting, it isn't applied to any GCs, and GCs use their local configuration. @@ -1277,13 +1257,12 @@ If you do not configure this policy setting, it is not applied to any GCs, and G | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1309,7 +1288,7 @@ If you do not configure this policy setting, it is not applied to any GCs, and G | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1323,13 +1302,13 @@ If you do not configure this policy setting, it is not applied to any GCs, and G This policy setting allows you to control the processing of incoming mailslot messages by a local domain controller (DC). > [!NOTE] -> To locate a remote DC based on its NetBIOS (single-label) domain name, DC Locator first gets the list of DCs from a WINS server that is configured in its local client settings. DC Locator then sends a mailslot message to each remote DC to get more information. DC location succeeds only if a remote DC responds to the mailslot message. +> To locate a remote DC based on its NetBIOS (single-label) domain name, DC Locator first gets the list of DCs from a WINS server that's configured in its local client settings. DC Locator then sends a mailslot message to each remote DC to get more information. DC location succeeds only if a remote DC responds to the mailslot message. -This policy setting is recommended to reduce the attack surface on a DC, and can be used in an environment without WINS, in an IPv6-only environment, and whenever DC location based on a NetBIOS domain name is not required. This policy setting does not affect DC location based on DNS names. +This policy setting is recommended to reduce the attack surface on a DC, and can be used in an environment without WINS, in an IPv6-only environment, and whenever DC location based on a NetBIOS domain name isn't required. This policy setting doesn't affect DC location based on DNS names. -- If you enable this policy setting, this DC does not process incoming mailslot messages that are used for NetBIOS domain name based DC location. +- If you enable this policy setting, this DC doesn't process incoming mailslot messages that are used for NetBIOS domain name based DC location. -- If you disable or do not configure this policy setting, this DC processes incoming mailslot messages. This is the default behavior of DC Locator. +- If you disable or don't configure this policy setting, this DC processes incoming mailslot messages. This is the default behavior of DC Locator. @@ -1341,13 +1320,12 @@ This policy setting is recommended to reduce the attack surface on a DC, and can | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1374,7 +1352,7 @@ This policy setting is recommended to reduce the attack surface on a DC, and can | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1391,7 +1369,7 @@ The Priority field in the SRV record sets the preference for target hosts (speci To specify the Priority in the DC Locator DNS SRV resource records, click Enabled, and then enter a value. The range of values is from 0 to 65535. -If you do not configure this policy setting, it is not applied to any DCs, and DCs use their local configuration. +If you don't configure this policy setting, it isn't applied to any DCs, and DCs use their local configuration. @@ -1403,13 +1381,12 @@ If you do not configure this policy setting, it is not applied to any DCs, and D | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1435,7 +1412,7 @@ If you do not configure this policy setting, it is not applied to any DCs, and D | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1446,13 +1423,13 @@ If you do not configure this policy setting, it is not applied to any DCs, and D -This policy setting specifies the Weight field in the SRV resource records registered by the domain controllers (DC) to which this setting is applied. These DNS records are dynamically registered by the Net Logon service, and they are used to locate the DC. +This policy setting specifies the Weight field in the SRV resource records registered by the domain controllers (DC) to which this setting is applied. These DNS records are dynamically registered by the Net Logon service, and they're used to locate the DC. The Weight field in the SRV record can be used in addition to the Priority value to provide a load-balancing mechanism where multiple servers are specified in the SRV records Target field and are all set to the same priority. The probability with which the DNS client randomly selects the target host to be contacted is proportional to the Weight field value in the SRV record. To specify the Weight in the DC Locator DNS SRV records, click Enabled, and then enter a value. The range of values is from 0 to 65535. -If you do not configure this policy setting, it is not applied to any DCs, and DCs use their local configuration. +If you don't configure this policy setting, it isn't applied to any DCs, and DCs use their local configuration. @@ -1464,13 +1441,12 @@ If you do not configure this policy setting, it is not applied to any DCs, and D | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1496,7 +1472,7 @@ If you do not configure this policy setting, it is not applied to any DCs, and D | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1513,7 +1489,7 @@ By default, the maximum size of the log file is 20MB. - If you enable this policy setting, the maximum size of the log file is set to the specified size. Once this size is reached the log file is saved to netlogon.bak and netlogon.log is truncated. A reasonable value based on available storage should be specified. -- If you disable or do not configure this policy setting, the default behavior occurs as indicated above. +- If you disable or don't configure this policy setting, the default behavior occurs as indicated above. @@ -1525,13 +1501,12 @@ By default, the maximum size of the log file is 20MB. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1557,7 +1532,7 @@ By default, the maximum size of the log file is 20MB. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1570,11 +1545,11 @@ By default, the maximum size of the log file is 20MB. This policy setting specifies the sites for which the domain controllers (DC) that host the application directory partition should register the site-specific, application directory partition-specific DC Locator DNS SRV resource records. These records are registered in addition to the site-specific SRV records registered for the site where the DC resides, and records registered by a DC configured to register DC Locator DNS SRV records for those sites without a DC that are closest to it. -The application directory partition DC Locator DNS records and the site-specific SRV records are dynamically registered by the Net Logon service, and they are used to locate the application directory partition-specific DC. An Active Directory site is one or more well-connected TCP/IP subnets that allow administrators to configure Active Directory access and replication. +The application directory partition DC Locator DNS records and the site-specific SRV records are dynamically registered by the Net Logon service, and they're used to locate the application directory partition-specific DC. An Active Directory site is one or more well-connected TCP/IP subnets that allow administrators to configure Active Directory access and replication. To specify the sites covered by the DC Locator application directory partition-specific DNS SRV records, click Enabled, and then enter the site names in a space-delimited format. -If you do not configure this policy setting, it is not applied to any DCs, and DCs use their local configuration. +If you don't configure this policy setting, it isn't applied to any DCs, and DCs use their local configuration. @@ -1586,13 +1561,12 @@ If you do not configure this policy setting, it is not applied to any DCs, and D | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1618,7 +1592,7 @@ If you do not configure this policy setting, it is not applied to any DCs, and D | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1629,12 +1603,12 @@ If you do not configure this policy setting, it is not applied to any DCs, and D -This policy setting specifies the amount of time (in seconds) the DC locator remembers that a domain controller (DC) could not be found in a domain. When a subsequent attempt to locate the DC occurs within the time set in this setting, DC Discovery immediately fails, without attempting to find the DC. +This policy setting specifies the amount of time (in seconds) the DC locator remembers that a domain controller (DC) couldn't be found in a domain. When a subsequent attempt to locate the DC occurs within the time set in this setting, DC Discovery immediately fails, without attempting to find the DC. The default value for this setting is 45 seconds. The maximum value for this setting is 7 days (7*24*60*60). The minimum value for this setting is 0. > [!WARNING] -> If the value for this setting is too large, a client will not attempt to find any DCs that were initially unavailable. If the value for this setting is too small, clients will attempt to find DCs even when none are available. +> If the value for this setting is too large, a client won't attempt to find any DCs that were initially unavailable. If the value for this setting is too small, clients will attempt to find DCs even when none are available. @@ -1646,13 +1620,12 @@ The default value for this setting is 45 seconds. The maximum value for this set | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1678,7 +1651,7 @@ The default value for this setting is 45 seconds. The maximum value for this set | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1693,7 +1666,7 @@ This policy setting controls whether or not the Netlogon share created by the Ne - If you enable this policy setting, the Netlogon share will honor file sharing semantics that grant requests for exclusive read access to files on the share even when the caller has only read permission. -- If you disable or do not configure this policy setting, the Netlogon share will grant shared read access to files on the share when exclusive access is requested and the caller has only read permission. +- If you disable or don't configure this policy setting, the Netlogon share will grant shared read access to files on the share when exclusive access is requested and the caller has only read permission. By default, the Netlogon share will grant shared read access to files on the share when exclusive access is requested. @@ -1712,13 +1685,12 @@ By default, the Netlogon share will grant shared read access to files on the sha | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1745,7 +1717,7 @@ By default, the Netlogon share will grant shared read access to files on the sha | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1756,9 +1728,9 @@ By default, the Netlogon share will grant shared read access to files on the sha -This policy setting determines when a successful DC cache entry is refreshed. This policy setting is applied to caller programs that do not periodically attempt to locate DCs, and it is applied before the returning the DC information to the caller program. This policy setting is relevant to only those callers of DsGetDcName that have not specified the DS_BACKGROUND_ONLY flag. +This policy setting determines when a successful DC cache entry is refreshed. This policy setting is applied to caller programs that don't periodically attempt to locate DCs, and it's applied before the returning the DC information to the caller program. This policy setting is relevant to only those callers of DsGetDcName that haven't specified the DS_BACKGROUND_ONLY flag. -The default value for this setting is 30 minutes (1800). The maximum value for this setting is (4294967200), while the maximum that is not treated as infinity is 49 days (49*24*60*60=4233600). Any larger value will be treated as infinity. The minimum value for this setting is to always refresh (0). +The default value for this setting is 30 minutes (1800). The maximum value for this setting is (4294967200), while the maximum that isn't treated as infinity is 49 days (49*24*60*60=4233600). Any larger value will be treated as infinity. The minimum value for this setting is to always refresh (0). @@ -1770,13 +1742,12 @@ The default value for this setting is 30 minutes (1800). The maximum value for t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1802,7 +1773,7 @@ The default value for this setting is 30 minutes (1800). The maximum value for t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1820,11 +1791,12 @@ When an environment has a large number of DCs running both old and new operating The allowable values for this setting result in the following behaviors: 1 - Computers will ping DCs at the normal frequency. + 2 - Computers will ping DCs at the higher frequency. To specify this behavior, click Enabled and then enter a value. The range of values is from 1 to 2. -If you do not configure this policy setting, it is not applied to any computers, and computers use their local configuration. +If you don't configure this policy setting, it isn't applied to any computers, and computers use their local configuration. @@ -1836,13 +1808,12 @@ If you do not configure this policy setting, it is not applied to any computers, | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1868,7 +1839,7 @@ If you do not configure this policy setting, it is not applied to any computers, | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1883,7 +1854,7 @@ This policy setting determines the interval at which Netlogon performs the follo - Checks if a password on a secure channel needs to be modified, and modifies it if necessary. -- On the domain controllers (DC), discovers a DC that has not been discovered. +- On the domain controllers (DC), discovers a DC that hasn't been discovered. - On the PDC, attempts to add the ``[1B] NetBIOS name if it hasn't already been successfully added. @@ -1901,13 +1872,12 @@ To enable the setting, click Enabled, and then specify the interval in seconds. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1933,7 +1903,7 @@ To enable the setting, click Enabled, and then specify the interval in seconds. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1946,11 +1916,11 @@ To enable the setting, click Enabled, and then specify the interval in seconds. This policy setting specifies the sites for which the domain controllers (DC) register the site-specific DC Locator DNS SRV resource records. These records are registered in addition to the site-specific SRV records registered for the site where the DC resides, and records registered by a DC configured to register DC Locator DNS SRV records for those sites without a DC that are closest to it. -The DC Locator DNS records are dynamically registered by the Net Logon service, and they are used to locate the DC. An Active Directory site is one or more well-connected TCP/IP subnets that allow administrators to configure Active Directory access and replication. +The DC Locator DNS records are dynamically registered by the Net Logon service, and they're used to locate the DC. An Active Directory site is one or more well-connected TCP/IP subnets that allow administrators to configure Active Directory access and replication. To specify the sites covered by the DC Locator DNS SRV records, click Enabled, and then enter the sites names in a space-delimited format. -If you do not configure this policy setting, it is not applied to any DCs, and DCs use their local configuration. +If you don't configure this policy setting, it isn't applied to any DCs, and DCs use their local configuration. @@ -1962,13 +1932,12 @@ If you do not configure this policy setting, it is not applied to any DCs, and D | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1994,7 +1963,7 @@ If you do not configure this policy setting, it is not applied to any DCs, and D | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2009,9 +1978,9 @@ This policy setting specifies the Active Directory site to which computers belon An Active Directory site is one or more well-connected TCP/IP subnets that allow administrators to configure Active Directory access and replication. -To specify the site name for this setting, click Enabled, and then enter the site name. When the site to which a computer belongs is not specified, the computer automatically discovers its site from Active Directory. +To specify the site name for this setting, click Enabled, and then enter the site name. When the site to which a computer belongs isn't specified, the computer automatically discovers its site from Active Directory. -If you do not configure this policy setting, it is not applied to any computers, and computers use their local configuration. +If you don't configure this policy setting, it isn't applied to any computers, and computers use their local configuration. @@ -2023,13 +1992,12 @@ If you do not configure this policy setting, it is not applied to any computers, | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2055,7 +2023,7 @@ If you do not configure this policy setting, it is not applied to any computers, | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2089,13 +2057,12 @@ If you enable this policy setting, domain administrators should ensure that the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2122,7 +2089,7 @@ If you enable this policy setting, domain administrators should ensure that the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2133,15 +2100,15 @@ If you enable this policy setting, domain administrators should ensure that the -This policy setting enables DC Locator to attempt to locate a DC in the nearest site based on the site link cost if a DC in same the site is not found. In scenarios with multiple sites, failing over to the try next closest site during DC Location streamlines network traffic more effectively. +This policy setting enables DC Locator to attempt to locate a DC in the nearest site based on the site link cost if a DC in same the site isn't found. In scenarios with multiple sites, failing over to the try next closest site during DC Location streamlines network traffic more effectively. The DC Locator service is used by clients to find domain controllers for their Active Directory domain. The default behavior for DC Locator is to find a DC in the same site. If none are found in the same site, a DC in another site, which might be several site-hops away, could be returned by DC Locator. Site proximity between two sites is determined by the total site-link cost between them. A site is closer if it has a lower site link cost than another site with a higher site link cost. - If you enable this policy setting, Try Next Closest Site DC Location will be turned on for the computer. -- If you disable this policy setting, Try Next Closest Site DC Location will not be used by default for the computer. However, if a DC Locator call is made using the DS_TRY_NEXTCLOSEST_SITE flag explicitly, the Try Next Closest Site behavior is honored. +- If you disable this policy setting, Try Next Closest Site DC Location won't be used by default for the computer. However, if a DC Locator call is made using the DS_TRY_NEXTCLOSEST_SITE flag explicitly, the Try Next Closest Site behavior is honored. -- If you do not configure this policy setting, Try Next Closest Site DC Location will not be used by default for the machine. If the DS_TRY_NEXTCLOSEST_SITE flag is used explicitly, the Next Closest Site behavior will be used. +- If you don't configure this policy setting, Try Next Closest Site DC Location won't be used by default for the machine. If the DS_TRY_NEXTCLOSEST_SITE flag is used explicitly, the Next Closest Site behavior will be used. @@ -2153,13 +2120,12 @@ The DC Locator service is used by clients to find domain controllers for their A | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2186,7 +2152,7 @@ The DC Locator service is used by clients to find domain controllers for their A | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2201,9 +2167,9 @@ This policy setting determines if dynamic registration of the domain controller - If you enable this policy setting, DCs to which this setting is applied dynamically register DC Locator DNS resource records through dynamic DNS update-enabled network connections. -- If you disable this policy setting, DCs will not register DC Locator DNS resource records. +- If you disable this policy setting, DCs won't register DC Locator DNS resource records. -- If you do not configure this policy setting, it is not applied to any DCs, and DCs use their local configuration. +- If you don't configure this policy setting, it isn't applied to any DCs, and DCs use their local configuration. @@ -2215,13 +2181,12 @@ This policy setting determines if dynamic registration of the domain controller | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-networkconnections.md b/windows/client-management/mdm/policy-csp-admx-networkconnections.md index 8844aca989..8eb1fd9ec5 100644 --- a/windows/client-management/mdm/policy-csp-admx-networkconnections.md +++ b/windows/client-management/mdm/policy-csp-admx-networkconnections.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_NetworkConnections Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_NetworkConnections -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,12 +41,12 @@ ms.topic: reference Determines whether administrators can add and remove network components for a LAN or remote access connection. This setting has no effect on nonadministrators. -- If you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Install and Uninstall buttons for components of connections are disabled, and administrators are not permitted to access network components in the Windows Components Wizard. +- If you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Install and Uninstall buttons for components of connections are disabled, and administrators aren't permitted to access network components in the Windows Components Wizard. > [!IMPORTANT] -> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers. +> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting won't apply to administrators on post-Windows 2000 computers. -- If you disable this setting or do not configure it, the Install and Uninstall buttons for components of connections in the Network Connections folder are enabled. Also, administrators can gain access to network components in the Windows Components Wizard. +- If you disable this setting or don't configure it, the Install and Uninstall buttons for components of connections in the Network Connections folder are enabled. Also, administrators can gain access to network components in the Windows Components Wizard. The Install button opens the dialog boxes used to add network components. Clicking the Uninstall button removes the selected component in the components list (above the button). @@ -71,13 +68,12 @@ The Install and Uninstall buttons appear in the properties dialog box for connec | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -104,7 +100,7 @@ The Install and Uninstall buttons appear in the properties dialog box for connec | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -122,9 +118,9 @@ The Advanced Settings item lets users view and change bindings and view and chan - If you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Advanced Settings item is disabled for administrators. > [!IMPORTANT] -> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers. +> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting won't apply to administrators on post-Windows 2000 computers. -- If you disable this setting or do not configure it, the Advanced Settings item is enabled for administrators. +- If you disable this setting or don't configure it, the Advanced Settings item is enabled for administrators. > [!NOTE] > Nonadministrators are already prohibited from accessing the Advanced Settings dialog box, regardless of this setting. @@ -139,13 +135,12 @@ The Advanced Settings item lets users view and change bindings and view and chan | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -172,7 +167,7 @@ The Advanced Settings item lets users view and change bindings and view and chan | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -185,24 +180,24 @@ The Advanced Settings item lets users view and change bindings and view and chan Determines whether users can configure advanced TCP/IP settings. -- If you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Advanced button on the Internet Protocol (TCP/IP) Properties dialog box is disabled for all users (including administrators). As a result, users cannot open the Advanced TCP/IP Settings Properties page and modify IP settings, such as DNS and WINS server information. +- If you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Advanced button on the Internet Protocol (TCP/IP) Properties dialog box is disabled for all users (including administrators). As a result, users can't open the Advanced TCP/IP Settings Properties page and modify IP settings, such as DNS and WINS server information. > [!IMPORTANT] -> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers. +> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting won't apply to administrators on post-Windows 2000 computers. - If you disable this setting, the Advanced button is enabled, and all users can open the Advanced TCP/IP Setting dialog box. > [!NOTE] -> This setting is superseded by settings that prohibit access to properties of connections or connection components. When these policies are set to deny access to the connection properties dialog box or Properties button for connection components, users cannot gain access to the Advanced button for TCP/IP configuration. +> This setting is superseded by settings that prohibit access to properties of connections or connection components. When these policies are set to deny access to the connection properties dialog box or Properties button for connection components, users can't gain access to the Advanced button for TCP/IP configuration. > [!NOTE] -> Nonadministrators (excluding Network Configuration Operators) do not have permission to access TCP/IP advanced configuration for a LAN connection, regardless of this setting. +> Nonadministrators (excluding Network Configuration Operators) don't have permission to access TCP/IP advanced configuration for a LAN connection, regardless of this setting. > [!TIP] > To open the Advanced TCP/IP Setting dialog box, in the Network Connections folder, right-click a connection icon, and click Properties. For remote access connections, click the Networking tab. In the "Components checked are used by this connection" box, click Internet Protocol (TCP/IP), click the Properties button, and then click the Advanced button. > [!NOTE] -> Changing this setting from Enabled to Not Configured does not enable the Advanced button until the user logs off. +> Changing this setting from Enabled to Not Configured doesn't enable the Advanced button until the user logs off. @@ -214,13 +209,12 @@ Determines whether users can configure advanced TCP/IP settings. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -247,7 +241,7 @@ Determines whether users can configure advanced TCP/IP settings. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -260,12 +254,12 @@ Determines whether users can configure advanced TCP/IP settings. Determines whether administrators can enable and disable the components used by LAN connections. -- If you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the check boxes for enabling and disabling components are disabled. As a result, administrators cannot enable or disable the components that a connection uses. +- If you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the check boxes for enabling and disabling components are disabled. As a result, administrators can't enable or disable the components that a connection uses. > [!IMPORTANT] -> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers. +> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting won't apply to administrators on post-Windows 2000 computers. -- If you disable this setting or do not configure it, the Properties dialog box for a connection includes a check box beside the name of each component that the connection uses. Selecting the check box enables the component, and clearing the check box disables the component. +- If you disable this setting or don't configure it, the Properties dialog box for a connection includes a check box beside the name of each component that the connection uses. Selecting the check box enables the component, and clearing the check box disables the component. > [!NOTE] > When the "Prohibit access to properties of a LAN connection" setting is enabled, users are blocked from accessing the check boxes for enabling and disabling the components of a LAN connection. @@ -283,13 +277,12 @@ Determines whether administrators can enable and disable the components used by | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -316,7 +309,7 @@ Determines whether administrators can enable and disable the components used by | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -333,21 +326,21 @@ To create an all-user remote access connection, on the Connection Availability p - If you enable this setting, all users can delete shared remote access connections. In addition, if your file system is NTFS, users need to have Write access to Documents and Settings\All Users\Application Data\Microsoft\Network\Connections\Pbk to delete a shared remote access connection. -- If you disable this setting (and enable the "Enable Network Connections settings for Administrators" setting), users (including administrators) cannot delete all-user remote access connections. (By default, users can still delete their private connections, but you can change the default by using the "Prohibit deletion of remote access connections" setting.) +- If you disable this setting (and enable the "Enable Network Connections settings for Administrators" setting), users (including administrators) can't delete all-user remote access connections. (By default, users can still delete their private connections, but you can change the default by using the "Prohibit deletion of remote access connections" setting). > [!IMPORTANT] -> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers. +> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting won't apply to administrators on post-Windows 2000 computers. -- If you do not configure this setting, only Administrators and Network Configuration Operators can delete all user remote access connections. +- If you don't configure this setting, only Administrators and Network Configuration Operators can delete all user remote access connections. > [!IMPORTANT] -> When enabled, the "Prohibit deletion of remote access connections" setting takes precedence over this setting. Users (including administrators) cannot delete any remote access connections, and this setting is ignored. +> When enabled, the "Prohibit deletion of remote access connections" setting takes precedence over this setting. Users (including administrators) can't delete any remote access connections, and this setting is ignored. > [!NOTE] -> LAN connections are created and deleted automatically by the system when a LAN adapter is installed or removed. You cannot use the Network Connections folder to create or delete a LAN connection. +> LAN connections are created and deleted automatically by the system when a LAN adapter is installed or removed. You can't use the Network Connections folder to create or delete a LAN connection. > [!NOTE] -> This setting does not prevent users from using other programs, such as Internet Explorer, to bypass this setting. +> This setting doesn't prevent users from using other programs, such as Internet Explorer, to bypass this setting. @@ -359,13 +352,12 @@ To create an all-user remote access connection, on the Connection Availability p | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -392,7 +384,7 @@ To create an all-user remote access connection, on the Connection Availability p | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -405,21 +397,21 @@ To create an all-user remote access connection, on the Connection Availability p Determines whether users can delete remote access connections. -- If you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), users (including administrators) cannot delete any remote access connections. This setting also disables the Delete option on the context menu for a remote access connection and on the File menu in the Network Connections folder. +- If you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), users (including administrators) can't delete any remote access connections. This setting also disables the Delete option on the context menu for a remote access connection and on the File menu in the Network Connections folder. > [!IMPORTANT] -> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers. +> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting won't apply to administrators on post-Windows 2000 computers. -- If you disable this setting or do not configure it, all users can delete their private remote access connections. Private connections are those that are available only to one user. (By default, only Administrators and Network Configuration Operators can delete connections available to all users, but you can change the default by using the "Ability to delete all user remote access connections" setting.) +- If you disable this setting or don't configure it, all users can delete their private remote access connections. Private connections are those that are available only to one user. (By default, only Administrators and Network Configuration Operators can delete connections available to all users, but you can change the default by using the "Ability to delete all user remote access connections" setting). > [!IMPORTANT] -> When enabled, this setting takes precedence over the "Ability to delete all user remote access connections" setting. Users cannot delete any remote access connections, and the "Ability to delete all user remote access connections" setting is ignored. +> When enabled, this setting takes precedence over the "Ability to delete all user remote access connections" setting. Users can't delete any remote access connections, and the "Ability to delete all user remote access connections" setting is ignored. > [!NOTE] -> LAN connections are created and deleted automatically when a LAN adapter is installed or removed. You cannot use the Network Connections folder to create or delete a LAN connection. +> LAN connections are created and deleted automatically when a LAN adapter is installed or removed. You can't use the Network Connections folder to create or delete a LAN connection. > [!NOTE] -> This setting does not prevent users from using other programs, such as Internet Explorer, to bypass this setting. +> This setting doesn't prevent users from using other programs, such as Internet Explorer, to bypass this setting. @@ -431,13 +423,12 @@ Determines whether users can delete remote access connections. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -464,7 +455,7 @@ Determines whether users can delete remote access connections. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -482,9 +473,9 @@ The Remote Access Preferences item lets users create and change connections befo - If you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Remote Access Preferences item is disabled for all users (including administrators). > [!IMPORTANT] -> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers. +> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting won't apply to administrators on post-Windows 2000 computers. -- If you disable this setting or do not configure it, the Remote Access Preferences item is enabled for all users. +- If you disable this setting or don't configure it, the Remote Access Preferences item is enabled for all users. @@ -496,13 +487,12 @@ The Remote Access Preferences item lets users create and change connections befo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -529,7 +519,7 @@ The Remote Access Preferences item lets users create and change connections befo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -544,7 +534,7 @@ Specifies whether or not the "local access only" network icon will be shown. When enabled, the icon for Internet access will be shown in the system tray even when a user is connected to a network with local access only. -If you disable this setting or do not configure it, the "local access only" icon will be used when a user is connected to a network with local access only. +If you disable this setting or don't configure it, the "local access only" icon will be used when a user is connected to a network with local access only. @@ -556,13 +546,12 @@ If you disable this setting or do not configure it, the "local access only" icon | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -589,7 +578,7 @@ If you disable this setting or do not configure it, the "local access only" icon | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -604,11 +593,11 @@ Determines whether settings that existed in Windows 2000 Server family will appl The set of Network Connections group settings that existed in Windows 2000 Professional also exists in Windows XP Professional. In Windows 2000 Professional, all of these settings had the ability to prohibit the use of certain features from Administrators. -By default, Network Connections group settings in Windows XP Professional do not have the ability to prohibit the use of features from Administrators. +By default, Network Connections group settings in Windows XP Professional don't have the ability to prohibit the use of features from Administrators. - If you enable this setting, the Windows XP settings that existed in Windows 2000 Professional will have the ability to prohibit Administrators from using certain features. These settings are "Ability to rename LAN connections or remote access connections available to all users", "Prohibit access to properties of components of a LAN connection", "Prohibit access to properties of components of a remote access connection", "Ability to access TCP/IP advanced configuration", "Prohibit access to the Advanced Settings Item on the Advanced Menu", "Prohibit adding and removing components for a LAN or remote access connection", "Prohibit access to properties of a LAN connection", "Prohibit Enabling/Disabling components of a LAN connection", "Ability to change properties of an all user remote access connection", "Prohibit changing properties of a private remote access connection", "Prohibit deletion of remote access connections", "Ability to delete all user remote access connections", "Prohibit connecting and disconnecting a remote access connection", "Ability to Enable/Disable a LAN connection", "Prohibit access to the New Connection Wizard", "Prohibit renaming private remote access connections", "Prohibit access to the Remote Access Preferences item on the Advanced menu", "Prohibit viewing of status for an active connection". When this setting is enabled, settings that exist in both Windows 2000 Professional and Windows XP Professional behave the same for administrators. -- If you disable this setting or do not configure it, Windows XP settings that existed in Windows 2000 will not apply to administrators. +- If you disable this setting or don't configure it, Windows XP settings that existed in Windows 2000 won't apply to administrators. > [!NOTE] > This setting is intended to be used in a situation in which the Group Policy object that these settings are being applied to contains both Windows 2000 Professional and Windows XP Professional computers, and identical Network Connections policy behavior is required between all Windows 2000 Professional and Windows XP Professional computers. @@ -623,13 +612,12 @@ By default, Network Connections group settings in Windows XP Professional do not | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -656,7 +644,7 @@ By default, Network Connections group settings in Windows XP Professional do not | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -673,9 +661,9 @@ When a remote client computer connects to an internal network using DirectAccess - If you enable this policy setting, all traffic between a remote client computer running DirectAccess and the Internet is routed through the internal network. -- If you disable this policy setting, traffic between remote client computers running DirectAccess and the Internet is not routed through the internal network. +- If you disable this policy setting, traffic between remote client computers running DirectAccess and the Internet isn't routed through the internal network. -- If you do not configure this policy setting, traffic between remote client computers running DirectAccess and the Internet is not routed through the internal network. +- If you don't configure this policy setting, traffic between remote client computers running DirectAccess and the Internet isn't routed through the internal network. @@ -687,13 +675,12 @@ When a remote client computer connects to an internal network using DirectAccess | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -719,7 +706,7 @@ When a remote client computer connects to an internal network using DirectAccess | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -730,11 +717,11 @@ When a remote client computer connects to an internal network using DirectAccess -This policy setting allows you to manage whether notifications are shown to the user when a DHCP-configured connection is unable to retrieve an IP address from a DHCP server. This is often signified by the assignment of an automatic private IP address"(i.e. an IP address in the range 169.254.*.*). This indicates that a DHCP server could not be reached or the DHCP server was reached but unable to respond to the request with a valid IP address. By default, a notification is displayed providing the user with information on how the problem can be resolved. +This policy setting allows you to manage whether notifications are shown to the user when a DHCP-configured connection is unable to retrieve an IP address from a DHCP server. This is often signified by the assignment of an automatic private IP address"(i.e. an IP address in the range 169.254.*.*). This indicates that a DHCP server couldn't be reached or the DHCP server was reached but unable to respond to the request with a valid IP address. By default, a notification is displayed providing the user with information on how the problem can be resolved. -- If you enable this policy setting, this condition will not be reported as an error to the user. +- If you enable this policy setting, this condition won't be reported as an error to the user. -- If you disable or do not configure this policy setting, a DHCP-configured connection that has not been assigned an IP address will be reported via a notification, providing the user with information as to how the problem can be resolved. +- If you disable or don't configure this policy setting, a DHCP-configured connection that hasn't been assigned an IP address will be reported via a notification, providing the user with information as to how the problem can be resolved. @@ -746,13 +733,12 @@ This policy setting allows you to manage whether notifications are shown to the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -779,7 +765,7 @@ This policy setting allows you to manage whether notifications are shown to the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -797,14 +783,14 @@ This setting determines whether the Properties button for components of a LAN co - If you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Properties button is disabled for Administrators. Network Configuration Operators are prohibited from accessing connection components, regardless of the "Enable Network Connections settings for Administrators" setting. > [!IMPORTANT] -> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting does not apply to administrators on post-Windows 2000 computers. +> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting doesn't apply to administrators on post-Windows 2000 computers. -- If you disable this setting or do not configure it, the Properties button is enabled for administrators and Network Configuration Operators. +- If you disable this setting or don't configure it, the Properties button is enabled for administrators and Network Configuration Operators. The Local Area Connection Properties dialog box includes a list of the network components that the connection uses. To view or change the properties of a component, click the name of the component, and then click the Properties button beneath the component list. > [!NOTE] -> Not all network components have configurable properties. For components that are not configurable, the Properties button is always disabled. +> Not all network components have configurable properties. For components that aren't configurable, the Properties button is always disabled. > [!NOTE] > When the "Prohibit access to properties of a LAN connection" setting is enabled, users are blocked from accessing the Properties button for LAN connection components. @@ -825,13 +811,12 @@ The Local Area Connection Properties dialog box includes a list of the network c | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -858,7 +843,7 @@ The Local Area Connection Properties dialog box includes a list of the network c | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -876,9 +861,9 @@ Determines whether users can enable/disable LAN connections. - If you disable this setting (and enable the "Enable Network Connections settings for Administrators" setting), double-clicking the icon has no effect, and the Enable and Disable menu items are disabled for all users (including administrators). > [!IMPORTANT] -> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers. +> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting won't apply to administrators on post-Windows 2000 computers. -- If you do not configure this setting, only Administrators and Network Configuration Operators can enable/disable LAN connections. +- If you don't configure this setting, only Administrators and Network Configuration Operators can enable/disable LAN connections. > [!NOTE] > Administrators can still enable/disable LAN connections from Device Manager when this setting is disabled. @@ -893,13 +878,12 @@ Determines whether users can enable/disable LAN connections. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -926,7 +910,7 @@ Determines whether users can enable/disable LAN connections. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -941,12 +925,12 @@ Determines whether users can change the properties of a LAN connection. This setting determines whether the Properties menu item is enabled, and thus, whether the Local Area Connection Properties dialog box is available to users. -- If you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Properties menu items are disabled for all users, and users cannot open the Local Area Connection Properties dialog box. +- If you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Properties menu items are disabled for all users, and users can't open the Local Area Connection Properties dialog box. > [!IMPORTANT] -> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers. +> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting won't apply to administrators on post-Windows 2000 computers. -- If you disable this setting or do not configure it, a Properties menu item appears when users right-click the icon representing a LAN connection. Also, when users select the connection, Properties is enabled on the File menu. +- If you disable this setting or don't configure it, a Properties menu item appears when users right-click the icon representing a LAN connection. Also, when users select the connection, Properties is enabled on the File menu. > [!NOTE] > This setting takes precedence over settings that manipulate the availability of features inside the Local Area Connection Properties dialog box. @@ -966,13 +950,12 @@ This setting determines whether the Properties menu item is enabled, and thus, w | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -999,7 +982,7 @@ This setting determines whether the Properties menu item is enabled, and thus, w | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1012,18 +995,18 @@ This setting determines whether the Properties menu item is enabled, and thus, w Determines whether users can use the New Connection Wizard, which creates new network connections. -- If you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Make New Connection icon does not appear in the Start Menu on in the Network Connections folder. As a result, users (including administrators) cannot start the New Connection Wizard. +- If you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Make New Connection icon doesn't appear in the Start Menu on in the Network Connections folder. As a result, users (including administrators) can't start the New Connection Wizard. > [!IMPORTANT] -> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers. +> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting won't apply to administrators on post-Windows 2000 computers. -- If you disable this setting or do not configure it, the Make New Connection icon appears in the Start menu and in the Network Connections folder for all users. Clicking the Make New Connection icon starts the New Connection Wizard. +- If you disable this setting or don't configure it, the Make New Connection icon appears in the Start menu and in the Network Connections folder for all users. Clicking the Make New Connection icon starts the New Connection Wizard. > [!NOTE] -> Changing this setting from Enabled to Not Configured does not restore the Make New Connection icon until the user logs off or on. When other changes to this setting are applied, the icon does not appear or disappear in the Network Connections folder until the folder is refreshed. +> Changing this setting from Enabled to Not Configured doesn't restore the Make New Connection icon until the user logs off or on. When other changes to this setting are applied, the icon doesn't appear or disappear in the Network Connections folder until the folder is refreshed. > [!NOTE] -> This setting does not prevent users from using other programs, such as Internet Explorer, to bypass this setting. +> This setting doesn't prevent users from using other programs, such as Internet Explorer, to bypass this setting. @@ -1035,13 +1018,12 @@ Determines whether users can use the New Connection Wizard, which creates new ne | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1068,7 +1050,7 @@ Determines whether users can use the New Connection Wizard, which creates new ne | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1084,16 +1066,16 @@ Prohibits use of Internet Connection Firewall on your DNS domain network. Determines whether users can enable the Internet Connection Firewall feature on a connection, and if the Internet Connection Firewall service can run on a computer. > [!IMPORTANT] -> This setting is location aware. It only applies when a computer is connected to the same DNS domain network it was connected to when the setting was refreshed on that computer. If a computer is connected to a DNS domain network other than the one it was connected to when the setting was refreshed, this setting does not apply. +> This setting is location aware. It only applies when a computer is connected to the same DNS domain network it was connected to when the setting was refreshed on that computer. If a computer is connected to a DNS domain network other than the one it was connected to when the setting was refreshed, this setting doesn't apply. The Internet Connection Firewall is a stateful packet filter for home and small office users to protect them from Internet network security threats. -- If you enable this setting, Internet Connection Firewall cannot be enabled or configured by users (including administrators), and the Internet Connection Firewall service cannot run on the computer. The option to enable the Internet Connection Firewall through the Advanced tab is removed. In addition, the Internet Connection Firewall is not enabled for remote access connections created through the Make New Connection Wizard. The Network Setup Wizard is disabled. +- If you enable this setting, Internet Connection Firewall can't be enabled or configured by users (including administrators), and the Internet Connection Firewall service can't run on the computer. The option to enable the Internet Connection Firewall through the Advanced tab is removed. In addition, the Internet Connection Firewall isn't enabled for remote access connections created through the Make New Connection Wizard. The Network Setup Wizard is disabled. > [!NOTE] > If you enable the "Windows Firewall: Protect all network connections" policy setting, the "Prohibit use of Internet Connection Firewall on your DNS domain network" policy setting has no effect on computers that are running Windows Firewall, which replaces Internet Connection Firewall when you install Windows XP Service Pack 2. -- If you disable this setting or do not configure it, the Internet Connection Firewall is disabled when a LAN Connection or VPN connection is created, but users can use the Advanced tab in the connection properties to enable it. The Internet Connection Firewall is enabled by default on the connection for which Internet Connection Sharing is enabled. In addition, remote access connections created through the Make New Connection Wizard have the Internet Connection Firewall enabled. +- If you disable this setting or don't configure it, the Internet Connection Firewall is disabled when a LAN Connection or VPN connection is created, but users can use the Advanced tab in the connection properties to enable it. The Internet Connection Firewall is enabled by default on the connection for which Internet Connection Sharing is enabled. In addition, remote access connections created through the Make New Connection Wizard have the Internet Connection Firewall enabled. @@ -1105,13 +1087,12 @@ The Internet Connection Firewall is a stateful packet filter for home and small | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1138,7 +1119,7 @@ The Internet Connection Firewall is a stateful packet filter for home and small | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1157,19 +1138,20 @@ This setting determines whether the Properties menu item is enabled, and thus, w - If you enable this setting, a Properties menu item appears when any user right-clicks the icon for a remote access connection. Also, when any user selects the connection, Properties appears on the File menu. -- If you disable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Properties menu items are disabled, and users (including administrators) cannot open the remote access connection properties dialog box. +- If you disable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Properties menu items are disabled, and users (including administrators) can't open the remote access connection properties dialog box. > [!IMPORTANT] -> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers. +> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting won't apply to administrators on post-Windows 2000 computers. -- If you do not configure this setting, only Administrators and Network Configuration Operators can change properties of all-user remote access connections. +- If you don't configure this setting, only Administrators and Network Configuration Operators can change properties of all-user remote access connections. > [!NOTE] > This setting takes precedence over settings that manipulate the availability of features inside the Remote Access Connection Properties dialog box. + - If this setting is disabled, nothing within the properties dialog box for a remote access connection will be available to users. > [!NOTE] -> This setting does not prevent users from using other programs, such as Internet Explorer, to bypass this setting. +> This setting doesn't prevent users from using other programs, such as Internet Explorer, to bypass this setting. @@ -1181,13 +1163,12 @@ This setting determines whether the Properties menu item is enabled, and thus, w | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1214,7 +1195,7 @@ This setting determines whether the Properties menu item is enabled, and thus, w | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1232,20 +1213,20 @@ This setting determines whether the Properties button for components used by a p - If you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Properties button is disabled for all users (including administrators). > [!IMPORTANT] -> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting does not apply to administrators on post-Windows 2000 computers. +> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting doesn't apply to administrators on post-Windows 2000 computers. -- If you disable this setting or do not configure it, the Properties button is enabled for all users. +- If you disable this setting or don't configure it, the Properties button is enabled for all users. The Networking tab of the Remote Access Connection Properties dialog box includes a list of the network components that the connection uses. To view or change the properties of a component, click the name of the component, and then click the Properties button beneath the component list. > [!NOTE] -> Not all network components have configurable properties. For components that are not configurable, the Properties button is always disabled. +> Not all network components have configurable properties. For components that aren't configurable, the Properties button is always disabled. > [!NOTE] > When the "Ability to change properties of an all user remote access connection" or "Prohibit changing properties of a private remote access connection" settings are set to deny access to the Remote Access Connection Properties dialog box, the Properties button for remote access connection components is blocked. > [!NOTE] -> This setting does not prevent users from using other programs, such as Internet Explorer, to bypass this setting. +> This setting doesn't prevent users from using other programs, such as Internet Explorer, to bypass this setting. @@ -1257,13 +1238,12 @@ The Networking tab of the Remote Access Connection Properties dialog box include | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1290,7 +1270,7 @@ The Networking tab of the Remote Access Connection Properties dialog box include | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1306,9 +1286,9 @@ Determines whether users can connect and disconnect remote access connections. - If you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), double-clicking the icon has no effect, and the Connect and Disconnect menu items are disabled for all users (including administrators). > [!IMPORTANT] -> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers. +> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting won't apply to administrators on post-Windows 2000 computers. -- If you disable this setting or do not configure it, the Connect and Disconnect options for remote access connections are available to all users. Users can connect or disconnect a remote access connection by double-clicking the icon representing the connection, by right-clicking it, or by using the File menu. +- If you disable this setting or don't configure it, the Connect and Disconnect options for remote access connections are available to all users. Users can connect or disconnect a remote access connection by double-clicking the icon representing the connection, by right-clicking it, or by using the File menu. @@ -1320,13 +1300,12 @@ Determines whether users can connect and disconnect remote access connections. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1353,7 +1332,7 @@ Determines whether users can connect and disconnect remote access connections. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1373,9 +1352,9 @@ This setting determines whether the Properties menu item is enabled, and thus, w - If you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Properties menu items are disabled, and no users (including administrators) can open the Remote Access Connection Properties dialog box for a private connection. > [!IMPORTANT] -> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers. +> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting won't apply to administrators on post-Windows 2000 computers. -- If you disable this setting or do not configure it, a Properties menu item appears when any user right-clicks the icon representing a private remote access connection. Also, when any user selects the connection, Properties appears on the File menu. +- If you disable this setting or don't configure it, a Properties menu item appears when any user right-clicks the icon representing a private remote access connection. Also, when any user selects the connection, Properties appears on the File menu. > [!NOTE] > This setting takes precedence over settings that manipulate the availability of features in the Remote Access Connection Properties dialog box. @@ -1383,7 +1362,7 @@ This setting determines whether the Properties menu item is enabled, and thus, w - If this setting is enabled, nothing within the properties dialog box for a remote access connection will be available to users. > [!NOTE] -> This setting does not prevent users from using other programs, such as Internet Explorer, to bypass this setting. +> This setting doesn't prevent users from using other programs, such as Internet Explorer, to bypass this setting. @@ -1395,13 +1374,12 @@ This setting determines whether the Properties menu item is enabled, and thus, w | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1428,7 +1406,7 @@ This setting determines whether the Properties menu item is enabled, and thus, w | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1447,16 +1425,16 @@ To create an all-user connection, on the Connection Availability page in the New - If you disable this setting, the Rename option is disabled for nonadministrators only. -- If you do not configure the setting, only Administrators and Network Configuration Operators can rename all-user remote access connections. +- If you don't configure the setting, only Administrators and Network Configuration Operators can rename all-user remote access connections. > [!NOTE] -> This setting does not apply to Administrators +> This setting doesn't apply to Administrators. > [!NOTE] -> When the "Ability to rename LAN connections or remote access connections available to all users" setting is configured (set to either Enabled or Disabled), this setting does not apply. +> When the "Ability to rename LAN connections or remote access connections available to all users" setting is configured (set to either Enabled or Disabled), this setting doesn't apply. > [!NOTE] -> This setting does not prevent users from using other programs, such as Internet Explorer, to bypass this setting. +> This setting doesn't prevent users from using other programs, such as Internet Explorer, to bypass this setting. @@ -1468,13 +1446,12 @@ To create an all-user connection, on the Connection Availability page in the New | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1501,7 +1478,7 @@ To create an all-user connection, on the Connection Availability page in the New | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1519,15 +1496,15 @@ Determines whether users can rename LAN or all user remote access connections. - If you disable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Rename option for LAN and all user remote access connections is disabled for all users (including Administrators and Network Configuration Operators). > [!IMPORTANT] -> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers. +> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting won't apply to administrators on post-Windows 2000 computers. -If this setting is not configured, only Administrators and Network Configuration Operators have the right to rename LAN or all user remote access connections. +If this setting isn't configured, only Administrators and Network Configuration Operators have the right to rename LAN or all user remote access connections. > [!NOTE] > When configured, this setting always takes precedence over the "Ability to rename LAN connections" and "Ability to rename all user remote access connections" settings. > [!NOTE] -> This setting does not prevent users from using other programs, such as Internet Explorer, to rename remote access connections. +> This setting doesn't prevent users from using other programs, such as Internet Explorer, to rename remote access connections. @@ -1539,13 +1516,12 @@ If this setting is not configured, only Administrators and Network Configuration | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1572,7 +1548,7 @@ If this setting is not configured, only Administrators and Network Configuration | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1589,13 +1565,13 @@ Determines whether nonadministrators can rename a LAN connection. - If you disable this setting, the Rename option is disabled for nonadministrators only. -- If you do not configure this setting, only Administrators and Network Configuration Operators can rename LAN connections +- If you don't configure this setting, only Administrators and Network Configuration Operators can rename LAN connections. > [!NOTE] -> This setting does not apply to Administrators. +> This setting doesn't apply to Administrators. > [!NOTE] -> When the "Ability to rename LAN connections or remote access connections available to all users" setting is configured (set to either enabled or disabled), this setting does not apply. +> When the "Ability to rename LAN connections or remote access connections available to all users" setting is configured (set to either enabled or disabled), this setting doesn't apply. @@ -1607,13 +1583,12 @@ Determines whether nonadministrators can rename a LAN connection. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1640,7 +1615,7 @@ Determines whether nonadministrators can rename a LAN connection. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1658,12 +1633,12 @@ Private connections are those that are available only to one user. To create a p - If you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Rename option is disabled for all users (including administrators). > [!IMPORTANT] -> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers. +> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting won't apply to administrators on post-Windows 2000 computers. -- If you disable this setting or do not configure it, the Rename option is enabled for all users' private remote access connections. Users can rename their private connection by clicking an icon representing the connection or by using the File menu. +- If you disable this setting or don't configure it, the Rename option is enabled for all users' private remote access connections. Users can rename their private connection by clicking an icon representing the connection or by using the File menu. > [!NOTE] -> This setting does not prevent users from using other programs, such as Internet Explorer, to bypass this setting. +> This setting doesn't prevent users from using other programs, such as Internet Explorer, to bypass this setting. @@ -1675,13 +1650,12 @@ Private connections are those that are available only to one user. To create a p | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1708,7 +1682,7 @@ Private connections are those that are available only to one user. To create a p | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1723,9 +1697,9 @@ Determines whether administrators can enable and configure the Internet Connecti ICS lets administrators configure their system as an Internet gateway for a small network and provides network services, such as name resolution and addressing through DHCP, to the local private network. -- If you enable this setting, ICS cannot be enabled or configured by administrators, and the ICS service cannot run on the computer. The Advanced tab in the Properties dialog box for a LAN or remote access connection is removed. The Internet Connection Sharing page is removed from the New Connection Wizard. The Network Setup Wizard is disabled. +- If you enable this setting, ICS can't be enabled or configured by administrators, and the ICS service can't run on the computer. The Advanced tab in the Properties dialog box for a LAN or remote access connection is removed. The Internet Connection Sharing page is removed from the New Connection Wizard. The Network Setup Wizard is disabled. -- If you disable this setting or do not configure it and have two or more connections, administrators can enable ICS. The Advanced tab in the properties dialog box for a LAN or remote access connection is available. In addition, the user is presented with the option to enable Internet Connection Sharing in the Network Setup Wizard and Make New Connection Wizard. (The Network Setup Wizard is available only in Windows XP Professional.) +- If you disable this setting or don't configure it and have two or more connections, administrators can enable ICS. The Advanced tab in the properties dialog box for a LAN or remote access connection is available. In addition, the user is presented with the option to enable Internet Connection Sharing in the Network Setup Wizard and Make New Connection Wizard. (The Network Setup Wizard is available only in Windows XP Professional). By default, ICS is disabled when you create a remote access connection, but administrators can use the Advanced tab to enable it. When running the New Connection Wizard or Network Setup Wizard, administrators can choose to enable ICS. @@ -1739,7 +1713,7 @@ By default, ICS is disabled when you create a remote access connection, but admi > Nonadministrators are already prohibited from configuring Internet Connection Sharing, regardless of this setting. > [!NOTE] -> Disabling this setting does not prevent Wireless Hosted Networking from using the ICS service for DHCP services. To prevent the ICS service from running, on the Network Permissions tab in the network's policy properties, select the "Don't use hosted networks" check box. +> Disabling this setting doesn't prevent Wireless Hosted Networking from using the ICS service for DHCP services. To prevent the ICS service from running, on the Network Permissions tab in the network's policy properties, select the "Do not use hosted networks" check box. @@ -1751,13 +1725,12 @@ By default, ICS is disabled when you create a remote access connection, but admi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1784,7 +1757,7 @@ By default, ICS is disabled when you create a remote access connection, but admi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1799,12 +1772,12 @@ Determines whether users can view the status for an active connection. Connection status is available from the connection status taskbar icon or from the Status dialog box. The Status dialog box displays information about the connection and its activity. It also provides buttons to disconnect and to configure the properties of the connection. -- If you enable this setting, the connection status taskbar icon and Status dialog box are not available to users (including administrators). The Status option is disabled in the context menu for the connection and on the File menu in the Network Connections folder. Users cannot choose to show the connection icon in the taskbar from the Connection Properties dialog box. +- If you enable this setting, the connection status taskbar icon and Status dialog box aren't available to users (including administrators). The Status option is disabled in the context menu for the connection and on the File menu in the Network Connections folder. Users can't choose to show the connection icon in the taskbar from the Connection Properties dialog box. > [!IMPORTANT] -> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers. +> If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting won't apply to administrators on post-Windows 2000 computers. -- If you disable this setting or do not configure it, the connection status taskbar icon and Status dialog box are available to all users. +- If you disable this setting or don't configure it, the connection status taskbar icon and Status dialog box are available to all users. @@ -1816,13 +1789,12 @@ Connection status is available from the connection status taskbar icon or from t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1849,7 +1821,7 @@ Connection status is available from the connection status taskbar icon or from t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1864,7 +1836,7 @@ This policy setting determines whether to require domain users to elevate when s - If you enable this policy setting, domain users must elevate when setting a network's location. -- If you disable or do not configure this policy setting, domain users can set a network's location without elevating. +- If you disable or don't configure this policy setting, domain users can set a network's location without elevating. @@ -1876,13 +1848,12 @@ This policy setting determines whether to require domain users to elevate when s | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-offlinefiles.md b/windows/client-management/mdm/policy-csp-admx-offlinefiles.md index 38fe42d808..56b4c9a621 100644 --- a/windows/client-management/mdm/policy-csp-admx-offlinefiles.md +++ b/windows/client-management/mdm/policy-csp-admx-offlinefiles.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_OfflineFiles Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_OfflineFiles -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,11 +41,11 @@ ms.topic: reference Makes subfolders available offline whenever their parent folder is made available offline. -This setting automatically extends the "make available offline" setting to all new and existing subfolders of a folder. Users do not have the option of excluding subfolders. +This setting automatically extends the "make available offline" setting to all new and existing subfolders of a folder. Users don't have the option of excluding subfolders. -- If you enable this setting, when you make a folder available offline, all folders within that folder are also made available offline. Also, new folders that you create within a folder that is available offline are made available offline when the parent folder is synchronized. +- If you enable this setting, when you make a folder available offline, all folders within that folder are also made available offline. Also, new folders that you create within a folder that's available offline are made available offline when the parent folder is synchronized. -- If you disable this setting or do not configure it, the system asks users whether they want subfolders to be made available offline when they make a parent folder available offline. +- If you disable this setting or don't configure it, the system asks users whether they want subfolders to be made available offline when they make a parent folder available offline. @@ -60,13 +57,12 @@ This setting automatically extends the "make available offline" setting to all n | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -93,7 +89,7 @@ This setting automatically extends the "make available offline" setting to all n | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -110,7 +106,7 @@ This policy setting lists network files and folders that are always available fo - If you disable this policy setting, the list of files or folders made always available offline (including those inherited from lower precedence GPOs) is deleted and no files or folders are made available for offline use by Group Policy (though users can still specify their own files and folders for offline use). -- If you do not configure this policy setting, no files or folders are made available for offline use by Group Policy. +- If you don't configure this policy setting, no files or folders are made available for offline use by Group Policy. > [!NOTE] > This setting appears in the Computer Configuration and User Configuration folders. If both policy settings are configured, the policy settings will be combined and all specified files will be available for offline use. @@ -125,13 +121,12 @@ This policy setting lists network files and folders that are always available fo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -157,7 +152,7 @@ This policy setting lists network files and folders that are always available fo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -174,7 +169,7 @@ This policy setting lists network files and folders that are always available fo - If you disable this policy setting, the list of files or folders made always available offline (including those inherited from lower precedence GPOs) is deleted and no files or folders are made available for offline use by Group Policy (though users can still specify their own files and folders for offline use). -- If you do not configure this policy setting, no files or folders are made available for offline use by Group Policy. +- If you don't configure this policy setting, no files or folders are made available for offline use by Group Policy. > [!NOTE] > This setting appears in the Computer Configuration and User Configuration folders. If both policy settings are configured, the policy settings will be combined and all specified files will be available for offline use. @@ -189,13 +184,12 @@ This policy setting lists network files and folders that are always available fo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -221,7 +215,7 @@ This policy setting lists network files and folders that are always available fo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -238,7 +232,7 @@ This policy setting controls when background synchronization occurs while operat You can also configure Background Sync for network shares that are in user selected Work Offline mode. This mode is in effect when a user selects the Work Offline button for a specific share. When selected, all configured settings will apply to shares in user selected Work Offline mode as well. -- If you disable or do not configure this policy setting, Windows performs a background sync of offline folders in the slow-link mode at a default interval with the start of the sync varying between 0 and 60 additional minutes. In Windows 7 and Windows Server 2008 R2, the default sync interval is 360 minutes. In Windows 8 and Windows Server 2012, the default sync interval is 120 minutes. +- If you disable or don't configure this policy setting, Windows performs a background sync of offline folders in the slow-link mode at a default interval with the start of the sync varying between 0 and 60 additional minutes. In Windows 7 and Windows Server 2008 R2, the default sync interval is 360 minutes. In Windows 8 and Windows Server 2012, the default sync interval is 120 minutes. @@ -250,13 +244,12 @@ You can also configure Background Sync for network shares that are in user selec | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -283,7 +276,7 @@ You can also configure Background Sync for network shares that are in user selec | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -302,13 +295,13 @@ This setting also disables the ability to adjust, through the Offline Files cont - If you disable this policy setting, the system limits the space that offline files occupy to 25 percent of the total space on the drive where the Offline Files cache is located. The limit for automatically cached files is 100 percent of the total disk space limit. -- If you do not configure this policy setting, the system limits the space that offline files occupy to 25 percent of the total space on the drive where the Offline Files cache is located. The limit for automatically cached files is 100 percent of the total disk space limit. However, the users can change these values using the Offline Files control applet. +- If you don't configure this policy setting, the system limits the space that offline files occupy to 25 percent of the total space on the drive where the Offline Files cache is located. The limit for automatically cached files is 100 percent of the total disk space limit. However, the users can change these values using the Offline Files control applet. -- If you enable this setting and specify a total size limit greater than the size of the drive hosting the Offline Files cache, and that drive is the system drive, the total size limit is automatically adjusted downward to 75 percent of the size of the drive. If the cache is located on a drive other than the system drive, the limit is automatically adjusted downward to 100 percent of the size of the drive. +- If you enable this setting and specify a total size limit greater than the size of the drive hosting the Offline Files cache, and that drive is the system drive, the total size limit's automatically adjusted downward to 75 percent of the size of the drive. If the cache is located on a drive other than the system drive, the limit's automatically adjusted downward to 100 percent of the size of the drive. -- If you enable this setting and specify a total size limit less than the amount of space currently used by the Offline Files cache, the total size limit is automatically adjusted upward to the amount of space currently used by offline files. The cache is then considered full. +- If you enable this setting and specify a total size limit less than the amount of space currently used by the Offline Files cache, the total size limit's automatically adjusted upward to the amount of space currently used by offline files. The cache is then considered full. -- If you enable this setting and specify an auto-cached space limit greater than the total size limit, the auto-cached limit is automatically adjusted downward to equal the total size limit. +- If you enable this setting and specify an auto-cached space limit greater than the total size limit, the auto-cached limit's automatically adjusted downward to equal the total size limit. This setting replaces the Default Cache Size setting used by pre-Windows Vista systems. @@ -322,13 +315,12 @@ This setting replaces the Default Cache Size setting used by pre-Windows Vista s | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -354,7 +346,7 @@ This setting replaces the Default Cache Size setting used by pre-Windows Vista s | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -365,11 +357,11 @@ This setting replaces the Default Cache Size setting used by pre-Windows Vista s -Determines how computers respond when they are disconnected from particular offline file servers. This setting overrides the default response, a user-specified response, and the response specified in the "Action on server disconnect" setting. +Determines how computers respond when they're disconnected from particular offline file servers. This setting overrides the default response, a user-specified response, and the response specified in the "Action on server disconnect" setting. -To use this setting, click Show. In the Show Contents dialog box in the Value Name column box, type the server's computer name. Then, in the Value column box, type "0" if users can work offline when they are disconnected from this server, or type "1" if they cannot. +To use this setting, click Show. In the Show Contents dialog box in the Value Name column box, type the server's computer name. Then, in the Value column box, type "0" if users can work offline when they're disconnected from this server, or type "1" if they cannot. -This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured for a particular server, the setting in Computer Configuration takes precedence over the setting in User Configuration. Both Computer and User configuration take precedence over a user's setting. This setting does not prevent users from setting custom actions through the Offline Files tab. However, users are unable to change any custom actions established via this setting. +This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured for a particular server, the setting in Computer Configuration takes precedence over the setting in User Configuration. Both Computer and User configuration take precedence over a user's setting. This setting doesn't prevent users from setting custom actions through the Offline Files tab. However, users are unable to change any custom actions established via this setting. > [!TIP] > To configure this setting without establishing a setting, in Windows Explorer, on the Tools menu, click Folder Options, click the Offline Files tab, and then click Advanced. This setting corresponds to the settings in the "Exception list" section. @@ -384,13 +376,12 @@ This setting appears in the Computer Configuration and User Configuration folder | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -416,7 +407,7 @@ This setting appears in the Computer Configuration and User Configuration folder | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -427,11 +418,11 @@ This setting appears in the Computer Configuration and User Configuration folder -Determines how computers respond when they are disconnected from particular offline file servers. This setting overrides the default response, a user-specified response, and the response specified in the "Action on server disconnect" setting. +Determines how computers respond when they're disconnected from particular offline file servers. This setting overrides the default response, a user-specified response, and the response specified in the "Action on server disconnect" setting. -To use this setting, click Show. In the Show Contents dialog box in the Value Name column box, type the server's computer name. Then, in the Value column box, type "0" if users can work offline when they are disconnected from this server, or type "1" if they cannot. +To use this setting, click Show. In the Show Contents dialog box in the Value Name column box, type the server's computer name. Then, in the Value column box, type "0" if users can work offline when they're disconnected from this server, or type "1" if they cannot. -This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured for a particular server, the setting in Computer Configuration takes precedence over the setting in User Configuration. Both Computer and User configuration take precedence over a user's setting. This setting does not prevent users from setting custom actions through the Offline Files tab. However, users are unable to change any custom actions established via this setting. +This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured for a particular server, the setting in Computer Configuration takes precedence over the setting in User Configuration. Both Computer and User configuration take precedence over a user's setting. This setting doesn't prevent users from setting custom actions through the Offline Files tab. However, users are unable to change any custom actions established via this setting. > [!TIP] > To configure this setting without establishing a setting, in Windows Explorer, on the Tools menu, click Folder Options, click the Offline Files tab, and then click Advanced. This setting corresponds to the settings in the "Exception list" section. @@ -446,13 +437,12 @@ This setting appears in the Computer Configuration and User Configuration folder | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -478,7 +468,7 @@ This setting appears in the Computer Configuration and User Configuration folder | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -495,13 +485,13 @@ This setting also disables the "Amount of disk space to use for temporary offlin Automatic caching can be set on any network share. When a user opens a file on the share, the system automatically stores a copy of the file on the user's computer. -This setting does not limit the disk space available for files that user's make available offline manually. +This setting doesn't limit the disk space available for files that user's make available offline manually. - If you enable this setting, you can specify an automatic-cache disk space limit. - If you disable this setting, the system limits the space that automatically cached files occupy to 10 percent of the space on the system drive. -- If you do not configure this setting, disk space for automatically cached files is limited to 10 percent of the system drive by default, but users can change it. +- If you don't configure this setting, disk space for automatically cached files is limited to 10 percent of the system drive by default, but users can change it. > [!TIP] > To change the amount of disk space used for automatic caching without specifying a setting, in Windows Explorer, on the Tools menu, click Folder Options, click the Offline Files tab, and then use the slider bar associated with the "Amount of disk space to use for temporary offline files" option. @@ -516,13 +506,12 @@ This setting does not limit the disk space available for files that user's make | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -548,7 +537,7 @@ This setting does not limit the disk space available for files that user's make | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -559,16 +548,16 @@ This setting does not limit the disk space available for files that user's make -This policy setting determines whether the Offline Files feature is enabled. Offline Files saves a copy of network files on the user's computer for use when the computer is not connected to the network. +This policy setting determines whether the Offline Files feature is enabled. Offline Files saves a copy of network files on the user's computer for use when the computer isn't connected to the network. -- If you enable this policy setting, Offline Files is enabled and users cannot disable it. +- If you enable this policy setting, Offline Files is enabled and users can't disable it. -- If you disable this policy setting, Offline Files is disabled and users cannot enable it. +- If you disable this policy setting, Offline Files is disabled and users can't enable it. -- If you do not configure this policy setting, Offline Files is enabled on Windows client computers, and disabled on computers running Windows Server, unless changed by the user. +- If you don't configure this policy setting, Offline Files is enabled on Windows client computers, and disabled on computers running Windows Server, unless changed by the user. > [!NOTE] -> Changes to this policy setting do not take effect until the affected computer is restarted. +> Changes to this policy setting don't take effect until the affected computer is restarted. @@ -580,13 +569,12 @@ This policy setting determines whether the Offline Files feature is enabled. Off | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -613,7 +601,7 @@ This policy setting determines whether the Offline Files feature is enabled. Off | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -628,11 +616,11 @@ This policy setting determines whether offline files are encrypted. Offline files are locally cached copies of files from a network share. Encrypting this cache reduces the likelihood that a user could access files from the Offline Files cache without proper permissions. -- If you enable this policy setting, all files in the Offline Files cache are encrypted. This includes existing files as well as files added later. The cached copy on the local computer is affected, but the associated network copy is not. The user cannot unencrypt Offline Files through the user interface. +- If you enable this policy setting, all files in the Offline Files cache are encrypted. This includes existing files as well as files added later. The cached copy on the local computer is affected, but the associated network copy is not. The user can't unencrypt Offline Files through the user interface. -- If you disable this policy setting, all files in the Offline Files cache are unencrypted. This includes existing files as well as files added later, even if the files were stored using NTFS encryption or BitLocker Drive Encryption while on the server. The cached copy on the local computer is affected, but the associated network copy is not. The user cannot encrypt Offline Files through the user interface. +- If you disable this policy setting, all files in the Offline Files cache are unencrypted. This includes existing files as well as files added later, even if the files were stored using NTFS encryption or BitLocker Drive Encryption while on the server. The cached copy on the local computer is affected, but the associated network copy is not. The user can't encrypt Offline Files through the user interface. -- If you do not configure this policy setting, encryption of the Offline Files cache is controlled by the user through the user interface. The current cache state is retained, and if the cache is only partially encrypted, the operation completes so that it is fully encrypted. The cache does not return to the unencrypted state. The user must be an administrator on the local computer to encrypt or decrypt the Offline Files cache. +- If you don't configure this policy setting, encryption of the Offline Files cache is controlled by the user through the user interface. The current cache state is retained, and if the cache is only partially encrypted, the operation completes so that it's fully encrypted. The cache doesn't return to the unencrypted state. The user must be an administrator on the local computer to encrypt or decrypt the Offline Files cache. > [!NOTE] > By default, this cache is protected on NTFS partitions by ACLs. @@ -649,13 +637,12 @@ This setting is applied at user logon. If this setting is changed after user log | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -682,7 +669,7 @@ This setting is applied at user logon. If this setting is changed after user log | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -720,13 +707,12 @@ To use this setting, in the "Enter" box, select the number corresponding to the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -752,7 +738,7 @@ To use this setting, in the "Enter" box, select the number corresponding to the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -790,13 +776,12 @@ To use this setting, in the "Enter" box, select the number corresponding to the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -822,7 +807,7 @@ To use this setting, in the "Enter" box, select the number corresponding to the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -837,7 +822,7 @@ This policy setting enables administrators to block certain file types from bein - If you enable this policy setting, a user will be unable to create files with the specified file extensions in any of the folders that have been made available offline. -- If you disable or do not configure this policy setting, a user can create a file of any type in the folders that have been made available offline. +- If you disable or don't configure this policy setting, a user can create a file of any type in the folders that have been made available offline. @@ -849,13 +834,12 @@ This policy setting enables administrators to block certain file types from bein | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -881,7 +865,7 @@ This policy setting enables administrators to block certain file types from bein | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -892,11 +876,11 @@ This policy setting enables administrators to block certain file types from bein -Lists types of files that cannot be used offline. +Lists types of files that can't be used offline. -This setting lets you exclude certain types of files from automatic and manual caching for offline use. The system does not cache files of the type specified in this setting even when they reside on a network share configured for automatic caching. Also, if users try to make a file of this type available offline, the operation will fail and the following message will be displayed in the Synchronization Manager progress dialog box: "Files of this type cannot be made available offline." +This setting lets you exclude certain types of files from automatic and manual caching for offline use. The system doesn't cache files of the type specified in this setting even when they reside on a network share configured for automatic caching. Also, if users try to make a file of this type available offline, the operation will fail and the following message will be displayed in the Synchronization Manager progress dialog box: "Files of this type can't be made available offline". -This setting is designed to protect files that cannot be separated, such as database components. +This setting is designed to protect files that can't be separated, such as database components. To use this setting, type the file name extension in the "Extensions" box. To type more than one extension, separate the extensions with a semicolon (;). @@ -913,13 +897,12 @@ To use this setting, type the file name extension in the "Extensions" box. To ty | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -945,7 +928,7 @@ To use this setting, type the file name extension in the "Extensions" box. To ty | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -964,11 +947,11 @@ This setting also disables the "When a network connection is lost" option on the - "Work offline" indicates that the computer can use local copies of network files while the server is inaccessible. -- "Never go offline" indicates that network files are not available while the server is inaccessible. +- "Never go offline" indicates that network files aren't available while the server is inaccessible. - If you disable this setting or select the "Work offline" option, users can work offline if disconnected. -- If you do not configure this setting, users can work offline by default, but they can change this option. +- If you don't configure this setting, users can work offline by default, but they can change this option. This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration. @@ -987,13 +970,12 @@ Also, see the "Non-default server disconnect actions" setting. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1019,7 +1001,7 @@ Also, see the "Non-default server disconnect actions" setting. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1038,11 +1020,11 @@ This setting also disables the "When a network connection is lost" option on the - "Work offline" indicates that the computer can use local copies of network files while the server is inaccessible. -- "Never go offline" indicates that network files are not available while the server is inaccessible. +- "Never go offline" indicates that network files aren't available while the server is inaccessible. - If you disable this setting or select the "Work offline" option, users can work offline if disconnected. -- If you do not configure this setting, users can work offline by default, but they can change this option. +- If you don't configure this setting, users can work offline by default, but they can change this option. This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration. @@ -1061,13 +1043,12 @@ Also, see the "Non-default server disconnect actions" setting. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1093,7 +1074,7 @@ Also, see the "Non-default server disconnect actions" setting. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1106,14 +1087,14 @@ Also, see the "Non-default server disconnect actions" setting. Disables the Offline Files folder. -This setting disables the "View Files" button on the Offline Files tab. As a result, users cannot use the Offline Files folder to view or open copies of network files stored on their computer. Also, they cannot use the folder to view characteristics of offline files, such as their server status, type, or location. +This setting disables the "View Files" button on the Offline Files tab. As a result, users can't use the Offline Files folder to view or open copies of network files stored on their computer. Also, they can't use the folder to view characteristics of offline files, such as their server status, type, or location. -This setting does not prevent users from working offline or from saving local copies of files available offline. Also, it does not prevent them from using other programs, such as Windows Explorer, to view their offline files. +This setting doesn't prevent users from working offline or from saving local copies of files available offline. Also, it doesn't prevent them from using other programs, such as Windows Explorer, to view their offline files. This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration. > [!TIP] -> To view the Offline Files Folder, in Windows Explorer, on the Tools menu, click Folder Options, click the Offline Files tab, and then click "View Files." +> To view the Offline Files Folder, in Windows Explorer, on the Tools menu, click Folder Options, click the Offline Files tab, and then click "View Files". @@ -1125,13 +1106,12 @@ This setting appears in the Computer Configuration and User Configuration folder | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1158,7 +1138,7 @@ This setting appears in the Computer Configuration and User Configuration folder | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1171,14 +1151,14 @@ This setting appears in the Computer Configuration and User Configuration folder Disables the Offline Files folder. -This setting disables the "View Files" button on the Offline Files tab. As a result, users cannot use the Offline Files folder to view or open copies of network files stored on their computer. Also, they cannot use the folder to view characteristics of offline files, such as their server status, type, or location. +This setting disables the "View Files" button on the Offline Files tab. As a result, users can't use the Offline Files folder to view or open copies of network files stored on their computer. Also, they can't use the folder to view characteristics of offline files, such as their server status, type, or location. -This setting does not prevent users from working offline or from saving local copies of files available offline. Also, it does not prevent them from using other programs, such as Windows Explorer, to view their offline files. +This setting doesn't prevent users from working offline or from saving local copies of files available offline. Also, it doesn't prevent them from using other programs, such as Windows Explorer, to view their offline files. This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration. > [!TIP] -> To view the Offline Files Folder, in Windows Explorer, on the Tools menu, click Folder Options, click the Offline Files tab, and then click "View Files." +> To view the Offline Files Folder, in Windows Explorer, on the Tools menu, click Folder Options, click the Offline Files tab, and then click "View Files". @@ -1190,13 +1170,12 @@ This setting appears in the Computer Configuration and User Configuration folder | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1223,7 +1202,7 @@ This setting appears in the Computer Configuration and User Configuration folder | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1236,14 +1215,14 @@ This setting appears in the Computer Configuration and User Configuration folder Prevents users from enabling, disabling, or changing the configuration of Offline Files. -This setting removes the Offline Files tab from the Folder Options dialog box. It also removes the Settings item from the Offline Files context menu and disables the Settings button on the Offline Files Status dialog box. As a result, users cannot view or change the options on the Offline Files tab or Offline Files dialog box. +This setting removes the Offline Files tab from the Folder Options dialog box. It also removes the Settings item from the Offline Files context menu and disables the Settings button on the Offline Files Status dialog box. As a result, users can't view or change the options on the Offline Files tab or Offline Files dialog box. This is a comprehensive setting that locks down the configuration you establish by using other settings in this folder. This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration. > [!TIP] -> This setting provides a quick method for locking down the default settings for Offline Files. To accept the defaults, just enable this setting. You do not have to disable any other settings in this folder. +> This setting provides a quick method for locking down the default settings for Offline Files. To accept the defaults, just enable this setting. You don't have to disable any other settings in this folder. @@ -1255,13 +1234,12 @@ This setting appears in the Computer Configuration and User Configuration folder | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1288,7 +1266,7 @@ This setting appears in the Computer Configuration and User Configuration folder | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1301,14 +1279,14 @@ This setting appears in the Computer Configuration and User Configuration folder Prevents users from enabling, disabling, or changing the configuration of Offline Files. -This setting removes the Offline Files tab from the Folder Options dialog box. It also removes the Settings item from the Offline Files context menu and disables the Settings button on the Offline Files Status dialog box. As a result, users cannot view or change the options on the Offline Files tab or Offline Files dialog box. +This setting removes the Offline Files tab from the Folder Options dialog box. It also removes the Settings item from the Offline Files context menu and disables the Settings button on the Offline Files Status dialog box. As a result, users can't view or change the options on the Offline Files tab or Offline Files dialog box. This is a comprehensive setting that locks down the configuration you establish by using other settings in this folder. This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration. > [!TIP] -> This setting provides a quick method for locking down the default settings for Offline Files. To accept the defaults, just enable this setting. You do not have to disable any other settings in this folder. +> This setting provides a quick method for locking down the default settings for Offline Files. To accept the defaults, just enable this setting. You don't have to disable any other settings in this folder. @@ -1320,13 +1298,12 @@ This setting appears in the Computer Configuration and User Configuration folder | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1353,7 +1330,7 @@ This setting appears in the Computer Configuration and User Configuration folder | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1366,11 +1343,11 @@ This setting appears in the Computer Configuration and User Configuration folder This policy setting prevents users from making network files and folders available offline. -- If you enable this policy setting, users cannot designate files to be saved on their computer for offline use. However, Windows will still cache local copies of files that reside on network shares designated for automatic caching. +- If you enable this policy setting, users can't designate files to be saved on their computer for offline use. However, Windows will still cache local copies of files that reside on network shares designated for automatic caching. -- If you disable or do not configure this policy setting, users can manually specify files and folders that they want to make available offline. +- If you disable or don't configure this policy setting, users can manually specify files and folders that they want to make available offline. -**Note**: +Note: This policy setting appears in the Computer Configuration and User Configuration folders. If both policy settings are configured, the policy setting in Computer Configuration takes precedence. @@ -1386,13 +1363,12 @@ The "Make Available Offline" command is called "Always available offline" on com | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1419,7 +1395,7 @@ The "Make Available Offline" command is called "Always available offline" on com | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1432,11 +1408,11 @@ The "Make Available Offline" command is called "Always available offline" on com This policy setting prevents users from making network files and folders available offline. -- If you enable this policy setting, users cannot designate files to be saved on their computer for offline use. However, Windows will still cache local copies of files that reside on network shares designated for automatic caching. +- If you enable this policy setting, users can't designate files to be saved on their computer for offline use. However, Windows will still cache local copies of files that reside on network shares designated for automatic caching. -- If you disable or do not configure this policy setting, users can manually specify files and folders that they want to make available offline. +- If you disable or don't configure this policy setting, users can manually specify files and folders that they want to make available offline. -**Note**: +Note: This policy setting appears in the Computer Configuration and User Configuration folders. If both policy settings are configured, the policy setting in Computer Configuration takes precedence. @@ -1452,13 +1428,12 @@ The "Make Available Offline" command is called "Always available offline" on com | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1485,7 +1460,7 @@ The "Make Available Offline" command is called "Always available offline" on com | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1498,19 +1473,19 @@ The "Make Available Offline" command is called "Always available offline" on com This policy setting allows you to manage a list of files and folders for which you want to block the "Make Available Offline" command. -- If you enable this policy setting, the "Make Available Offline" command is not available for the files and folders that you list. To specify these files and folders, click Show. In the Show Contents dialog box, in the Value Name column box, type the fully qualified UNC path to the file or folder. Leave the Value column field blank. +- If you enable this policy setting, the "Make Available Offline" command isn't available for the files and folders that you list. To specify these files and folders, click Show. In the Show Contents dialog box, in the Value Name column box, type the fully qualified UNC path to the file or folder. Leave the Value column field blank. - If you disable this policy setting, the list of files and folders is deleted, including any lists inherited from lower precedence GPOs, and the "Make Available Offline" command is displayed for all files and folders. -- If you do not configure this policy setting, the "Make Available Offline" command is available for all files and folders. +- If you don't configure this policy setting, the "Make Available Offline" command is available for all files and folders. -**Note**: +Note: This policy setting appears in the Computer Configuration and User Configuration folders. If both policy settings are configured, the policy settings are combined, and the "Make Available Offline" command is unavailable for all specified files and folders. The "Make Available Offline" command is called "Always available offline" on computers running Windows Server 2012, Windows Server 2008 R2, Windows Server 2008, Windows 8, Windows 7, or Windows Vista. -This policy setting does not prevent files from being automatically cached if the network share is configured for "Automatic Caching." It only affects the display of the "Make Available Offline" command in File Explorer. +This policy setting doesn't prevent files from being automatically cached if the network share is configured for "Automatic Caching". It only affects the display of the "Make Available Offline" command in File Explorer. If the "Remove 'Make Available Offline' command" policy setting is enabled, this setting has no effect. @@ -1524,13 +1499,12 @@ If the "Remove 'Make Available Offline' command" policy setting is enabled, this | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1556,7 +1530,7 @@ If the "Remove 'Make Available Offline' command" policy setting is enabled, this | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1569,19 +1543,19 @@ If the "Remove 'Make Available Offline' command" policy setting is enabled, this This policy setting allows you to manage a list of files and folders for which you want to block the "Make Available Offline" command. -- If you enable this policy setting, the "Make Available Offline" command is not available for the files and folders that you list. To specify these files and folders, click Show. In the Show Contents dialog box, in the Value Name column box, type the fully qualified UNC path to the file or folder. Leave the Value column field blank. +- If you enable this policy setting, the "Make Available Offline" command isn't available for the files and folders that you list. To specify these files and folders, click Show. In the Show Contents dialog box, in the Value Name column box, type the fully qualified UNC path to the file or folder. Leave the Value column field blank. - If you disable this policy setting, the list of files and folders is deleted, including any lists inherited from lower precedence GPOs, and the "Make Available Offline" command is displayed for all files and folders. -- If you do not configure this policy setting, the "Make Available Offline" command is available for all files and folders. +- If you don't configure this policy setting, the "Make Available Offline" command is available for all files and folders. -**Note**: +Note: This policy setting appears in the Computer Configuration and User Configuration folders. If both policy settings are configured, the policy settings are combined, and the "Make Available Offline" command is unavailable for all specified files and folders. The "Make Available Offline" command is called "Always available offline" on computers running Windows Server 2012, Windows Server 2008 R2, Windows Server 2008, Windows 8, Windows 7, or Windows Vista. -This policy setting does not prevent files from being automatically cached if the network share is configured for "Automatic Caching." It only affects the display of the "Make Available Offline" command in File Explorer. +This policy setting doesn't prevent files from being automatically cached if the network share is configured for "Automatic Caching". It only affects the display of the "Make Available Offline" command in File Explorer. If the "Remove 'Make Available Offline' command" policy setting is enabled, this setting has no effect. @@ -1595,13 +1569,12 @@ If the "Remove 'Make Available Offline' command" policy setting is enabled, this | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1627,7 +1600,7 @@ If the "Remove 'Make Available Offline' command" policy setting is enabled, this | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1640,15 +1613,15 @@ If the "Remove 'Make Available Offline' command" policy setting is enabled, this Hides or displays reminder balloons, and prevents users from changing the setting. -Reminder balloons appear above the Offline Files icon in the notification area to notify users when they have lost the connection to a networked file and are working on a local copy of the file. Users can then decide how to proceed. +Reminder balloons appear above the Offline Files icon in the notification area to notify users when they've lost the connection to a networked file and are working on a local copy of the file. Users can then decide how to proceed. If you enable this setting, the system hides the reminder balloons, and prevents users from displaying them. If you disable the setting, the system displays the reminder balloons and prevents users from hiding them. -If this setting is not configured, reminder balloons are displayed by default when you enable offline files, but users can change the setting. +If this setting isn't configured, reminder balloons are displayed by default when you enable offline files, but users can change the setting. -To prevent users from changing the setting while a setting is in effect, the system disables the "Enable reminders" option on the Offline Files tab +To prevent users from changing the setting while a setting is in effect, the system disables the "Enable reminders" option on the Offline Files tab. This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration. @@ -1665,13 +1638,12 @@ This setting appears in the Computer Configuration and User Configuration folder | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1698,7 +1670,7 @@ This setting appears in the Computer Configuration and User Configuration folder | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1711,15 +1683,15 @@ This setting appears in the Computer Configuration and User Configuration folder Hides or displays reminder balloons, and prevents users from changing the setting. -Reminder balloons appear above the Offline Files icon in the notification area to notify users when they have lost the connection to a networked file and are working on a local copy of the file. Users can then decide how to proceed. +Reminder balloons appear above the Offline Files icon in the notification area to notify users when they've lost the connection to a networked file and are working on a local copy of the file. Users can then decide how to proceed. If you enable this setting, the system hides the reminder balloons, and prevents users from displaying them. If you disable the setting, the system displays the reminder balloons and prevents users from hiding them. -If this setting is not configured, reminder balloons are displayed by default when you enable offline files, but users can change the setting. +If this setting isn't configured, reminder balloons are displayed by default when you enable offline files, but users can change the setting. -To prevent users from changing the setting while a setting is in effect, the system disables the "Enable reminders" option on the Offline Files tab +To prevent users from changing the setting while a setting is in effect, the system disables the "Enable reminders" option on the Offline Files tab. This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration. @@ -1736,13 +1708,12 @@ This setting appears in the Computer Configuration and User Configuration folder | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1769,7 +1740,7 @@ This setting appears in the Computer Configuration and User Configuration folder | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1782,13 +1753,13 @@ This setting appears in the Computer Configuration and User Configuration folder This policy setting controls whether files read from file shares over a slow network are transparently cached in the Offline Files cache for future reads. When a user tries to access a file that has been transparently cached, Windows reads from the cached copy after verifying its integrity. This improves end-user response times and decreases bandwidth consumption over WAN links. -The cached files are temporary and are not available to the user when offline. The cached files are not kept in sync with the version on the server, and the most current version from the server is always available for subsequent reads. +The cached files are temporary and aren't available to the user when offline. The cached files aren't kept in sync with the version on the server, and the most current version from the server is always available for subsequent reads. -This policy setting is triggered by the configured round trip network latency value. We recommend using this policy setting when the network connection to the server is slow. For example, you can configure a value of 60 ms as the round trip latency of the network above which files should be transparently cached in the Offline Files cache. If the round trip latency of the network is less than 60ms, reads to remote files will not be cached. +This policy setting is triggered by the configured round trip network latency value. We recommend using this policy setting when the network connection to the server is slow. For example, you can configure a value of 60 ms as the round trip latency of the network above which files should be transparently cached in the Offline Files cache. If the round trip latency of the network is less than 60ms, reads to remote files won't be cached. - If you enable this policy setting, transparent caching is enabled and configurable. -- If you disable or do not configure this policy setting, remote files will be not be transparently cached on client computers. +- If you disable or don't configure this policy setting, remote files will be not be transparently cached on client computers. @@ -1800,13 +1771,12 @@ This policy setting is triggered by the configured round trip network latency va | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1832,7 +1802,7 @@ This policy setting is triggered by the configured round trip network latency va | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1845,12 +1815,12 @@ This policy setting is triggered by the configured round trip network latency va Deletes local copies of the user's offline files when the user logs off. -This setting specifies that automatically and manually cached offline files are retained only while the user is logged on to the computer. When the user logs off, the system deletes all local copies of offline files. +This setting specifies that automatically and manually cached offline files are retained only while the user is logged-on to the computer. When the user logs off, the system deletes all local copies of offline files. -If you disable this setting or do not configure it, automatically and manually cached copies are retained on the user's computer for later offline use. +If you disable this setting or don't configure it, automatically and manually cached copies are retained on the user's computer for later offline use. > [!CAUTION] -> Files are not synchronized before they are deleted. Any changes to local files since the last synchronization are lost. +> Files aren't synchronized before they're deleted. Any changes to local files since the last synchronization are lost. @@ -1862,13 +1832,12 @@ If you disable this setting or do not configure it, automatically and manually c | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1895,7 +1864,7 @@ If you disable this setting or do not configure it, automatically and manually c | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1908,7 +1877,7 @@ If you disable this setting or do not configure it, automatically and manually c This policy setting allows you to turn on economical application of administratively assigned Offline Files. -- If you enable or do not configure this policy setting, only new files and folders in administratively assigned folders are synchronized at logon. Files and folders that are already available offline are skipped and are synchronized later. +- If you enable or don't configure this policy setting, only new files and folders in administratively assigned folders are synchronized at logon. Files and folders that are already available offline are skipped and are synchronized later. - If you disable this policy setting, all administratively assigned folders are synchronized at logon. @@ -1922,13 +1891,12 @@ This policy setting allows you to turn on economical application of administrati | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1955,7 +1923,7 @@ This policy setting allows you to turn on economical application of administrati | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1970,7 +1938,7 @@ Determines how often reminder balloon updates appear. If you enable this setting, you can select how often reminder balloons updates appear and also prevent users from changing this setting. -Reminder balloons appear when the user's connection to a network file is lost or reconnected, and they are updated periodically. By default, the first reminder for an event is displayed for 30 seconds. Then, updates appear every 60 minutes and are displayed for 15 seconds. You can use this setting to change the update interval. +Reminder balloons appear when the user's connection to a network file is lost or reconnected, and they're updated periodically. By default, the first reminder for an event is displayed for 30 seconds. Then, updates appear every 60 minutes and are displayed for 15 seconds. You can use this setting to change the update interval. This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration. @@ -1987,13 +1955,12 @@ This setting appears in the Computer Configuration and User Configuration folder | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2019,7 +1986,7 @@ This setting appears in the Computer Configuration and User Configuration folder | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2034,7 +2001,7 @@ Determines how often reminder balloon updates appear. If you enable this setting, you can select how often reminder balloons updates appear and also prevent users from changing this setting. -Reminder balloons appear when the user's connection to a network file is lost or reconnected, and they are updated periodically. By default, the first reminder for an event is displayed for 30 seconds. Then, updates appear every 60 minutes and are displayed for 15 seconds. You can use this setting to change the update interval. +Reminder balloons appear when the user's connection to a network file is lost or reconnected, and they're updated periodically. By default, the first reminder for an event is displayed for 30 seconds. Then, updates appear every 60 minutes and are displayed for 15 seconds. You can use this setting to change the update interval. This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration. @@ -2051,13 +2018,12 @@ This setting appears in the Computer Configuration and User Configuration folder | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2083,7 +2049,7 @@ This setting appears in the Computer Configuration and User Configuration folder | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2096,7 +2062,7 @@ This setting appears in the Computer Configuration and User Configuration folder Determines how long the first reminder balloon for a network status change is displayed. -Reminder balloons appear when the user's connection to a network file is lost or reconnected, and they are updated periodically. By default, the first reminder for an event is displayed for 30 seconds. Then, updates appear every 60 minutes and are displayed for 15 seconds. You can use this setting to change the duration of the first reminder. +Reminder balloons appear when the user's connection to a network file is lost or reconnected, and they're updated periodically. By default, the first reminder for an event is displayed for 30 seconds. Then, updates appear every 60 minutes and are displayed for 15 seconds. You can use this setting to change the duration of the first reminder. This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration. @@ -2110,13 +2076,12 @@ This setting appears in the Computer Configuration and User Configuration folder | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2142,7 +2107,7 @@ This setting appears in the Computer Configuration and User Configuration folder | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2155,7 +2120,7 @@ This setting appears in the Computer Configuration and User Configuration folder Determines how long the first reminder balloon for a network status change is displayed. -Reminder balloons appear when the user's connection to a network file is lost or reconnected, and they are updated periodically. By default, the first reminder for an event is displayed for 30 seconds. Then, updates appear every 60 minutes and are displayed for 15 seconds. You can use this setting to change the duration of the first reminder. +Reminder balloons appear when the user's connection to a network file is lost or reconnected, and they're updated periodically. By default, the first reminder for an event is displayed for 30 seconds. Then, updates appear every 60 minutes and are displayed for 15 seconds. You can use this setting to change the duration of the first reminder. This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration. @@ -2169,13 +2134,12 @@ This setting appears in the Computer Configuration and User Configuration folder | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2201,7 +2165,7 @@ This setting appears in the Computer Configuration and User Configuration folder | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2214,7 +2178,7 @@ This setting appears in the Computer Configuration and User Configuration folder Determines how long updated reminder balloons are displayed. -Reminder balloons appear when the user's connection to a network file is lost or reconnected, and they are updated periodically. By default, the first reminder for an event is displayed for 30 seconds. Then, updates appear every 60 minutes and are displayed for 15 seconds. You can use this setting to change the duration of the update reminder. +Reminder balloons appear when the user's connection to a network file is lost or reconnected, and they're updated periodically. By default, the first reminder for an event is displayed for 30 seconds. Then, updates appear every 60 minutes and are displayed for 15 seconds. You can use this setting to change the duration of the update reminder. This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration. @@ -2228,13 +2192,12 @@ This setting appears in the Computer Configuration and User Configuration folder | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2260,7 +2223,7 @@ This setting appears in the Computer Configuration and User Configuration folder | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2273,7 +2236,7 @@ This setting appears in the Computer Configuration and User Configuration folder Determines how long updated reminder balloons are displayed. -Reminder balloons appear when the user's connection to a network file is lost or reconnected, and they are updated periodically. By default, the first reminder for an event is displayed for 30 seconds. Then, updates appear every 60 minutes and are displayed for 15 seconds. You can use this setting to change the duration of the update reminder. +Reminder balloons appear when the user's connection to a network file is lost or reconnected, and they're updated periodically. By default, the first reminder for an event is displayed for 30 seconds. Then, updates appear every 60 minutes and are displayed for 15 seconds. You can use this setting to change the duration of the update reminder. This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration. @@ -2287,13 +2250,12 @@ This setting appears in the Computer Configuration and User Configuration folder | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2319,7 +2281,7 @@ This setting appears in the Computer Configuration and User Configuration folder | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2330,13 +2292,13 @@ This setting appears in the Computer Configuration and User Configuration folder -This policy setting controls the network latency and throughput thresholds that will cause a client computers to transition files and folders that are already available offline to the slow-link mode so that the user's access to this data is not degraded due to network slowness. When Offline Files is operating in the slow-link mode, all network file requests are satisfied from the Offline Files cache. This is similar to a user working offline. +This policy setting controls the network latency and throughput thresholds that will cause a client computers to transition files and folders that are already available offline to the slow-link mode so that the user's access to this data isn't degraded due to network slowness. When Offline Files is operating in the slow-link mode, all network file requests are satisfied from the Offline Files cache. This is similar to a user working offline. - If you enable this policy setting, Offline Files uses the slow-link mode if the network throughput between the client and the server is below (slower than) the Throughput threshold parameter, or if the round-trip network latency is above (slower than) the Latency threshold parameter. -You can configure the slow-link mode by specifying threshold values for Throughput (in bits per second) and/or Latency (in milliseconds) for specific UNC paths. We recommend that you always specify a value for Latency, since the round-trip network latency detection is faster. You can use wildcard characters (*) for specifying UNC paths. If you do not specify a Latency or Throughput value, computers running Windows Vista or Windows Server 2008 will not use the slow-link mode. +You can configure the slow-link mode by specifying threshold values for Throughput (in bits per second) and/or Latency (in milliseconds) for specific UNC paths. We recommend that you always specify a value for Latency, since the round-trip network latency detection is faster. You can use wildcard characters (*) for specifying UNC paths. If you don't specify a Latency or Throughput value, computers running Windows Vista or Windows Server 2008 won't use the slow-link mode. -- If you do not configure this policy setting, computers running Windows Vista or Windows Server 2008 will not transition a shared folder to the slow-link mode. Computers running Windows 7 or Windows Server 2008 R2 will use the default latency value of 80 milliseconds when transitioning a folder to the slow-link mode. Computers running Windows 8 or Windows Server 2012 will use the default latency value of 35 milliseconds when transitioning a folder to the slow-link mode. To avoid extra charges on cell phone or broadband plans, it may be necessary to configure the latency threshold to be lower than the round-trip network latency. +- If you don't configure this policy setting, computers running Windows Vista or Windows Server 2008 won't transition a shared folder to the slow-link mode. Computers running Windows 7 or Windows Server 2008 R2 will use the default latency value of 80 milliseconds when transitioning a folder to the slow-link mode. Computers running Windows 8 or Windows Server 2012 will use the default latency value of 35 milliseconds when transitioning a folder to the slow-link mode. To avoid extra charges on cell phone or broadband plans, it may be necessary to configure the latency threshold to be lower than the round-trip network latency. In Windows Vista or Windows Server 2008, once transitioned to slow-link mode, users will continue to operate in slow-link mode until the user clicks the Work Online button on the toolbar in Windows Explorer. Data will only be synchronized to the server if the user manually initiates synchronization by using Sync Center. @@ -2344,7 +2306,7 @@ In Windows 7, Windows Server 2008 R2, Windows 8 or Windows Server 2012, when ope In Windows 8 or Windows Server 2012, set the Latency threshold to 1ms to keep users always working offline in slow-link mode. -- If you disable this policy setting, computers will not use the slow-link mode. +- If you disable this policy setting, computers won't use the slow-link mode. @@ -2356,13 +2318,12 @@ In Windows 8 or Windows Server 2012, set the Latency threshold to 1ms to keep us | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2389,7 +2350,7 @@ In Windows 8 or Windows Server 2012, set the Latency threshold to 1ms to keep us | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2402,7 +2363,7 @@ In Windows 8 or Windows Server 2012, set the Latency threshold to 1ms to keep us Configures the threshold value at which Offline Files considers a network connection to be "slow". Any network speed below this value is considered to be slow. -When a connection is considered slow, Offline Files automatically adjust its behavior to avoid excessive synchronization traffic and will not automatically reconnect to a server when the presence of a server is detected. +When a connection is considered slow, Offline Files automatically adjust its behavior to avoid excessive synchronization traffic and won't automatically reconnect to a server when the presence of a server is detected. - If you enable this setting, you can configure the threshold value that will be used to determine a slow network connection. @@ -2421,13 +2382,12 @@ When a connection is considered slow, Offline Files automatically adjust its beh | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2453,7 +2413,7 @@ When a connection is considered slow, Offline Files automatically adjust its beh | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2470,9 +2430,9 @@ This setting also disables the "Synchronize all offline files before logging off - If you enable this setting, offline files are fully synchronized. Full synchronization ensures that offline files are complete and current. -- If you disable this setting, the system only performs a quick synchronization. Quick synchronization ensures that files are complete, but does not ensure that they are current. +- If you disable this setting, the system only performs a quick synchronization. Quick synchronization ensures that files are complete, but doesn't ensure that they're current. -- If you do not configure this setting, the system performs a quick synchronization by default, but users can change this option. +- If you don't configure this setting, the system performs a quick synchronization by default, but users can change this option. This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration. @@ -2489,13 +2449,12 @@ This setting appears in the Computer Configuration and User Configuration folder | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2522,7 +2481,7 @@ This setting appears in the Computer Configuration and User Configuration folder | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2539,9 +2498,9 @@ This setting also disables the "Synchronize all offline files before logging off - If you enable this setting, offline files are fully synchronized. Full synchronization ensures that offline files are complete and current. -- If you disable this setting, the system only performs a quick synchronization. Quick synchronization ensures that files are complete, but does not ensure that they are current. +- If you disable this setting, the system only performs a quick synchronization. Quick synchronization ensures that files are complete, but doesn't ensure that they're current. -- If you do not configure this setting, the system performs a quick synchronization by default, but users can change this option. +- If you don't configure this setting, the system performs a quick synchronization by default, but users can change this option. This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration. @@ -2558,13 +2517,12 @@ This setting appears in the Computer Configuration and User Configuration folder | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2591,7 +2549,7 @@ This setting appears in the Computer Configuration and User Configuration folder | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2608,9 +2566,9 @@ This setting also disables the "Synchronize all offline files before logging on" - If you enable this setting, offline files are fully synchronized at logon. Full synchronization ensures that offline files are complete and current. Enabling this setting automatically enables logon synchronization in Synchronization Manager. -- If this setting is disabled and Synchronization Manager is configured for logon synchronization, the system performs only a quick synchronization. Quick synchronization ensures that files are complete but does not ensure that they are current. +- If this setting is disabled and Synchronization Manager is configured for logon synchronization, the system performs only a quick synchronization. Quick synchronization ensures that files are complete but doesn't ensure that they're current. -- If you do not configure this setting and Synchronization Manager is configured for logon synchronization, the system performs a quick synchronization by default, but users can change this option. +- If you don't configure this setting and Synchronization Manager is configured for logon synchronization, the system performs a quick synchronization by default, but users can change this option. This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration. @@ -2627,13 +2585,12 @@ This setting appears in the Computer Configuration and User Configuration folder | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2660,7 +2617,7 @@ This setting appears in the Computer Configuration and User Configuration folder | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2677,9 +2634,9 @@ This setting also disables the "Synchronize all offline files before logging on" - If you enable this setting, offline files are fully synchronized at logon. Full synchronization ensures that offline files are complete and current. Enabling this setting automatically enables logon synchronization in Synchronization Manager. -- If this setting is disabled and Synchronization Manager is configured for logon synchronization, the system performs only a quick synchronization. Quick synchronization ensures that files are complete but does not ensure that they are current. +- If this setting is disabled and Synchronization Manager is configured for logon synchronization, the system performs only a quick synchronization. Quick synchronization ensures that files are complete but doesn't ensure that they're current. -- If you do not configure this setting and Synchronization Manager is configured for logon synchronization, the system performs a quick synchronization by default, but users can change this option. +- If you don't configure this setting and Synchronization Manager is configured for logon synchronization, the system performs a quick synchronization by default, but users can change this option. This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration. @@ -2696,13 +2653,12 @@ This setting appears in the Computer Configuration and User Configuration folder | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2729,7 +2685,7 @@ This setting appears in the Computer Configuration and User Configuration folder | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2744,10 +2700,10 @@ Determines whether offline files are synchonized before a computer is suspended. - If you enable this setting, offline files are synchronized whenever the computer is suspended. Setting the synchronization action to "Quick" ensures only that all files in the cache are complete. Setting the synchronization action to "Full" ensures that all cached files and folders are up-to-date with the most current version. -- If you disable or do not configuring this setting, files are not synchronized when the computer is suspended. +- If you disable or don't configuring this setting, files aren't synchronized when the computer is suspended. > [!NOTE] -> If the computer is suspended by closing the display on a portable computer, files are not synchronized. If multiple users are logged on to the computer at the time the computer is suspended, a synchronization is not performed. +> If the computer is suspended by closing the display on a portable computer, files aren't synchronized. If multiple users are logged-on to the computer at the time the computer is suspended, a synchronization isn't performed. @@ -2759,13 +2715,12 @@ Determines whether offline files are synchonized before a computer is suspended. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2791,7 +2746,7 @@ Determines whether offline files are synchonized before a computer is suspended. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2806,10 +2761,10 @@ Determines whether offline files are synchonized before a computer is suspended. - If you enable this setting, offline files are synchronized whenever the computer is suspended. Setting the synchronization action to "Quick" ensures only that all files in the cache are complete. Setting the synchronization action to "Full" ensures that all cached files and folders are up-to-date with the most current version. -- If you disable or do not configuring this setting, files are not synchronized when the computer is suspended. +- If you disable or don't configuring this setting, files aren't synchronized when the computer is suspended. > [!NOTE] -> If the computer is suspended by closing the display on a portable computer, files are not synchronized. If multiple users are logged on to the computer at the time the computer is suspended, a synchronization is not performed. +> If the computer is suspended by closing the display on a portable computer, files aren't synchronized. If multiple users are logged-on to the computer at the time the computer is suspended, a synchronization isn't performed. @@ -2821,13 +2776,12 @@ Determines whether offline files are synchonized before a computer is suspended. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2853,7 +2807,7 @@ Determines whether offline files are synchonized before a computer is suspended. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2868,7 +2822,7 @@ This policy setting determines whether offline files are synchronized in the bac - If you enable this setting, synchronization can occur in the background when the user's network is roaming, near, or over the plan's data limit. This may result in extra charges on cell phone or broadband plans. -- If this setting is disabled or not configured, synchronization will not run in the background on network folders when the user's network is roaming, near, or over the plan's data limit. The network folder must also be in "slow-link" mode, as specified by the "Configure slow-link mode" policy to avoid network usage. +- If this setting is disabled or not configured, synchronization won't run in the background on network folders when the user's network is roaming, near, or over the plan's data limit. The network folder must also be in "slow-link" mode, as specified by the "Configure slow-link mode" policy to avoid network usage. @@ -2880,13 +2834,12 @@ This policy setting determines whether offline files are synchronized in the bac | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2913,7 +2866,7 @@ This policy setting determines whether offline files are synchronized in the bac | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2926,9 +2879,9 @@ This policy setting determines whether offline files are synchronized in the bac This policy setting removes the "Work offline" command from Explorer, preventing users from manually changing whether Offline Files is in online mode or offline mode. -- If you enable this policy setting, the "Work offline" command is not displayed in File Explorer. +- If you enable this policy setting, the "Work offline" command isn't displayed in File Explorer. -- If you disable or do not configure this policy setting, the "Work offline" command is displayed in File Explorer. +- If you disable or don't configure this policy setting, the "Work offline" command is displayed in File Explorer. @@ -2940,13 +2893,12 @@ This policy setting removes the "Work offline" command from Explorer, preventing | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2973,7 +2925,7 @@ This policy setting removes the "Work offline" command from Explorer, preventing | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2986,9 +2938,9 @@ This policy setting removes the "Work offline" command from Explorer, preventing This policy setting removes the "Work offline" command from Explorer, preventing users from manually changing whether Offline Files is in online mode or offline mode. -- If you enable this policy setting, the "Work offline" command is not displayed in File Explorer. +- If you enable this policy setting, the "Work offline" command isn't displayed in File Explorer. -- If you disable or do not configure this policy setting, the "Work offline" command is displayed in File Explorer. +- If you disable or don't configure this policy setting, the "Work offline" command is displayed in File Explorer. @@ -3000,13 +2952,12 @@ This policy setting removes the "Work offline" command from Explorer, preventing | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-pca.md b/windows/client-management/mdm/policy-csp-admx-pca.md index 936802cf55..8ab572b025 100644 --- a/windows/client-management/mdm/policy-csp-admx-pca.md +++ b/windows/client-management/mdm/policy-csp-admx-pca.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_pca Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_pca -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -42,7 +39,7 @@ ms.topic: reference -This setting exists only for backward compatibility, and is not valid for this version of Windows. To configure the Program Compatibility Assistant, use the 'Turn off Program Compatibility Assistant' setting under Computer Configuration\Administrative Templates\Windows Components\Application Compatibility. +This setting exists only for backward compatibility, and isn't valid for this version of Windows. To configure the Program Compatibility Assistant, use the 'Turn off Program Compatibility Assistant' setting under Computer Configuration\Administrative Templates\Windows Components\Application Compatibility. @@ -54,13 +51,12 @@ This setting exists only for backward compatibility, and is not valid for this v | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -86,7 +82,7 @@ This setting exists only for backward compatibility, and is not valid for this v | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -97,7 +93,7 @@ This setting exists only for backward compatibility, and is not valid for this v -This setting exists only for backward compatibility, and is not valid for this version of Windows. To configure the Program Compatibility Assistant, use the 'Turn off Program Compatibility Assistant' setting under Computer Configuration\Administrative Templates\Windows Components\Application Compatibility. +This setting exists only for backward compatibility, and isn't valid for this version of Windows. To configure the Program Compatibility Assistant, use the 'Turn off Program Compatibility Assistant' setting under Computer Configuration\Administrative Templates\Windows Components\Application Compatibility. @@ -109,13 +105,12 @@ This setting exists only for backward compatibility, and is not valid for this v | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -142,7 +137,7 @@ This setting exists only for backward compatibility, and is not valid for this v | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -153,7 +148,7 @@ This setting exists only for backward compatibility, and is not valid for this v -This setting exists only for backward compatibility, and is not valid for this version of Windows. To configure the Program Compatibility Assistant, use the 'Turn off Program Compatibility Assistant' setting under Computer Configuration\Administrative Templates\Windows Components\Application Compatibility. +This setting exists only for backward compatibility, and isn't valid for this version of Windows. To configure the Program Compatibility Assistant, use the 'Turn off Program Compatibility Assistant' setting under Computer Configuration\Administrative Templates\Windows Components\Application Compatibility. @@ -165,13 +160,12 @@ This setting exists only for backward compatibility, and is not valid for this v | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -198,7 +192,7 @@ This setting exists only for backward compatibility, and is not valid for this v | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -209,7 +203,7 @@ This setting exists only for backward compatibility, and is not valid for this v -This setting exists only for backward compatibility, and is not valid for this version of Windows. To configure the Program Compatibility Assistant, use the 'Turn off Program Compatibility Assistant' setting under Computer Configuration\Administrative Templates\Windows Components\Application Compatibility. +This setting exists only for backward compatibility, and isn't valid for this version of Windows. To configure the Program Compatibility Assistant, use the 'Turn off Program Compatibility Assistant' setting under Computer Configuration\Administrative Templates\Windows Components\Application Compatibility. @@ -221,13 +215,12 @@ This setting exists only for backward compatibility, and is not valid for this v | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -253,7 +246,7 @@ This setting exists only for backward compatibility, and is not valid for this v | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -264,7 +257,7 @@ This setting exists only for backward compatibility, and is not valid for this v -This setting exists only for backward compatibility, and is not valid for this version of Windows. To configure the Program Compatibility Assistant, use the 'Turn off Program Compatibility Assistant' setting under Computer Configuration\Administrative Templates\Windows Components\Application Compatibility. +This setting exists only for backward compatibility, and isn't valid for this version of Windows. To configure the Program Compatibility Assistant, use the 'Turn off Program Compatibility Assistant' setting under Computer Configuration\Administrative Templates\Windows Components\Application Compatibility. @@ -276,13 +269,12 @@ This setting exists only for backward compatibility, and is not valid for this v | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -309,7 +301,7 @@ This setting exists only for backward compatibility, and is not valid for this v | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -320,7 +312,7 @@ This setting exists only for backward compatibility, and is not valid for this v -This setting exists only for backward compatibility, and is not valid for this version of Windows. To configure the Program Compatibility Assistant, use the 'Turn off Program Compatibility Assistant' setting under Computer Configuration\Administrative Templates\Windows Components\Application Compatibility. +This setting exists only for backward compatibility, and isn't valid for this version of Windows. To configure the Program Compatibility Assistant, use the 'Turn off Program Compatibility Assistant' setting under Computer Configuration\Administrative Templates\Windows Components\Application Compatibility. @@ -332,13 +324,12 @@ This setting exists only for backward compatibility, and is not valid for this v | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -365,7 +356,7 @@ This setting exists only for backward compatibility, and is not valid for this v | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -380,9 +371,9 @@ This policy setting configures the Program Compatibility Assistant (PCA) to diag - If you enable this policy setting, the PCA is configured to detect failures during application installation, failures during application runtime, and drivers blocked due to compatibility issues. When failures are detected, the PCA will provide options to run the application in a compatibility mode or get help online through a Microsoft website. -- If you disable this policy setting, the PCA does not detect compatibility issues for applications and drivers. +- If you disable this policy setting, the PCA doesn't detect compatibility issues for applications and drivers. -- If you do not configure this policy setting, the PCA is configured to detect failures during application installation, failures during application runtime, and drivers blocked due to compatibility issues. +- If you don't configure this policy setting, the PCA is configured to detect failures during application installation, failures during application runtime, and drivers blocked due to compatibility issues. > [!NOTE] > This policy setting has no effect if the "Turn off Program Compatibility Assistant" policy setting is enabled. The Diagnostic Policy Service (DPS) and Program Compatibility Assistant Service must be running for the PCA to run. These services can be configured by using the Services snap-in to the Microsoft Management Console. @@ -397,13 +388,12 @@ This policy setting configures the Program Compatibility Assistant (PCA) to diag | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-peertopeercaching.md b/windows/client-management/mdm/policy-csp-admx-peertopeercaching.md index f2d2d78382..c7a0b84a44 100644 --- a/windows/client-management/mdm/policy-csp-admx-peertopeercaching.md +++ b/windows/client-management/mdm/policy-csp-admx-peertopeercaching.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_PeerToPeerCaching Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_PeerToPeerCaching -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,17 +41,17 @@ ms.topic: reference This policy setting specifies whether BranchCache is enabled on client computers to which this policy is applied. In addition to this policy setting, you must specify whether the client computers are hosted cache mode or distributed cache mode clients. To do so, configure one of the following the policy settings: -- Set BranchCache Distributed Cache mode +- Set BranchCache Distributed Cache mode. -- Set BranchCache Hosted Cache mode +- Set BranchCache Hosted Cache mode. -- Configure Hosted Cache Servers +- Configure Hosted Cache Servers. -Policy configuration +Policy configuration. Select one of the following: -- Not Configured. With this selection, BranchCache settings are not applied to client computers by this policy. In the circumstance where client computers are domain members but you do not want to enable BranchCache on all client computers, you can specify Not Configured for this domain Group Policy setting, and then configure local computer policy to enable BranchCache on individual client computers. Because the domain Group Policy setting is not configured, it will not over-write the enabled setting that you use on individual client computers where you want to enable BranchCache. +- Not Configured. With this selection, BranchCache settings aren't applied to client computers by this policy. In the circumstance where client computers are domain members but you don't want to enable BranchCache on all client computers, you can specify Not Configured for this domain Group Policy setting, and then configure local computer policy to enable BranchCache on individual client computers. Because the domain Group Policy setting isn't configured, it won't over-write the enabled setting that you use on individual client computers where you want to enable BranchCache. - Enabled. With this selection, BranchCache is turned on for all client computers where the policy is applied. For example, if this policy is enabled in domain Group Policy, BranchCache is turned on for all domain member client computers to which the policy is applied. @@ -72,13 +69,12 @@ Select one of the following: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -105,7 +101,7 @@ Select one of the following: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -120,11 +116,11 @@ This policy setting specifies whether BranchCache distributed cache mode is enab In distributed cache mode, client computers download content from BranchCache-enabled main office content servers, cache the content locally, and serve the content to other BranchCache distributed cache mode clients in the branch office. -Policy configuration +Policy configuration. Select one of the following: -- Not Configured. With this selection, BranchCache settings are not applied to client computers by this policy. In the circumstance where client computers are domain members but you do not want to enable BranchCache on all client computers, you can specify Not Configured for this domain Group Policy setting, and then configure local computer policy to enable BranchCache on individual client computers. Because the domain Group Policy setting is not configured, it will not over-write the enabled setting that you use on individual client computers where you want to enable BranchCache. +- Not Configured. With this selection, BranchCache settings aren't applied to client computers by this policy. In the circumstance where client computers are domain members but you don't want to enable BranchCache on all client computers, you can specify Not Configured for this domain Group Policy setting, and then configure local computer policy to enable BranchCache on individual client computers. Because the domain Group Policy setting isn't configured, it won't over-write the enabled setting that you use on individual client computers where you want to enable BranchCache. - Enabled. With this selection, BranchCache distributed cache mode is enabled for all client computers where the policy is applied. For example, if this policy is enabled in domain Group Policy, BranchCache distributed cache mode is turned on for all domain member client computers to which the policy is applied. @@ -142,13 +138,12 @@ Select one of the following: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -175,7 +170,7 @@ Select one of the following: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -188,13 +183,13 @@ Select one of the following: This policy setting specifies whether BranchCache hosted cache mode is enabled on client computers to which this policy is applied. In addition to this policy, you must use the policy "Turn on BranchCache" to enable BranchCache on client computers. -When a client computer is configured as a hosted cache mode client, it is able to download cached content from a hosted cache server that is located at the branch office. In addition, when the hosted cache client obtains content from a content server, the client can upload the content to the hosted cache server for access by other hosted cache clients at the branch office. +When a client computer is configured as a hosted cache mode client, it's able to download cached content from a hosted cache server that's located at the branch office. In addition, when the hosted cache client obtains content from a content server, the client can upload the content to the hosted cache server for access by other hosted cache clients at the branch office. -Policy configuration +Policy configuration. Select one of the following: -- Not Configured. With this selection, BranchCache settings are not applied to client computers by this policy. In the circumstance where client computers are domain members but you do not want to enable BranchCache on all client computers, you can specify Not Configured for this domain Group Policy setting, and then configure local computer policy to enable BranchCache on individual client computers. Because the domain Group Policy setting is not configured, it will not over-write the enabled setting that you use on individual client computers where you want to enable BranchCache. +- Not Configured. With this selection, BranchCache settings aren't applied to client computers by this policy. In the circumstance where client computers are domain members but you don't want to enable BranchCache on all client computers, you can specify Not Configured for this domain Group Policy setting, and then configure local computer policy to enable BranchCache on individual client computers. Because the domain Group Policy setting isn't configured, it won't over-write the enabled setting that you use on individual client computers where you want to enable BranchCache. - Enabled. With this selection, BranchCache hosted cache mode is enabled for all client computers where the policy is applied. For example, if this policy is enabled in domain Group Policy, BranchCache hosted cache mode is turned on for all domain member client computers to which the policy is applied. @@ -202,9 +197,9 @@ Select one of the following: In circumstances where this setting is enabled, you can also select and configure the following option: -- Type the name of the hosted cache server. Specifies the computer name of the hosted cache server. Because the hosted cache server name is also specified in the certificate enrolled to the hosted cache server, the name that you enter here must match the name of the hosted cache server that is specified in the server certificate. +- Type the name of the hosted cache server. Specifies the computer name of the hosted cache server. Because the hosted cache server name is also specified in the certificate enrolled to the hosted cache server, the name that you enter here must match the name of the hosted cache server that's specified in the server certificate. -Hosted cache clients must trust the server certificate that is issued to the hosted cache server. Ensure that the issuing CA certificate is installed in the Trusted Root Certification Authorities certificate store on all hosted cache client computers. +Hosted cache clients must trust the server certificate that's issued to the hosted cache server. Ensure that the issuing CA certificate is installed in the Trusted Root Certification Authorities certificate store on all hosted cache client computers. * This policy setting is supported on computers that are running Windows Vista Business, Enterprise, and Ultimate editions with Background Intelligent Transfer Service (BITS) 4.0 installed. @@ -218,13 +213,12 @@ Hosted cache clients must trust the server certificate that is issued to the hos | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -250,7 +244,7 @@ Hosted cache clients must trust the server certificate that is issued to the hos | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -263,29 +257,29 @@ Hosted cache clients must trust the server certificate that is issued to the hos This policy setting specifies whether client computers should attempt the automatic configuration of hosted cache mode by searching for hosted cache servers publishing service connection points that are associated with the client's current Active Directory site. If you enable this policy setting, client computers to which the policy setting is applied search for hosted cache servers using Active Directory, and will prefer both these servers and hosted cache mode rather than manual BranchCache configuration or BranchCache configuration by other group policies. -If you enable this policy setting in addition to the "Turn on BranchCache" policy setting, BranchCache clients attempt to discover hosted cache servers in the local branch office. If client computers detect hosted cache servers, hosted cache mode is turned on. If they do not detect hosted cache servers, hosted cache mode is not turned on, and the client uses any other configuration that is specified manually or by Group Policy. +If you enable this policy setting in addition to the "Turn on BranchCache" policy setting, BranchCache clients attempt to discover hosted cache servers in the local branch office. If client computers detect hosted cache servers, hosted cache mode is turned on. If they don't detect hosted cache servers, hosted cache mode isn't turned on, and the client uses any other configuration that's specified manually or by Group Policy. -When this policy setting is applied, the client computer performs or does not perform automatic hosted cache server discovery under the following circumstances: +When this policy setting is applied, the client computer performs or doesn't perform automatic hosted cache server discovery under the following circumstances: If no other BranchCache mode-based policy settings are applied, the client computer performs automatic hosted cache server discovery. If one or more hosted cache servers is found, the client computer self-configures for hosted cache mode. If the policy setting "Set BranchCache Distributed Cache Mode" is applied in addition to this policy, the client computer performs automatic hosted cache server discovery. If one or more hosted cache servers are found, the client computer self-configures for hosted cache mode only. -If the policy setting "Set BranchCache Hosted Cache Mode" is applied, the client computer does not perform automatic hosted cache discovery. This is also true in cases where the policy setting "Configure Hosted Cache Servers" is applied. +If the policy setting "Set BranchCache Hosted Cache Mode" is applied, the client computer doesn't perform automatic hosted cache discovery. This is also true in cases where the policy setting "Configure Hosted Cache Servers" is applied. This policy setting can only be applied to client computers that are running at least Windows 8. This policy has no effect on computers that are running Windows 7 or Windows Vista. -If you disable, or do not configure this setting, a client will not attempt to discover hosted cache servers by service connection point. +If you disable, or don't configure this setting, a client won't attempt to discover hosted cache servers by service connection point. -Policy configuration +Policy configuration. Select one of the following: -- Not Configured. With this selection, BranchCache settings are not applied to client computers by this policy setting, and client computers do not perform hosted cache server discovery. +- Not Configured. With this selection, BranchCache settings aren't applied to client computers by this policy setting, and client computers don't perform hosted cache server discovery. - Enabled. With this selection, the policy setting is applied to client computers, which perform automatic hosted cache server discovery and which are configured as hosted cache mode clients. -- Disabled. With this selection, this policy is not applied to client computers. +- Disabled. With this selection, this policy isn't applied to client computers. @@ -297,13 +291,12 @@ Select one of the following: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -330,7 +323,7 @@ Select one of the following: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -345,19 +338,19 @@ This policy setting specifies whether client computers are configured to use hos - If you enable this policy setting and specify valid computer names of hosted cache servers, hosted cache mode is enabled for all client computers to which the policy setting is applied. For this policy setting to take effect, you must also enable the "Turn on BranchCache" policy setting. -This policy setting can only be applied to client computers that are running at least Windows 8. This policy has no effect on computers that are running Windows 7 or Windows Vista. Client computers to which this policy setting is applied, in addition to the "Set BranchCache Hosted Cache mode" policy setting, use the hosted cache servers that are specified in this policy setting and do not use the hosted cache server that is configured in the policy setting "Set BranchCache Hosted Cache Mode." +This policy setting can only be applied to client computers that are running at least Windows 8. This policy has no effect on computers that are running Windows 7 or Windows Vista. Client computers to which this policy setting is applied, in addition to the "Set BranchCache Hosted Cache mode" policy setting, use the hosted cache servers that are specified in this policy setting and don't use the hosted cache server that's configured in the policy setting "Set BranchCache Hosted Cache Mode". -- If you do not configure this policy setting, or if you disable this policy setting, client computers that are configured with hosted cache mode still function correctly. +- If you don't configure this policy setting, or if you disable this policy setting, client computers that are configured with hosted cache mode still function correctly. -Policy configuration +Policy configuration. Select one of the following: -- Not Configured. With this selection, BranchCache settings are not applied to client computers by this policy setting. +- Not Configured. With this selection, BranchCache settings aren't applied to client computers by this policy setting. -- Enabled. With this selection, the policy setting is applied to client computers, which are configured as hosted cache mode clients that use the hosted cache servers that you specify in "Hosted cache servers." +- Enabled. With this selection, the policy setting is applied to client computers, which are configured as hosted cache mode clients that use the hosted cache servers that you specify in "Hosted cache servers". -- Disabled. With this selection, this policy is not applied to client computers. +- Disabled. With this selection, this policy isn't applied to client computers. In circumstances where this setting is enabled, you can also select and configure the following option: @@ -373,13 +366,12 @@ In circumstances where this setting is enabled, you can also select and configur | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -405,7 +397,7 @@ In circumstances where this setting is enabled, you can also select and configur | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -416,13 +408,13 @@ In circumstances where this setting is enabled, you can also select and configur -This policy setting is used only when you have deployed one or more BranchCache-enabled file servers at your main office. This policy setting specifies when client computers in branch offices start caching content from file servers based on the network latency - or delay - that occurs when the clients download content from the main office over a Wide Area Network (WAN) link. When you configure a value for this setting, which is the maximum round trip network latency allowed before caching begins, clients do not cache content until the network latency reaches the specified value; when network latency is greater than the value, clients begin caching content after they receive it from the file servers. +This policy setting is used only when you have deployed one or more BranchCache-enabled file servers at your main office. This policy setting specifies when client computers in branch offices start caching content from file servers based on the network latency - or delay - that occurs when the clients download content from the main office over a Wide Area Network (WAN) link. When you configure a value for this setting, which is the maximum round trip network latency allowed before caching begins, clients don't cache content until the network latency reaches the specified value; when network latency is greater than the value, clients begin caching content after they receive it from the file servers. -Policy configuration +Policy configuration. Select one of the following: -- Not Configured. With this selection, BranchCache latency settings are not applied to client computers by this policy. In the circumstance where client computers are domain members but you do not want to configure a BranchCache latency setting on all client computers, you can specify Not Configured for this domain Group Policy setting, and then configure local computer policy to enable BranchCache latency settings on individual client computers. Because the domain Group Policy setting is not configured, it will not over-write the latency setting that you use on individual client computers. +- Not Configured. With this selection, BranchCache latency settings aren't applied to client computers by this policy. In the circumstance where client computers are domain members but you don't want to configure a BranchCache latency setting on all client computers, you can specify Not Configured for this domain Group Policy setting, and then configure local computer policy to enable BranchCache latency settings on individual client computers. Because the domain Group Policy setting isn't configured, it won't over-write the latency setting that you use on individual client computers. - Enabled. With this selection, the BranchCache maximum round trip latency setting is enabled for all client computers where the policy is applied. For example, if Configure BranchCache for network files is enabled in domain Group Policy, the BranchCache latency setting that you specify in the policy is turned on for all domain member client computers to which the policy is applied. @@ -442,13 +434,12 @@ In circumstances where this policy setting is enabled, you can also select and c | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -474,7 +465,7 @@ In circumstances where this policy setting is enabled, you can also select and c | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -485,17 +476,17 @@ In circumstances where this policy setting is enabled, you can also select and c -This policy setting specifies the default percentage of total disk space that is allocated for the BranchCache disk cache on client computers. +This policy setting specifies the default percentage of total disk space that's allocated for the BranchCache disk cache on client computers. - If you enable this policy setting, you can configure the percentage of total disk space to allocate for the cache. -- If you disable or do not configure this policy setting, the cache is set to 5 percent of the total disk space on the client computer. +- If you disable or don't configure this policy setting, the cache is set to 5 percent of the total disk space on the client computer. -Policy configuration +Policy configuration. Select one of the following: -- Not Configured. With this selection, BranchCache client computer cache settings are not applied to client computers by this policy. In the circumstance where client computers are domain members but you do not want to configure a BranchCache client computer cache setting on all client computers, you can specify Not Configured for this domain Group Policy setting, and then configure local computer policy to enable BranchCache client computer cache settings on individual client computers. Because the domain Group Policy setting is not configured, it will not over-write the client computer cache setting that you use on individual client computers. +- Not Configured. With this selection, BranchCache client computer cache settings aren't applied to client computers by this policy. In the circumstance where client computers are domain members but you don't want to configure a BranchCache client computer cache setting on all client computers, you can specify Not Configured for this domain Group Policy setting, and then configure local computer policy to enable BranchCache client computer cache settings on individual client computers. Because the domain Group Policy setting isn't configured, it won't over-write the client computer cache setting that you use on individual client computers. - Enabled. With this selection, the BranchCache client computer cache setting is enabled for all client computers where the policy is applied. For example, if Set percentage of disk space used for client computer cache is enabled in domain Group Policy, the BranchCache client computer cache setting that you specify in the policy is turned on for all domain member client computers to which the policy is applied. @@ -503,7 +494,7 @@ Select one of the following: In circumstances where this setting is enabled, you can also select and configure the following option: -- Specify the percentage of total disk space allocated for the cache. Specifies an integer that is the percentage of total client computer disk space to use for the BranchCache client computer cache. +- Specify the percentage of total disk space allocated for the cache. Specifies an integer that's the percentage of total client computer disk space to use for the BranchCache client computer cache. * This policy setting is supported on computers that are running Windows Vista Business, Enterprise, and Ultimate editions with Background Intelligent Transfer Service (BITS) 4.0 installed. @@ -517,13 +508,12 @@ In circumstances where this setting is enabled, you can also select and configur | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -549,7 +539,7 @@ In circumstances where this setting is enabled, you can also select and configur | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -564,13 +554,13 @@ This policy setting specifies the default age in days for which segments are val - If you enable this policy setting, you can configure the age for segments in the data cache. -- If you disable or do not configure this policy setting, the age is set to 28 days. +- If you disable or don't configure this policy setting, the age is set to 28 days. -Policy configuration +Policy configuration. Select one of the following: -- Not Configured. With this selection, BranchCache client computer cache age settings are not applied to client computers by this policy. In the circumstance where client computers are domain members but you do not want to configure a BranchCache client computer cache age setting on all client computers, you can specify Not Configured for this domain Group Policy setting, and then configure local computer policy to enable BranchCache client computer cache age settings on individual client computers. Because the domain Group Policy setting is not configured, it will not over-write the client computer cache age setting that you use on individual client computers. +- Not Configured. With this selection, BranchCache client computer cache age settings aren't applied to client computers by this policy. In the circumstance where client computers are domain members but you don't want to configure a BranchCache client computer cache age setting on all client computers, you can specify Not Configured for this domain Group Policy setting, and then configure local computer policy to enable BranchCache client computer cache age settings on individual client computers. Because the domain Group Policy setting isn't configured, it won't over-write the client computer cache age setting that you use on individual client computers. - Enabled. With this selection, the BranchCache client computer cache age setting is enabled for all client computers where the policy is applied. For example, if this policy setting is enabled in domain Group Policy, the BranchCache client computer cache age that you specify in the policy is turned on for all domain member client computers to which the policy is applied. @@ -590,13 +580,12 @@ In circumstances where this setting is enabled, you can also select and configur | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -622,7 +611,7 @@ In circumstances where this setting is enabled, you can also select and configur | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -633,29 +622,29 @@ In circumstances where this setting is enabled, you can also select and configur -This policy setting specifies whether BranchCache-capable client computers operate in a downgraded mode in order to maintain compatibility with previous versions of BranchCache. If client computers do not use the same BranchCache version, cache efficiency might be reduced because client computers that are using different versions of BranchCache might store cache data in incompatible formats. +This policy setting specifies whether BranchCache-capable client computers operate in a downgraded mode in order to maintain compatibility with previous versions of BranchCache. If client computers don't use the same BranchCache version, cache efficiency might be reduced because client computers that are using different versions of BranchCache might store cache data in incompatible formats. -- If you enable this policy setting, all clients use the version of BranchCache that you specify in "Select from the following versions." +- If you enable this policy setting, all clients use the version of BranchCache that you specify in "Select from the following versions". -- If you do not configure this setting, all clients will use the version of BranchCache that matches their operating system. +- If you don't configure this setting, all clients will use the version of BranchCache that matches their operating system. -Policy configuration +Policy configuration. Select one of the following: -- Not Configured. With this selection, this policy setting is not applied to client computers, and the clients run the version of BranchCache that is included with their operating system. +- Not Configured. With this selection, this policy setting isn't applied to client computers, and the clients run the version of BranchCache that's included with their operating system. - Enabled. With this selection, this policy setting is applied to client computers based on the value of the option setting "Select from the following versions" that you specify. -- Disabled. With this selection, this policy setting is not applied to client computers, and the clients run the version of BranchCache that is included with their operating system. +- Disabled. With this selection, this policy setting isn't applied to client computers, and the clients run the version of BranchCache that's included with their operating system. In circumstances where this setting is enabled, you can also select and configure the following option: -Select from the following versions +Select from the following versions. -- Windows Vista with BITS 4.0 installed, Windows 7, or Windows Server 2008 R2. If you select this version, later versions of Windows run the version of BranchCache that is included in these operating systems rather than later versions of BranchCache. +- Windows Vista with BITS 4.0 installed, Windows 7, or Windows Server 2008 R2. If you select this version, later versions of Windows run the version of BranchCache that's included in these operating systems rather than later versions of BranchCache. -- Windows 8. If you select this version, Windows 8 will run the version of BranchCache that is included in the operating system. +- Windows 8. If you select this version, Windows 8 will run the version of BranchCache that's included in the operating system. @@ -667,13 +656,12 @@ Select from the following versions | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-pentraining.md b/windows/client-management/mdm/policy-csp-admx-pentraining.md index bc3212ef5a..71da7af9ca 100644 --- a/windows/client-management/mdm/policy-csp-admx-pentraining.md +++ b/windows/client-management/mdm/policy-csp-admx-pentraining.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_PenTraining Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_PenTraining -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,9 +41,9 @@ ms.topic: reference Turns off Tablet PC Pen Training. -- If you enable this policy setting, users cannot open Tablet PC Pen Training. +- If you enable this policy setting, users can't open Tablet PC Pen Training. -- If you disable or do not configure this policy setting, users can open Tablet PC Pen Training. +- If you disable or don't configure this policy setting, users can open Tablet PC Pen Training. @@ -58,13 +55,12 @@ Turns off Tablet PC Pen Training. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -91,7 +87,7 @@ Turns off Tablet PC Pen Training. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -104,9 +100,9 @@ Turns off Tablet PC Pen Training. Turns off Tablet PC Pen Training. -- If you enable this policy setting, users cannot open Tablet PC Pen Training. +- If you enable this policy setting, users can't open Tablet PC Pen Training. -- If you disable or do not configure this policy setting, users can open Tablet PC Pen Training. +- If you disable or don't configure this policy setting, users can open Tablet PC Pen Training. @@ -118,13 +114,12 @@ Turns off Tablet PC Pen Training. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-performancediagnostics.md b/windows/client-management/mdm/policy-csp-admx-performancediagnostics.md index f422307fe0..b303966a84 100644 --- a/windows/client-management/mdm/policy-csp-admx-performancediagnostics.md +++ b/windows/client-management/mdm/policy-csp-admx-performancediagnostics.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_PerformanceDiagnostics Area in Policy CSP author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_PerformanceDiagnostics -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,15 +43,15 @@ Determines the execution level for Windows Boot Performance Diagnostics. - If you enable this policy setting, you must select an execution level from the dropdown menu. If you select problem detection and troubleshooting only, the Diagnostic Policy Service (DPS) will detect Windows Boot Performance problems and attempt to determine their root causes. These root causes will be logged to the event log when detected, but no corrective action will be taken. If you select detection, troubleshooting and resolution, the DPS will detect Windows Boot Performance problems and indicate to the user that assisted resolution is available. -- If you disable this policy setting, Windows will not be able to detect, troubleshoot or resolve any Windows Boot Performance problems that are handled by the DPS. +- If you disable this policy setting, Windows won't be able to detect, troubleshoot or resolve any Windows Boot Performance problems that are handled by the DPS. -- If you do not configure this policy setting, the DPS will enable Windows Boot Performance for resolution by default. +- If you don't configure this policy setting, the DPS will enable Windows Boot Performance for resolution by default. -This policy setting takes effect only if the diagnostics-wide scenario execution policy is not configured. +This policy setting takes effect only if the diagnostics-wide scenario execution policy isn't configured. No system restart or service restart is required for this policy to take effect: changes take effect immediately. -This policy setting will only take effect when the Diagnostic Policy Service is in the running state. When the service is stopped or disabled, diagnostic scenarios will not be executed. The DPS can be configured with the Services snap-in to the Microsoft Management Console. +This policy setting will only take effect when the Diagnostic Policy Service is in the running state. When the service is stopped or disabled, diagnostic scenarios won't be executed. The DPS can be configured with the Services snap-in to the Microsoft Management Console. @@ -66,13 +63,12 @@ This policy setting will only take effect when the Diagnostic Policy Service is | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -99,7 +95,7 @@ This policy setting will only take effect when the Diagnostic Policy Service is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -114,15 +110,15 @@ Determines the execution level for Windows System Responsiveness Diagnostics. - If you enable this policy setting, you must select an execution level from the dropdown menu. If you select problem detection and troubleshooting only, the Diagnostic Policy Service (DPS) will detect Windows System Responsiveness problems and attempt to determine their root causes. These root causes will be logged to the event log when detected, but no corrective action will be taken. If you select detection, troubleshooting and resolution, the DPS will detect Windows System Responsiveness problems and indicate to the user that assisted resolution is available. -- If you disable this policy setting, Windows will not be able to detect, troubleshoot or resolve any Windows System Responsiveness problems that are handled by the DPS. +- If you disable this policy setting, Windows won't be able to detect, troubleshoot or resolve any Windows System Responsiveness problems that are handled by the DPS. -- If you do not configure this policy setting, the DPS will enable Windows System Responsiveness for resolution by default. +- If you don't configure this policy setting, the DPS will enable Windows System Responsiveness for resolution by default. -This policy setting takes effect only if the diagnostics-wide scenario execution policy is not configured. +This policy setting takes effect only if the diagnostics-wide scenario execution policy isn't configured. No system restart or service restart is required for this policy to take effect: changes take effect immediately. -This policy setting will only take effect when the Diagnostic Policy Service is in the running state. When the service is stopped or disabled, diagnostic scenarios will not be executed. The DPS can be configured with the Services snap-in to the Microsoft Management Console. +This policy setting will only take effect when the Diagnostic Policy Service is in the running state. When the service is stopped or disabled, diagnostic scenarios won't be executed. The DPS can be configured with the Services snap-in to the Microsoft Management Console. @@ -134,13 +130,12 @@ This policy setting will only take effect when the Diagnostic Policy Service is | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -167,7 +162,7 @@ This policy setting will only take effect when the Diagnostic Policy Service is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -182,15 +177,15 @@ Determines the execution level for Windows Shutdown Performance Diagnostics. - If you enable this policy setting, you must select an execution level from the dropdown menu. If you select problem detection and troubleshooting only, the Diagnostic Policy Service (DPS) will detect Windows Shutdown Performance problems and attempt to determine their root causes. These root causes will be logged to the event log when detected, but no corrective action will be taken. If you select detection, troubleshooting and resolution, the DPS will detect Windows Shutdown Performance problems and indicate to the user that assisted resolution is available. -- If you disable this policy setting, Windows will not be able to detect, troubleshoot or resolve any Windows Shutdown Performance problems that are handled by the DPS. +- If you disable this policy setting, Windows won't be able to detect, troubleshoot or resolve any Windows Shutdown Performance problems that are handled by the DPS. -- If you do not configure this policy setting, the DPS will enable Windows Shutdown Performance for resolution by default. +- If you don't configure this policy setting, the DPS will enable Windows Shutdown Performance for resolution by default. -This policy setting takes effect only if the diagnostics-wide scenario execution policy is not configured. +This policy setting takes effect only if the diagnostics-wide scenario execution policy isn't configured. No system restart or service restart is required for this policy to take effect: changes take effect immediately. -This policy setting will only take effect when the Diagnostic Policy Service is in the running state. When the service is stopped or disabled, diagnostic scenarios will not be executed. The DPS can be configured with the Services snap-in to the Microsoft Management Console. +This policy setting will only take effect when the Diagnostic Policy Service is in the running state. When the service is stopped or disabled, diagnostic scenarios won't be executed. The DPS can be configured with the Services snap-in to the Microsoft Management Console. @@ -202,13 +197,12 @@ This policy setting will only take effect when the Diagnostic Policy Service is | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -235,7 +229,7 @@ This policy setting will only take effect when the Diagnostic Policy Service is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -250,15 +244,15 @@ Determines the execution level for Windows Standby/Resume Performance Diagnostic - If you enable this policy setting, you must select an execution level from the dropdown menu. If you select problem detection and troubleshooting only, the Diagnostic Policy Service (DPS) will detect Windows Standby/Resume Performance problems and attempt to determine their root causes. These root causes will be logged to the event log when detected, but no corrective action will be taken. If you select detection, troubleshooting and resolution, the DPS will detect Windows Standby/Resume Performance problems and indicate to the user that assisted resolution is available. -- If you disable this policy setting, Windows will not be able to detect, troubleshoot or resolve any Windows Standby/Resume Performance problems that are handled by the DPS. +- If you disable this policy setting, Windows won't be able to detect, troubleshoot or resolve any Windows Standby/Resume Performance problems that are handled by the DPS. -- If you do not configure this policy setting, the DPS will enable Windows Standby/Resume Performance for resolution by default. +- If you don't configure this policy setting, the DPS will enable Windows Standby/Resume Performance for resolution by default. -This policy setting takes effect only if the diagnostics-wide scenario execution policy is not configured. +This policy setting takes effect only if the diagnostics-wide scenario execution policy isn't configured. No system restart or service restart is required for this policy to take effect: changes take effect immediately. -This policy setting will only take effect when the Diagnostic Policy Service is in the running state. When the service is stopped or disabled, diagnostic scenarios will not be executed. The DPS can be configured with the Services snap-in to the Microsoft Management Console. +This policy setting will only take effect when the Diagnostic Policy Service is in the running state. When the service is stopped or disabled, diagnostic scenarios won't be executed. The DPS can be configured with the Services snap-in to the Microsoft Management Console. @@ -270,13 +264,12 @@ This policy setting will only take effect when the Diagnostic Policy Service is | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-power.md b/windows/client-management/mdm/policy-csp-admx-power.md index 8d39627171..70d0eda39d 100644 --- a/windows/client-management/mdm/policy-csp-admx-power.md +++ b/windows/client-management/mdm/policy-csp-admx-power.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_Power Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_Power -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,9 +43,9 @@ This policy setting allows you to control the network connectivity state in stan - If you enable this policy setting, network connectivity will be maintained in standby. -- If you disable this policy setting, network connectivity in standby is not guaranteed. This connectivity restriction currently applies to WLAN networks only, and is subject to change. +- If you disable this policy setting, network connectivity in standby isn't guaranteed. This connectivity restriction currently applies to WLAN networks only, and is subject to change. -- If you do not configure this policy setting, users control this setting. +- If you don't configure this policy setting, users control this setting. @@ -60,13 +57,12 @@ This policy setting allows you to control the network connectivity state in stan | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -93,7 +89,7 @@ This policy setting allows you to control the network connectivity state in stan | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -108,7 +104,7 @@ This policy setting allows you to turn on the ability for applications and servi - If you enable this policy setting, an application or service may prevent the system from sleeping (Hybrid Sleep, Stand By, or Hibernate). -- If you disable or do not configure this policy setting, users control this setting. +- If you disable or don't configure this policy setting, users control this setting. @@ -120,13 +116,12 @@ This policy setting allows you to turn on the ability for applications and servi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -153,7 +148,7 @@ This policy setting allows you to turn on the ability for applications and servi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -167,11 +162,12 @@ This policy setting allows you to turn on the ability for applications and servi This policy setting specifies the action that Windows takes when a user presses the Start menu Power button. - If you enable this policy setting, select one of the following actions: + -Sleep -Hibernate --Shut down +-Shut down. -- If you disable this policy or do not configure this policy setting, users control this setting. +- If you disable this policy or don't configure this policy setting, users control this setting. @@ -183,13 +179,12 @@ This policy setting specifies the action that Windows takes when a user presses | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -215,7 +210,7 @@ This policy setting specifies the action that Windows takes when a user presses | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -230,7 +225,7 @@ This policy setting allows applications and services to prevent automatic sleep. - If you enable this policy setting, any application, service, or device driver prevents Windows from automatically transitioning to sleep after a period of user inactivity. -- If you disable or do not configure this policy setting, applications, services, or drivers do not prevent Windows from automatically transitioning to sleep. Only user input is used to determine if Windows should automatically sleep. +- If you disable or don't configure this policy setting, applications, services, or drivers don't prevent Windows from automatically transitioning to sleep. Only user input is used to determine if Windows should automatically sleep. @@ -242,13 +237,12 @@ This policy setting allows applications and services to prevent automatic sleep. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -275,7 +269,7 @@ This policy setting allows applications and services to prevent automatic sleep. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -290,7 +284,7 @@ This policy setting allows applications and services to prevent automatic sleep. - If you enable this policy setting, any application, service, or device driver prevents Windows from automatically transitioning to sleep after a period of user inactivity. -- If you disable or do not configure this policy setting, applications, services, or drivers do not prevent Windows from automatically transitioning to sleep. Only user input is used to determine if Windows should automatically sleep. +- If you disable or don't configure this policy setting, applications, services, or drivers don't prevent Windows from automatically transitioning to sleep. Only user input is used to determine if Windows should automatically sleep. @@ -302,13 +296,12 @@ This policy setting allows applications and services to prevent automatic sleep. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -335,7 +328,7 @@ This policy setting allows applications and services to prevent automatic sleep. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -350,7 +343,7 @@ This policy setting allows you to manage automatic sleep with open network files - If you enable this policy setting, the computer automatically sleeps when network files are open. -- If you disable or do not configure this policy setting, the computer does not automatically sleep when network files are open. +- If you disable or don't configure this policy setting, the computer doesn't automatically sleep when network files are open. @@ -362,13 +355,12 @@ This policy setting allows you to manage automatic sleep with open network files | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -395,7 +387,7 @@ This policy setting allows you to manage automatic sleep with open network files | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -410,7 +402,7 @@ This policy setting allows you to manage automatic sleep with open network files - If you enable this policy setting, the computer automatically sleeps when network files are open. -- If you disable or do not configure this policy setting, the computer does not automatically sleep when network files are open. +- If you disable or don't configure this policy setting, the computer doesn't automatically sleep when network files are open. @@ -422,13 +414,12 @@ This policy setting allows you to manage automatic sleep with open network files | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -455,7 +446,7 @@ This policy setting allows you to manage automatic sleep with open network files | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -470,7 +461,7 @@ This policy setting specifies the active power plan from a specified power plan' - If you enable this policy setting, you must specify a power plan, specified as a GUID using the following format: XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX (For example, 103eea6e-9fcd-4544-a713-c282d8e50083), indicating the power plan to be active. -- If you disable or do not configure this policy setting, users can see and change this setting. +- If you disable or don't configure this policy setting, users can see and change this setting. @@ -482,13 +473,12 @@ This policy setting specifies the active power plan from a specified power plan' | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -514,7 +504,7 @@ This policy setting specifies the active power plan from a specified power plan' | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -528,12 +518,13 @@ This policy setting specifies the active power plan from a specified power plan' This policy setting specifies the action that Windows takes when battery capacity reaches the critical battery notification level. - If you enable this policy setting, select one of the following actions: + -Take no action -Sleep -Hibernate --Shut down +-Shut down. -- If you disable or do not configure this policy setting, users control this setting. +- If you disable or don't configure this policy setting, users control this setting. @@ -545,13 +536,12 @@ This policy setting specifies the action that Windows takes when battery capacit | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -577,7 +567,7 @@ This policy setting specifies the action that Windows takes when battery capacit | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -591,12 +581,13 @@ This policy setting specifies the action that Windows takes when battery capacit This policy setting specifies the action that Windows takes when battery capacity reaches the low battery notification level. - If you enable this policy setting, select one of the following actions: + -Take no action -Sleep -Hibernate --Shut down +-Shut down. -- If you disable or do not configure this policy setting, users control this setting. +- If you disable or don't configure this policy setting, users control this setting. @@ -608,13 +599,12 @@ This policy setting specifies the action that Windows takes when battery capacit | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -640,7 +630,7 @@ This policy setting specifies the action that Windows takes when battery capacit | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -655,9 +645,9 @@ This policy setting specifies the percentage of battery capacity remaining that - If you enable this policy setting, you must enter a numeric value (percentage) to set the battery level that triggers the critical notification. -To set the action that is triggered, see the "Critical Battery Notification Action" policy setting. +To set the action that's triggered, see the "Critical Battery Notification Action" policy setting. -- If you disable this policy setting or do not configure it, users control this setting. +- If you disable this policy setting or don't configure it, users control this setting. @@ -669,13 +659,12 @@ To set the action that is triggered, see the "Critical Battery Notification Acti | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -701,7 +690,7 @@ To set the action that is triggered, see the "Critical Battery Notification Acti | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -716,9 +705,9 @@ This policy setting specifies the percentage of battery capacity remaining that - If you enable this policy setting, you must enter a numeric value (percentage) to set the battery level that triggers the low notification. -To set the action that is triggered, see the "Low Battery Notification Action" policy setting. +To set the action that's triggered, see the "Low Battery Notification Action" policy setting. -- If you disable this policy setting or do not configure it, users control this setting. +- If you disable this policy setting or don't configure it, users control this setting. @@ -730,13 +719,12 @@ To set the action that is triggered, see the "Low Battery Notification Action" p | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -762,7 +750,7 @@ To set the action that is triggered, see the "Low Battery Notification Action" p | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -779,7 +767,7 @@ This policy setting turns off the user notification when the battery capacity re The notification will only be shown if the "Low Battery Notification Action" policy setting is configured to "No Action". -- If you disable or do not configure this policy setting, users can control this setting. +- If you disable or don't configure this policy setting, users can control this setting. @@ -791,13 +779,12 @@ The notification will only be shown if the "Low Battery Notification Action" pol | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -824,7 +811,7 @@ The notification will only be shown if the "Low Battery Notification Action" pol | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -839,9 +826,9 @@ This policy setting allows you to control the network connectivity state in stan - If you enable this policy setting, network connectivity will be maintained in standby. -- If you disable this policy setting, network connectivity in standby is not guaranteed. This connectivity restriction currently applies to WLAN networks only, and is subject to change. +- If you disable this policy setting, network connectivity in standby isn't guaranteed. This connectivity restriction currently applies to WLAN networks only, and is subject to change. -- If you do not configure this policy setting, users control this setting. +- If you don't configure this policy setting, users control this setting. @@ -853,13 +840,12 @@ This policy setting allows you to control the network connectivity state in stan | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -886,7 +872,7 @@ This policy setting allows you to control the network connectivity state in stan | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -901,7 +887,7 @@ This policy setting allows you to turn on the ability for applications and servi - If you enable this policy setting, an application or service may prevent the system from sleeping (Hybrid Sleep, Stand By, or Hibernate). -- If you disable or do not configure this policy setting, users control this setting. +- If you disable or don't configure this policy setting, users control this setting. @@ -913,13 +899,12 @@ This policy setting allows you to turn on the ability for applications and servi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -946,7 +931,7 @@ This policy setting allows you to turn on the ability for applications and servi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -960,11 +945,12 @@ This policy setting allows you to turn on the ability for applications and servi This policy setting specifies the action that Windows takes when a user presses the Start menu Power button. - If you enable this policy setting, select one of the following actions: + -Sleep -Hibernate --Shut down +-Shut down. -- If you disable this policy or do not configure this policy setting, users control this setting. +- If you disable this policy or don't configure this policy setting, users control this setting. @@ -976,13 +962,12 @@ This policy setting specifies the action that Windows takes when a user presses | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1008,7 +993,7 @@ This policy setting specifies the action that Windows takes when a user presses | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1023,7 +1008,7 @@ This policy setting specifies the period of inactivity before Windows turns off - If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows turns off the hard disk. -- If you disable or do not configure this policy setting, users can see and change this setting. +- If you disable or don't configure this policy setting, users can see and change this setting. @@ -1035,13 +1020,12 @@ This policy setting specifies the period of inactivity before Windows turns off | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1067,7 +1051,7 @@ This policy setting specifies the period of inactivity before Windows turns off | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1082,7 +1066,7 @@ This policy setting specifies the period of inactivity before Windows turns off - If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows turns off the hard disk. -- If you disable or do not configure this policy setting, users can see and change this setting. +- If you disable or don't configure this policy setting, users can see and change this setting. @@ -1094,13 +1078,12 @@ This policy setting specifies the period of inactivity before Windows turns off | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1126,7 +1109,7 @@ This policy setting specifies the period of inactivity before Windows turns off | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1137,13 +1120,13 @@ This policy setting specifies the period of inactivity before Windows turns off -This policy setting allows you to configure whether power is automatically turned off when Windows shutdown completes. This setting does not affect Windows shutdown behavior when shutdown is manually selected using the Start menu or Task Manager user interfaces. Applications such as UPS software may rely on Windows shutdown behavior. +This policy setting allows you to configure whether power is automatically turned off when Windows shutdown completes. This setting doesn't affect Windows shutdown behavior when shutdown is manually selected using the Start menu or Task Manager user interfaces. Applications such as UPS software may rely on Windows shutdown behavior. This setting is only applicable when Windows shutdown is initiated by software programs invoking the Windows programming interfaces ExitWindowsEx() or InitiateSystemShutdown(). - If you enable this policy setting, the computer system safely shuts down and remains in a powered state, ready for power to be safely removed. -- If you disable or do not configure this policy setting, the computer system safely shuts down to a fully powered-off state. +- If you disable or don't configure this policy setting, the computer system safely shuts down to a fully powered-off state. @@ -1155,13 +1138,12 @@ This setting is only applicable when Windows shutdown is initiated by software p | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1188,7 +1170,7 @@ This setting is only applicable when Windows shutdown is initiated by software p | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1205,7 +1187,7 @@ This policy setting allows you to specify if Windows should enable the desktop b - If you disable this policy setting, the desktop background slideshow is disabled. -- If you disable or do not configure this policy setting, users control this setting. +- If you disable or don't configure this policy setting, users control this setting. @@ -1217,13 +1199,12 @@ This policy setting allows you to specify if Windows should enable the desktop b | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1250,7 +1231,7 @@ This policy setting allows you to specify if Windows should enable the desktop b | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1267,7 +1248,7 @@ This policy setting allows you to specify if Windows should enable the desktop b - If you disable this policy setting, the desktop background slideshow is disabled. -- If you disable or do not configure this policy setting, users control this setting. +- If you disable or don't configure this policy setting, users control this setting. @@ -1279,13 +1260,12 @@ This policy setting allows you to specify if Windows should enable the desktop b | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1312,7 +1292,7 @@ This policy setting allows you to specify if Windows should enable the desktop b | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1327,7 +1307,7 @@ This policy setting specifies the active power plan from a list of default Windo - If you enable this policy setting, specify a power plan from the Active Power Plan list. -- If you disable or do not configure this policy setting, users control this setting. +- If you disable or don't configure this policy setting, users control this setting. @@ -1339,13 +1319,12 @@ This policy setting specifies the active power plan from a list of default Windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1371,7 +1350,7 @@ This policy setting specifies the active power plan from a list of default Windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1386,7 +1365,7 @@ This policy setting allows you to turn off Power Throttling. - If you enable this policy setting, Power Throttling will be turned off. -- If you disable or do not configure this policy setting, users control this setting. +- If you disable or don't configure this policy setting, users control this setting. @@ -1398,13 +1377,12 @@ This policy setting allows you to turn off Power Throttling. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1431,7 +1409,7 @@ This policy setting allows you to turn off Power Throttling. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1444,9 +1422,9 @@ This policy setting allows you to turn off Power Throttling. This policy setting allows you to configure client computers to lock and prompt for a password when resuming from a hibernate or suspend state. -- If you enable this policy setting, the client computer is locked and prompted for a password when it is resumed from a suspend or hibernate state. +- If you enable this policy setting, the client computer is locked and prompted for a password when it's resumed from a suspend or hibernate state. -- If you disable or do not configure this policy setting, users control if their computer is automatically locked or not after performing a resume operation. +- If you disable or don't configure this policy setting, users control if their computer is automatically locked or not after performing a resume operation. @@ -1458,13 +1436,12 @@ This policy setting allows you to configure client computers to lock and prompt | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1491,7 +1468,7 @@ This policy setting allows you to configure client computers to lock and prompt | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1506,7 +1483,7 @@ This policy setting specifies the percentage of battery capacity remaining that - If you enable this policy setting, you must enter a numeric value (percentage) to set the battery level that triggers the reserve power notification. -- If you disable or do not configure this policy setting, users can see and change this setting. +- If you disable or don't configure this policy setting, users can see and change this setting. @@ -1518,13 +1495,12 @@ This policy setting specifies the percentage of battery capacity remaining that | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-powershellexecutionpolicy.md b/windows/client-management/mdm/policy-csp-admx-powershellexecutionpolicy.md index 0c13746a26..1fe9516c0a 100644 --- a/windows/client-management/mdm/policy-csp-admx-powershellexecutionpolicy.md +++ b/windows/client-management/mdm/policy-csp-admx-powershellexecutionpolicy.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_PowerShellExecutionPolicy Area in Policy author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_PowerShellExecutionPolicy -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -52,7 +49,7 @@ This policy setting allows you to turn on logging for Windows PowerShell modules - If you disable this policy setting, logging of execution events is disabled for all Windows PowerShell modules. Disabling this policy setting for a module is equivalent to setting the LogPipelineExecutionDetails property of the module to False. -- If this policy setting is not configured, the LogPipelineExecutionDetails property of a module or snap-in determines whether the execution events of a module or snap-in are logged. By default, the LogPipelineExecutionDetails property of all modules and snap-ins is set to False. +- If this policy setting isn't configured, the LogPipelineExecutionDetails property of a module or snap-in determines whether the execution events of a module or snap-in are logged. By default, the LogPipelineExecutionDetails property of all modules and snap-ins is set to False. To add modules and snap-ins to the policy setting list, click Show, and then type the module names in the list. The modules and snap-ins in the list must be installed on the computer. @@ -69,13 +66,12 @@ To add modules and snap-ins to the policy setting list, click Show, and then typ | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -102,7 +98,7 @@ To add modules and snap-ins to the policy setting list, click Show, and then typ | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -121,7 +117,7 @@ This policy setting lets you configure the script execution policy, controlling - If you enable this policy setting, the scripts selected in the drop-down list are allowed to run. -The "Allow only signed scripts" policy setting allows scripts to execute only if they are signed by a trusted publisher. +The "Allow only signed scripts" policy setting allows scripts to execute only if they're signed by a trusted publisher. The "Allow local scripts and remote signed scripts" policy setting allows any local scrips to run; scripts that originate from the Internet must be signed by a trusted publisher. @@ -130,9 +126,9 @@ The "Allow all scripts" policy setting allows all scripts to run. - If you disable this policy setting, no scripts are allowed to run. > [!NOTE] -> This policy setting exists under both "Computer Configuration" and "User Configuration" in the Local Group Policy Editor. The "Computer Configuration" has precedence over "User Configuration." +> This policy setting exists under both "Computer Configuration" and "User Configuration" in the Local Group Policy Editor. The "Computer Configuration" has precedence over "User Configuration". -- If you disable or do not configure this policy setting, it reverts to a per-machine preference setting; the default if that is not configured is "No scripts allowed." +- If you disable or don't configure this policy setting, it reverts to a per-machine preference setting; the default if that isn't configured is "No scripts allowed". @@ -144,13 +140,12 @@ The "Allow all scripts" policy setting allows all scripts to run. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -177,7 +172,7 @@ The "Allow all scripts" policy setting allows all scripts to run. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -194,16 +189,11 @@ The "Allow all scripts" policy setting allows all scripts to run. This policy setting lets you capture the input and output of Windows PowerShell commands into text-based transcripts. -- If you enable this policy setting, Windows PowerShell will enable transcripting for Windows PowerShell, the Windows PowerShell ISE, and any other -applications that leverage the Windows PowerShell engine. By default, Windows PowerShell will record transcript output to each users' My Documents -directory, with a file name that includes 'PowerShell_transcript', along with the computer name and time started. Enabling this policy is equivalent -to calling the Start-Transcript cmdlet on each Windows PowerShell session. +- If you enable this policy setting, Windows PowerShell will enable transcripting for Windows PowerShell, the Windows PowerShell ISE, and any other applications that leverage the Windows PowerShell engine. By default, Windows PowerShell will record transcript output to each users' My Documents directory, with a file name that includes 'PowerShell_transcript', along with the computer name and time started. Enabling this policy is equivalent to calling the Start-Transcript cmdlet on each Windows PowerShell session. -- If you disable this policy setting, transcripting of PowerShell-based applications is disabled by default, although transcripting can still be enabled -through the Start-Transcript cmdlet. +- If you disable this policy setting, transcripting of PowerShell-based applications is disabled by default, although transcripting can still be enabled through the Start-Transcript cmdlet. -If you use the OutputDirectory setting to enable transcript logging to a shared location, be sure to limit access to that directory to prevent users -from viewing the transcripts of other users or computers. +If you use the OutputDirectory setting to enable transcript logging to a shared location, be sure to limit access to that directory to prevent users from viewing the transcripts of other users or computers. > [!NOTE] > This policy setting exists under both Computer Configuration and User Configuration in the Group Policy Editor. The Computer Configuration policy setting takes precedence over the User Configuration policy setting. @@ -218,13 +208,12 @@ from viewing the transcripts of other users or computers. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -251,7 +240,7 @@ from viewing the transcripts of other users or computers. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -270,7 +259,7 @@ This policy setting allows you to set the default value of the SourcePath parame - If you enable this policy setting, the Update-Help cmdlet will use the specified value as the default value for the SourcePath parameter. This default value can be overridden by specifying a different value with the SourcePath parameter on the Update-Help cmdlet. -- If this policy setting is disabled or not configured, this policy setting does not set a default value for the SourcePath parameter of the Update-Help cmdlet. +- If this policy setting is disabled or not configured, this policy setting doesn't set a default value for the SourcePath parameter of the Update-Help cmdlet. > [!NOTE] > This policy setting exists under both Computer Configuration and User Configuration in the Group Policy Editor. The Computer Configuration policy setting takes precedence over the User Configuration policy setting. @@ -285,13 +274,12 @@ This policy setting allows you to set the default value of the SourcePath parame | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-previousversions.md b/windows/client-management/mdm/policy-csp-admx-previousversions.md index c2aa223837..8d21b28178 100644 --- a/windows/client-management/mdm/policy-csp-admx-previousversions.md +++ b/windows/client-management/mdm/policy-csp-admx-previousversions.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_PreviousVersions Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_PreviousVersions -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -48,7 +45,7 @@ This policy setting lets you suppress the Restore button in the previous version - If you disable this policy setting, the Restore button remains active for a previous version corresponding to a backup. If the Restore button is clicked, Windows attempts to restore the file from the backup media. -- If you do not configure this policy setting, it is disabled by default. The Restore button is active when the previous version is of a local file and stored on the backup. +- If you don't configure this policy setting, it's disabled by default. The Restore button is active when the previous version is of a local file and stored on the backup. @@ -60,13 +57,12 @@ This policy setting lets you suppress the Restore button in the previous version | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -93,7 +89,7 @@ This policy setting lets you suppress the Restore button in the previous version | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -110,7 +106,7 @@ This policy setting lets you suppress the Restore button in the previous version - If you disable this policy setting, the Restore button remains active for a previous version corresponding to a backup. If the Restore button is clicked, Windows attempts to restore the file from the backup media. -- If you do not configure this policy setting, it is disabled by default. The Restore button is active when the previous version is of a local file and stored on the backup. +- If you don't configure this policy setting, it's disabled by default. The Restore button is active when the previous version is of a local file and stored on the backup. @@ -122,13 +118,12 @@ This policy setting lets you suppress the Restore button in the previous version | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -155,7 +150,7 @@ This policy setting lets you suppress the Restore button in the previous version | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -168,11 +163,11 @@ This policy setting lets you suppress the Restore button in the previous version This policy setting lets you hide the list of previous versions of files that are on local disks. The previous versions could come from the on-disk restore points or from backup media. -- If you enable this policy setting, users cannot list or restore previous versions of files on local disks. +- If you enable this policy setting, users can't list or restore previous versions of files on local disks. -- If you disable this policy setting, users cannot list and restore previous versions of files on local disks. +- If you disable this policy setting, users can't list and restore previous versions of files on local disks. -- If you do not configure this policy setting, it defaults to disabled. +- If you don't configure this policy setting, it defaults to disabled. @@ -184,13 +179,12 @@ This policy setting lets you hide the list of previous versions of files that ar | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -217,7 +211,7 @@ This policy setting lets you hide the list of previous versions of files that ar | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -230,11 +224,11 @@ This policy setting lets you hide the list of previous versions of files that ar This policy setting lets you hide the list of previous versions of files that are on local disks. The previous versions could come from the on-disk restore points or from backup media. -- If you enable this policy setting, users cannot list or restore previous versions of files on local disks. +- If you enable this policy setting, users can't list or restore previous versions of files on local disks. -- If you disable this policy setting, users cannot list and restore previous versions of files on local disks. +- If you disable this policy setting, users can't list and restore previous versions of files on local disks. -- If you do not configure this policy setting, it defaults to disabled. +- If you don't configure this policy setting, it defaults to disabled. @@ -246,13 +240,12 @@ This policy setting lets you hide the list of previous versions of files that ar | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -279,7 +272,7 @@ This policy setting lets you hide the list of previous versions of files that ar | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -296,7 +289,7 @@ This policy setting lets you suppress the Restore button in the previous version - If you disable this policy setting, the Restore button remains active for a previous version corresponding to a local file. If the user clicks the Restore button, Windows attempts to restore the file from the local disk. -- If you do not configure this policy setting, it is disabled by default. The Restore button is active when the previous version is of a local file. +- If you don't configure this policy setting, it's disabled by default. The Restore button is active when the previous version is of a local file. @@ -308,13 +301,12 @@ This policy setting lets you suppress the Restore button in the previous version | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -341,7 +333,7 @@ This policy setting lets you suppress the Restore button in the previous version | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -358,7 +350,7 @@ This policy setting lets you suppress the Restore button in the previous version - If you disable this policy setting, the Restore button remains active for a previous version corresponding to a local file. If the user clicks the Restore button, Windows attempts to restore the file from the local disk. -- If you do not configure this policy setting, it is disabled by default. The Restore button is active when the previous version is of a local file. +- If you don't configure this policy setting, it's disabled by default. The Restore button is active when the previous version is of a local file. @@ -370,13 +362,12 @@ This policy setting lets you suppress the Restore button in the previous version | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -403,7 +394,7 @@ This policy setting lets you suppress the Restore button in the previous version | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -416,11 +407,11 @@ This policy setting lets you suppress the Restore button in the previous version This policy setting lets you hide the list of previous versions of files that are on file shares. The previous versions come from the on-disk restore points on the file share. -- If you enable this policy setting, users cannot list or restore previous versions of files on file shares. +- If you enable this policy setting, users can't list or restore previous versions of files on file shares. - If you disable this policy setting, users can list and restore previous versions of files on file shares. -- If you do not configure this policy setting, it is disabled by default. +- If you don't configure this policy setting, it's disabled by default. @@ -432,13 +423,12 @@ This policy setting lets you hide the list of previous versions of files that ar | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -465,7 +455,7 @@ This policy setting lets you hide the list of previous versions of files that ar | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -478,11 +468,11 @@ This policy setting lets you hide the list of previous versions of files that ar This policy setting lets you hide the list of previous versions of files that are on file shares. The previous versions come from the on-disk restore points on the file share. -- If you enable this policy setting, users cannot list or restore previous versions of files on file shares. +- If you enable this policy setting, users can't list or restore previous versions of files on file shares. - If you disable this policy setting, users can list and restore previous versions of files on file shares. -- If you do not configure this policy setting, it is disabled by default. +- If you don't configure this policy setting, it's disabled by default. @@ -494,13 +484,12 @@ This policy setting lets you hide the list of previous versions of files that ar | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -527,7 +516,7 @@ This policy setting lets you hide the list of previous versions of files that ar | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -544,7 +533,7 @@ This setting lets you suppress the Restore button in the previous versions prope - If you disable this policy setting, the Restore button remains active for a previous version corresponding to a file on a file share. If the user clicks the Restore button, Windows attempts to restore the file from the file share. -- If you do not configure this policy setting, it is disabled by default. The Restore button is active when the previous version is of a file on a file share. +- If you don't configure this policy setting, it's disabled by default. The Restore button is active when the previous version is of a file on a file share. @@ -556,13 +545,12 @@ This setting lets you suppress the Restore button in the previous versions prope | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -589,7 +577,7 @@ This setting lets you suppress the Restore button in the previous versions prope | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -606,7 +594,7 @@ This setting lets you suppress the Restore button in the previous versions prope - If you disable this policy setting, the Restore button remains active for a previous version corresponding to a file on a file share. If the user clicks the Restore button, Windows attempts to restore the file from the file share. -- If you do not configure this policy setting, it is disabled by default. The Restore button is active when the previous version is of a file on a file share. +- If you don't configure this policy setting, it's disabled by default. The Restore button is active when the previous version is of a file on a file share. @@ -618,13 +606,12 @@ This setting lets you suppress the Restore button in the previous versions prope | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -651,7 +638,7 @@ This setting lets you suppress the Restore button in the previous versions prope | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -664,11 +651,11 @@ This setting lets you suppress the Restore button in the previous versions prope This policy setting lets you hide entries in the list of previous versions of a file in which the previous version is located on backup media. Previous versions can come from the on-disk restore points or the backup media. -- If you enable this policy setting, users cannot see any previous versions corresponding to backup copies, and can see only previous versions corresponding to on-disk restore points. +- If you enable this policy setting, users can't see any previous versions corresponding to backup copies, and can see only previous versions corresponding to on-disk restore points. - If you disable this policy setting, users can see previous versions corresponding to backup copies as well as previous versions corresponding to on-disk restore points. -- If you do not configure this policy setting, it is disabled by default. +- If you don't configure this policy setting, it's disabled by default. @@ -680,13 +667,12 @@ This policy setting lets you hide entries in the list of previous versions of a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -713,7 +699,7 @@ This policy setting lets you hide entries in the list of previous versions of a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -726,11 +712,11 @@ This policy setting lets you hide entries in the list of previous versions of a This policy setting lets you hide entries in the list of previous versions of a file in which the previous version is located on backup media. Previous versions can come from the on-disk restore points or the backup media. -- If you enable this policy setting, users cannot see any previous versions corresponding to backup copies, and can see only previous versions corresponding to on-disk restore points. +- If you enable this policy setting, users can't see any previous versions corresponding to backup copies, and can see only previous versions corresponding to on-disk restore points. - If you disable this policy setting, users can see previous versions corresponding to backup copies as well as previous versions corresponding to on-disk restore points. -- If you do not configure this policy setting, it is disabled by default. +- If you don't configure this policy setting, it's disabled by default. @@ -742,13 +728,12 @@ This policy setting lets you hide entries in the list of previous versions of a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-printing.md b/windows/client-management/mdm/policy-csp-admx-printing.md index 207d96ce87..8080b412ee 100644 --- a/windows/client-management/mdm/policy-csp-admx-printing.md +++ b/windows/client-management/mdm/policy-csp-admx-printing.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_Printing Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_Printing -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,12 +43,12 @@ Internet printing lets you display printers on Web pages so that printers can be - If you enable this policy setting, Internet printing is activated on this server. -- If you disable this policy setting or do not configure it, Internet printing is not activated. +- If you disable this policy setting or don't configure it, Internet printing isn't activated. Internet printing is an extension of Internet Information Services (IIS). To use Internet printing, IIS must be installed, and printing support and this setting must be enabled. > [!NOTE] -> This setting affects the server side of Internet printing only. It does not prevent the print client on the computer from printing across the Internet. +> This setting affects the server side of Internet printing only. It doesn't prevent the print client on the computer from printing across the Internet. Also, see the "Custom support URL in the Printers folder's left pane" setting in this folder and the "Browse a common Web site to find printers" setting in User Configuration\Administrative Templates\Control Panel\Printers. @@ -65,13 +62,12 @@ Also, see the "Custom support URL in the Printers folder's left pane" setting in | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -98,7 +94,7 @@ Also, see the "Custom support URL in the Printers folder's left pane" setting in | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -111,15 +107,18 @@ Also, see the "Custom support URL in the Printers folder's left pane" setting in Determines if print driver components are isolated from applications instead of normally loading them into applications. Isolating print drivers greatly reduces the risk of a print driver failure causing an application crash. -Not all applications support driver isolation. By default, Microsoft Excel 2007, Excel 2010, Word 2007, Word 2010 and certain other applications are configured to support it. Other applications may also be capable of isolating print drivers, depending on whether they are configured for it. +Not all applications support driver isolation. By default, Microsoft Excel 2007, Excel 2010, Word 2007, Word 2010 and certain other applications are configured to support it. Other applications may also be capable of isolating print drivers, depending on whether they're configured for it. -- If you enable or do not configure this policy setting, then applications that are configured to support driver isolation will be isolated. +- If you enable or don't configure this policy setting, then applications that are configured to support driver isolation will be isolated. - If you disable this policy setting, then print drivers will be loaded within all associated application processes. -**Note**: +Note: + -This policy setting applies only to applications opted into isolation. --This policy setting applies only to print drivers loaded by applications. Print drivers loaded by the print spooler are not affected. + +-This policy setting applies only to print drivers loaded by applications. Print drivers loaded by the print spooler aren't affected. + -This policy setting is only checked once during the lifetime of a process. After changing the policy, a running application must be relaunched before settings take effect. @@ -132,13 +131,12 @@ Not all applications support driver isolation. By default, Microsoft Excel 2007, | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -165,7 +163,7 @@ Not all applications support driver isolation. By default, Microsoft Excel 2007, | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -180,10 +178,10 @@ By default, the Printers folder includes a link to the Microsoft Support Web pag - If you enable this policy setting, you replace the "Get help with printing" default link with a link to a Web page customized for your enterprise. -- If you disable this setting or do not configure it, or if you do not enter an alternate Internet address, the default link will appear in the Printers folder. +- If you disable this setting or don't configure it, or if you don't enter an alternate Internet address, the default link will appear in the Printers folder. > [!NOTE] -> Web pages links only appear in the Printers folder when Web view is enabled. If Web view is disabled, the setting has no effect. (To enable Web view, open the Printers folder, and, on the Tools menu, click Folder Options, click the General tab, and then click "Enable Web content in folders.") +> Web pages links only appear in the Printers folder when Web view is enabled. If Web view is disabled, the setting has no effect. (To enable Web view, open the Printers folder, and, on the Tools menu, click Folder Options, click the General tab, and then click "Enable Web content in folders"). Also, see the "Activate Internet printing" setting in this setting folder and the "Browse a common web site to find printers" setting in User Configuration\Administrative Templates\Control Panel\Printers. @@ -199,13 +197,12 @@ Web view is affected by the "Turn on Classic Shell" and "Do not allow Folder Opt | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -231,7 +228,7 @@ Web view is affected by the "Turn on Classic Shell" and "Do not allow Folder Opt | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -243,11 +240,12 @@ Web view is affected by the "Turn on Classic Shell" and "Do not allow Folder Opt -- If you enable this policy setting, it sets the maximum number of printers (of each type) that the Add Printer wizard will display on a computer on a managed network (when the computer is able to reach a domain controller, e.g. a domain-joined laptop on a corporate network.) +- If you enable this policy setting, it sets the maximum number of printers (of each type) that the Add Printer wizard will display on a computer on a managed network (when the computer is able to reach a domain controller, e.g. a domain-joined laptop on a corporate network). -- If this policy setting is disabled, the network scan page will not be displayed. +- If this policy setting is disabled, the network scan page won't be displayed. + +- If this policy setting isn't configured, the Add Printer wizard will display the default number of printers of each type: -- If this policy setting is not configured, the Add Printer wizard will display the default number of printers of each type: Directory printers: 20 TCP/IP printers: 0 Web Services printers: 0 @@ -260,9 +258,9 @@ If you would like to not display printers of a certain type, enable this policy In Windows 10 and later, only TCP/IP printers can be shown in the wizard. -- If you enable this policy setting, only TCP/IP printer limits are applicable. On Windows 10 only, if you disable or do not configure this policy setting, the default limit is applied. +- If you enable this policy setting, only TCP/IP printer limits are applicable. On Windows 10 only, if you disable or don't configure this policy setting, the default limit's applied. -In Windows 8 and later, Bluetooth printers are not shown so its limit does not apply to those versions of Windows. +In Windows 8 and later, Bluetooth printers aren't shown so its limit doesn't apply to those versions of Windows. @@ -274,13 +272,12 @@ In Windows 8 and later, Bluetooth printers are not shown so its limit does not a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -307,7 +304,7 @@ In Windows 8 and later, Bluetooth printers are not shown so its limit does not a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -322,9 +319,10 @@ This policy setting allows you to manage where client computers search for Point - If you enable this policy setting, the client computer will continue to search for compatible Point and Print drivers from Windows Update after it fails to find the compatible driver from the local driver store and the server driver cache. -- If you disable this policy setting, the client computer will only search the local driver store and server driver cache for compatible Point and Print drivers. If it is unable to find a compatible driver, then the Point and Print connection will fail. +- If you disable this policy setting, the client computer will only search the local driver store and server driver cache for compatible Point and Print drivers. If it's unable to find a compatible driver, then the Point and Print connection will fail. + +This policy setting isn't configured by default, and the behavior depends on the version of Windows that you are using. -This policy setting is not configured by default, and the behavior depends on the version of Windows that you are using. By default, Windows Ultimate, Professional and Home SKUs will continue to search for compatible Point and Print drivers from Windows Update, if needed. However, you must explicitly enable this policy setting for other versions of Windows (for example Windows Enterprise, and all versions of Windows Server 2008 R2 and later) to have the same behavior. @@ -337,13 +335,12 @@ By default, Windows Ultimate, Professional and Home SKUs will continue to search | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -370,7 +367,7 @@ By default, Windows Ultimate, Professional and Home SKUs will continue to search | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -383,12 +380,12 @@ By default, Windows Ultimate, Professional and Home SKUs will continue to search Allows users to use the Add Printer Wizard to search the network for shared printers. -- If you enable this setting or do not configure it, when users choose to add a network printer by selecting the "A network printer, or a printer attached to another computer" radio button on Add Printer Wizard's page 2, and also check the "Connect to this printer (or to browse for a printer, select this option and click Next)" radio button on Add Printer Wizard's page 3, and do not specify a printer name in the adjacent "Name" edit box, then Add Printer Wizard displays the list of shared printers on the network and invites to choose a printer from the shown list. +- If you enable this setting or don't configure it, when users choose to add a network printer by selecting the "A network printer, or a printer attached to another computer" radio button on Add Printer Wizard's page 2, and also check the "Connect to this printer (or to browse for a printer, select this option and click Next)" radio button on Add Printer Wizard's page 3, and don't specify a printer name in the adjacent "Name" edit box, then Add Printer Wizard displays the list of shared printers on the network and invites to choose a printer from the shown list. -- If you disable this setting, the network printer browse page is removed from within the Add Printer Wizard, and users cannot search the network but must type a printer name. +- If you disable this setting, the network printer browse page is removed from within the Add Printer Wizard, and users can't search the network but must type a printer name. > [!NOTE] -> This setting affects the Add Printer Wizard only. It does not prevent users from using other programs to search for shared printers or to connect to network printers. +> This setting affects the Add Printer Wizard only. It doesn't prevent users from using other programs to search for shared printers or to connect to network printers. @@ -400,13 +397,12 @@ Allows users to use the Add Printer Wizard to search the network for shared prin | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -433,7 +429,7 @@ Allows users to use the Add Printer Wizard to search the network for shared prin | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -448,20 +444,20 @@ When printing through a print server, determines whether the print spooler on th This policy setting only effects printing to a Windows print server. -- If you enable this policy setting on a client machine, the client spooler will not process print jobs before sending them to the print server. This decreases the workload on the client at the expense of increasing the load on the server. +- If you enable this policy setting on a client machine, the client spooler won't process print jobs before sending them to the print server. This decreases the workload on the client at the expense of increasing the load on the server. - If you disable this policy setting on a client machine, the client itself will process print jobs into printer device commands. These commands will then be sent to the print server, and the server will simply pass the commands to the printer. This increases the workload of the client while decreasing the load on the server. -If you do not enable this policy setting, the behavior is the same as disabling it. +If you don't enable this policy setting, the behavior is the same as disabling it. > [!NOTE] -> This policy does not determine whether offline printing will be available to the client. The client print spooler can always queue print jobs when not connected to the print server. Upon reconnecting to the server, the client will submit any pending print jobs. +> This policy doesn't determine whether offline printing will be available to the client. The client print spooler can always queue print jobs when not connected to the print server. Upon reconnecting to the server, the client will submit any pending print jobs. > [!NOTE] -> Some printer drivers require a custom print processor. In some cases the custom print processor may not be installed on the client machine, such as when the print server does not support transferring print processors during point-and-print. In the case of a print processor mismatch, the client spooler will always send jobs to the print server for rendering. Disabling the above policy setting does not override this behavior. +> Some printer drivers require a custom print processor. In some cases the custom print processor may not be installed on the client machine, such as when the print server doesn't support transferring print processors during point-and-print. In the case of a print processor mismatch, the client spooler will always send jobs to the print server for rendering. Disabling the above policy setting doesn't override this behavior. > [!NOTE] -> In cases where the client print driver does not match the server print driver (mismatched connection), the client will always process the print job, regardless of the setting of this policy. +> In cases where the client print driver doesn't match the server print driver (mismatched connection), the client will always process the print job, regardless of the setting of this policy. @@ -473,13 +469,12 @@ If you do not enable this policy setting, the behavior is the same as disabling | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -506,7 +501,7 @@ If you do not enable this policy setting, the behavior is the same as disabling | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -531,13 +526,12 @@ This setting may improve the performance of the XPS Rasterization Service or the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -564,7 +558,7 @@ This setting may improve the performance of the XPS Rasterization Service or the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -583,7 +577,7 @@ If you enable this setting and type an Internet or intranet address in the text This setting makes it easy for users to find the printers you want them to add. -Also, see the "Custom support URL in the Printers folder's left pane" and "Activate Internet printing" settings in "Computer Configuration\Administrative Templates\Printers." +Also, see the "Custom support URL in the Printers folder's left pane" and "Activate Internet printing" settings in "Computer Configuration\Administrative Templates\Printers". @@ -595,13 +589,12 @@ Also, see the "Custom support URL in the Printers folder's left pane" and "Activ | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -627,7 +620,7 @@ Also, see the "Custom support URL in the Printers folder's left pane" and "Activ | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -640,14 +633,14 @@ Also, see the "Custom support URL in the Printers folder's left pane" and "Activ Determines whether printers using kernel-mode drivers may be installed on the local computer. Kernel-mode drivers have access to system-wide memory, and therefore poorly-written kernel-mode drivers can cause stop errors. -- If you disable this setting, or do not configure it, then printers using a kernel-mode drivers may be installed on the local computer running Windows XP Home Edition and Windows XP Professional. +- If you disable this setting, or don't configure it, then printers using a kernel-mode drivers may be installed on the local computer running Windows XP Home Edition and Windows XP Professional. -- If you do not configure this setting on Windows Server 2003 family products, the installation of kernel-mode printer drivers will be blocked. +- If you don't configure this setting on Windows Server 2003 family products, the installation of kernel-mode printer drivers will be blocked. -- If you enable this setting, installation of a printer using a kernel-mode driver will not be allowed. +- If you enable this setting, installation of a printer using a kernel-mode driver won't be allowed. > [!NOTE] -> By applying this policy, existing kernel-mode drivers will be disabled upon installation of service packs or reinstallation of the Windows XP operating system. This policy does not apply to 64-bit kernel-mode printer drivers as they cannot be installed and associated with a print queue. +> By applying this policy, existing kernel-mode drivers will be disabled upon installation of service packs or reinstallation of the Windows XP operating system. This policy doesn't apply to 64-bit kernel-mode printer drivers as they can't be installed and associated with a print queue. @@ -659,13 +652,12 @@ Determines whether printers using kernel-mode drivers may be installed on the lo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -692,7 +684,7 @@ Determines whether printers using kernel-mode drivers may be installed on the lo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -705,11 +697,11 @@ Determines whether printers using kernel-mode drivers may be installed on the lo This preference allows you to change default printer management. -- If you enable this setting, Windows will not manage the default printer. +- If you enable this setting, Windows won't manage the default printer. - If you disable this setting, Windows will manage the default printer. -- If you do not configure this setting, default printer management will not change. +- If you don't configure this setting, default printer management won't change. @@ -721,13 +713,12 @@ This preference allows you to change default printer management. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -754,7 +745,7 @@ This preference allows you to change default printer management. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -769,7 +760,7 @@ Microsoft XPS Document Writer (MXDW) generates OpenXPS (*.oxps) files by default - If you enable this group policy setting, the default MXDW output format is the legacy Microsoft XPS (*.xps). -- If you disable or do not configure this policy setting, the default MXDW output format is OpenXPS (*.oxps). +- If you disable or don't configure this policy setting, the default MXDW output format is OpenXPS (*.oxps). @@ -781,13 +772,12 @@ Microsoft XPS Document Writer (MXDW) generates OpenXPS (*.oxps) files by default | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -814,7 +804,7 @@ Microsoft XPS Document Writer (MXDW) generates OpenXPS (*.oxps) files by default | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -830,7 +820,7 @@ Microsoft XPS Document Writer (MXDW) generates OpenXPS (*.oxps) files by default If a user tries to delete a printer, such as by using the Delete option in Printers in Control Panel, a message appears explaining that a setting prevents the action. -This setting does not prevent users from running other programs to delete a printer. +This setting doesn't prevent users from running other programs to delete a printer. - If this policy is disabled, or not configured, users can delete printers using the methods described above. @@ -844,13 +834,12 @@ This setting does not prevent users from running other programs to delete a prin | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -877,7 +866,7 @@ This setting does not prevent users from running other programs to delete a prin | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -888,11 +877,12 @@ This setting does not prevent users from running other programs to delete a prin -This policy sets the maximum number of printers (of each type) that the Add Printer wizard will display on a computer on an unmanaged network (when the computer is not able to reach a domain controller, e.g. a domain-joined laptop on a home network.) +This policy sets the maximum number of printers (of each type) that the Add Printer wizard will display on a computer on an unmanaged network (when the computer isn't able to reach a domain controller, e.g. a domain-joined laptop on a home network). -- If this setting is disabled, the network scan page will not be displayed. +- If this setting is disabled, the network scan page won't be displayed. + +If this setting isn't configured, the Add Printer wizard will display the default number of printers of each type: -If this setting is not configured, the Add Printer wizard will display the default number of printers of each type: TCP/IP printers: 50 Web Services printers: 50 Bluetooth printers: 10 @@ -902,9 +892,9 @@ If you would like to not display printers of a certain type, enable this policy In Windows 10 and later, only TCP/IP printers can be shown in the wizard. -- If you enable this policy setting, only TCP/IP printer limits are applicable. On Windows 10 only, if you disable or do not configure this policy setting, the default limit is applied. +- If you enable this policy setting, only TCP/IP printer limits are applicable. On Windows 10 only, if you disable or don't configure this policy setting, the default limit's applied. -In Windows 8 and later, Bluetooth printers are not shown so its limit does not apply to those versions of Windows. +In Windows 8 and later, Bluetooth printers aren't shown so its limit doesn't apply to those versions of Windows. @@ -916,13 +906,12 @@ In Windows 8 and later, Bluetooth printers are not shown so its limit does not a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -949,7 +938,7 @@ In Windows 8 and later, Bluetooth printers are not shown so its limit does not a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -964,7 +953,7 @@ This policy restricts clients computers to use package point and print only. - If this setting is enabled, users will only be able to point and print to printers that use package-aware drivers. When using package point and print, client computers will check the driver signature of all drivers that are downloaded from print servers. -- If this setting is disabled, or not configured, users will not be restricted to package-aware point and print only. +- If this setting is disabled, or not configured, users won't be restricted to package-aware point and print only. @@ -976,13 +965,12 @@ This policy restricts clients computers to use package point and print only. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1009,7 +997,7 @@ This policy restricts clients computers to use package point and print only. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1024,7 +1012,7 @@ This policy restricts clients computers to use package point and print only. - If this setting is enabled, users will only be able to point and print to printers that use package-aware drivers. When using package point and print, client computers will check the driver signature of all drivers that are downloaded from print servers. -- If this setting is disabled, or not configured, users will not be restricted to package-aware point and print only. +- If this setting is disabled, or not configured, users won't be restricted to package-aware point and print only. @@ -1036,13 +1024,12 @@ This policy restricts clients computers to use package point and print only. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1069,7 +1056,7 @@ This policy restricts clients computers to use package point and print only. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1088,7 +1075,7 @@ Windows Vista and later clients will attempt to make a non-package point and pri - If this setting is enabled, users will only be able to package point and print to print servers approved by the network administrator. When using package point and print, client computers will check the driver signature of all drivers that are downloaded from print servers. -- If this setting is disabled, or not configured, package point and print will not be restricted to specific print servers. +- If this setting is disabled, or not configured, package point and print won't be restricted to specific print servers. @@ -1100,13 +1087,12 @@ Windows Vista and later clients will attempt to make a non-package point and pri | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1133,7 +1119,7 @@ Windows Vista and later clients will attempt to make a non-package point and pri | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1152,7 +1138,7 @@ Windows Vista and later clients will attempt to make a non-package point and pri - If this setting is enabled, users will only be able to package point and print to print servers approved by the network administrator. When using package point and print, client computers will check the driver signature of all drivers that are downloaded from print servers. -- If this setting is disabled, or not configured, package point and print will not be restricted to specific print servers. +- If this setting is disabled, or not configured, package point and print won't be restricted to specific print servers. @@ -1164,13 +1150,12 @@ Windows Vista and later clients will attempt to make a non-package point and pri | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1197,7 +1182,7 @@ Windows Vista and later clients will attempt to make a non-package point and pri | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1217,7 +1202,7 @@ When Location Tracking is enabled, the system uses the specified location as a c Type the location of the user's computer. When users search for printers, the system uses the specified location (and other search criteria) to find a printer nearby. You can also use this setting to direct users to a particular printer or group of printers that you want them to use. -- If you disable this setting or do not configure it, and the user does not type a location as a search criterion, the system searches for a nearby printer based on the IP address and subnet mask of the user's computer. +- If you disable this setting or don't configure it, and the user doesn't type a location as a search criterion, the system searches for a nearby printer based on the IP address and subnet mask of the user's computer. @@ -1229,13 +1214,12 @@ Type the location of the user's computer. When users search for printers, the sy | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1261,7 +1245,7 @@ Type the location of the user's computer. When users search for printers, the sy | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1278,7 +1262,7 @@ Use Location Tracking to design a location scheme for your enterprise and assign - If you enable this setting, users can browse for printers by location without knowing the printer's location or location naming scheme. Enabling Location Tracking adds a Browse button in the Add Printer wizard's Printer Name and Sharing Location screen and to the General tab in the Printer Properties dialog box. If you enable the Group Policy Computer location setting, the default location you entered appears in the Location field by default. -- If you disable this setting or do not configure it, Location Tracking is disabled. Printer proximity is estimated using the standard method (that is, based on IP address and subnet mask). +- If you disable this setting or don't configure it, Location Tracking is disabled. Printer proximity is estimated using the standard method (that is, based on IP address and subnet mask). @@ -1290,13 +1274,12 @@ Use Location Tracking to design a location scheme for your enterprise and assign | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1323,7 +1306,7 @@ Use Location Tracking to design a location scheme for your enterprise and assign | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1334,15 +1317,18 @@ Use Location Tracking to design a location scheme for your enterprise and assign -This policy setting determines whether the print spooler will execute print drivers in an isolated or separate process. When print drivers are loaded in an isolated process (or isolated processes), a print driver failure will not cause the print spooler service to fail. +This policy setting determines whether the print spooler will execute print drivers in an isolated or separate process. When print drivers are loaded in an isolated process (or isolated processes), a print driver failure won't cause the print spooler service to fail. -- If you enable or do not configure this policy setting, the print spooler will execute print drivers in an isolated process by default. +- If you enable or don't configure this policy setting, the print spooler will execute print drivers in an isolated process by default. - If you disable this policy setting, the print spooler will execute print drivers in the print spooler process. -**Note**: +Note: + -Other system or driver policy settings may alter the process in which a print driver is executed. --This policy setting applies only to print drivers loaded by the print spooler. Print drivers loaded by applications are not affected. + +-This policy setting applies only to print drivers loaded by the print spooler. Print drivers loaded by applications aren't affected. + -This policy setting takes effect without restarting the print spooler service. @@ -1355,13 +1341,12 @@ This policy setting determines whether the print spooler will execute print driv | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1388,7 +1373,7 @@ This policy setting determines whether the print spooler will execute print driv | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1399,15 +1384,18 @@ This policy setting determines whether the print spooler will execute print driv -This policy setting determines whether the print spooler will override the Driver Isolation compatibility reported by the print driver. This enables executing print drivers in an isolated process, even if the driver does not report compatibility. +This policy setting determines whether the print spooler will override the Driver Isolation compatibility reported by the print driver. This enables executing print drivers in an isolated process, even if the driver doesn't report compatibility. -- If you enable this policy setting, the print spooler isolates all print drivers that do not explicitly opt out of Driver Isolation. +- If you enable this policy setting, the print spooler isolates all print drivers that don't explicitly opt out of Driver Isolation. -- If you disable or do not configure this policy setting, the print spooler uses the Driver Isolation compatibility flag value reported by the print driver. +- If you disable or don't configure this policy setting, the print spooler uses the Driver Isolation compatibility flag value reported by the print driver. + +Note: -**Note**: -Other system or driver policy settings may alter the process in which a print driver is executed. --This policy setting applies only to print drivers loaded by the print spooler. Print drivers loaded by applications are not affected. + +-This policy setting applies only to print drivers loaded by the print spooler. Print drivers loaded by applications aren't affected. + -This policy setting takes effect without restarting the print spooler service. @@ -1420,13 +1408,12 @@ This policy setting determines whether the print spooler will override the Drive | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1453,7 +1440,7 @@ This policy setting determines whether the print spooler will override the Drive | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1470,7 +1457,7 @@ The Add Printer Wizard gives users the option of searching Active Directory for If you enable this policy setting, these searches begin at the location you specify in the "Default Active Directory path" box. Otherwise, searches begin at the root of Active Directory. -This setting only provides a starting point for Active Directory searches for printers. It does not restrict user searches through Active Directory. +This setting only provides a starting point for Active Directory searches for printers. It doesn't restrict user searches through Active Directory. @@ -1482,13 +1469,12 @@ This setting only provides a starting point for Active Directory searches for pr | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1514,7 +1500,7 @@ This setting only provides a starting point for Active Directory searches for pr | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1527,13 +1513,13 @@ This setting only provides a starting point for Active Directory searches for pr Announces the presence of shared printers to print servers for the domain. -On domains with Active Directory, shared printer resources are available in Active Directory and are not announced. +On domains with Active Directory, shared printer resources are available in Active Directory and aren't announced. - If you enable this setting, the print spooler announces shared printers to the print servers. -- If you disable this setting, shared printers are not announced to print servers, even if Active Directory is not available. +- If you disable this setting, shared printers aren't announced to print servers, even if Active Directory isn't available. -- If you do not configure this setting, shared printers are announced to servers only when Active Directory is not available. +- If you don't configure this setting, shared printers are announced to servers only when Active Directory isn't available. > [!NOTE] > A client license is used each time a client computer announces a printer to a print browse master on the domain. @@ -1548,13 +1534,12 @@ On domains with Active Directory, shared printer resources are available in Acti | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1581,7 +1566,7 @@ On domains with Active Directory, shared printer resources are available in Acti | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1594,12 +1579,12 @@ On domains with Active Directory, shared printer resources are available in Acti This policy controls whether the print job name will be included in print event logs. -- If you disable or do not configure this policy setting, the print job name will not be included. +- If you disable or don't configure this policy setting, the print job name won't be included. - If you enable this policy setting, the print job name will be included in new log entries. > [!NOTE] -> This setting does not apply to Branch Office Direct Printing jobs. +> This setting doesn't apply to Branch Office Direct Printing jobs. @@ -1611,13 +1596,12 @@ This policy controls whether the print job name will be included in print event | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1644,7 +1628,7 @@ This policy controls whether the print job name will be included in print event | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1659,9 +1643,9 @@ This policy determines if v4 printer drivers are allowed to run printer extensio V4 printer drivers may include an optional, customized user interface known as a printer extension. These extensions may provide access to more device features, but this may not be appropriate for all enterprises. -- If you enable this policy setting, then all printer extensions will not be allowed to run. +- If you enable this policy setting, then all printer extensions won't be allowed to run. -- If you disable this policy setting or do not configure it, then all printer extensions that have been installed will be allowed to run. +- If you disable this policy setting or don't configure it, then all printer extensions that have been installed will be allowed to run. @@ -1673,13 +1657,12 @@ V4 printer drivers may include an optional, customized user interface known as a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-printing2.md b/windows/client-management/mdm/policy-csp-admx-printing2.md index 1d78b2f09e..f4e5a8d051 100644 --- a/windows/client-management/mdm/policy-csp-admx-printing2.md +++ b/windows/client-management/mdm/policy-csp-admx-printing2.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_Printing2 Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_Printing2 -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,9 +41,9 @@ ms.topic: reference Determines whether the Add Printer Wizard automatically publishes the computer's shared printers in Active Directory. -- If you enable this setting or do not configure it, the Add Printer Wizard automatically publishes all shared printers. +- If you enable this setting or don't configure it, the Add Printer Wizard automatically publishes all shared printers. -- If you disable this setting, the Add Printer Wizard does not automatically publish printers. However, you can publish shared printers manually. +- If you disable this setting, the Add Printer Wizard doesn't automatically publish printers. However, you can publish shared printers manually. The default behavior is to automatically publish shared printers in Active Directory. @@ -63,13 +60,12 @@ The default behavior is to automatically publish shared printers in Active Direc | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -96,7 +92,7 @@ The default behavior is to automatically publish shared printers in Active Direc | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -109,11 +105,11 @@ The default behavior is to automatically publish shared printers in Active Direc Determines whether the domain controller can prune (delete from Active Directory) the printers published by this computer. -By default, the pruning service on the domain controller prunes printer objects from Active Directory if the computer that published them does not respond to contact requests. When the computer that published the printers restarts, it republishes any deleted printer objects. +By default, the pruning service on the domain controller prunes printer objects from Active Directory if the computer that published them doesn't respond to contact requests. When the computer that published the printers restarts, it republishes any deleted printer objects. -- If you enable this setting or do not configure it, the domain controller prunes this computer's printers when the computer does not respond. +- If you enable this setting or don't configure it, the domain controller prunes this computer's printers when the computer doesn't respond. -- If you disable this setting, the domain controller does not prune this computer's printers. This setting is designed to prevent printers from being pruned when the computer is temporarily disconnected from the network. +- If you disable this setting, the domain controller doesn't prune this computer's printers. This setting is designed to prevent printers from being pruned when the computer is temporarily disconnected from the network. > [!NOTE] > You can use the "Directory Pruning Interval" and "Directory Pruning Retry" settings to adjust the contact interval and number of contact attempts. @@ -128,13 +124,12 @@ By default, the pruning service on the domain controller prunes printer objects | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -161,7 +156,7 @@ By default, the pruning service on the domain controller prunes printer objects | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -172,20 +167,20 @@ By default, the pruning service on the domain controller prunes printer objects -Determines whether the pruning service on a domain controller prunes printer objects that are not automatically republished whenever the host computer does not respond,just as it does with Windows 2000 printers. This setting applies to printers running operating systems other than Windows 2000 and to Windows 2000 printers published outside their forest. +Determines whether the pruning service on a domain controller prunes printer objects that aren't automatically republished whenever the host computer doesn't respond,just as it does with Windows 2000 printers. This setting applies to printers running operating systems other than Windows 2000 and to Windows 2000 printers published outside their forest. -The Windows pruning service prunes printer objects from Active Directory when the computer that published them does not respond to contact requests. Computers running Windows 2000 Professional detect and republish deleted printer objects when they rejoin the network. However, because non-Windows 2000 computers and computers in other domains cannot republish printers in Active Directory automatically, by default, the system never prunes their printer objects. +The Windows pruning service prunes printer objects from Active Directory when the computer that published them doesn't respond to contact requests. Computers running Windows 2000 Professional detect and republish deleted printer objects when they rejoin the network. However, because non-Windows 2000 computers and computers in other domains can't republish printers in Active Directory automatically, by default, the system never prunes their printer objects. You can enable this setting to change the default behavior. To use this setting, select one of the following options from the "Prune non-republishing printers" box: -- "Never" specifies that printer objects that are not automatically republished are never pruned. "Never" is the default. +- "Never" specifies that printer objects that aren't automatically republished are never pruned. "Never" is the default. -- "Only if Print Server is found" prunes printer objects that are not automatically republished only when the print server responds, but the printer is unavailable. +- "Only if Print Server is found" prunes printer objects that aren't automatically republished only when the print server responds, but the printer is unavailable. -- "Whenever printer is not found" prunes printer objects that are not automatically republished whenever the host computer does not respond, just as it does with Windows 2000 printers. +- "Whenever printer isn't found" prunes printer objects that aren't automatically republished whenever the host computer doesn't respond, just as it does with Windows 2000 printers. > [!NOTE] -> This setting applies to printers published by using Active Directory Users and Computers or Pubprn.vbs. It does not apply to printers published by using Printers in Control Panel. +> This setting applies to printers published by using Active Directory Users and Computers or Pubprn.vbs. It doesn't apply to printers published by using Printers in Control Panel. > [!TIP] > If you disable automatic pruning, remember to delete printer objects manually whenever you remove a printer or print server. @@ -200,13 +195,12 @@ You can enable this setting to change the default behavior. To use this setting, | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -232,7 +226,7 @@ You can enable this setting to change the default behavior. To use this setting, | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -245,13 +239,13 @@ You can enable this setting to change the default behavior. To use this setting, Specifies how often the pruning service on a domain controller contacts computers to verify that their printers are operational. -The pruning service periodically contacts computers that have published printers. If a computer does not respond to the contact message (optionally, after repeated attempts), the pruning service "prunes" (deletes from Active Directory) printer objects the computer has published. +The pruning service periodically contacts computers that have published printers. If a computer doesn't respond to the contact message (optionally, after repeated attempts), the pruning service "prunes" (deletes from Active Directory) printer objects the computer has published. By default, the pruning service contacts computers every eight hours and allows two repeated contact attempts before deleting printers from Active Directory. - If you enable this setting, you can change the interval between contact attempts. -- If you do not configure or disable this setting the default values will be used. +- If you don't configure or disable this setting the default values will be used. > [!NOTE] > This setting is used only on domain controllers. @@ -266,13 +260,12 @@ By default, the pruning service contacts computers every eight hours and allows | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -298,7 +291,7 @@ By default, the pruning service contacts computers every eight hours and allows | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -311,9 +304,9 @@ By default, the pruning service contacts computers every eight hours and allows Sets the priority of the pruning thread. -The pruning thread, which runs only on domain controllers, deletes printer objects from Active Directory if the printer that published the object does not respond to contact attempts. This process keeps printer information in Active Directory current. +The pruning thread, which runs only on domain controllers, deletes printer objects from Active Directory if the printer that published the object doesn't respond to contact attempts. This process keeps printer information in Active Directory current. -The thread priority influences the order in which the thread receives processor time and determines how likely it is to be preempted by higher priority threads. +The thread priority influences the order in which the thread receives processor time and determines how likely it's to be preempted by higher priority threads. By default, the pruning thread runs at normal priority. However, you can adjust the priority to improve the performance of this service. @@ -330,13 +323,12 @@ By default, the pruning thread runs at normal priority. However, you can adjust | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -362,7 +354,7 @@ By default, the pruning thread runs at normal priority. However, you can adjust | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -375,13 +367,13 @@ By default, the pruning thread runs at normal priority. However, you can adjust Specifies how many times the pruning service on a domain controller repeats its attempt to contact a computer before pruning the computer's printers. -The pruning service periodically contacts computers that have published printers to verify that the printers are still available for use. If a computer does not respond to the contact message, the message is repeated for the specified number of times. If the computer still fails to respond, then the pruning service "prunes" (deletes from Active Directory) printer objects the computer has published. +The pruning service periodically contacts computers that have published printers to verify that the printers are still available for use. If a computer doesn't respond to the contact message, the message is repeated for the specified number of times. If the computer still fails to respond, then the pruning service "prunes" (deletes from Active Directory) printer objects the computer has published. By default, the pruning service contacts computers every eight hours and allows two retries before deleting printers from Active Directory. You can use this setting to change the number of retries. - If you enable this setting, you can change the interval between attempts. -- If you do not configure or disable this setting, the default values are used. +- If you don't configure or disable this setting, the default values are used. > [!NOTE] > This setting is used only on domain controllers. @@ -396,13 +388,12 @@ By default, the pruning service contacts computers every eight hours and allows | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -428,7 +419,7 @@ By default, the pruning service contacts computers every eight hours and allows | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -441,14 +432,14 @@ By default, the pruning service contacts computers every eight hours and allows Specifies whether or not to log events when the pruning service on a domain controller attempts to contact a computer before pruning the computer's printers. -The pruning service periodically contacts computers that have published printers to verify that the printers are still available for use. If a computer does not respond to the contact attempt, the attempt is retried a specified number of times, at a specified interval. The "Directory pruning retry" setting determines the number of times the attempt is retried; the default value is two retries. The "Directory Pruning Interval" setting determines the time interval between retries; the default value is every eight hours. If the computer has not responded by the last contact attempt, its printers are pruned from the directory. +The pruning service periodically contacts computers that have published printers to verify that the printers are still available for use. If a computer doesn't respond to the contact attempt, the attempt is retried a specified number of times, at a specified interval. The "Directory pruning retry" setting determines the number of times the attempt is retried; the default value is two retries. The "Directory Pruning Interval" setting determines the time interval between retries; the default value is every eight hours. If the computer hasn't responded by the last contact attempt, its printers are pruned from the directory. - If you enable this policy setting, the contact events are recorded in the event log. -- If you disable or do not configure this policy setting, the contact events are not recorded in the event log. +- If you disable or don't configure this policy setting, the contact events aren't recorded in the event log. > [!NOTE] -> This setting does not affect the logging of pruning events; the actual pruning of a printer is always logged. +> This setting doesn't affect the logging of pruning events; the actual pruning of a printer is always logged. > [!NOTE] > This setting is used only on domain controllers. @@ -463,13 +454,12 @@ The pruning service periodically contacts computers that have published printers | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -496,7 +486,7 @@ The pruning service periodically contacts computers that have published printers | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -511,7 +501,7 @@ This policy controls whether the print spooler will accept client connections. When the policy is unconfigured or enabled, the spooler will always accept client connections. -When the policy is disabled, the spooler will not accept client connections nor allow users to share printers. All printers currently shared will continue to be shared. +When the policy is disabled, the spooler won't accept client connections nor allow users to share printers. All printers currently shared will continue to be shared. The spooler must be restarted for changes to this policy to take effect. @@ -525,13 +515,12 @@ The spooler must be restarted for changes to this policy to take effect. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -558,7 +547,7 @@ The spooler must be restarted for changes to this policy to take effect. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -587,13 +576,12 @@ To disable verification, disable this setting, or enable this setting and select | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-programs.md b/windows/client-management/mdm/policy-csp-admx-programs.md index da10e25a17..3a614e7938 100644 --- a/windows/client-management/mdm/policy-csp-admx-programs.md +++ b/windows/client-management/mdm/policy-csp-admx-programs.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_Programs Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_Programs -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -42,15 +39,15 @@ ms.topic: reference -This setting removes the Set Program Access and Defaults page from the Programs Control Panel. As a result, users cannot view or change the associated page. +This setting removes the Set Program Access and Defaults page from the Programs Control Panel. As a result, users can't view or change the associated page. The Set Program Access and Computer Defaults page allows administrators to specify default programs for certain activities, such as Web browsing or sending e-mail, as well as specify the programs that are accessible from the Start menu, desktop, and other locations. If this setting is disabled or not configured, the Set Program Access and Defaults button is available to all users. -This setting does not prevent users from using other tools and methods to change program access or defaults. +This setting doesn't prevent users from using other tools and methods to change program access or defaults. -This setting does not prevent the Default Programs icon from appearing on the Start menu. +This setting doesn't prevent the Default Programs icon from appearing on the Start menu. @@ -62,13 +59,12 @@ This setting does not prevent the Default Programs icon from appearing on the St | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -95,7 +91,7 @@ This setting does not prevent the Default Programs icon from appearing on the St | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -112,9 +108,9 @@ This setting prevents users from accessing the "Get Programs" page from the Prog Published programs are those programs that the system administrator has explicitly made available to the user with a tool such as Windows Installer. Typically, system administrators publish programs to notify users of their availability, to recommend their use, or to enable users to install them without having to search for installation files. -- If this setting is enabled, users cannot view the programs that have been published by the system administrator, and they cannot use the "Get Programs" page to install published programs. Enabling this feature does not prevent users from installing programs by using other methods. Users will still be able to view and installed assigned (partially installed) programs that are offered on the desktop or on the Start menu. +- If this setting is enabled, users can't view the programs that have been published by the system administrator, and they can't use the "Get Programs" page to install published programs. Enabling this feature doesn't prevent users from installing programs by using other methods. Users will still be able to view and installed assigned (partially installed) programs that are offered on the desktop or on the Start menu. -- If this setting is disabled or is not configured, the "Install a program from the network" task to the "Get Programs" page will be available to all users. +- If this setting is disabled or isn't configured, the "Install a program from the network" task to the "Get Programs" page will be available to all users. > [!NOTE] > If the "Hide Programs Control Panel" setting is enabled, this setting is ignored. @@ -129,13 +125,12 @@ Published programs are those programs that the system administrator has explicit | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -162,7 +157,7 @@ Published programs are those programs that the system administrator has explicit | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -179,7 +174,7 @@ This setting prevents users from accessing "Installed Updates" page from the "Vi If this setting is disabled or not configured, the "View installed updates" task and the "Installed Updates" page will be available to all users. -This setting does not prevent users from using other tools and methods to install or uninstall programs. +This setting doesn't prevent users from using other tools and methods to install or uninstall programs. @@ -191,13 +186,12 @@ This setting does not prevent users from using other tools and methods to instal | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -224,7 +218,7 @@ This setting does not prevent users from using other tools and methods to instal | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -239,7 +233,7 @@ This setting prevents users from accessing "Programs and Features" to view, unin If this setting is disabled or not configured, "Programs and Features" will be available to all users. -This setting does not prevent users from using other tools and methods to view or uninstall programs. It also does not prevent users from linking to related Programs Control Panel Features including Windows Features, Get Programs, or Windows Marketplace. +This setting doesn't prevent users from using other tools and methods to view or uninstall programs. It also doesn't prevent users from linking to related Programs Control Panel Features including Windows Features, Get Programs, or Windows Marketplace. @@ -251,13 +245,12 @@ This setting does not prevent users from using other tools and methods to view o | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -284,7 +277,7 @@ This setting does not prevent users from using other tools and methods to view o | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -303,7 +296,7 @@ If this setting is disabled or not configured, the Programs Control Panel in Cat When enabled, this setting takes precedence over the other settings in this folder. -This setting does not prevent users from using other tools and methods to install or uninstall programs. +This setting doesn't prevent users from using other tools and methods to install or uninstall programs. @@ -315,13 +308,12 @@ This setting does not prevent users from using other tools and methods to instal | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -348,7 +340,7 @@ This setting does not prevent users from using other tools and methods to instal | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -359,11 +351,11 @@ This setting does not prevent users from using other tools and methods to instal -This setting prevents users from accessing the "Turn Windows features on or off" task from the Programs Control Panel in Category View, Programs and Features in Classic View, and Get Programs. As a result, users cannot view, enable, or disable various Windows features and services. +This setting prevents users from accessing the "Turn Windows features on or off" task from the Programs Control Panel in Category View, Programs and Features in Classic View, and Get Programs. As a result, users can't view, enable, or disable various Windows features and services. -If this setting is disabled or is not configured, the "Turn Windows features on or off" task will be available to all users. +If this setting is disabled or isn't configured, the "Turn Windows features on or off" task will be available to all users. -This setting does not prevent users from using other tools and methods to configure services or enable or disable program components. +This setting doesn't prevent users from using other tools and methods to configure services or enable or disable program components. @@ -375,13 +367,12 @@ This setting does not prevent users from using other tools and methods to config | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -408,7 +399,7 @@ This setting does not prevent users from using other tools and methods to config | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -423,9 +414,9 @@ This setting prevents users from access the "Get new programs from Windows Marke Windows Marketplace allows users to purchase and/or download various programs to their computer for installation. -Enabling this feature does not prevent users from navigating to Windows Marketplace using other methods. +Enabling this feature doesn't prevent users from navigating to Windows Marketplace using other methods. -If this feature is disabled or is not configured, the "Get new programs from Windows Marketplace" task link will be available to all users. +If this feature is disabled or isn't configured, the "Get new programs from Windows Marketplace" task link will be available to all users. > [!NOTE] > If the "Hide Programs control Panel" setting is enabled, this setting is ignored. @@ -440,13 +431,12 @@ If this feature is disabled or is not configured, the "Get new programs from Win | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-pushtoinstall.md b/windows/client-management/mdm/policy-csp-admx-pushtoinstall.md index 812ee0a71e..60a5e62d91 100644 --- a/windows/client-management/mdm/policy-csp-admx-pushtoinstall.md +++ b/windows/client-management/mdm/policy-csp-admx-pushtoinstall.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_PushToInstall Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_PushToInstall -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -42,7 +39,7 @@ ms.topic: reference -If you enable this setting, users will not be able to push Apps to this device from the Microsoft Store running on other devices or the web. +If you enable this setting, users won't be able to push Apps to this device from the Microsoft Store running on other devices or the web. @@ -54,13 +51,12 @@ If you enable this setting, users will not be able to push Apps to this device f | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-qos.md b/windows/client-management/mdm/policy-csp-admx-qos.md index d81a28a193..f9bd414d52 100644 --- a/windows/client-management/mdm/policy-csp-admx-qos.md +++ b/windows/client-management/mdm/policy-csp-admx-qos.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_QOS Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_QOS -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,11 +41,11 @@ ms.topic: reference Specifies the maximum number of outstanding packets permitted on the system. When the number of outstanding packets reaches this limit, the Packet Scheduler postpones all submissions to network adapters until the number falls below this limit. -"Outstanding packets" are packets that the Packet Scheduler has submitted to a network adapter for transmission, but which have not yet been sent. +"Outstanding packets" are packets that the Packet Scheduler has submitted to a network adapter for transmission, but which haven't yet been sent. - If you enable this setting, you can limit the number of outstanding packets. -- If you disable this setting or do not configure it, then the setting has no effect on the system. +- If you disable this setting or don't configure it, then the setting has no effect on the system. > [!IMPORTANT] > If the maximum number of outstanding packets is specified in the registry for a particular network adapter, this setting is ignored when configuring that network adapter. @@ -63,13 +60,12 @@ Specifies the maximum number of outstanding packets permitted on the system. Whe | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -95,7 +91,7 @@ Specifies the maximum number of outstanding packets permitted on the system. Whe | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -112,10 +108,10 @@ By default, the Packet Scheduler limits the system to 80 percent of the bandwidt - If you enable this setting, you can use the "Bandwidth limit" box to adjust the amount of bandwidth the system can reserve. -- If you disable this setting or do not configure it, the system uses the default value of 80 percent of the connection. +- If you disable this setting or don't configure it, the system uses the default value of 80 percent of the connection. > [!IMPORTANT] -> If a bandwidth limit is set for a particular network adapter in the registry, this setting is ignored when configuring that network adapter. +> If a bandwidth limit's set for a particular network adapter in the registry, this setting is ignored when configuring that network adapter. @@ -127,13 +123,12 @@ By default, the Packet Scheduler limits the system to 80 percent of the bandwidt | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -159,7 +154,7 @@ By default, the Packet Scheduler limits the system to 80 percent of the bandwidt | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -191,13 +186,12 @@ This setting applies only to packets that conform to the flow specification. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -223,7 +217,7 @@ This setting applies only to packets that conform to the flow specification. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -236,7 +230,7 @@ This setting applies only to packets that conform to the flow specification. Specifies an alternate Layer-3 Differentiated Services Code Point (DSCP) value for packets with the Best Effort service type (ServiceTypeBestEffort). The Packet Scheduler inserts the corresponding DSCP value in the IP header of the packets. -This setting applies only to packets that do not conform to the flow specification. +This setting applies only to packets that don't conform to the flow specification. - If you enable this setting, you can change the default DSCP value associated with the Best Effort service type. @@ -255,13 +249,12 @@ This setting applies only to packets that do not conform to the flow specificati | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -287,7 +280,7 @@ This setting applies only to packets that do not conform to the flow specificati | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -317,13 +310,12 @@ Specifies an alternate link layer (Layer-2) priority value for packets with the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -349,7 +341,7 @@ Specifies an alternate link layer (Layer-2) priority value for packets with the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -381,13 +373,12 @@ This setting applies only to packets that conform to the flow specification. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -413,7 +404,7 @@ This setting applies only to packets that conform to the flow specification. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -426,7 +417,7 @@ This setting applies only to packets that conform to the flow specification. Specifies an alternate Layer-3 Differentiated Services Code Point (DSCP) value for packets with the Controlled Load service type (ServiceTypeControlledLoad). The Packet Scheduler inserts the corresponding DSCP value in the IP header of the packets. -This setting applies only to packets that do not conform to the flow specification. +This setting applies only to packets that don't conform to the flow specification. - If you enable this setting, you can change the default DSCP value associated with the Controlled Load service type. @@ -445,13 +436,12 @@ This setting applies only to packets that do not conform to the flow specificati | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -477,7 +467,7 @@ This setting applies only to packets that do not conform to the flow specificati | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -507,13 +497,12 @@ Specifies an alternate link layer (Layer-2) priority value for packets with the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -539,7 +528,7 @@ Specifies an alternate link layer (Layer-2) priority value for packets with the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -571,13 +560,12 @@ This setting applies only to packets that conform to the flow specification. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -603,7 +591,7 @@ This setting applies only to packets that conform to the flow specification. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -616,7 +604,7 @@ This setting applies only to packets that conform to the flow specification. Specifies an alternate Layer-3 Differentiated Services Code Point (DSCP) value for packets with the Guaranteed service type (ServiceTypeGuaranteed). The Packet Scheduler inserts the corresponding DSCP value in the IP header of the packets. -This setting applies only to packets that do not conform to the flow specification. +This setting applies only to packets that don't conform to the flow specification. - If you enable this setting, you can change the default DSCP value associated with the Guaranteed service type. @@ -635,13 +623,12 @@ This setting applies only to packets that do not conform to the flow specificati | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -667,7 +654,7 @@ This setting applies only to packets that do not conform to the flow specificati | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -697,13 +684,12 @@ Specifies an alternate link layer (Layer-2) priority value for packets with the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -729,7 +715,7 @@ Specifies an alternate link layer (Layer-2) priority value for packets with the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -761,13 +747,12 @@ This setting applies only to packets that conform to the flow specification. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -793,7 +778,7 @@ This setting applies only to packets that conform to the flow specification. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -806,7 +791,7 @@ This setting applies only to packets that conform to the flow specification. Specifies an alternate Layer-3 Differentiated Services Code Point (DSCP) value for packets with the Network Control service type (ServiceTypeNetworkControl). The Packet Scheduler inserts the corresponding DSCP value in the IP header of the packets. -This setting applies only to packets that do not conform to the flow specification. +This setting applies only to packets that don't conform to the flow specification. - If you enable this setting, you can change the default DSCP value associated with the Network Control service type. @@ -825,13 +810,12 @@ This setting applies only to packets that do not conform to the flow specificati | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -857,7 +841,7 @@ This setting applies only to packets that do not conform to the flow specificati | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -887,13 +871,12 @@ Specifies an alternate link layer (Layer-2) priority value for packets with the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -919,7 +902,7 @@ Specifies an alternate link layer (Layer-2) priority value for packets with the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -930,7 +913,7 @@ Specifies an alternate link layer (Layer-2) priority value for packets with the -Specifies an alternate link layer (Layer-2) priority value for packets that do not conform to the flow specification. The Packet Scheduler inserts the corresponding priority value in the Layer-2 header of the packets. +Specifies an alternate link layer (Layer-2) priority value for packets that don't conform to the flow specification. The Packet Scheduler inserts the corresponding priority value in the Layer-2 header of the packets. - If you enable this setting, you can change the default priority value associated with nonconforming packets. @@ -949,13 +932,12 @@ Specifies an alternate link layer (Layer-2) priority value for packets that do n | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -981,7 +963,7 @@ Specifies an alternate link layer (Layer-2) priority value for packets that do n | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1013,13 +995,12 @@ This setting applies only to packets that conform to the flow specification. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1045,7 +1026,7 @@ This setting applies only to packets that conform to the flow specification. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1058,7 +1039,7 @@ This setting applies only to packets that conform to the flow specification. Specifies an alternate Layer-3 Differentiated Services Code Point (DSCP) value for packets with the Qualitative service type (ServiceTypeQualitative). The Packet Scheduler inserts the corresponding DSCP value in the IP header of the packets. -This setting applies only to packets that do not conform to the flow specification. +This setting applies only to packets that don't conform to the flow specification. - If you enable this setting, you can change the default DSCP value associated with the Qualitative service type. @@ -1077,13 +1058,12 @@ This setting applies only to packets that do not conform to the flow specificati | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1109,7 +1089,7 @@ This setting applies only to packets that do not conform to the flow specificati | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1139,13 +1119,12 @@ Specifies an alternate link layer (Layer-2) priority value for packets with the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1171,7 +1150,7 @@ Specifies an alternate link layer (Layer-2) priority value for packets with the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1182,11 +1161,11 @@ Specifies an alternate link layer (Layer-2) priority value for packets with the -Determines the smallest unit of time that the Packet Scheduler uses when scheduling packets for transmission. The Packet Scheduler cannot schedule packets for transmission more frequently than permitted by the value of this entry. +Determines the smallest unit of time that the Packet Scheduler uses when scheduling packets for transmission. The Packet Scheduler can't schedule packets for transmission more frequently than permitted by the value of this entry. - If you enable this setting, you can override the default timer resolution established for the system, usually units of 10 microseconds. -- If you disable this setting or do not configure it, the setting has no effect on the system. +- If you disable this setting or don't configure it, the setting has no effect on the system. > [!IMPORTANT] > If a timer resolution is specified in the registry for a particular network adapter, then this setting is ignored when configuring that network adapter. @@ -1201,13 +1180,12 @@ Determines the smallest unit of time that the Packet Scheduler uses when schedul | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-radar.md b/windows/client-management/mdm/policy-csp-admx-radar.md index 2c6b557f6b..eb513d6580 100644 --- a/windows/client-management/mdm/policy-csp-admx-radar.md +++ b/windows/client-management/mdm/policy-csp-admx-radar.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_Radar Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_Radar -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,15 +43,15 @@ Determines the execution level for Windows Resource Exhaustion Detection and Res - If you enable this policy setting, you must select an execution level from the dropdown menu. If you select problem detection and troubleshooting only, the Diagnostic Policy Service (DPS) will detect Windows Resource Exhaustion problems and attempt to determine their root causes. These root causes will be logged to the event log when detected, but no corrective action will be taken. If you select detection, troubleshooting and resolution, the DPS will detect Windows Resource Exhaustion problems and indicate to the user that assisted resolution is available. -- If you disable this policy setting, Windows will not be able to detect, troubleshoot or resolve any Windows Resource Exhaustion problems that are handled by the DPS. +- If you disable this policy setting, Windows won't be able to detect, troubleshoot or resolve any Windows Resource Exhaustion problems that are handled by the DPS. -- If you do not configure this policy setting, the DPS will enable Windows Resource Exhaustion for resolution by default. +- If you don't configure this policy setting, the DPS will enable Windows Resource Exhaustion for resolution by default. -This policy setting takes effect only if the diagnostics-wide scenario execution policy is not configured. +This policy setting takes effect only if the diagnostics-wide scenario execution policy isn't configured. No system restart or service restart is required for this policy to take effect: changes take effect immediately. -This policy setting will only take effect when the Diagnostic Policy Service is in the running state. When the service is stopped or disabled, diagnostic scenarios will not be executed. The DPS can be configured with the Services snap-in to the Microsoft Management Console. +This policy setting will only take effect when the Diagnostic Policy Service is in the running state. When the service is stopped or disabled, diagnostic scenarios won't be executed. The DPS can be configured with the Services snap-in to the Microsoft Management Console. @@ -66,13 +63,12 @@ This policy setting will only take effect when the Diagnostic Policy Service is | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-reliability.md b/windows/client-management/mdm/policy-csp-admx-reliability.md index 1ac41a1abb..e08ad665f0 100644 --- a/windows/client-management/mdm/policy-csp-admx-reliability.md +++ b/windows/client-management/mdm/policy-csp-admx-reliability.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_Reliability Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_Reliability -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,9 +43,9 @@ This policy setting allows the system to detect the time of unexpected shutdowns - If you enable this policy setting, you are able to specify how often the Persistent System Timestamp is refreshed and subsequently written to the disk. You can specify the Timestamp Interval in seconds. -- If you disable this policy setting, the Persistent System Timestamp is turned off and the timing of unexpected shutdowns is not recorded. +- If you disable this policy setting, the Persistent System Timestamp is turned off and the timing of unexpected shutdowns isn't recorded. -- If you do not configure this policy setting, the Persistent System Timestamp is refreshed according the default, which is every 60 seconds beginning with Windows Server 2003. +- If you don't configure this policy setting, the Persistent System Timestamp is refreshed according the default, which is every 60 seconds beginning with Windows Server 2003. > [!NOTE] > This feature might interfere with power configuration settings that turn off hard disks after a period of inactivity. These power settings may be accessed in the Power Options Control Panel. @@ -63,13 +60,12 @@ This policy setting allows the system to detect the time of unexpected shutdowns | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -96,7 +92,7 @@ This policy setting allows the system to detect the time of unexpected shutdowns | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -111,9 +107,9 @@ This policy setting controls whether or not unplanned shutdown events can be rep - If you enable this policy setting, error reporting includes unplanned shutdown events. -- If you disable this policy setting, unplanned shutdown events are not included in error reporting. +- If you disable this policy setting, unplanned shutdown events aren't included in error reporting. -- If you do not configure this policy setting, users can adjust this setting using the control panel, which is set to "Upload unplanned shutdown events" by default. +- If you don't configure this policy setting, users can adjust this setting using the control panel, which is set to "Upload unplanned shutdown events" by default. Also see the "Configure Error Reporting" policy setting. @@ -127,13 +123,12 @@ Also see the "Configure Error Reporting" policy setting. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -160,7 +155,7 @@ Also see the "Configure Error Reporting" policy setting. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -179,7 +174,7 @@ The system state data file contains information about the basic system state as - If you disable this policy setting, the System State Data feature is never activated. -- If you do not configure this policy setting, the default behavior for the System State Data feature occurs. +- If you don't configure this policy setting, the default behavior for the System State Data feature occurs. > [!NOTE] > By default, the System State Data feature is always enabled on Windows Server 2003. See "Supported on" for all supported versions. @@ -194,13 +189,12 @@ The system state data file contains information about the basic system state as | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -227,7 +221,7 @@ The system state data file contains information about the basic system state as | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -238,17 +232,17 @@ The system state data file contains information about the basic system state as -The Shutdown Event Tracker can be displayed when you shut down a workstation or server. This is an extra set of questions that is displayed when you invoke a shutdown to collect information related to why you are shutting down the computer. +The Shutdown Event Tracker can be displayed when you shut down a workstation or server. This is an extra set of questions that's displayed when you invoke a shutdown to collect information related to why you are shutting down the computer. - If you enable this setting and choose "Always" from the drop-down menu list, the Shutdown Event Tracker is displayed when the computer shuts down. -- If you enable this policy setting and choose "Server Only" from the drop-down menu list, the Shutdown Event Tracker is displayed when you shut down a computer running Windows Server. (See "Supported on" for supported versions.) +- If you enable this policy setting and choose "Server Only" from the drop-down menu list, the Shutdown Event Tracker is displayed when you shut down a computer running Windows Server. (See "Supported on" for supported versions). -- If you enable this policy setting and choose "Workstation Only" from the drop-down menu list, the Shutdown Event Tracker is displayed when you shut down a computer running a client version of Windows. (See "Supported on" for supported versions.) +- If you enable this policy setting and choose "Workstation Only" from the drop-down menu list, the Shutdown Event Tracker is displayed when you shut down a computer running a client version of Windows. (See "Supported on" for supported versions). -- If you disable this policy setting, the Shutdown Event Tracker is not displayed when you shut down the computer. +- If you disable this policy setting, the Shutdown Event Tracker isn't displayed when you shut down the computer. -- If you do not configure this policy setting, the default behavior for the Shutdown Event Tracker occurs. +- If you don't configure this policy setting, the default behavior for the Shutdown Event Tracker occurs. > [!NOTE] > By default, the Shutdown Event Tracker is only displayed on computers running Windows Server. @@ -263,13 +257,12 @@ The Shutdown Event Tracker can be displayed when you shut down a workstation or | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-remoteassistance.md b/windows/client-management/mdm/policy-csp-admx-remoteassistance.md index faee594f91..1c36430a8b 100644 --- a/windows/client-management/mdm/policy-csp-admx-remoteassistance.md +++ b/windows/client-management/mdm/policy-csp-admx-remoteassistance.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_RemoteAssistance Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_RemoteAssistance -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -42,13 +39,13 @@ ms.topic: reference -This policy setting enables Remote Assistance invitations to be generated with improved encryption so that only computers running this version (or later versions) of the operating system can connect. This policy setting does not affect Remote Assistance connections that are initiated by instant messaging contacts or the unsolicited Offer Remote Assistance. +This policy setting enables Remote Assistance invitations to be generated with improved encryption so that only computers running this version (or later versions) of the operating system can connect. This policy setting doesn't affect Remote Assistance connections that are initiated by instant messaging contacts or the unsolicited Offer Remote Assistance. - If you enable this policy setting, only computers running this version (or later versions) of the operating system can connect to this computer. - If you disable this policy setting, computers running this version and a previous version of the operating system can connect to this computer. -- If you do not configure this policy setting, users can configure the setting in System Properties in the Control Panel. +- If you don't configure this policy setting, users can configure the setting in System Properties in the Control Panel. @@ -60,13 +57,12 @@ This policy setting enables Remote Assistance invitations to be generated with i | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -93,7 +89,7 @@ This policy setting enables Remote Assistance invitations to be generated with i | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -111,20 +107,22 @@ This setting is incrementally scaled from "No optimization" to "Full optimizatio For example: "Turn off background" will include the following optimizations: + -No full window drag --Turn off background +-Turn off background. "Full optimization" will include the following optimizations: + -Use 16-bit color (8-bit color in Windows Vista) -Turn off font smoothing (not supported in Windows Vista) -No full window drag --Turn off background +-Turn off background. - If you enable this policy setting, bandwidth optimization occurs at the level specified. - If you disable this policy setting, application-based settings are used. -- If you do not configure this policy setting, application-based settings are used. +- If you don't configure this policy setting, application-based settings are used. @@ -136,13 +134,12 @@ For example: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-removablestorage.md b/windows/client-management/mdm/policy-csp-admx-removablestorage.md index 27e48cd062..9dd1fd7618 100644 --- a/windows/client-management/mdm/policy-csp-admx-removablestorage.md +++ b/windows/client-management/mdm/policy-csp-admx-removablestorage.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_RemovableStorage Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_RemovableStorage -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,10 +43,10 @@ This policy setting configures the amount of time (in seconds) that the operatin - If you enable this policy setting, you can set the number of seconds you want the system to wait until a reboot. -- If you disable or do not configure this setting, the operating system does not force a reboot. +- If you disable or don't configure this setting, the operating system doesn't force a reboot. > [!NOTE] -> If no reboot is forced, the access right does not take effect until the operating system is restarted. +> If no reboot is forced, the access right doesn't take effect until the operating system is restarted. @@ -61,13 +58,12 @@ This policy setting configures the amount of time (in seconds) that the operatin | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -94,7 +90,7 @@ This policy setting configures the amount of time (in seconds) that the operatin | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -109,10 +105,10 @@ This policy setting configures the amount of time (in seconds) that the operatin - If you enable this policy setting, you can set the number of seconds you want the system to wait until a reboot. -- If you disable or do not configure this setting, the operating system does not force a reboot. +- If you disable or don't configure this setting, the operating system doesn't force a reboot. > [!NOTE] -> If no reboot is forced, the access right does not take effect until the operating system is restarted. +> If no reboot is forced, the access right doesn't take effect until the operating system is restarted. @@ -124,13 +120,12 @@ This policy setting configures the amount of time (in seconds) that the operatin | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -157,7 +152,7 @@ This policy setting configures the amount of time (in seconds) that the operatin | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -172,7 +167,7 @@ This policy setting denies execute access to the CD and DVD removable storage cl - If you enable this policy setting, execute access is denied to this removable storage class. -- If you disable or do not configure this policy setting, execute access is allowed to this removable storage class. +- If you disable or don't configure this policy setting, execute access is allowed to this removable storage class. @@ -184,13 +179,12 @@ This policy setting denies execute access to the CD and DVD removable storage cl | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -217,7 +211,7 @@ This policy setting denies execute access to the CD and DVD removable storage cl | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -232,7 +226,7 @@ This policy setting denies read access to the CD and DVD removable storage class - If you enable this policy setting, read access is denied to this removable storage class. -- If you disable or do not configure this policy setting, read access is allowed to this removable storage class. +- If you disable or don't configure this policy setting, read access is allowed to this removable storage class. @@ -244,13 +238,12 @@ This policy setting denies read access to the CD and DVD removable storage class | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -277,7 +270,7 @@ This policy setting denies read access to the CD and DVD removable storage class | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -292,7 +285,7 @@ This policy setting denies read access to the CD and DVD removable storage class - If you enable this policy setting, read access is denied to this removable storage class. -- If you disable or do not configure this policy setting, read access is allowed to this removable storage class. +- If you disable or don't configure this policy setting, read access is allowed to this removable storage class. @@ -304,13 +297,12 @@ This policy setting denies read access to the CD and DVD removable storage class | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -337,7 +329,7 @@ This policy setting denies read access to the CD and DVD removable storage class | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -352,7 +344,7 @@ This policy setting denies write access to the CD and DVD removable storage clas - If you enable this policy setting, write access is denied to this removable storage class. -- If you disable or do not configure this policy setting, write access is allowed to this removable storage class. +- If you disable or don't configure this policy setting, write access is allowed to this removable storage class. @@ -364,13 +356,12 @@ This policy setting denies write access to the CD and DVD removable storage clas | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -397,7 +388,7 @@ This policy setting denies write access to the CD and DVD removable storage clas | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -412,7 +403,7 @@ This policy setting denies write access to the CD and DVD removable storage clas - If you enable this policy setting, write access is denied to this removable storage class. -- If you disable or do not configure this policy setting, write access is allowed to this removable storage class. +- If you disable or don't configure this policy setting, write access is allowed to this removable storage class. @@ -424,13 +415,12 @@ This policy setting denies write access to the CD and DVD removable storage clas | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -457,7 +447,7 @@ This policy setting denies write access to the CD and DVD removable storage clas | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -472,7 +462,7 @@ This policy setting denies read access to custom removable storage classes. - If you enable this policy setting, read access is denied to these removable storage classes. -- If you disable or do not configure this policy setting, read access is allowed to these removable storage classes. +- If you disable or don't configure this policy setting, read access is allowed to these removable storage classes. @@ -484,13 +474,12 @@ This policy setting denies read access to custom removable storage classes. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -517,7 +506,7 @@ This policy setting denies read access to custom removable storage classes. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -532,7 +521,7 @@ This policy setting denies read access to custom removable storage classes. - If you enable this policy setting, read access is denied to these removable storage classes. -- If you disable or do not configure this policy setting, read access is allowed to these removable storage classes. +- If you disable or don't configure this policy setting, read access is allowed to these removable storage classes. @@ -544,13 +533,12 @@ This policy setting denies read access to custom removable storage classes. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -577,7 +565,7 @@ This policy setting denies read access to custom removable storage classes. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -592,7 +580,7 @@ This policy setting denies write access to custom removable storage classes. - If you enable this policy setting, write access is denied to these removable storage classes. -- If you disable or do not configure this policy setting, write access is allowed to these removable storage classes. +- If you disable or don't configure this policy setting, write access is allowed to these removable storage classes. @@ -604,13 +592,12 @@ This policy setting denies write access to custom removable storage classes. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -637,7 +624,7 @@ This policy setting denies write access to custom removable storage classes. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -652,7 +639,7 @@ This policy setting denies write access to custom removable storage classes. - If you enable this policy setting, write access is denied to these removable storage classes. -- If you disable or do not configure this policy setting, write access is allowed to these removable storage classes. +- If you disable or don't configure this policy setting, write access is allowed to these removable storage classes. @@ -664,13 +651,12 @@ This policy setting denies write access to custom removable storage classes. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -697,7 +683,7 @@ This policy setting denies write access to custom removable storage classes. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -712,7 +698,7 @@ This policy setting denies execute access to the Floppy Drives removable storage - If you enable this policy setting, execute access is denied to this removable storage class. -- If you disable or do not configure this policy setting, execute access is allowed to this removable storage class. +- If you disable or don't configure this policy setting, execute access is allowed to this removable storage class. @@ -724,13 +710,12 @@ This policy setting denies execute access to the Floppy Drives removable storage | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -757,7 +742,7 @@ This policy setting denies execute access to the Floppy Drives removable storage | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -772,7 +757,7 @@ This policy setting denies read access to the Floppy Drives removable storage cl - If you enable this policy setting, read access is denied to this removable storage class. -- If you disable or do not configure this policy setting, read access is allowed to this removable storage class. +- If you disable or don't configure this policy setting, read access is allowed to this removable storage class. @@ -784,13 +769,12 @@ This policy setting denies read access to the Floppy Drives removable storage cl | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -817,7 +801,7 @@ This policy setting denies read access to the Floppy Drives removable storage cl | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -832,7 +816,7 @@ This policy setting denies read access to the Floppy Drives removable storage cl - If you enable this policy setting, read access is denied to this removable storage class. -- If you disable or do not configure this policy setting, read access is allowed to this removable storage class. +- If you disable or don't configure this policy setting, read access is allowed to this removable storage class. @@ -844,13 +828,12 @@ This policy setting denies read access to the Floppy Drives removable storage cl | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -877,7 +860,7 @@ This policy setting denies read access to the Floppy Drives removable storage cl | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -892,7 +875,7 @@ This policy setting denies write access to the Floppy Drives removable storage c - If you enable this policy setting, write access is denied to this removable storage class. -- If you disable or do not configure this policy setting, write access is allowed to this removable storage class. +- If you disable or don't configure this policy setting, write access is allowed to this removable storage class. @@ -904,13 +887,12 @@ This policy setting denies write access to the Floppy Drives removable storage c | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -937,7 +919,7 @@ This policy setting denies write access to the Floppy Drives removable storage c | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -952,7 +934,7 @@ This policy setting denies write access to the Floppy Drives removable storage c - If you enable this policy setting, write access is denied to this removable storage class. -- If you disable or do not configure this policy setting, write access is allowed to this removable storage class. +- If you disable or don't configure this policy setting, write access is allowed to this removable storage class. @@ -964,13 +946,12 @@ This policy setting denies write access to the Floppy Drives removable storage c | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -997,7 +978,7 @@ This policy setting denies write access to the Floppy Drives removable storage c | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1012,7 +993,7 @@ This policy setting grants normal users direct access to removable storage devic - If you enable this policy setting, remote users can open direct handles to removable storage devices in remote sessions. -- If you disable or do not configure this policy setting, remote users cannot open direct handles to removable storage devices in remote sessions. +- If you disable or don't configure this policy setting, remote users can't open direct handles to removable storage devices in remote sessions. @@ -1024,13 +1005,12 @@ This policy setting grants normal users direct access to removable storage devic | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1057,7 +1037,7 @@ This policy setting grants normal users direct access to removable storage devic | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1072,7 +1052,7 @@ This policy setting denies execute access to removable disks. - If you enable this policy setting, execute access is denied to this removable storage class. -- If you disable or do not configure this policy setting, execute access is allowed to this removable storage class. +- If you disable or don't configure this policy setting, execute access is allowed to this removable storage class. @@ -1084,13 +1064,12 @@ This policy setting denies execute access to removable disks. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1117,7 +1096,7 @@ This policy setting denies execute access to removable disks. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1132,7 +1111,7 @@ This policy setting denies read access to removable disks. - If you enable this policy setting, read access is denied to this removable storage class. -- If you disable or do not configure this policy setting, read access is allowed to this removable storage class. +- If you disable or don't configure this policy setting, read access is allowed to this removable storage class. @@ -1144,13 +1123,12 @@ This policy setting denies read access to removable disks. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1177,7 +1155,7 @@ This policy setting denies read access to removable disks. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1192,7 +1170,7 @@ This policy setting denies read access to removable disks. - If you enable this policy setting, read access is denied to this removable storage class. -- If you disable or do not configure this policy setting, read access is allowed to this removable storage class. +- If you disable or don't configure this policy setting, read access is allowed to this removable storage class. @@ -1204,13 +1182,12 @@ This policy setting denies read access to removable disks. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1237,7 +1214,7 @@ This policy setting denies read access to removable disks. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1252,10 +1229,10 @@ This policy setting denies write access to removable disks. - If you enable this policy setting, write access is denied to this removable storage class. -- If you disable or do not configure this policy setting, write access is allowed to this removable storage class. +- If you disable or don't configure this policy setting, write access is allowed to this removable storage class. > [!NOTE] -> To require that users write data to BitLocker-protected storage, enable the policy setting "Deny write access to drives not protected by BitLocker," which is located in "Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Removable Data Drives." +> To require that users write data to BitLocker-protected storage, enable the policy setting "Deny write access to drives not protected by BitLocker," which is located in "Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Removable Data Drives". @@ -1267,13 +1244,12 @@ This policy setting denies write access to removable disks. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1300,7 +1276,7 @@ This policy setting denies write access to removable disks. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1317,7 +1293,7 @@ This policy setting takes precedence over any individual removable storage polic - If you enable this policy setting, no access is allowed to any removable storage class. -- If you disable or do not configure this policy setting, write and read accesses are allowed to all removable storage classes. +- If you disable or don't configure this policy setting, write and read accesses are allowed to all removable storage classes. @@ -1329,13 +1305,12 @@ This policy setting takes precedence over any individual removable storage polic | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1362,7 +1337,7 @@ This policy setting takes precedence over any individual removable storage polic | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1379,7 +1354,7 @@ This policy setting takes precedence over any individual removable storage polic - If you enable this policy setting, no access is allowed to any removable storage class. -- If you disable or do not configure this policy setting, write and read accesses are allowed to all removable storage classes. +- If you disable or don't configure this policy setting, write and read accesses are allowed to all removable storage classes. @@ -1391,13 +1366,12 @@ This policy setting takes precedence over any individual removable storage polic | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1424,7 +1398,7 @@ This policy setting takes precedence over any individual removable storage polic | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1439,7 +1413,7 @@ This policy setting denies execute access to the Tape Drive removable storage cl - If you enable this policy setting, execute access is denied to this removable storage class. -- If you disable or do not configure this policy setting, execute access is allowed to this removable storage class. +- If you disable or don't configure this policy setting, execute access is allowed to this removable storage class. @@ -1451,13 +1425,12 @@ This policy setting denies execute access to the Tape Drive removable storage cl | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1484,7 +1457,7 @@ This policy setting denies execute access to the Tape Drive removable storage cl | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1499,7 +1472,7 @@ This policy setting denies read access to the Tape Drive removable storage class - If you enable this policy setting, read access is denied to this removable storage class. -- If you disable or do not configure this policy setting, read access is allowed to this removable storage class. +- If you disable or don't configure this policy setting, read access is allowed to this removable storage class. @@ -1511,13 +1484,12 @@ This policy setting denies read access to the Tape Drive removable storage class | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1544,7 +1516,7 @@ This policy setting denies read access to the Tape Drive removable storage class | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1559,7 +1531,7 @@ This policy setting denies read access to the Tape Drive removable storage class - If you enable this policy setting, read access is denied to this removable storage class. -- If you disable or do not configure this policy setting, read access is allowed to this removable storage class. +- If you disable or don't configure this policy setting, read access is allowed to this removable storage class. @@ -1571,13 +1543,12 @@ This policy setting denies read access to the Tape Drive removable storage class | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1604,7 +1575,7 @@ This policy setting denies read access to the Tape Drive removable storage class | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1619,7 +1590,7 @@ This policy setting denies write access to the Tape Drive removable storage clas - If you enable this policy setting, write access is denied to this removable storage class. -- If you disable or do not configure this policy setting, write access is allowed to this removable storage class. +- If you disable or don't configure this policy setting, write access is allowed to this removable storage class. @@ -1631,13 +1602,12 @@ This policy setting denies write access to the Tape Drive removable storage clas | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1664,7 +1634,7 @@ This policy setting denies write access to the Tape Drive removable storage clas | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1679,7 +1649,7 @@ This policy setting denies write access to the Tape Drive removable storage clas - If you enable this policy setting, write access is denied to this removable storage class. -- If you disable or do not configure this policy setting, write access is allowed to this removable storage class. +- If you disable or don't configure this policy setting, write access is allowed to this removable storage class. @@ -1691,13 +1661,12 @@ This policy setting denies write access to the Tape Drive removable storage clas | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1724,7 +1693,7 @@ This policy setting denies write access to the Tape Drive removable storage clas | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1739,7 +1708,7 @@ This policy setting denies read access to removable disks, which may include med - If you enable this policy setting, read access is denied to this removable storage class. -- If you disable or do not configure this policy setting, read access is allowed to this removable storage class. +- If you disable or don't configure this policy setting, read access is allowed to this removable storage class. @@ -1751,13 +1720,12 @@ This policy setting denies read access to removable disks, which may include med | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1784,7 +1752,7 @@ This policy setting denies read access to removable disks, which may include med | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1799,7 +1767,7 @@ This policy setting denies read access to removable disks, which may include med - If you enable this policy setting, read access is denied to this removable storage class. -- If you disable or do not configure this policy setting, read access is allowed to this removable storage class. +- If you disable or don't configure this policy setting, read access is allowed to this removable storage class. @@ -1811,13 +1779,12 @@ This policy setting denies read access to removable disks, which may include med | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1844,7 +1811,7 @@ This policy setting denies read access to removable disks, which may include med | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1859,7 +1826,7 @@ This policy setting denies write access to removable disks, which may include me - If you enable this policy setting, write access is denied to this removable storage class. -- If you disable or do not configure this policy setting, write access is allowed to this removable storage class. +- If you disable or don't configure this policy setting, write access is allowed to this removable storage class. @@ -1871,13 +1838,12 @@ This policy setting denies write access to removable disks, which may include me | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1904,7 +1870,7 @@ This policy setting denies write access to removable disks, which may include me | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1919,7 +1885,7 @@ This policy setting denies write access to removable disks, which may include me - If you enable this policy setting, write access is denied to this removable storage class. -- If you disable or do not configure this policy setting, write access is allowed to this removable storage class. +- If you disable or don't configure this policy setting, write access is allowed to this removable storage class. @@ -1931,13 +1897,12 @@ This policy setting denies write access to removable disks, which may include me | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-rpc.md b/windows/client-management/mdm/policy-csp-admx-rpc.md index ca1428aae4..4edfda6b8f 100644 --- a/windows/client-management/mdm/policy-csp-admx-rpc.md +++ b/windows/client-management/mdm/policy-csp-admx-rpc.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_RPC Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_RPC -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -48,7 +45,7 @@ Extended error information includes the local time that the error occurred, the - If you disable this policy setting, the RPC Runtime only generates a status code to indicate an error condition. -- If you do not configure this policy setting, it remains disabled. It will only generate a status code to indicate an error condition. +- If you don't configure this policy setting, it remains disabled. It will only generate a status code to indicate an error condition. - If you enable this policy setting, the RPC runtime will generate extended error information. You must select an error response type in the drop-down box. @@ -67,10 +64,10 @@ Extended error information includes the local time that the error occurred, the > Extended error information is formatted to be compatible with other operating systems and older Microsoft operating systems, but only newer Microsoft operating systems can read and respond to the information. > [!NOTE] -> The default policy setting, "Off," is designed for systems where extended error information is considered to be sensitive, and it should not be made available remotely. +> The default policy setting, "Off," is designed for systems where extended error information is considered to be sensitive, and it shouldn't be made available remotely. > [!NOTE] -> This policy setting will not be applied until the system is rebooted. +> This policy setting won't be applied until the system is rebooted. @@ -82,13 +79,12 @@ Extended error information includes the local time that the error occurred, the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -114,7 +110,7 @@ Extended error information includes the local time that the error occurred, the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -127,20 +123,20 @@ Extended error information includes the local time that the error occurred, the This policy setting controls whether the RPC Runtime ignores delegation failures when delegation is requested. -The constrained delegation model, introduced in Windows Server 2003, does not report that delegation was enabled on a security context when a client connects to a server. Callers of RPC and COM are encouraged to use the RPC_C_QOS_CAPABILITIES_IGNORE_DELEGATE_FAILURE flag, but some applications written for the traditional delegation model prior to Windows Server 2003 may not use this flag and will encounter RPC_S_SEC_PKG_ERROR when connecting to a server that uses constrained delegation. +The constrained delegation model, introduced in Windows Server 2003, doesn't report that delegation was enabled on a security context when a client connects to a server. Callers of RPC and COM are encouraged to use the RPC_C_QOS_CAPABILITIES_IGNORE_DELEGATE_FAILURE flag, but some applications written for the traditional delegation model prior to Windows Server 2003 may not use this flag and will encounter RPC_S_SEC_PKG_ERROR when connecting to a server that uses constrained delegation. - If you disable this policy setting, the RPC Runtime will generate RPC_S_SEC_PKG_ERROR errors to applications that ask for delegation and connect to servers using constrained delegation. -- If you do not configure this policy setting, it remains disabled and will generate RPC_S_SEC_PKG_ERROR errors to applications that ask for delegation and connect to servers using constrained delegation. +- If you don't configure this policy setting, it remains disabled and will generate RPC_S_SEC_PKG_ERROR errors to applications that ask for delegation and connect to servers using constrained delegation. - If you enable this policy setting, then: -- "Off" directs the RPC Runtime to generate RPC_S_SEC_PKG_ERROR if the client asks for delegation, but the created security context does not support delegation. +- "Off" directs the RPC Runtime to generate RPC_S_SEC_PKG_ERROR if the client asks for delegation, but the created security context doesn't support delegation. -- "On" directs the RPC Runtime to accept security contexts that do not support delegation even if delegation was asked for. +- "On" directs the RPC Runtime to accept security contexts that don't support delegation even if delegation was asked for. > [!NOTE] -> This policy setting will not be applied until the system is rebooted. +> This policy setting won't be applied until the system is rebooted. @@ -152,13 +148,12 @@ The constrained delegation model, introduced in Windows Server 2003, does not re | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -184,7 +179,7 @@ The constrained delegation model, introduced in Windows Server 2003, does not re | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -205,12 +200,12 @@ The minimum allowed value for this policy setting is 90 seconds. The maximum is - If you disable this policy setting, the idle connection timeout on the IIS server running the RPC HTTP proxy will be used. -- If you do not configure this policy setting, it will remain disabled. The idle connection timeout on the IIS server running the RPC HTTP proxy will be used. +- If you don't configure this policy setting, it will remain disabled. The idle connection timeout on the IIS server running the RPC HTTP proxy will be used. - If you enable this policy setting, and the IIS server running the RPC HTTP proxy is configured with a lower idle connection timeout, the timeout on the IIS server is used. Otherwise, the provided timeout value is used. The timeout is given in seconds. > [!NOTE] -> This policy setting will not be applied until the system is rebooted. +> This policy setting won't be applied until the system is rebooted. @@ -222,13 +217,12 @@ The minimum allowed value for this policy setting is 90 seconds. The maximum is | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -254,7 +248,7 @@ The minimum allowed value for this policy setting is 90 seconds. The maximum is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -269,14 +263,14 @@ This policy setting determines whether the RPC Runtime maintains RPC state infor - If you disable this policy setting, the RPC runtime defaults to "Auto2" level. -- If you do not configure this policy setting, the RPC defaults to "Auto2" level. +- If you don't configure this policy setting, the RPC defaults to "Auto2" level. - If you enable this policy setting, you can use the drop-down box to determine which systems maintain RPC state information. -- "None" indicates that the system does not maintain any RPC state information. +- "None" indicates that the system doesn't maintain any RPC state information. > [!NOTE] -> Because the basic state information required for troubleshooting has a negligible effect on performance and uses only about 4K of memory, this setting is not recommended for most installations. +> Because the basic state information required for troubleshooting has a negligible effect on performance and uses only about 4K of memory, this setting isn't recommended for most installations. - "Auto1" directs RPC to maintain basic state information only if the computer has at least 64 MB of memory. @@ -284,13 +278,13 @@ This policy setting determines whether the RPC Runtime maintains RPC state infor - "Server" directs RPC to maintain basic state information on the computer, regardless of its capacity. -- "Full" directs RPC to maintain complete RPC state information on the system, regardless of its capacity. Because this level can degrade performance, it is recommended for use only while you are investigating an RPC problem. +- "Full" directs RPC to maintain complete RPC state information on the system, regardless of its capacity. Because this level can degrade performance, it's recommended for use only while you are investigating an RPC problem. > [!NOTE] > To retrieve the RPC state information from a system that maintains it, you must use a debugging tool. > [!NOTE] -> This policy setting will not be applied until the system is rebooted. +> This policy setting won't be applied until the system is rebooted. @@ -302,13 +296,12 @@ This policy setting determines whether the RPC Runtime maintains RPC state infor | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-sam.md b/windows/client-management/mdm/policy-csp-admx-sam.md index 1dc3a07841..8f947117a1 100644 --- a/windows/client-management/mdm/policy-csp-admx-sam.md +++ b/windows/client-management/mdm/policy-csp-admx-sam.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_sam Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_sam -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -52,7 +49,7 @@ For more information on the ROCA vulnerability, please see: If you enable this policy setting the following options are supported: -Ignore: during authentication the domain controller will not probe any WHfB keys for the ROCA vulnerability. +Ignore: during authentication the domain controller won't probe any WHfB keys for the ROCA vulnerability. Audit: during authentication the domain controller will emit audit events for WHfB keys that are subject to the ROCA vulnerability (authentications will still succeed). @@ -62,9 +59,9 @@ This setting only takes effect on domain controllers. If not configured, domain controllers will default to using their local configuration. The default local configuration is Audit. -A reboot is not required for changes to this setting to take effect. +A reboot isn't required for changes to this setting to take effect. -**Note** to avoid unexpected disruptions this setting should not be set to Block until appropriate mitigations have been performed, for example patching of vulnerable TPMs. +Note to avoid unexpected disruptions this setting shouldn't be set to Block until appropriate mitigations have been performed, for example patching of vulnerable TPMs. More information is available at< https://go.microsoft.com/fwlink/?linkid=2116430>. @@ -78,13 +75,12 @@ More information is available at< https://go.microsoft.com/fwlink/?linkid=211643 | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-scripts.md b/windows/client-management/mdm/policy-csp-admx-scripts.md index dc87193ebf..84a0dd295a 100644 --- a/windows/client-management/mdm/policy-csp-admx-scripts.md +++ b/windows/client-management/mdm/policy-csp-admx-scripts.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_Scripts Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_Scripts -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -42,11 +39,11 @@ ms.topic: reference -This policy setting allows user logon scripts to run when the logon cross-forest, DNS suffixes are not configured, and NetBIOS or WINS is disabled. This policy setting affects all user accounts interactively logging on to the computer. +This policy setting allows user logon scripts to run when the logon cross-forest, DNS suffixes aren't configured, and NetBIOS or WINS is disabled. This policy setting affects all user accounts interactively logging on to the computer. - If you enable this policy setting, user logon scripts run if NetBIOS or WINS is disabled during cross-forest logons without the DNS suffixes being configured. -- If you disable or do not configure this policy setting, user account cross-forest, interactive logging cannot run logon scripts if NetBIOS or WINS is disabled, and the DNS suffixes are not configured. +- If you disable or don't configure this policy setting, user account cross-forest, interactive logging can't run logon scripts if NetBIOS or WINS is disabled, and the DNS suffixes aren't configured. @@ -58,13 +55,12 @@ This policy setting allows user logon scripts to run when the logon cross-forest | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -91,7 +87,7 @@ This policy setting allows user logon scripts to run when the logon cross-forest | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -104,7 +100,7 @@ This policy setting allows user logon scripts to run when the logon cross-forest This policy setting determines how long the system waits for scripts applied by Group Policy to run. -This setting limits the total time allowed for all logon, logoff, startup, and shutdown scripts applied by Group Policy to finish running. If the scripts have not finished running when the specified time expires, the system stops script processing and records an error event. +This setting limits the total time allowed for all logon, logoff, startup, and shutdown scripts applied by Group Policy to finish running. If the scripts haven't finished running when the specified time expires, the system stops script processing and records an error event. - If you enable this setting, then, in the Seconds box, you can type a number from 1 to 32,000 for the number of seconds you want the system to wait for the set of scripts to finish. To direct the system to wait until the scripts have finished, no matter how long they take, type 0. @@ -112,7 +108,7 @@ This interval is particularly important when other system tasks must wait while An excessively long interval can delay the system and inconvenience users. However, if the interval is too short, prerequisite tasks might not be done, and the system can appear to be ready prematurely. -- If you disable or do not configure this setting the system lets the combined set of scripts run for up to 600 seconds (10 minutes). This is the default. +- If you disable or don't configure this setting the system lets the combined set of scripts run for up to 600 seconds (10 minutes). This is the default. @@ -124,13 +120,12 @@ An excessively long interval can delay the system and inconvenience users. Howev | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -156,7 +151,7 @@ An excessively long interval can delay the system and inconvenience users. Howev | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -202,13 +197,12 @@ For DesktopSales, GPOs B and C are applied, but not GPO A. Therefore, the script | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -235,7 +229,7 @@ For DesktopSales, GPOs B and C are applied, but not GPO A. Therefore, the script | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -248,11 +242,11 @@ For DesktopSales, GPOs B and C are applied, but not GPO A. Therefore, the script This policy setting hides the instructions in logon scripts written for Windows NT 4.0 and earlier. -Logon scripts are batch files of instructions that run when the user logs on. By default, Windows 2000 displays the instructions in logon scripts written for Windows NT 4.0 and earlier in a command window as they run, although it does not display logon scripts written for Windows 2000. +Logon scripts are batch files of instructions that run when the user logs on. By default, Windows 2000 displays the instructions in logon scripts written for Windows NT 4.0 and earlier in a command window as they run, although it doesn't display logon scripts written for Windows 2000. -- If you enable this setting, Windows 2000 does not display logon scripts written for Windows NT 4.0 and earlier. +- If you enable this setting, Windows 2000 doesn't display logon scripts written for Windows NT 4.0 and earlier. -- If you disable or do not configure this policy setting, Windows 2000 displays login scripts written for Windows NT 4.0 and earlier. +- If you disable or don't configure this policy setting, Windows 2000 displays login scripts written for Windows NT 4.0 and earlier. Also, see the "Run Logon Scripts Visible" setting. @@ -266,13 +260,12 @@ Also, see the "Run Logon Scripts Visible" setting. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -299,7 +292,7 @@ Also, see the "Run Logon Scripts Visible" setting. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -312,11 +305,11 @@ Also, see the "Run Logon Scripts Visible" setting. This policy setting displays the instructions in logoff scripts as they run. -Logoff scripts are batch files of instructions that run when the user logs off. By default, the system does not display the instructions in the logoff script. +Logoff scripts are batch files of instructions that run when the user logs off. By default, the system doesn't display the instructions in the logoff script. - If you enable this policy setting, the system displays each instruction in the logoff script as it runs. The instructions appear in a command window. This policy setting is designed for advanced users. -- If you disable or do not configure this policy setting, the instructions are suppressed. +- If you disable or don't configure this policy setting, the instructions are suppressed. @@ -328,13 +321,12 @@ Logoff scripts are batch files of instructions that run when the user logs off. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -361,7 +353,7 @@ Logoff scripts are batch files of instructions that run when the user logs off. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -374,9 +366,9 @@ Logoff scripts are batch files of instructions that run when the user logs off. This policy setting directs the system to wait for logon scripts to finish running before it starts the File Explorer interface program and creates the desktop. -- If you enable this policy setting, File Explorer does not start until the logon scripts have finished running. This policy setting ensures that logon script processing is complete before the user starts working, but it can delay the appearance of the desktop. +- If you enable this policy setting, File Explorer doesn't start until the logon scripts have finished running. This policy setting ensures that logon script processing is complete before the user starts working, but it can delay the appearance of the desktop. -- If you disable or do not configure this policy setting, the logon scripts and File Explorer are not synchronized and can run simultaneously. +- If you disable or don't configure this policy setting, the logon scripts and File Explorer aren't synchronized and can run simultaneously. This policy setting appears in the Computer Configuration and User Configuration folders. The policy setting set in Computer Configuration takes precedence over the policy setting set in User Configuration. @@ -390,13 +382,12 @@ This policy setting appears in the Computer Configuration and User Configuration | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -423,7 +414,7 @@ This policy setting appears in the Computer Configuration and User Configuration | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -436,9 +427,9 @@ This policy setting appears in the Computer Configuration and User Configuration This policy setting directs the system to wait for logon scripts to finish running before it starts the File Explorer interface program and creates the desktop. -- If you enable this policy setting, File Explorer does not start until the logon scripts have finished running. This policy setting ensures that logon script processing is complete before the user starts working, but it can delay the appearance of the desktop. +- If you enable this policy setting, File Explorer doesn't start until the logon scripts have finished running. This policy setting ensures that logon script processing is complete before the user starts working, but it can delay the appearance of the desktop. -- If you disable or do not configure this policy setting, the logon scripts and File Explorer are not synchronized and can run simultaneously. +- If you disable or don't configure this policy setting, the logon scripts and File Explorer aren't synchronized and can run simultaneously. This policy setting appears in the Computer Configuration and User Configuration folders. The policy setting set in Computer Configuration takes precedence over the policy setting set in User Configuration. @@ -452,13 +443,12 @@ This policy setting appears in the Computer Configuration and User Configuration | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -485,7 +475,7 @@ This policy setting appears in the Computer Configuration and User Configuration | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -498,11 +488,11 @@ This policy setting appears in the Computer Configuration and User Configuration This policy setting displays the instructions in logon scripts as they run. -Logon scripts are batch files of instructions that run when the user logs on. By default, the system does not display the instructions in logon scripts. +Logon scripts are batch files of instructions that run when the user logs on. By default, the system doesn't display the instructions in logon scripts. - If you enable this policy setting, the system displays each instruction in the logon script as it runs. The instructions appear in a command window. This policy setting is designed for advanced users. -- If you disable or do not configure this policy setting, the instructions are suppressed. +- If you disable or don't configure this policy setting, the instructions are suppressed. @@ -514,13 +504,12 @@ Logon scripts are batch files of instructions that run when the user logs on. By | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -547,7 +536,7 @@ Logon scripts are batch files of instructions that run when the user logs on. By | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -560,11 +549,11 @@ Logon scripts are batch files of instructions that run when the user logs on. By This policy setting displays the instructions in shutdown scripts as they run. -Shutdown scripts are batch files of instructions that run when the user restarts the system or shuts it down. By default, the system does not display the instructions in the shutdown script. +Shutdown scripts are batch files of instructions that run when the user restarts the system or shuts it down. By default, the system doesn't display the instructions in the shutdown script. - If you enable this policy setting, the system displays each instruction in the shutdown script as it runs. The instructions appear in a command window. -- If you disable or do not configure this policy setting, the instructions are suppressed. +- If you disable or don't configure this policy setting, the instructions are suppressed. @@ -576,13 +565,12 @@ Shutdown scripts are batch files of instructions that run when the user restarts | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -609,7 +597,7 @@ Shutdown scripts are batch files of instructions that run when the user restarts | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -624,9 +612,9 @@ This policy setting lets the system run startup scripts simultaneously. Startup scripts are batch files that run before the user is invited to log on. By default, the system waits for each startup script to complete before it runs the next startup script. -- If you enable this policy setting, the system does not coordinate the running of startup scripts. As a result, startup scripts can run simultaneously. +- If you enable this policy setting, the system doesn't coordinate the running of startup scripts. As a result, startup scripts can run simultaneously. -- If you disable or do not configure this policy setting, a startup cannot run until the previous script is complete. +- If you disable or don't configure this policy setting, a startup can't run until the previous script is complete. > [!NOTE] > Starting with Windows Vista operating system, scripts that are configured to run asynchronously are no longer visible on startup, whether the "Run startup scripts visible" policy setting is enabled or not. @@ -641,13 +629,12 @@ Startup scripts are batch files that run before the user is invited to log on. B | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -674,7 +661,7 @@ Startup scripts are batch files that run before the user is invited to log on. B | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -687,11 +674,11 @@ Startup scripts are batch files that run before the user is invited to log on. B This policy setting displays the instructions in startup scripts as they run. -Startup scripts are batch files of instructions that run before the user is invited to log on. By default, the system does not display the instructions in the startup script. +Startup scripts are batch files of instructions that run before the user is invited to log on. By default, the system doesn't display the instructions in the startup script. - If you enable this policy setting, the system displays each instruction in the startup script as it runs. Instructions appear in a command window. This policy setting is designed for advanced users. -- If you disable or do not configure this policy setting, the instructions are suppressed. +- If you disable or don't configure this policy setting, the instructions are suppressed. > [!NOTE] > Starting with Windows Vista operating system, scripts that are configured to run asynchronously are no longer visible on startup, whether this policy setting is enabled or not. @@ -706,13 +693,12 @@ Startup scripts are batch files of instructions that run before the user is invi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -739,7 +725,7 @@ Startup scripts are batch files of instructions that run before the user is invi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -789,13 +775,12 @@ For Tamara, GPOs B and C are applied, but not GPO A. Therefore, the scripts for | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-sdiageng.md b/windows/client-management/mdm/policy-csp-admx-sdiageng.md index 3ec7284be3..b00d4f7d27 100644 --- a/windows/client-management/mdm/policy-csp-admx-sdiageng.md +++ b/windows/client-management/mdm/policy-csp-admx-sdiageng.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_sdiageng Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_sdiageng -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -42,11 +39,11 @@ ms.topic: reference -This policy setting allows users who are connected to the Internet to access and search troubleshooting content that is hosted on Microsoft content servers. Users can access online troubleshooting content from within the Troubleshooting Control Panel UI by clicking "Yes" when they are prompted by a message that states, "Do you want the most up-to-date troubleshooting content?" +This policy setting allows users who are connected to the Internet to access and search troubleshooting content that's hosted on Microsoft content servers. Users can access online troubleshooting content from within the Troubleshooting Control Panel UI by clicking "Yes" when they're prompted by a message that states, "Do you want the most up-to-date troubleshooting content?". -- If you enable or do not configure this policy setting, users who are connected to the Internet can access and search troubleshooting content that is hosted on Microsoft content servers from within the Troubleshooting Control Panel user interface. +- If you enable or don't configure this policy setting, users who are connected to the Internet can access and search troubleshooting content that's hosted on Microsoft content servers from within the Troubleshooting Control Panel user interface. -- If you disable this policy setting, users can only access and search troubleshooting content that is available locally on their computers, even if they are connected to the Internet. They are prevented from connecting to the Microsoft servers that host the Windows Online Troubleshooting Service. +- If you disable this policy setting, users can only access and search troubleshooting content that's available locally on their computers, even if they're connected to the Internet. They are prevented from connecting to the Microsoft servers that host the Windows Online Troubleshooting Service. @@ -58,13 +55,12 @@ This policy setting allows users who are connected to the Internet to access and | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -91,7 +87,7 @@ This policy setting allows users who are connected to the Internet to access and | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -104,11 +100,11 @@ This policy setting allows users who are connected to the Internet to access and This policy setting allows users to access and run the troubleshooting tools that are available in the Troubleshooting Control Panel and to run the troubleshooting wizard to troubleshoot problems on their computers. -- If you enable or do not configure this policy setting, users can access and run the troubleshooting tools from the Troubleshooting Control Panel. +- If you enable or don't configure this policy setting, users can access and run the troubleshooting tools from the Troubleshooting Control Panel. -- If you disable this policy setting, users cannot access or run the troubleshooting tools from the Control Panel. +- If you disable this policy setting, users can't access or run the troubleshooting tools from the Control Panel. -**Note** that this setting also controls a user's ability to launch standalone troubleshooting packs such as those found in .diagcab files. +Note that this setting also controls a user's ability to launch standalone troubleshooting packs such as those found in .diagcab files. @@ -120,13 +116,12 @@ This policy setting allows users to access and run the troubleshooting tools tha | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -153,7 +148,7 @@ This policy setting allows users to access and run the troubleshooting tools tha | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -168,7 +163,7 @@ This policy setting determines whether scripted diagnostics will execute diagnos - If you enable this policy setting, the scripted diagnostics execution engine validates the signer of any diagnostic package and runs only those signed by trusted publishers. -- If you disable or do not configure this policy setting, the scripted diagnostics execution engine runs all digitally signed packages. +- If you disable or don't configure this policy setting, the scripted diagnostics execution engine runs all digitally signed packages. @@ -180,13 +175,12 @@ This policy setting determines whether scripted diagnostics will execute diagnos | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-sdiagschd.md b/windows/client-management/mdm/policy-csp-admx-sdiagschd.md index 91f8df9c49..7370644c81 100644 --- a/windows/client-management/mdm/policy-csp-admx-sdiagschd.md +++ b/windows/client-management/mdm/policy-csp-admx-sdiagschd.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_sdiagschd Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_sdiagschd -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -48,13 +45,13 @@ Determines whether scheduled diagnostics will run to proactively detect and reso If you choose detection, troubleshooting and resolution, Windows will resolve some of these problems silently without requiring user input. -- If you disable this policy setting, Windows will not be able to detect, troubleshoot or resolve problems on a scheduled basis. +- If you disable this policy setting, Windows won't be able to detect, troubleshoot or resolve problems on a scheduled basis. -- If you do not configure this policy setting, local troubleshooting preferences will take precedence, as configured in the control panel. If no local troubleshooting preference is configured, scheduled diagnostics are enabled for detection, troubleshooting and resolution by default. +- If you don't configure this policy setting, local troubleshooting preferences will take precedence, as configured in the control panel. If no local troubleshooting preference is configured, scheduled diagnostics are enabled for detection, troubleshooting and resolution by default. No reboots or service restarts are required for this policy to take effect: changes take effect immediately. -This policy setting will only take effect when the Task Scheduler service is in the running state. When the service is stopped or disabled, scheduled diagnostics will not be executed. The Task Scheduler service can be configured with the Services snap-in to the Microsoft Management Console. +This policy setting will only take effect when the Task Scheduler service is in the running state. When the service is stopped or disabled, scheduled diagnostics won't be executed. The Task Scheduler service can be configured with the Services snap-in to the Microsoft Management Console. @@ -66,13 +63,12 @@ This policy setting will only take effect when the Task Scheduler service is in | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-securitycenter.md b/windows/client-management/mdm/policy-csp-admx-securitycenter.md index 6bc06ebc29..40f546a5ed 100644 --- a/windows/client-management/mdm/policy-csp-admx-securitycenter.md +++ b/windows/client-management/mdm/policy-csp-admx-securitycenter.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_Securitycenter Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/18/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_Securitycenter -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -42,11 +39,11 @@ ms.topic: reference -This policy setting specifies whether Security Center is turned on or off for computers that are joined to an Active Directory domain. When Security Center is turned on, it monitors essential security settings and notifies the user when the computer might be at risk. The Security Center Control Panel category view also contains a status section, where the user can get recommendations to help increase the computer's security. When Security Center is not enabled on the domain, neither the notifications nor the Security Center status section are displayed. +This policy setting specifies whether Security Center is turned on or off for computers that are joined to an Active Directory domain. When Security Center is turned on, it monitors essential security settings and notifies the user when the computer might be at risk. The Security Center Control Panel category view also contains a status section, where the user can get recommendations to help increase the computer's security. When Security Center isn't enabled on the domain, neither the notifications nor the Security Center status section are displayed. -**Note** that Security Center can only be turned off for computers that are joined to a Windows domain. When a computer is not joined to a Windows domain, the policy setting will have no effect. +Note that Security Center can only be turned off for computers that are joined to a Windows domain. When a computer isn't joined to a Windows domain, the policy setting will have no effect. -If you do not congifure this policy setting, the Security Center is turned off for domain members. +- If you don't configure this policy setting, the Security Center is turned off for domain members. - If you enable this policy setting, Security Center is turned on for all users. @@ -54,11 +51,11 @@ If you do not congifure this policy setting, the Security Center is turned off f Windows XP SP2 ---------------------- -In Windows XP SP2, the essential security settings that are monitored by Security Center include firewall, antivirus, and Automatic Updates. **Note** that Security Center might not be available following a change to this policy setting until after the computer is restarted for Windows XP SP2 computers. +In Windows XP SP2, the essential security settings that are monitored by Security Center include firewall, antivirus, and Automatic Updates. Note that Security Center might not be available following a change to this policy setting until after the computer is restarted for Windows XP SP2 computers. Windows Vista --------------------- -In Windows Vista, this policy setting monitors essential security settings to include firewall, antivirus, antispyware, Internet security settings, User Account Control, and Automatic Updates. Windows Vista computers do not require a reboot for this policy setting to take effect. +In Windows Vista, this policy setting monitors essential security settings to include firewall, antivirus, antispyware, Internet security settings, User Account Control, and Automatic Updates. Windows Vista computers don't require a reboot for this policy setting to take effect. @@ -70,13 +67,12 @@ In Windows Vista, this policy setting monitors essential security settings to in | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-sensors.md b/windows/client-management/mdm/policy-csp-admx-sensors.md index 31322c5681..4a9cd48d2b 100644 --- a/windows/client-management/mdm/policy-csp-admx-sensors.md +++ b/windows/client-management/mdm/policy-csp-admx-sensors.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_Sensors Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_Sensors -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,7 +43,7 @@ This policy setting turns off the location feature for this computer. - If you enable this policy setting, the location feature is turned off, and all programs on this computer are prevented from using location information from the location feature. -- If you disable or do not configure this policy setting, all programs on this computer will not be prevented from using location information from the location feature. +- If you disable or don't configure this policy setting, all programs on this computer won't be prevented from using location information from the location feature. @@ -58,13 +55,12 @@ This policy setting turns off the location feature for this computer. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -91,7 +87,7 @@ This policy setting turns off the location feature for this computer. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -104,9 +100,9 @@ This policy setting turns off the location feature for this computer. This policy setting turns off scripting for the location feature. -- If you enable this policy setting, scripts for the location feature will not run. +- If you enable this policy setting, scripts for the location feature won't run. -- If you disable or do not configure this policy setting, all location scripts will run. +- If you disable or don't configure this policy setting, all location scripts will run. @@ -118,13 +114,12 @@ This policy setting turns off scripting for the location feature. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -151,7 +146,7 @@ This policy setting turns off scripting for the location feature. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -164,9 +159,9 @@ This policy setting turns off scripting for the location feature. This policy setting turns off scripting for the location feature. -- If you enable this policy setting, scripts for the location feature will not run. +- If you enable this policy setting, scripts for the location feature won't run. -- If you disable or do not configure this policy setting, all location scripts will run. +- If you disable or don't configure this policy setting, all location scripts will run. @@ -178,13 +173,12 @@ This policy setting turns off scripting for the location feature. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -211,7 +205,7 @@ This policy setting turns off scripting for the location feature. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -224,9 +218,9 @@ This policy setting turns off scripting for the location feature. This policy setting turns off the sensor feature for this computer. -- If you enable this policy setting, the sensor feature is turned off, and all programs on this computer cannot use the sensor feature. +- If you enable this policy setting, the sensor feature is turned off, and all programs on this computer can't use the sensor feature. -- If you disable or do not configure this policy setting, all programs on this computer can use the sensor feature. +- If you disable or don't configure this policy setting, all programs on this computer can use the sensor feature. @@ -238,13 +232,12 @@ This policy setting turns off the sensor feature for this computer. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -271,7 +264,7 @@ This policy setting turns off the sensor feature for this computer. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -284,9 +277,9 @@ This policy setting turns off the sensor feature for this computer. This policy setting turns off the sensor feature for this computer. -- If you enable this policy setting, the sensor feature is turned off, and all programs on this computer cannot use the sensor feature. +- If you enable this policy setting, the sensor feature is turned off, and all programs on this computer can't use the sensor feature. -- If you disable or do not configure this policy setting, all programs on this computer can use the sensor feature. +- If you disable or don't configure this policy setting, all programs on this computer can use the sensor feature. @@ -298,13 +291,12 @@ This policy setting turns off the sensor feature for this computer. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-servermanager.md b/windows/client-management/mdm/policy-csp-admx-servermanager.md index 3bebbb38c2..f662948db4 100644 --- a/windows/client-management/mdm/policy-csp-admx-servermanager.md +++ b/windows/client-management/mdm/policy-csp-admx-servermanager.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_ServerManager Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_ServerManager -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,9 +41,9 @@ ms.topic: reference This policy setting allows you to turn off the automatic display of the Manage Your Server page. -- If you enable this policy setting, the Manage Your Server page is not displayed each time an administrator logs on to the server. +- If you enable this policy setting, the Manage Your Server page isn't displayed each time an administrator logs on to the server. -- If you disable or do not configure this policy setting, the Manage Your Server page is displayed each time an administrator logs on to the server. However, if the administrator has selected the "Don't display this page at logon" option at the bottom of the Manage Your Server page, the page is not displayed. +- If you disable or don't configure this policy setting, the Manage Your Server page is displayed each time an administrator logs on to the server. However, if the administrator has selected the "Do not display this page at logon" option at the bottom of the Manage Your Server page, the page isn't displayed. @@ -60,13 +57,12 @@ This policy setting allows you to turn off the automatic display of the Manage Y | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -93,7 +89,7 @@ This policy setting allows you to turn off the automatic display of the Manage Y | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -106,11 +102,11 @@ This policy setting allows you to turn off the automatic display of the Manage Y This policy setting allows you to turn off the automatic display of the Initial Configuration Tasks window at logon on Windows Server 2008 and Windows Server 2008 R2. -- If you enable this policy setting, the Initial Configuration Tasks window is not displayed when an administrator logs on to the server. +- If you enable this policy setting, the Initial Configuration Tasks window isn't displayed when an administrator logs on to the server. - If you disable this policy setting, the Initial Configuration Tasks window is displayed when an administrator logs on to the server. -- If you do not configure this policy setting, the Initial Configuration Tasks window is displayed when an administrator logs on to the server. However, if an administrator selects the "Do not show this window at logon" option, the window is not displayed on subsequent logons. +- If you don't configure this policy setting, the Initial Configuration Tasks window is displayed when an administrator logs on to the server. However, if an administrator selects the "Do not show this window at logon" option, the window isn't displayed on subsequent logons. @@ -122,13 +118,12 @@ This policy setting allows you to turn off the automatic display of the Initial | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -155,7 +150,7 @@ This policy setting allows you to turn off the automatic display of the Initial | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -168,11 +163,11 @@ This policy setting allows you to turn off the automatic display of the Initial This policy setting allows you to turn off the automatic display of Server Manager at logon. -- If you enable this policy setting, Server Manager is not displayed automatically when a user logs on to the server. +- If you enable this policy setting, Server Manager isn't displayed automatically when a user logs on to the server. - If you disable this policy setting, Server Manager is displayed automatically when a user logs on to the server. -- If you do not configure this policy setting, Server Manager is displayed when a user logs on to the server. However, if the "Do not show me this console at logon" (Windows Server 2008 and Windows Server 2008 R2) or "Do not start Server Manager automatically at logon" (Windows Server 2012) option is selected, the console is not displayed automatically at logon. +- If you don't configure this policy setting, Server Manager is displayed when a user logs on to the server. However, if the "Do not show me this console at logon" (Windows Server 2008 and Windows Server 2008 R2) or "Do not start Server Manager automatically at logon" (Windows Server 2012) option is selected, the console isn't displayed automatically at logon. > [!NOTE] > Regardless of the status of this policy setting, Server Manager is available from the Start menu or the Windows taskbar. @@ -187,13 +182,12 @@ This policy setting allows you to turn off the automatic display of Server Manag | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -220,7 +214,7 @@ This policy setting allows you to turn off the automatic display of Server Manag | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -233,10 +227,11 @@ This policy setting allows you to turn off the automatic display of Server Manag This policy setting allows you to set the refresh interval for Server Manager. Each refresh provides Server Manager with updated information about which roles and features are installed on servers that you are managing by using Server Manager. Server Manager also monitors the status of roles and features installed on managed servers. -- If you enable this policy setting, Server Manager uses the refresh interval specified in the policy setting instead of the "Configure Refresh Interval" setting (in Windows Server 2008 and Windows Server 2008 R2), or the "Refresh the data shown in Server Manager every [x] [minutes/hours/days]" setting (in Windows Server 2012) that is configured in the Server Manager console. +- If you enable this policy setting, Server Manager uses the refresh interval specified in the policy setting instead of the "Configure Refresh Interval" setting (in Windows Server 2008 and Windows Server 2008 R2), or the "Refresh the data shown in Server Manager every [x] [minutes/hours/days]" setting (in Windows Server 2012) that's configured in the Server Manager console. -- If you disable this policy setting, Server Manager does not refresh automatically. -- If you do not configure this policy setting, Server Manager uses the refresh interval settings that are specified in the Server Manager console. +- If you disable this policy setting, Server Manager doesn't refresh automatically. + +- If you don't configure this policy setting, Server Manager uses the refresh interval settings that are specified in the Server Manager console. > [!NOTE] > The default refresh interval for Server Manager is two minutes in Windows Server 2008 and Windows Server 2008 R2, or 10 minutes in Windows Server 2012. @@ -251,13 +246,12 @@ This policy setting allows you to set the refresh interval for Server Manager. E | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-servicing.md b/windows/client-management/mdm/policy-csp-admx-servicing.md index 98279f859e..42f2718866 100644 --- a/windows/client-management/mdm/policy-csp-admx-servicing.md +++ b/windows/client-management/mdm/policy-csp-admx-servicing.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_Servicing Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_Servicing -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,9 +43,9 @@ This policy setting specifies the network locations that will be used for the re - If you enable this policy setting and specify the new location, the files in that location will be used to repair operating system corruption and for enabling optional features that have had their payload files removed. You must enter the fully qualified path to the new location in the "Alternate source file path" text box. Multiple locations can be specified when each path is separated by a semicolon. -The network location can be either a folder, or a WIM file. If it is a WIM file, the location should be specified by prefixing the path with "wim:" and include the index of the image to use in the WIM file. For example "wim:\\server\share\install.wim:3". +The network location can be either a folder, or a WIM file. If it's a WIM file, the location should be specified by prefixing the path with "wim:" and include the index of the image to use in the WIM file. For example "wim:\\server\share\install.wim:3". -- If you disable or do not configure this policy setting, or if the required files cannot be found at the locations specified in this policy setting, the files will be downloaded from Windows Update, if that is allowed by the policy settings for the computer. +- If you disable or don't configure this policy setting, or if the required files can't be found at the locations specified in this policy setting, the files will be downloaded from Windows Update, if that's allowed by the policy settings for the computer. @@ -60,13 +57,12 @@ The network location can be either a folder, or a WIM file. If it is a WIM file, | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-settingsync.md b/windows/client-management/mdm/policy-csp-admx-settingsync.md index 3eb2672ba9..de81e34abc 100644 --- a/windows/client-management/mdm/policy-csp-admx-settingsync.md +++ b/windows/client-management/mdm/policy-csp-admx-settingsync.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_SettingSync Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_SettingSync -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,11 +41,11 @@ ms.topic: reference Prevent the "app settings" group from syncing to and from this PC. This turns off and disables the "app settings" group on the "sync your settings" page in PC settings. -If you enable this policy setting, the "app settings" group will not be synced. +If you enable this policy setting, the "app settings" group won't be synced. Use the option "Allow users to turn app settings syncing on" so that syncing it turned off by default but not disabled. -If you do not set or disable this setting, syncing of the "app settings" group is on by default and configurable by the user. +If you don't set or disable this setting, syncing of the "app settings" group is on by default and configurable by the user. @@ -60,13 +57,12 @@ If you do not set or disable this setting, syncing of the "app settings" group i | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -93,7 +89,7 @@ If you do not set or disable this setting, syncing of the "app settings" group i | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -106,11 +102,11 @@ If you do not set or disable this setting, syncing of the "app settings" group i Prevent the "AppSync" group from syncing to and from this PC. This turns off and disables the "AppSync" group on the "sync your settings" page in PC settings. -If you enable this policy setting, the "AppSync" group will not be synced. +If you enable this policy setting, the "AppSync" group won't be synced. Use the option "Allow users to turn app syncing on" so that syncing it turned off by default but not disabled. -If you do not set or disable this setting, syncing of the "AppSync" group is on by default and configurable by the user. +If you don't set or disable this setting, syncing of the "AppSync" group is on by default and configurable by the user. @@ -122,13 +118,12 @@ If you do not set or disable this setting, syncing of the "AppSync" group is on | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -155,7 +150,7 @@ If you do not set or disable this setting, syncing of the "AppSync" group is on | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -168,11 +163,11 @@ If you do not set or disable this setting, syncing of the "AppSync" group is on Prevent the "passwords" group from syncing to and from this PC. This turns off and disables the "passwords" group on the "sync your settings" page in PC settings. -If you enable this policy setting, the "passwords" group will not be synced. +If you enable this policy setting, the "passwords" group won't be synced. Use the option "Allow users to turn passwords syncing on" so that syncing it turned off by default but not disabled. -If you do not set or disable this setting, syncing of the "passwords" group is on by default and configurable by the user. +If you don't set or disable this setting, syncing of the "passwords" group is on by default and configurable by the user. @@ -184,13 +179,12 @@ If you do not set or disable this setting, syncing of the "passwords" group is o | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -217,7 +211,7 @@ If you do not set or disable this setting, syncing of the "passwords" group is o | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -230,11 +224,11 @@ If you do not set or disable this setting, syncing of the "passwords" group is o Prevent the "desktop personalization" group from syncing to and from this PC. This turns off and disables the "desktop personalization" group on the "sync your settings" page in PC settings. -If you enable this policy setting, the "desktop personalization" group will not be synced. +If you enable this policy setting, the "desktop personalization" group won't be synced. Use the option "Allow users to turn desktop personalization syncing on" so that syncing it turned off by default but not disabled. -If you do not set or disable this setting, syncing of the "desktop personalization" group is on by default and configurable by the user. +If you don't set or disable this setting, syncing of the "desktop personalization" group is on by default and configurable by the user. @@ -246,13 +240,12 @@ If you do not set or disable this setting, syncing of the "desktop personalizati | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -279,7 +272,7 @@ If you do not set or disable this setting, syncing of the "desktop personalizati | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -292,11 +285,11 @@ If you do not set or disable this setting, syncing of the "desktop personalizati Prevent the "personalize" group from syncing to and from this PC. This turns off and disables the "personalize" group on the "sync your settings" page in PC settings. -If you enable this policy setting, the "personalize" group will not be synced. +If you enable this policy setting, the "personalize" group won't be synced. Use the option "Allow users to turn personalize syncing on" so that syncing it turned off by default but not disabled. -If you do not set or disable this setting, syncing of the "personalize" group is on by default and configurable by the user. +If you don't set or disable this setting, syncing of the "personalize" group is on by default and configurable by the user. @@ -308,13 +301,12 @@ If you do not set or disable this setting, syncing of the "personalize" group is | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -341,7 +333,7 @@ If you do not set or disable this setting, syncing of the "personalize" group is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -358,7 +350,7 @@ If you enable this policy setting, "sync your settings" will be turned off, and Use the option "Allow users to turn syncing on" so that syncing it turned off by default but not disabled. -If you do not set or disable this setting, "sync your settings" is on by default and configurable by the user. +If you don't set or disable this setting, "sync your settings" is on by default and configurable by the user. @@ -370,13 +362,12 @@ If you do not set or disable this setting, "sync your settings" is on by default | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -403,7 +394,7 @@ If you do not set or disable this setting, "sync your settings" is on by default | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -416,11 +407,11 @@ If you do not set or disable this setting, "sync your settings" is on by default Prevent the "Start layout" group from syncing to and from this PC. This turns off and disables the "Start layout" group on the "sync your settings" page in PC settings. -If you enable this policy setting, the "Start layout" group will not be synced. +If you enable this policy setting, the "Start layout" group won't be synced. Use the option "Allow users to turn start syncing on" so that syncing is turned off by default but not disabled. -If you do not set or disable this setting, syncing of the "Start layout" group is on by default and configurable by the user. +If you don't set or disable this setting, syncing of the "Start layout" group is on by default and configurable by the user. @@ -432,13 +423,12 @@ If you do not set or disable this setting, syncing of the "Start layout" group i | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -465,7 +455,7 @@ If you do not set or disable this setting, syncing of the "Start layout" group i | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -480,7 +470,7 @@ Prevent syncing to and from this PC when on metered Internet connections. This t If you enable this policy setting, syncing on metered connections will be turned off, and no syncing will take place when this PC is on a metered connection. -If you do not set or disable this setting, syncing on metered connections is configurable by the user. +If you don't set or disable this setting, syncing on metered connections is configurable by the user. @@ -492,13 +482,12 @@ If you do not set or disable this setting, syncing on metered connections is con | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -525,7 +514,7 @@ If you do not set or disable this setting, syncing on metered connections is con | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -538,11 +527,11 @@ If you do not set or disable this setting, syncing on metered connections is con Prevent the "Other Windows settings" group from syncing to and from this PC. This turns off and disables the "Other Windows settings" group on the "sync your settings" page in PC settings. -If you enable this policy setting, the "Other Windows settings" group will not be synced. +If you enable this policy setting, the "Other Windows settings" group won't be synced. Use the option "Allow users to turn other Windows settings syncing on" so that syncing it turned off by default but not disabled. -If you do not set or disable this setting, syncing of the "Other Windows settings" group is on by default and configurable by the user. +If you don't set or disable this setting, syncing of the "Other Windows settings" group is on by default and configurable by the user. @@ -554,13 +543,12 @@ If you do not set or disable this setting, syncing of the "Other Windows setting | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-sharedfolders.md b/windows/client-management/mdm/policy-csp-admx-sharedfolders.md index 5c5b42532a..316e955dd2 100644 --- a/windows/client-management/mdm/policy-csp-admx-sharedfolders.md +++ b/windows/client-management/mdm/policy-csp-admx-sharedfolders.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_SharedFolders Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 05/01/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_SharedFolders -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,12 +41,12 @@ ms.topic: reference This policy setting determines whether the user can publish DFS roots in Active Directory Domain Services (AD DS). -- If you enable or do not configure this policy setting, users can use the "Publish in Active Directory" option to publish DFS roots as shared folders in AD DS . +- If you enable or don't configure this policy setting, users can use the "Publish in Active Directory" option to publish DFS roots as shared folders in AD DS . -- If you disable this policy setting, users cannot publish DFS roots in AD DS and the "Publish in Active Directory" option is disabled. +- If you disable this policy setting, users can't publish DFS roots in AD DS and the "Publish in Active Directory" option is disabled. > [!NOTE] -> The default is to allow shared folders to be published when this setting is not configured. +> The default is to allow shared folders to be published when this setting isn't configured. @@ -61,13 +58,12 @@ This policy setting determines whether the user can publish DFS roots in Active | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -94,7 +90,7 @@ This policy setting determines whether the user can publish DFS roots in Active | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -107,12 +103,12 @@ This policy setting determines whether the user can publish DFS roots in Active This policy setting determines whether the user can publish shared folders in Active Directory Domain Services (AD DS). -- If you enable or do not configure this policy setting, users can use the "Publish in Active Directory" option in the Shared Folders snap-in to publish shared folders in AD DS. +- If you enable or don't configure this policy setting, users can use the "Publish in Active Directory" option in the Shared Folders snap-in to publish shared folders in AD DS. -- If you disable this policy setting, users cannot publish shared folders in AD DS, and the "Publish in Active Directory" option is disabled. +- If you disable this policy setting, users can't publish shared folders in AD DS, and the "Publish in Active Directory" option is disabled. > [!NOTE] -> The default is to allow shared folders to be published when this setting is not configured. +> The default is to allow shared folders to be published when this setting isn't configured. @@ -124,13 +120,12 @@ This policy setting determines whether the user can publish shared folders in Ac | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-sharing.md b/windows/client-management/mdm/policy-csp-admx-sharing.md index ca00b3af93..cf95b1984b 100644 --- a/windows/client-management/mdm/policy-csp-admx-sharing.md +++ b/windows/client-management/mdm/policy-csp-admx-sharing.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_Sharing Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_Sharing -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,11 +41,11 @@ ms.topic: reference This policy setting specifies whether users can add computers to a homegroup. By default, users can add their computer to a homegroup on a private network. -- If you enable this policy setting, users cannot add computers to a homegroup. This policy setting does not affect other network sharing features. +- If you enable this policy setting, users can't add computers to a homegroup. This policy setting doesn't affect other network sharing features. -- If you disable or do not configure this policy setting, users can add computers to a homegroup. However, data on a domain-joined computer is not shared with the homegroup. +- If you disable or don't configure this policy setting, users can add computers to a homegroup. However, data on a domain-joined computer isn't shared with the homegroup. -This policy setting is not configured by default. +This policy setting isn't configured by default. You must restart the computer for this policy setting to take effect. @@ -62,13 +59,12 @@ You must restart the computer for this policy setting to take effect. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -95,7 +91,7 @@ You must restart the computer for this policy setting to take effect. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -108,7 +104,7 @@ You must restart the computer for this policy setting to take effect. This policy setting specifies whether users can share files within their profile. By default users are allowed to share files within their profile to other users on their network after an administrator opts in the computer. An administrator can opt in the computer by using the sharing wizard to share a file within their profile. -- If you enable this policy setting, users cannot share files within their profile using the sharing wizard. Also, the sharing wizard cannot create a share at %root%\users and can only be used to create SMB shares on folders. +- If you enable this policy setting, users can't share files within their profile using the sharing wizard. Also, the sharing wizard can't create a share at %root%\users and can only be used to create SMB shares on folders. - If you disable or don't configure this policy setting, users can share files out of their user profile after an administrator has opted in the computer. @@ -122,13 +118,12 @@ This policy setting specifies whether users can share files within their profile | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-shellcommandpromptregedittools.md b/windows/client-management/mdm/policy-csp-admx-shellcommandpromptregedittools.md index e438a375db..9e2556c33d 100644 --- a/windows/client-management/mdm/policy-csp-admx-shellcommandpromptregedittools.md +++ b/windows/client-management/mdm/policy-csp-admx-shellcommandpromptregedittools.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_ShellCommandPromptRegEditTools Area in Po author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_ShellCommandPromptRegEditTools -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,10 +43,10 @@ This policy setting prevents users from running the interactive command prompt, - If you enable this policy setting and the user tries to open a command window, the system displays a message explaining that a setting prevents the action. -- If you disable this policy setting or do not configure it, users can run Cmd.exe and batch files normally. +- If you disable this policy setting or don't configure it, users can run Cmd.exe and batch files normally. > [!NOTE] -> Do not prevent the computer from running batch files if the computer uses logon, logoff, startup, or shutdown batch file scripts, or for users that use Remote Desktop Services. +> Don't prevent the computer from running batch files if the computer uses logon, logoff, startup, or shutdown batch file scripts, or for users that use Remote Desktop Services. @@ -61,13 +58,12 @@ This policy setting prevents users from running the interactive command prompt, | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -93,7 +89,7 @@ This policy setting prevents users from running the interactive command prompt, | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -108,7 +104,7 @@ Disables the Windows registry editor Regedit.exe. - If you enable this policy setting and the user tries to start Regedit.exe, a message appears explaining that a policy setting prevents the action. -- If you disable this policy setting or do not configure it, users can run Regedit.exe normally. +- If you disable this policy setting or don't configure it, users can run Regedit.exe normally. To prevent users from using other administrative tools, use the "Run only specified Windows applications" policy setting. @@ -122,13 +118,12 @@ To prevent users from using other administrative tools, use the "Run only specif | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -154,7 +149,7 @@ To prevent users from using other administrative tools, use the "Run only specif | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -167,11 +162,11 @@ To prevent users from using other administrative tools, use the "Run only specif Prevents Windows from running the programs you specify in this policy setting. -- If you enable this policy setting, users cannot run programs that you add to the list of disallowed applications. +- If you enable this policy setting, users can't run programs that you add to the list of disallowed applications. -- If you disable this policy setting or do not configure it, users can run any programs. +- If you disable this policy setting or don't configure it, users can run any programs. -This policy setting only prevents users from running programs that are started by the File Explorer process. It does not prevent users from running programs, such as Task Manager, which are started by the system process or by other processes. Also, if users have access to the command prompt (Cmd.exe), this policy setting does not prevent them from starting programs in the command window even though they would be prevented from doing so using File Explorer. +This policy setting only prevents users from running programs that are started by the File Explorer process. It doesn't prevent users from running programs, such as Task Manager, which are started by the system process or by other processes. Also, if users have access to the command prompt (Cmd.exe), this policy setting doesn't prevent them from starting programs in the command window even though they would be prevented from doing so using File Explorer. > [!NOTE] > Non-Microsoft applications with Windows 2000 or later certification are required to comply with this policy setting. @@ -189,13 +184,12 @@ This policy setting only prevents users from running programs that are started b | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -222,7 +216,7 @@ This policy setting only prevents users from running programs that are started b | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -237,9 +231,9 @@ Limits the Windows programs that users have permission to run on the computer. - If you enable this policy setting, users can only run programs that you add to the list of allowed applications. -- If you disable this policy setting or do not configure it, users can run all applications. +- If you disable this policy setting or don't configure it, users can run all applications. -This policy setting only prevents users from running programs that are started by the File Explorer process. It does not prevent users from running programs such as Task Manager, which are started by the system process or by other processes. Also, if users have access to the command prompt (Cmd.exe), this policy setting does not prevent them from starting programs in the command window even though they would be prevented from doing so using File Explorer. +This policy setting only prevents users from running programs that are started by the File Explorer process. It doesn't prevent users from running programs such as Task Manager, which are started by the system process or by other processes. Also, if users have access to the command prompt (Cmd.exe), this policy setting doesn't prevent them from starting programs in the command window even though they would be prevented from doing so using File Explorer. > [!NOTE] > Non-Microsoft applications with Windows 2000 or later certification are required to comply with this policy setting. @@ -257,13 +251,12 @@ This policy setting only prevents users from running programs that are started b | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-smartcard.md b/windows/client-management/mdm/policy-csp-admx-smartcard.md index 9f8cd9d3d9..61db310b5f 100644 --- a/windows/client-management/mdm/policy-csp-admx-smartcard.md +++ b/windows/client-management/mdm/policy-csp-admx-smartcard.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_Smartcard Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/27/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_Smartcard -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -47,11 +44,12 @@ This policy setting lets you allow certificates without an Extended Key Usage (E In versions of Windows prior to Windows Vista, smart card certificates that are used for logon require an extended key usage (EKU) extension with a smart card logon object identifier. This policy setting can be used to modify that restriction. - If you enable this policy setting, certificates with the following attributes can also be used to log on with a smart card: - - Certificates with no EKU - - Certificates with an All Purpose EKU - - Certificates with a Client Authentication EKU -- If you disable or do not configure this policy setting, only certificates that contain the smart card logon object identifier can be used to log on with a smart card. +- Certificates with no EKU +- Certificates with an All Purpose EKU +- Certificates with a Client Authentication EKU. + +- If you disable or don't configure this policy setting, only certificates that contain the smart card logon object identifier can be used to log on with a smart card. @@ -63,13 +61,12 @@ In versions of Windows prior to Windows Vista, smart card certificates that are | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -96,7 +93,7 @@ In versions of Windows prior to Windows Vista, smart card certificates that are | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -113,7 +110,7 @@ In order to use the integrated unblock feature your smart card must support this - If you enable this policy setting, the integrated unblock feature will be available. -- If you disable or do not configure this policy setting then the integrated unblock feature will not be available. +- If you disable or don't configure this policy setting then the integrated unblock feature won't be available. @@ -125,13 +122,12 @@ In order to use the integrated unblock feature your smart card must support this | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -158,7 +154,7 @@ In order to use the integrated unblock feature your smart card must support this | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -173,7 +169,7 @@ This policy setting lets you allow signature key-based certificates to be enumer - If you enable this policy setting then any certificates available on the smart card with a signature only key will be listed on the logon screen. -- If you disable or do not configure this policy setting, any available smart card signature key-based certificates will not be listed on the logon screen. +- If you disable or don't configure this policy setting, any available smart card signature key-based certificates won't be listed on the logon screen. @@ -185,13 +181,12 @@ This policy setting lets you allow signature key-based certificates to be enumer | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -218,7 +213,7 @@ This policy setting lets you allow signature key-based certificates to be enumer | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -233,9 +228,9 @@ This policy setting permits those certificates to be displayed for logon that ar Under previous versions of Microsoft Windows, certificates were required to contain a valid time and not be expired. The certificate must still be accepted by the domain controller in order to be used. This setting only controls the displaying of the certificate on the client machine. -- If you enable this policy setting certificates will be listed on the logon screen regardless of whether they have an invalid time or their time validity has expired. +- If you enable this policy setting certificates will be listed on the logon screen regardless of whether they've an invalid time or their time validity has expired. -- If you disable or do not configure this policy setting, certificates which are expired or not yet valid will not be listed on the logon screen. +- If you disable or don't configure this policy setting, certificates which are expired or not yet valid won't be listed on the logon screen. @@ -247,13 +242,12 @@ Under previous versions of Microsoft Windows, certificates were required to cont | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -280,7 +274,7 @@ Under previous versions of Microsoft Windows, certificates were required to cont | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -293,9 +287,9 @@ Under previous versions of Microsoft Windows, certificates were required to cont This policy setting allows you to manage the certificate propagation that occurs when a smart card is inserted. -- If you enable or do not configure this policy setting then certificate propagation will occur when you insert your smart card. +- If you enable or don't configure this policy setting then certificate propagation will occur when you insert your smart card. -- If you disable this policy setting, certificate propagation will not occur and the certificates will not be made available to applications such as Outlook. +- If you disable this policy setting, certificate propagation won't occur and the certificates won't be made available to applications such as Outlook. @@ -307,13 +301,12 @@ This policy setting allows you to manage the certificate propagation that occurs | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -340,7 +333,7 @@ This policy setting allows you to manage the certificate propagation that occurs | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -354,7 +347,8 @@ This policy setting allows you to manage the certificate propagation that occurs This policy setting allows you to manage the clean up behavior of root certificates. - If you enable this policy setting then root certificate cleanup will occur according to the option selected. -- If you disable or do not configure this setting then root certificate clean up will occur on log off. + +- If you disable or don't configure this setting then root certificate clean up will occur on log off. @@ -366,13 +360,12 @@ This policy setting allows you to manage the clean up behavior of root certifica | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -398,7 +391,7 @@ This policy setting allows you to manage the clean up behavior of root certifica | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -411,12 +404,12 @@ This policy setting allows you to manage the clean up behavior of root certifica This policy setting allows you to manage the root certificate propagation that occurs when a smart card is inserted. -- If you enable or do not configure this policy setting then root certificate propagation will occur when you insert your smart card. +- If you enable or don't configure this policy setting then root certificate propagation will occur when you insert your smart card. > [!NOTE] > For this policy setting to work the following policy setting must also be enabled: Turn on certificate propagation from smart card. -- If you disable this policy setting then root certificates will not be propagated from the smart card. +- If you disable this policy setting then root certificates won't be propagated from the smart card. @@ -428,13 +421,12 @@ This policy setting allows you to manage the root certificate propagation that o | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -461,7 +453,7 @@ This policy setting allows you to manage the root certificate propagation that o | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -474,12 +466,12 @@ This policy setting allows you to manage the root certificate propagation that o This policy setting prevents plaintext PINs from being returned by Credential Manager. -- If you enable this policy setting, Credential Manager does not return a plaintext PIN. +- If you enable this policy setting, Credential Manager doesn't return a plaintext PIN. -- If you disable or do not configure this policy setting, plaintext PINs can be returned by Credential Manager. +- If you disable or don't configure this policy setting, plaintext PINs can be returned by Credential Manager. > [!NOTE] -> Enabling this policy setting could prevent certain smart cards from working on Windows. Please consult your smart card manufacturer to find out whether you will be affected by this policy setting. +> Enabling this policy setting could prevent certain smart cards from working on Windows. Please consult your smart card manufacturer to find out whether you'll be affected by this policy setting. @@ -491,13 +483,12 @@ This policy setting prevents plaintext PINs from being returned by Credential Ma | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -524,7 +515,7 @@ This policy setting prevents plaintext PINs from being returned by Credential Ma | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -539,13 +530,13 @@ This policy setting allows you to control whether elliptic curve cryptography (E - If you enable this policy setting, ECC certificates on a smart card can be used to log on to a domain. -- If you disable or do not configure this policy setting, ECC certificates on a smart card cannot be used to log on to a domain. +- If you disable or don't configure this policy setting, ECC certificates on a smart card can't be used to log on to a domain. > [!NOTE] -> This policy setting only affects a user's ability to log on to a domain. ECC certificates on a smart card that are used for other applications, such as document signing, are not affected by this policy setting. +> This policy setting only affects a user's ability to log on to a domain. ECC certificates on a smart card that are used for other applications, such as document signing, aren't affected by this policy setting. > [!NOTE] -> If you use an ECDSA key to log on, you must also have an associated ECDH key to permit logons when you are not connected to the network. +> If you use an ECDSA key to log on, you must also have an associated ECDH key to permit logons when you aren't connected to the network. @@ -557,13 +548,12 @@ This policy setting allows you to control whether elliptic curve cryptography (E | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -590,7 +580,7 @@ This policy setting allows you to control whether elliptic curve cryptography (E | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -603,14 +593,14 @@ This policy setting allows you to control whether elliptic curve cryptography (E This policy setting lets you configure if all your valid logon certificates are displayed. -During the certificate renewal period, a user can have multiple valid logon certificates issued from the same certificate template. This can cause confusion as to which certificate to select for logon. The common case for this behavior is when a certificate is renewed and the old one has not yet expired. Two certificates are determined to be the same if they are issued from the same template with the same major version and they are for the same user (determined by their UPN). +During the certificate renewal period, a user can have multiple valid logon certificates issued from the same certificate template. This can cause confusion as to which certificate to select for logon. The common case for this behavior is when a certificate is renewed and the old one hasn't yet expired. Two certificates are determined to be the same if they're issued from the same template with the same major version and they're for the same user (determined by their UPN). -If there are two or more of the "same" certificate on a smart card and this policy is enabled then the certificate that is used for logon on Windows 2000, Windows XP, and Windows 2003 Server will be shown, otherwise the certificate with the expiration time furthest in the future will be shown. +If there are two or more of the "same" certificate on a smart card and this policy is enabled then the certificate that's used for logon on Windows 2000, Windows XP, and Windows 2003 Server will be shown, otherwise the certificate with the expiration time furthest in the future will be shown. > [!NOTE] -> This setting will be applied after the following policy: "Allow time invalid certificates" +> This setting will be applied after the following policy: "Allow time invalid certificates". -- If you enable or do not configure this policy setting, filtering will take place. +- If you enable or don't configure this policy setting, filtering will take place. - If you disable this policy setting, no filtering will take place. @@ -624,13 +614,12 @@ If there are two or more of the "same" certificate on a smart card and this poli | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -657,7 +646,7 @@ If there are two or more of the "same" certificate on a smart card and this poli | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -674,7 +663,7 @@ During logon Windows will by default only read the default certificate from the - If you enable this setting, then Windows will attempt to read all certificates from the smart card regardless of the feature set of the CSP. -- If you disable or do not configure this setting, Windows will only attempt to read the default certificate from those cards that do not support retrieval of all certificates in a single call. Certificates other than the default will not be available for logon. +- If you disable or don't configure this setting, Windows will only attempt to read the default certificate from those cards that don't support retrieval of all certificates in a single call. Certificates other than the default won't be available for logon. @@ -686,13 +675,12 @@ During logon Windows will by default only read the default certificate from the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -719,7 +707,7 @@ During logon Windows will by default only read the default certificate from the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -737,7 +725,7 @@ This policy setting allows you to manage the displayed message when a smart card > [!NOTE] > The following policy setting must be enabled - Allow Integrated Unblock screen to be displayed at the time of logon. -- If you disable or do not configure this policy setting, the default message will be displayed to the user when the smart card is blocked, if the integrated unblock feature is enabled. +- If you disable or don't configure this policy setting, the default message will be displayed to the user when the smart card is blocked, if the integrated unblock feature is enabled. @@ -749,13 +737,12 @@ This policy setting allows you to manage the displayed message when a smart card | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -781,7 +768,7 @@ This policy setting allows you to manage the displayed message when a smart card | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -792,11 +779,11 @@ This policy setting allows you to manage the displayed message when a smart card -This policy setting lets you reverse the subject name from how it is stored in the certificate when displaying it during logon. +This policy setting lets you reverse the subject name from how it's stored in the certificate when displaying it during logon. -By default the user principal name (UPN) is displayed in addition to the common name to help users distinguish one certificate from another. For example, if the certificate subject was CN=User1, OU=Users, DN=example, DN=com and had an UPN of user1@example.com then "User1" will be displayed along with "user1@example.com." If the UPN is not present then the entire subject name will be displayed. This setting controls the appearance of that subject name and might need to be adjusted per organization. +By default the user principal name (UPN) is displayed in addition to the common name to help users distinguish one certificate from another. For example, if the certificate subject was CN=User1, OU=Users, DN=example, DN=com and had an UPN of user1@example.com then "User1" will be displayed along with "user1@example.com". If the UPN isn't present then the entire subject name will be displayed. This setting controls the appearance of that subject name and might need to be adjusted per organization. -If you enable this policy setting or do not configure this setting, then the subject name will be reversed. +If you enable this policy setting or don't configure this setting, then the subject name will be reversed. If you disable , the subject name will be displayed as it appears in the certificate. @@ -810,13 +797,12 @@ If you disable , the subject name will be displayed as it appears in the certifi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -843,7 +829,7 @@ If you disable , the subject name will be displayed as it appears in the certifi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -856,9 +842,9 @@ If you disable , the subject name will be displayed as it appears in the certifi This policy setting allows you to control whether Smart Card Plug and Play is enabled. -- If you enable or do not configure this policy setting, Smart Card Plug and Play will be enabled and the system will attempt to install a Smart Card device driver when a card is inserted in a Smart Card Reader for the first time. +- If you enable or don't configure this policy setting, Smart Card Plug and Play will be enabled and the system will attempt to install a Smart Card device driver when a card is inserted in a Smart Card Reader for the first time. -- If you disable this policy setting, Smart Card Plug and Play will be disabled and a device driver will not be installed when a card is inserted in a Smart Card Reader. +- If you disable this policy setting, Smart Card Plug and Play will be disabled and a device driver won't be installed when a card is inserted in a Smart Card Reader. > [!NOTE] > This policy setting is applied only for smart cards that have passed the Windows Hardware Quality Labs (WHQL) testing process. @@ -873,13 +859,12 @@ This policy setting allows you to control whether Smart Card Plug and Play is en | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -906,7 +891,7 @@ This policy setting allows you to control whether Smart Card Plug and Play is en | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -919,9 +904,9 @@ This policy setting allows you to control whether Smart Card Plug and Play is en This policy setting allows you to control whether a confirmation message is displayed when a smart card device driver is installed. -- If you enable or do not configure this policy setting, a confirmation message will be displayed when a smart card device driver is installed. +- If you enable or don't configure this policy setting, a confirmation message will be displayed when a smart card device driver is installed. -- If you disable this policy setting, a confirmation message will not be displayed when a smart card device driver is installed. +- If you disable this policy setting, a confirmation message won't be displayed when a smart card device driver is installed. > [!NOTE] > This policy setting is applied only for smart cards that have passed the Windows Hardware Quality Labs (WHQL) testing process. @@ -936,13 +921,12 @@ This policy setting allows you to control whether a confirmation message is disp | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -969,7 +953,7 @@ This policy setting allows you to control whether a confirmation message is disp | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -984,7 +968,7 @@ This policy setting lets you determine whether an optional field will be display - If you enable this policy setting then an optional field that allows a user to enter their user name or user name and domain will be displayed. -- If you disable or do not configure this policy setting, an optional field that allows users to enter their user name or user name and domain will not be displayed. +- If you disable or don't configure this policy setting, an optional field that allows users to enter their user name or user name and domain won't be displayed. @@ -996,13 +980,12 @@ This policy setting lets you determine whether an optional field will be display | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-snmp.md b/windows/client-management/mdm/policy-csp-admx-snmp.md index 3621590388..3e8c855e69 100644 --- a/windows/client-management/mdm/policy-csp-admx-snmp.md +++ b/windows/client-management/mdm/policy-csp-admx-snmp.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_Snmp Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_Snmp -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -50,15 +47,15 @@ A valid community is a community recognized by the SNMP service, while a communi - If you enable this policy setting, the SNMP agent only accepts requests from management systems within the communities it recognizes, and only SNMP Read operation is allowed for the community. -- If you disable or do not configure this policy setting, the SNMP service takes the Valid Communities configured on the local computer instead. +- If you disable or don't configure this policy setting, the SNMP service takes the Valid Communities configured on the local computer instead. -Best practice: For security purposes, it is recommended to restrict the HKLM\SOFTWARE\Policies\SNMP\Parameters\ValidCommunities key to allow only the local admin group full control. +Best practice: For security purposes, it's recommended to restrict the HKLM\SOFTWARE\Policies\SNMP\Parameters\ValidCommunities key to allow only the local admin group full control. > [!NOTE] -> It is good practice to use a cryptic community name. +> It's good practice to use a cryptic community name. > [!NOTE] -> This policy setting has no effect if the SNMP agent is not installed on the client computer. +> This policy setting has no effect if the SNMP agent isn't installed on the client computer. Also, see the other two SNMP settings: "Specify permitted managers" and "Specify trap configuration". @@ -72,13 +69,12 @@ Also, see the other two SNMP settings: "Specify permitted managers" and "Specify | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -104,7 +100,7 @@ Also, see the other two SNMP settings: "Specify permitted managers" and "Specify | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -123,12 +119,12 @@ The manager is located on the host computer on the network. The manager's role i - If you enable this policy setting, the SNMP agent only accepts requests from the list of permitted managers that you configure using this setting. -- If you disable or do not configure this policy setting, SNMP service takes the permitted managers configured on the local computer instead. +- If you disable or don't configure this policy setting, SNMP service takes the permitted managers configured on the local computer instead. -Best practice: For security purposes, it is recommended to restrict the HKLM\SOFTWARE\Policies\SNMP\Parameters\PermittedManagers key to allow only the local admin group full control. +Best practice: For security purposes, it's recommended to restrict the HKLM\SOFTWARE\Policies\SNMP\Parameters\PermittedManagers key to allow only the local admin group full control. > [!NOTE] -> This policy setting has no effect if the SNMP agent is not installed on the client computer. +> This policy setting has no effect if the SNMP agent isn't installed on the client computer. Also, see the other two SNMP policy settings: "Specify trap configuration" and "Specify Community Name". @@ -142,13 +138,12 @@ Also, see the other two SNMP policy settings: "Specify trap configuration" and " | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -174,7 +169,7 @@ Also, see the other two SNMP policy settings: "Specify trap configuration" and " | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -193,10 +188,10 @@ This policy setting allows you to configure the name of the hosts that receive t - If you enable this policy setting, the SNMP service sends trap messages to the hosts within the "public" community. -- If you disable or do not configure this policy setting, the SNMP service takes the trap configuration configured on the local computer instead. +- If you disable or don't configure this policy setting, the SNMP service takes the trap configuration configured on the local computer instead. > [!NOTE] -> This setting has no effect if the SNMP agent is not installed on the client computer. +> This setting has no effect if the SNMP agent isn't installed on the client computer. Also, see the other two SNMP settings: "Specify permitted managers" and "Specify Community Name". @@ -210,13 +205,12 @@ Also, see the other two SNMP settings: "Specify permitted managers" and "Specify | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-soundrec.md b/windows/client-management/mdm/policy-csp-admx-soundrec.md index 2c0c32056e..1e445c4bdb 100644 --- a/windows/client-management/mdm/policy-csp-admx-soundrec.md +++ b/windows/client-management/mdm/policy-csp-admx-soundrec.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_SoundRec Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_SoundRec -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,9 +43,9 @@ Specifies whether Sound Recorder can run. Sound Recorder is a feature of Microsoft Windows Vista that can be used to record sound from an audio input device where the recorded sound is encoded and saved as an audio file. -- If you enable this policy setting, Sound Recorder will not run. +- If you enable this policy setting, Sound Recorder won't run. -- If you disable or do not configure this policy setting, Sound Recorder can be run. +- If you disable or don't configure this policy setting, Sound Recorder can be run. @@ -60,13 +57,12 @@ Sound Recorder is a feature of Microsoft Windows Vista that can be used to recor | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -93,7 +89,7 @@ Sound Recorder is a feature of Microsoft Windows Vista that can be used to recor | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -108,9 +104,9 @@ Specifies whether Sound Recorder can run. Sound Recorder is a feature of Microsoft Windows Vista that can be used to record sound from an audio input device where the recorded sound is encoded and saved as an audio file. -- If you enable this policy setting, Sound Recorder will not run. +- If you enable this policy setting, Sound Recorder won't run. -- If you disable or do not configure this policy setting, Sound Recorder can be run. +- If you disable or don't configure this policy setting, Sound Recorder can be run. @@ -122,13 +118,12 @@ Sound Recorder is a feature of Microsoft Windows Vista that can be used to recor | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-srmfci.md b/windows/client-management/mdm/policy-csp-admx-srmfci.md index cce101b264..37859d9add 100644 --- a/windows/client-management/mdm/policy-csp-admx-srmfci.md +++ b/windows/client-management/mdm/policy-csp-admx-srmfci.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_srmfci Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_srmfci -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -42,13 +39,13 @@ ms.topic: reference -This policy setting specifies the message that users see when they are denied access to a file or folder. You can customize the Access Denied message to include additional text and links. You can also provide users with the ability to send an email to request access to the file or folder to which they were denied access. +This policy setting specifies the message that users see when they're denied access to a file or folder. You can customize the Access Denied message to include additional text and links. You can also provide users with the ability to send an email to request access to the file or folder to which they were denied access. - If you enable this policy setting, users receive a customized Access Denied message from the file servers on which this policy setting is applied. - If you disable this policy setting, users see a standard Access Denied message that doesn't provide any of the functionality controlled by this policy setting, regardless of the file server configuration. -- If you do not configure this policy setting, users see a standard Access Denied message unless the file server is configured to display the customized Access Denied message. By default, users see the standard Access Denied message. +- If you don't configure this policy setting, users see a standard Access Denied message unless the file server is configured to display the customized Access Denied message. By default, users see the standard Access Denied message. @@ -60,13 +57,12 @@ This policy setting specifies the message that users see when they are denied ac | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -93,7 +89,7 @@ This policy setting specifies the message that users see when they are denied ac | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -110,7 +106,7 @@ Administrators can define the properties for the organization by using Active Di - If you enable this policy setting, you can select which list of properties is available for classification on the affected computers. -- If you disable or do not configure this policy setting, the Global Resource Property List in AD DS provides the default set of properties. +- If you disable or don't configure this policy setting, the Global Resource Property List in AD DS provides the default set of properties. @@ -122,13 +118,12 @@ Administrators can define the properties for the organization by using Active Di | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -154,7 +149,7 @@ Administrators can define the properties for the organization by using Active Di | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -171,7 +166,7 @@ The Classification tab enables users to manually classify files by selecting pro - If you enable this policy setting, the Classification tab is displayed. -- If you disable or do not configure this policy setting, the Classification tab is hidden. +- If you disable or don't configure this policy setting, the Classification tab is hidden. @@ -183,13 +178,12 @@ The Classification tab enables users to manually classify files by selecting pro | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -216,7 +210,7 @@ The Classification tab enables users to manually classify files by selecting pro | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -239,13 +233,12 @@ This Group Policy Setting should be set on Windows clients to enable access-deni | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-startmenu.md b/windows/client-management/mdm/policy-csp-admx-startmenu.md index 39837aa6f0..c72a1ae49c 100644 --- a/windows/client-management/mdm/policy-csp-admx-startmenu.md +++ b/windows/client-management/mdm/policy-csp-admx-startmenu.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_StartMenu Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_StartMenu -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -45,9 +42,9 @@ ms.topic: reference - If you enable this policy, a "Search the Internet" link is shown when the user performs a search in the start menu search box. This button launches the default browser with the search terms. -- If you disable this policy, there will not be a "Search the Internet" link when the user performs a search in the start menu search box. +- If you disable this policy, there won't be a "Search the Internet" link when the user performs a search in the start menu search box. -- If you do not configure this policy (default), there will not be a "Search the Internet" link on the start menu. +- If you don't configure this policy (default), there won't be a "Search the Internet" link on the start menu. @@ -59,13 +56,12 @@ ms.topic: reference | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -92,7 +88,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -107,18 +103,18 @@ Clear history of recently opened documents on exit. - If you enable this setting, the system deletes shortcuts to recently used document files when the user logs off. As a result, the Recent Items menu on the Start menu is always empty when the user logs on. In addition, recently and frequently used items in the Jump Lists off of programs in the Start Menu and Taskbar will be cleared when the user logs off. -- If you disable or do not configure this setting, the system retains document shortcuts, and when a user logs on, the Recent Items menu and the Jump Lists appear just as it did when the user logged off. +- If you disable or don't configure this setting, the system retains document shortcuts, and when a user logs on, the Recent Items menu and the Jump Lists appear just as it did when the user logged off. > [!NOTE] > The system saves document shortcuts in the user profile in the System-drive\Users\User-name\Recent folder. Also, see the "Remove Recent Items menu from Start Menu" and "Do not keep history of recently opened documents" policies in this folder. The system only uses this setting when neither of these related settings are selected. -This setting does not clear the list of recent files that Windows programs display at the bottom of the File menu. See the "Do not keep history of recently opened documents" setting. +This setting doesn't clear the list of recent files that Windows programs display at the bottom of the File menu. See the "Do not keep history of recently opened documents" setting. -This policy setting also does not hide document shortcuts displayed in the Open dialog box. See the "Hide the dropdown list of recent files" setting. +This policy setting also doesn't hide document shortcuts displayed in the Open dialog box. See the "Hide the dropdown list of recent files" setting. -This policy also does not clear items that the user may have pinned to the Jump Lists, or Tasks that the application has provided for their menu. See the "Do not allow pinning items in Jump Lists" setting. +This policy also doesn't clear items that the user may have pinned to the Jump Lists, or Tasks that the application has provided for their menu. See the "Do not allow pinning items in Jump Lists" setting. @@ -130,13 +126,12 @@ This policy also does not clear items that the user may have pinned to the Jump | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -163,7 +158,7 @@ This policy also does not clear items that the user may have pinned to the Jump | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -177,7 +172,7 @@ This policy also does not clear items that the user may have pinned to the Jump - If you enable this policy setting, the recent programs list in the start menu will be blank for each new user. -- If you disable or do not configure this policy, the start menu recent programs list will be pre-populated with programs for each new user. +- If you disable or don't configure this policy, the start menu recent programs list will be pre-populated with programs for each new user. @@ -189,13 +184,12 @@ This policy also does not clear items that the user may have pinned to the Jump | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -222,7 +216,7 @@ This policy also does not clear items that the user may have pinned to the Jump | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -236,9 +230,9 @@ This policy also does not clear items that the user may have pinned to the Jump - If you enable this setting, the system deletes tile notifications when the user logs on. As a result, the Tiles in the start view will always show their default content when the user logs on. In addition, any cached versions of these notifications will be cleared when the user logs on. -- If you disable or do not configure this setting, the system retains notifications, and when a user logs on, the tiles appear just as they did when the user logged off, including the history of previous notifications for each tile. +- If you disable or don't configure this setting, the system retains notifications, and when a user logs on, the tiles appear just as they did when the user logged off, including the history of previous notifications for each tile. -This setting does not prevent new notifications from appearing. See the "Turn off Application Notifications" setting to prevent new notifications. +This setting doesn't prevent new notifications from appearing. See the "Turn off Application Notifications" setting to prevent new notifications. @@ -250,13 +244,12 @@ This setting does not prevent new notifications from appearing. See the "Turn of | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -283,7 +276,7 @@ This setting does not prevent new notifications from appearing. See the "Turn of | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -310,13 +303,12 @@ This policy setting allows desktop apps to be listed first in the Apps view in S | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -343,7 +335,7 @@ This policy setting allows desktop apps to be listed first in the Apps view in S | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -372,13 +364,12 @@ This policy setting is only applied when the Apps view is set as the default vie | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -405,7 +396,7 @@ This policy setting is only applied when the Apps view is set as the default vie | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -416,15 +407,15 @@ This policy setting is only applied when the Apps view is set as the default vie -This policy only applies to the classic version of the start menu and does not affect the new style start menu. +This policy only applies to the classic version of the start menu and doesn't affect the new style start menu. Adds the "Log Off ``" item to the Start menu and prevents users from removing it. -- If you enable this setting, the Log Off `` item appears in the Start menu. This setting also removes the Display Logoff item from Start Menu Options. As a result, users cannot remove the Log Off `` item from the Start Menu. +- If you enable this setting, the Log Off `` item appears in the Start menu. This setting also removes the Display Logoff item from Start Menu Options. As a result, users can't remove the Log Off `` item from the Start Menu. -- If you disable this setting or do not configure it, users can use the Display Logoff item to add and remove the Log Off item. +- If you disable this setting or don't configure it, users can use the Display Logoff item to add and remove the Log Off item. -This setting affects the Start menu only. It does not affect the Log Off item on the Windows Security dialog box that appears when you press Ctrl+Alt+Del. +This setting affects the Start menu only. It doesn't affect the Log Off item on the Windows Security dialog box that appears when you press Ctrl+Alt+Del. > [!NOTE] > To add or remove the Log Off item on a computer, click Start, click Settings, click Taskbar and Start Menu, click the Start Menu Options tab, and then, in the Start Menu Settings box, click Display Logoff. @@ -441,13 +432,12 @@ Also, see "Remove Logoff" in User Configuration\Administrative Templates\System\ | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -474,7 +464,7 @@ Also, see "Remove Logoff" in User Configuration\Administrative Templates\System\ | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -503,13 +493,12 @@ This policy setting allows users to go to the desktop instead of the Start scree | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -536,7 +525,7 @@ This policy setting allows users to go to the desktop instead of the Start scree | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -553,7 +542,7 @@ This setting makes it easier for users to distinguish between programs that are Partially installed programs include those that a system administrator assigns using Windows Installer and those that users have configured for full installation upon first use. -If you disable this setting or do not configure it, all Start menu shortcuts appear as black text. +If you disable this setting or don't configure it, all Start menu shortcuts appear as black text. > [!NOTE] > Enabling this setting can make the Start menu slow to open. @@ -568,13 +557,12 @@ If you disable this setting or do not configure it, all Start menu shortcuts app | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -601,7 +589,7 @@ If you disable this setting or do not configure it, all Start menu shortcuts app | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -612,11 +600,11 @@ If you disable this setting or do not configure it, all Start menu shortcuts app -This policy setting prevents users from performing the following commands from the Windows security screen, the logon screen, and the Start menu: Shut Down, Restart, Sleep, and Hibernate. This policy setting does not prevent users from running Windows-based programs that perform these functions. +This policy setting prevents users from performing the following commands from the Windows security screen, the logon screen, and the Start menu: Shut Down, Restart, Sleep, and Hibernate. This policy setting doesn't prevent users from running Windows-based programs that perform these functions. - If you enable this policy setting, the shutdown, restart, sleep, and hibernate commands are removed from the Start menu. The Power button is also removed from the Windows Security screen, which appears when you press CTRL+ALT+DELETE, and from the logon screen. -- If you disable or do not configure this policy setting, the Power button and the Shut Down, Restart, Sleep, and Hibernate commands are available on the Start menu. The Power button on the Windows Security and logon screens is also available. +- If you disable or don't configure this policy setting, the Power button and the Shut Down, Restart, Sleep, and Hibernate commands are available on the Start menu. The Power button on the Windows Security and logon screens is also available. @@ -628,13 +616,12 @@ This policy setting prevents users from performing the following commands from t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -661,7 +648,7 @@ This policy setting prevents users from performing the following commands from t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -674,9 +661,9 @@ This policy setting prevents users from performing the following commands from t Disables personalized menus. -Windows personalizes long menus by moving recently used items to the top of the menu and hiding items that have not been used recently. Users can display the hidden items by clicking an arrow to extend the menu. +Windows personalizes long menus by moving recently used items to the top of the menu and hiding items that haven't been used recently. Users can display the hidden items by clicking an arrow to extend the menu. -If you enable this setting, the system does not personalize menus. All menu items appear and remain in standard order. Also, this setting removes the "Use Personalized Menus" option so users do not try to change the setting while a setting is in effect. +If you enable this setting, the system doesn't personalize menus. All menu items appear and remain in standard order. Also, this setting removes the "Use Personalized Menus" option so users don't try to change the setting while a setting is in effect. > [!NOTE] > Personalized menus require user tracking. If you enable the "Turn off user tracking" setting, the system disables user tracking and personalized menus and ignores this setting. @@ -694,13 +681,12 @@ If you enable this setting, the system does not personalize menus. All menu item | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -727,7 +713,7 @@ If you enable this setting, the system does not personalize menus. All menu item | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -740,14 +726,14 @@ If you enable this setting, the system does not personalize menus. All menu item This setting affects the taskbar, which is used to switch between running applications. -The taskbar includes the Start button, list of currently running tasks, and the notification area. By default, the taskbar is located at the bottom of the screen, but it can be dragged to any side of the screen. When it is locked, it cannot be moved or resized. +The taskbar includes the Start button, list of currently running tasks, and the notification area. By default, the taskbar is located at the bottom of the screen, but it can be dragged to any side of the screen. When it's locked, it can't be moved or resized. - If you enable this setting, it prevents the user from moving or resizing the taskbar. While the taskbar is locked, auto-hide and other taskbar options are still available in Taskbar properties. -- If you disable this setting or do not configure it, the user can configure the taskbar position. +- If you disable this setting or don't configure it, the user can configure the taskbar position. > [!NOTE] -> Enabling this setting also locks the QuickLaunch bar and any other toolbars that the user has on their taskbar. The toolbar's position is locked, and the user cannot show and hide various toolbars using the taskbar context menu. +> Enabling this setting also locks the QuickLaunch bar and any other toolbars that the user has on their taskbar. The toolbar's position is locked, and the user can't show and hide various toolbars using the taskbar context menu. @@ -759,13 +745,12 @@ The taskbar includes the Start button, list of currently running tasks, and the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -792,7 +777,7 @@ The taskbar includes the Start button, list of currently running tasks, and the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -805,7 +790,7 @@ The taskbar includes the Start button, list of currently running tasks, and the Lets users run a 16-bit program in a dedicated (not shared) Virtual DOS Machine (VDM) process. -All DOS and 16-bit programs run on Windows 2000 Professional and Windows XP Professional in the Windows Virtual DOS Machine program. VDM simulates a 16-bit environment, complete with the DLLs required by 16-bit programs. By default, all 16-bit programs run as threads in a single, shared VDM process. As such, they share the memory space allocated to the VDM process and cannot run simultaneously. +All DOS and 16-bit programs run on Windows 2000 Professional and Windows XP Professional in the Windows Virtual DOS Machine program. VDM simulates a 16-bit environment, complete with the DLLs required by 16-bit programs. By default, all 16-bit programs run as threads in a single, shared VDM process. As such, they share the memory space allocated to the VDM process and can't run simultaneously. Enabling this setting adds a check box to the Run dialog box, giving users the option of running a 16-bit program in its own dedicated NTVDM process. The additional check box is enabled only when a user enters a 16-bit program in the Run dialog box. @@ -819,13 +804,12 @@ Enabling this setting adds a check box to the Run dialog box, giving users the o | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -852,7 +836,7 @@ Enabling this setting adds a check box to the Run dialog box, giving users the o | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -863,15 +847,15 @@ Enabling this setting adds a check box to the Run dialog box, giving users the o -This setting affects the notification area, also called the "system tray." +This setting affects the notification area, also called the "system tray". -The notification area is located in the task bar, generally at the bottom of the screen, and it includes the clock and current notifications. This setting determines whether the items are always expanded or always collapsed. By default, notifications are collapsed. The notification cleanup << icon can be referred to as the "notification chevron." +The notification area is located in the task bar, generally at the bottom of the screen, and it includes the clock and current notifications. This setting determines whether the items are always expanded or always collapsed. By default, notifications are collapsed. The notification cleanup << icon can be referred to as the "notification chevron". - If you enable this setting, the system notification area expands to show all of the notifications that use this area. - If you disable this setting, the system notification area will always collapse notifications. -- If you do not configure it, the user can choose if they want notifications collapsed. +- If you don't configure it, the user can choose if they want notifications collapsed. @@ -883,13 +867,12 @@ The notification area is located in the task bar, generally at the bottom of the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -916,7 +899,7 @@ The notification area is located in the task bar, generally at the bottom of the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -931,9 +914,9 @@ Hides pop-up text on the Start menu and in the notification area. When you hold the cursor over an item on the Start menu or in the notification area, the system displays pop-up text providing additional information about the object. -- If you enable this setting, some of this pop-up text is not displayed. The pop-up text affected by this setting includes "Click here to begin" on the Start button, "Where have all my programs gone" on the Start menu, and "Where have my icons gone" in the notification area. +- If you enable this setting, some of this pop-up text isn't displayed. The pop-up text affected by this setting includes "Click here to begin" on the Start button, "Where have all my programs gone" on the Start menu, and "Where have my icons gone" in the notification area. -- If you disable this setting or do not configure it, all pop-up text is displayed on the Start menu and in the notification area. +- If you disable this setting or don't configure it, all pop-up text is displayed on the Start menu and in the notification area. @@ -945,13 +928,12 @@ When you hold the cursor over an item on the Start menu or in the notification a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -978,7 +960,7 @@ When you hold the cursor over an item on the Start menu or in the notification a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -995,9 +977,9 @@ When you hold the cursor over an item on the Start menu or in the notification a This policy setting allows you to prevent users from changing their Start screen layout. -- If you enable this setting, you will prevent a user from selecting an app, resizing a tile, pinning/unpinning a tile or a secondary tile, entering the customize mode and rearranging tiles within Start and Apps. +- If you enable this setting, you'll prevent a user from selecting an app, resizing a tile, pinning/unpinning a tile or a secondary tile, entering the customize mode and rearranging tiles within Start and Apps. -- If you disable or do not configure this setting, you will allow a user to select an app, resize a tile, pin/unpin a tile or a secondary tile, enter the customize mode and rearrange tiles within Start and Apps. +- If you disable or don't configure this setting, you'll allow a user to select an app, resize a tile, pin/unpin a tile or a secondary tile, enter the customize mode and rearrange tiles within Start and Apps. @@ -1009,13 +991,12 @@ This policy setting allows you to prevent users from changing their Start screen | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1042,7 +1023,7 @@ This policy setting allows you to prevent users from changing their Start screen | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1053,11 +1034,11 @@ This policy setting allows you to prevent users from changing their Start screen -This policy setting prevents users from performing the following commands from the Start menu or Windows Security screen: Shut Down, Restart, Sleep, and Hibernate. This policy setting does not prevent users from running Windows-based programs that perform these functions. +This policy setting prevents users from performing the following commands from the Start menu or Windows Security screen: Shut Down, Restart, Sleep, and Hibernate. This policy setting doesn't prevent users from running Windows-based programs that perform these functions. - If you enable this policy setting, the Power button and the Shut Down, Restart, Sleep, and Hibernate commands are removed from the Start menu. The Power button is also removed from the Windows Security screen, which appears when you press CTRL+ALT+DELETE. -- If you disable or do not configure this policy setting, the Power button and the Shut Down, Restart, Sleep, and Hibernate commands are available on the Start menu. The Power button on the Windows Security screen is also available. +- If you disable or don't configure this policy setting, the Power button and the Shut Down, Restart, Sleep, and Hibernate commands are available on the Start menu. The Power button on the Windows Security screen is also available. > [!NOTE] > Third-party programs certified as compatible with Microsoft Windows Vista, Windows XP SP2, Windows XP SP1, Windows XP, or Windows 2000 Professional are required to support this policy setting. @@ -1072,13 +1053,12 @@ This policy setting prevents users from performing the following commands from t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1105,7 +1085,7 @@ This policy setting prevents users from performing the following commands from t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1133,13 +1113,12 @@ By default, the Programs menu contains items from the All Users profile and item | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1166,7 +1145,7 @@ By default, the Programs menu contains items from the All Users profile and item | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1179,12 +1158,12 @@ By default, the Programs menu contains items from the All Users profile and item Prevents users from adding the Favorites menu to the Start menu or classic Start menu. -- If you enable this setting, the Display Favorites item does not appear in the Advanced Start menu options box. +- If you enable this setting, the Display Favorites item doesn't appear in the Advanced Start menu options box. -- If you disable or do not configure this setting, the Display Favorite item is available. +- If you disable or don't configure this setting, the Display Favorite item is available. > [!NOTE] -> The Favorites menu does not appear on the Start menu by default. To display the Favorites menu, right-click Start, click Properties, and then click Customize. If you are using Start menu, click the Advanced tab, and then, under Start menu items, click the Favorites menu. If you are using the classic Start menu, click Display Favorites under Advanced Start menu options. +> The Favorites menu doesn't appear on the Start menu by default. To display the Favorites menu, right-click Start, click Properties, and then click Customize. If you are using Start menu, click the Advanced tab, and then, under Start menu items, click the Favorites menu. If you are using the classic Start menu, click Display Favorites under Advanced Start menu options. > [!NOTE] > The items that appear in the Favorites menu when you install Windows are pre-configured by the system to appeal to most users. However, users can add and remove items from this menu, and system administrators can create a customized Favorites menu for a user group. @@ -1202,13 +1181,12 @@ Prevents users from adding the Favorites menu to the Start menu or classic Start | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1235,7 +1213,7 @@ Prevents users from adding the Favorites menu to the Start menu or classic Start | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1246,18 +1224,18 @@ Prevents users from adding the Favorites menu to the Start menu or classic Start -This policy setting allows you to remove the Search link from the Start menu, and disables some File Explorer search elements. **Note** that this does not remove the search box from the new style Start menu. +This policy setting allows you to remove the Search link from the Start menu, and disables some File Explorer search elements. Note that this doesn't remove the search box from the new style Start menu. -- If you enable this policy setting, the Search item is removed from the Start menu and from the context menu that appears when you right-click the Start menu. Also, the system does not respond when users press the Application key (the key with the Windows logo)+ F. +- If you enable this policy setting, the Search item is removed from the Start menu and from the context menu that appears when you right-click the Start menu. Also, the system doesn't respond when users press the Application key (the key with the Windows logo)+ F. > [!NOTE] > Enabling this policy setting also prevents the user from using the F3 key. -In File Explorer, the Search item still appears on the Standard buttons toolbar, but the system does not respond when the user presses Ctrl+F. Also, Search does not appear in the context menu when you right-click an icon representing a drive or a folder. +In File Explorer, the Search item still appears on the Standard buttons toolbar, but the system doesn't respond when the user presses Ctrl+F. Also, Search doesn't appear in the context menu when you right-click an icon representing a drive or a folder. -This policy setting affects the specified user interface elements only. It does not affect Internet Explorer and does not prevent the user from using other methods to search. +This policy setting affects the specified user interface elements only. It doesn't affect Internet Explorer and doesn't prevent the user from using other methods to search. -- If you disable or do not configure this policy setting, the Search link is available from the Start menu. +- If you disable or don't configure this policy setting, the Search link is available from the Start menu. @@ -1269,13 +1247,12 @@ This policy setting affects the specified user interface elements only. It does | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1302,7 +1279,7 @@ This policy setting affects the specified user interface elements only. It does | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1314,9 +1291,9 @@ This policy setting affects the specified user interface elements only. It does -- If you enable this policy the start menu will not show a link to the Games folder. +- If you enable this policy the start menu won't show a link to the Games folder. -- If you disable or do not configure this policy, the start menu will show a link to the Games folder, unless the user chooses to remove it in the start menu control panel. +- If you disable or don't configure this policy, the start menu will show a link to the Games folder, unless the user chooses to remove it in the start menu control panel. @@ -1328,13 +1305,12 @@ This policy setting affects the specified user interface elements only. It does | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1361,7 +1337,7 @@ This policy setting affects the specified user interface elements only. It does | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1376,9 +1352,9 @@ This policy setting allows you to remove the Help command from the Start menu. - If you enable this policy setting, the Help command is removed from the Start menu. -- If you disable or do not configure this policy setting, the Help command is available from the Start menu. +- If you disable or don't configure this policy setting, the Help command is available from the Start menu. -This policy setting only affects the Start menu. It does not remove the Help menu from File Explorer and does not prevent users from running Help. +This policy setting only affects the Start menu. It doesn't remove the Help menu from File Explorer and doesn't prevent users from running Help. @@ -1390,13 +1366,12 @@ This policy setting only affects the Start menu. It does not remove the Help men | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1423,7 +1398,7 @@ This policy setting only affects the Start menu. It does not remove the Help men | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1436,13 +1411,13 @@ This policy setting only affects the Start menu. It does not remove the Help men This policy setting allows you to turn off user tracking. -- If you enable this policy setting, the system does not track the programs that the user runs, and does not display frequently used programs in the Start Menu. +- If you enable this policy setting, the system doesn't track the programs that the user runs, and doesn't display frequently used programs in the Start Menu. -- If you disable or do not configure this policy setting, the system tracks the programs that the user runs. The system uses this information to customize Windows features, such as showing frequently used programs in the Start Menu. +- If you disable or don't configure this policy setting, the system tracks the programs that the user runs. The system uses this information to customize Windows features, such as showing frequently used programs in the Start Menu. Also, see these related policy settings: "Remove frequent programs liist from the Start Menu" and "Turn off personalized menus". -This policy setting does not prevent users from pinning programs to the Start Menu or Taskbar. See the "Remove pinned programs list from the Start Menu" and "Do not allow pinning programs to the Taskbar" policy settings. +This policy setting doesn't prevent users from pinning programs to the Start Menu or Taskbar. See the "Remove pinned programs list from the Start Menu" and "Do not allow pinning programs to the Taskbar" policy settings. @@ -1454,13 +1429,12 @@ This policy setting does not prevent users from pinning programs to the Start Me | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1487,7 +1461,7 @@ This policy setting does not prevent users from pinning programs to the Start Me | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1505,13 +1479,13 @@ This policy setting does not prevent users from pinning programs to the Start Me - If you enable this setting, the Start Menu will either collapse or remove the all apps list from the Start menu. -Selecting "Collapse" will not display the app list next to the pinned tiles in Start. An "All apps" button will be displayed on Start to open the all apps list. This is equivalent to setting the "Show app list in Start" in Settings to Off. +Selecting "Collapse" won't display the app list next to the pinned tiles in Start. An "All apps" button will be displayed on Start to open the all apps list. This is equivalent to setting the "Show app list in Start" in Settings to Off. -Selecting "Collapse and disable setting" will do the same as the collapse option and disable the "Show app list in Start menu" in Settings, so users cannot turn it to On. +Selecting "Collapse and disable setting" will do the same as the collapse option and disable the "Show app list in Start menu" in Settings, so users can't turn it to On. -Selecting "Remove and disable setting" will remove the all apps list from Start and disable the "Show app list in Start menu" in Settings, so users cannot turn it to On. Select this option for compatibility with earlier versions of Windows. +Selecting "Remove and disable setting" will remove the all apps list from Start and disable the "Show app list in Start menu" in Settings, so users can't turn it to On. Select this option for compatibility with earlier versions of Windows. -- If you disable or do not configure this setting, the all apps list will be visible by default, and the user can change "Show app list in Start" in Settings. +- If you disable or don't configure this setting, the all apps list will be visible by default, and the user can change "Show app list in Start" in Settings. @@ -1523,13 +1497,12 @@ Selecting "Remove and disable setting" will remove the all apps list from Start | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1555,7 +1528,7 @@ Selecting "Remove and disable setting" will remove the all apps list from Start | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1574,7 +1547,7 @@ Enabling this policy setting prevents the Network Connections folder from openin Network Connections still appears in Control Panel and in File Explorer, but if users try to start it, a message appears explaining that a setting prevents the action. -- If you disable or do not configure this policy setting, Network Connections is available from the Start Menu. +- If you disable or don't configure this policy setting, Network Connections is available from the Start Menu. Also, see the "Disable programs on Settings menu" and "Disable Control Panel" policy settings and the policy settings in the Network Connections folder (Computer Configuration and User Configuration\Administrative Templates\Network\Network Connections). @@ -1588,13 +1561,12 @@ Also, see the "Disable programs on Settings menu" and "Disable Control Panel" po | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1621,7 +1593,7 @@ Also, see the "Disable programs on Settings menu" and "Disable Control Panel" po | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1633,11 +1605,11 @@ Also, see the "Disable programs on Settings menu" and "Disable Control Panel" po -- If you enable this setting, the "Pinned Programs" list is removed from the Start menu. Users cannot pin programs to the Start menu. +- If you enable this setting, the "Pinned Programs" list is removed from the Start menu. Users can't pin programs to the Start menu. In Windows XP and Windows Vista, the Internet and email checkboxes are removed from the 'Customize Start Menu' dialog. -- If you disable this setting or do not configure it, the "Pinned Programs" list remains on the Start menu. Users can pin and unpin programs in the Start Menu. +- If you disable this setting or don't configure it, the "Pinned Programs" list remains on the Start menu. Users can pin and unpin programs in the Start Menu. @@ -1649,13 +1621,12 @@ In Windows XP and Windows Vista, the Internet and email checkboxes are removed f | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1682,7 +1653,7 @@ In Windows XP and Windows Vista, the Internet and email checkboxes are removed f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1697,18 +1668,18 @@ Removes the Recent Items menu from the Start menu. Removes the Documents menu fr The Recent Items menu contains links to the non-program files that users have most recently opened. It appears so that users can easily reopen their documents. -If you enable this setting, the system saves document shortcuts but does not display the Recent Items menu in the Start Menu, and users cannot turn the menu on. +If you enable this setting, the system saves document shortcuts but doesn't display the Recent Items menu in the Start Menu, and users can't turn the menu on. If you later disable the setting, so that the Recent Items menu appears in the Start Menu, the document shortcuts saved before the setting was enabled and while it was in effect appear in the Recent Items menu. -When the setting is disabled, the Recent Items menu appears in the Start Menu, and users cannot remove it. +When the setting is disabled, the Recent Items menu appears in the Start Menu, and users can't remove it. -If the setting is not configured, users can turn the Recent Items menu on and off. +If the setting isn't configured, users can turn the Recent Items menu on and off. > [!NOTE] -> This setting does not prevent Windows programs from displaying shortcuts to recently opened documents. See the "Do not keep history of recently opened documents" setting. +> This setting doesn't prevent Windows programs from displaying shortcuts to recently opened documents. See the "Do not keep history of recently opened documents" setting. -This setting also does not hide document shortcuts displayed in the Open dialog box. See the "Hide the dropdown list of recent files" setting. +This setting also doesn't hide document shortcuts displayed in the Open dialog box. See the "Hide the dropdown list of recent files" setting. @@ -1720,13 +1691,12 @@ This setting also does not hide document shortcuts displayed in the Open dialog | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1753,7 +1723,7 @@ This setting also does not hide document shortcuts displayed in the Open dialog | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1766,12 +1736,12 @@ This setting also does not hide document shortcuts displayed in the Open dialog This policy setting prevents the system from conducting a comprehensive search of the target drive to resolve a shortcut. -- If you enable this policy setting, the system does not conduct the final drive search. It just displays a message explaining that the file is not found. +- If you enable this policy setting, the system doesn't conduct the final drive search. It just displays a message explaining that the file isn't found. -- If you disable or do not configure this policy setting, by default, when the system cannot find the target file for a shortcut (.lnk), it searches all paths associated with the shortcut. If the target file is located on an NTFS partition, the system then uses the target's file ID to find a path. If the resulting path is not correct, it conducts a comprehensive search of the target drive in an attempt to find the file. +- If you disable or don't configure this policy setting, by default, when the system can't find the target file for a shortcut (.lnk), it searches all paths associated with the shortcut. If the target file is located on an NTFS partition, the system then uses the target's file ID to find a path. If the resulting path isn't correct, it conducts a comprehensive search of the target drive in an attempt to find the file. > [!NOTE] -> This policy setting only applies to target files on NTFS partitions. FAT partitions do not have this ID tracking and search capability. +> This policy setting only applies to target files on NTFS partitions. FAT partitions don't have this ID tracking and search capability. Also, see the "Do not track Shell shortcuts during roaming" and the "Do not use the tracking-based method when resolving shell shortcuts" policy settings. @@ -1785,13 +1755,12 @@ Also, see the "Do not track Shell shortcuts during roaming" and the "Do not use | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1818,7 +1787,7 @@ Also, see the "Do not track Shell shortcuts during roaming" and the "Do not use | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1831,12 +1800,12 @@ Also, see the "Do not track Shell shortcuts during roaming" and the "Do not use This policy setting prevents the system from using NTFS tracking features to resolve a shortcut. -- If you enable this policy setting, the system does not try to locate the file by using its file ID. It skips this step and begins a comprehensive search of the drive specified in the target path. +- If you enable this policy setting, the system doesn't try to locate the file by using its file ID. It skips this step and begins a comprehensive search of the drive specified in the target path. -- If you disable or do not configure this policy setting, by default, when the system cannot find the target file for a shortcut (.lnk), it searches all paths associated with the shortcut. If the target file is located on an NTFS partition, the system then uses the target's file ID to find a path. If the resulting path is not correct, it conducts a comprehensive search of the target drive in an attempt to find the file. +- If you disable or don't configure this policy setting, by default, when the system can't find the target file for a shortcut (.lnk), it searches all paths associated with the shortcut. If the target file is located on an NTFS partition, the system then uses the target's file ID to find a path. If the resulting path isn't correct, it conducts a comprehensive search of the target drive in an attempt to find the file. > [!NOTE] -> This policy setting only applies to target files on NTFS partitions. FAT partitions do not have this ID tracking and search capability. +> This policy setting only applies to target files on NTFS partitions. FAT partitions don't have this ID tracking and search capability. Also, see the "Do not track Shell shortcuts during roaming" and the "Do not use the search-based method when resolving shell shortcuts" policy settings. @@ -1850,13 +1819,12 @@ Also, see the "Do not track Shell shortcuts during roaming" and the "Do not use | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1883,7 +1851,7 @@ Also, see the "Do not track Shell shortcuts during roaming" and the "Do not use | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1916,13 +1884,13 @@ Allows you to remove the Run command from the Start menu, Internet Explorer, and Also, users with extended keyboards will no longer be able to display the Run dialog box by pressing the Application key (the key with the Windows logo) + R. -- If you disable or do not configure this setting, users will be able to access the Run command in the Start menu and in Task Manager and use the Internet Explorer Address Bar. +- If you disable or don't configure this setting, users will be able to access the Run command in the Start menu and in Task Manager and use the Internet Explorer Address Bar. > [!NOTE] -> This setting affects the specified interface only. It does not prevent users from using other methods to run programs. +> This setting affects the specified interface only. It doesn't prevent users from using other methods to run programs. > [!NOTE] -> It is a requirement for third-party applications with Windows 2000 or later certification to adhere to this setting. +> It's a requirement for third-party applications with Windows 2000 or later certification to adhere to this setting. @@ -1934,13 +1902,12 @@ Also, users with extended keyboards will no longer be able to display the Run di | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1967,7 +1934,7 @@ Also, users with extended keyboards will no longer be able to display the Run di | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1979,9 +1946,9 @@ Also, users with extended keyboards will no longer be able to display the Run di -- If you enable this policy the start menu search box will not search for communications. +- If you enable this policy the start menu search box won't search for communications. -- If you disable or do not configure this policy, the start menu will search for communications, unless the user chooses not to in the start menu control panel. +- If you disable or don't configure this policy, the start menu will search for communications, unless the user chooses not to in the start menu control panel. @@ -1993,13 +1960,12 @@ Also, users with extended keyboards will no longer be able to display the Run di | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2026,7 +1992,7 @@ Also, users with extended keyboards will no longer be able to display the Run di | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2038,9 +2004,9 @@ Also, users with extended keyboards will no longer be able to display the Run di -- If you enable this policy, the "See all results" link will not be shown when the user performs a search in the start menu search box. +- If you enable this policy, the "See all results" link won't be shown when the user performs a search in the start menu search box. -- If you disable or do not configure this policy, the "See all results" link will be shown when the user performs a search in the start menu search box. +- If you disable or don't configure this policy, the "See all results" link will be shown when the user performs a search in the start menu search box. @@ -2052,13 +2018,12 @@ Also, users with extended keyboards will no longer be able to display the Run di | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2085,7 +2050,7 @@ Also, users with extended keyboards will no longer be able to display the Run di | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2097,9 +2062,9 @@ Also, users with extended keyboards will no longer be able to display the Run di -- If you enable this policy, a "See more results" / "Search Everywhere" link will not be shown when the user performs a search in the start menu search box. +- If you enable this policy, a "See more results" / "Search Everywhere" link won't be shown when the user performs a search in the start menu search box. -- If you disable or do not configure this policy, a "See more results" link will be shown when the user performs a search in the start menu search box. If a 3rd party protocol handler is installed, a "Search Everywhere" link will be shown instead of the "See more results" link. +- If you disable or don't configure this policy, a "See more results" link will be shown when the user performs a search in the start menu search box. If a 3rd party protocol handler is installed, a "Search Everywhere" link will be shown instead of the "See more results" link. @@ -2111,13 +2076,12 @@ Also, users with extended keyboards will no longer be able to display the Run di | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2144,7 +2108,7 @@ Also, users with extended keyboards will no longer be able to display the Run di | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2156,11 +2120,11 @@ Also, users with extended keyboards will no longer be able to display the Run di -- If you enable this policy setting the Start menu search box will not search for files. +- If you enable this policy setting the Start menu search box won't search for files. -- If you disable or do not configure this policy setting, the Start menu will search for files, unless the user chooses not to do so directly in Control Panel. +- If you disable or don't configure this policy setting, the Start menu will search for files, unless the user chooses not to do so directly in Control Panel. -- If you enable this policy, a "See more results" / "Search Everywhere" link will not be shown when the user performs a search in the start menu search box. +- If you enable this policy, a "See more results" / "Search Everywhere" link won't be shown when the user performs a search in the start menu search box. @@ -2172,13 +2136,12 @@ Also, users with extended keyboards will no longer be able to display the Run di | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2205,7 +2168,7 @@ Also, users with extended keyboards will no longer be able to display the Run di | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2217,9 +2180,9 @@ Also, users with extended keyboards will no longer be able to display the Run di -- If you enable this policy the start menu search box will not search for internet history or favorites. +- If you enable this policy the start menu search box won't search for internet history or favorites. -- If you disable or do not configure this policy, the start menu will search for for internet history or favorites, unless the user chooses not to in the start menu control panel. +- If you disable or don't configure this policy, the start menu will search for for internet history or favorites, unless the user chooses not to in the start menu control panel. @@ -2231,13 +2194,12 @@ Also, users with extended keyboards will no longer be able to display the Run di | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2264,7 +2226,7 @@ Also, users with extended keyboards will no longer be able to display the Run di | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2276,9 +2238,9 @@ Also, users with extended keyboards will no longer be able to display the Run di -- If you enable this policy setting the Start menu search box will not search for programs or Control Panel items. +- If you enable this policy setting the Start menu search box won't search for programs or Control Panel items. -- If you disable or do not configure this policy setting, the Start menu search box will search for programs and Control Panel items, unless the user chooses not to do so directly in Control Panel. +- If you disable or don't configure this policy setting, the Start menu search box will search for programs and Control Panel items, unless the user chooses not to do so directly in Control Panel. @@ -2290,13 +2252,12 @@ Also, users with extended keyboards will no longer be able to display the Run di | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2323,7 +2284,7 @@ Also, users with extended keyboards will no longer be able to display the Run di | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2340,7 +2301,7 @@ This policy setting allows you to remove programs on Settings menu. However, users can still start Control Panel items by using other methods, such as right-clicking the desktop to start Display or right-clicking Computer to start System. -- If you disable or do not configure this policy setting, the Control Panel, Printers, and Network and Connection folders from Settings are available on the Start menu, and from Computer and File Explorer. +- If you disable or don't configure this policy setting, the Control Panel, Printers, and Network and Connection folders from Settings are available on the Start menu, and from Computer and File Explorer. Also, see the "Disable Control Panel," "Disable Display in Control Panel," and "Remove Network Connections from Start Menu" policy settings. @@ -2354,13 +2315,12 @@ Also, see the "Disable Control Panel," "Disable Display in Control Panel," and " | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2387,7 +2347,7 @@ Also, see the "Disable Control Panel," "Disable Display in Control Panel," and " | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2408,7 +2368,7 @@ This policy setting allows you to prevent changes to Taskbar and Start Menu Sett If the user right-clicks the taskbar and then clicks Properties, a message appears explaining that a setting prevents the action. -- If you disable or do not configure this policy setting, the Taskbar and Start Menu items are available from Settings on the Start menu. +- If you disable or don't configure this policy setting, the Taskbar and Start Menu items are available from Settings on the Start menu. @@ -2420,13 +2380,12 @@ If the user right-clicks the taskbar and then clicks Properties, a message appea | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2453,7 +2412,7 @@ If the user right-clicks the taskbar and then clicks Properties, a message appea | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2470,10 +2429,10 @@ This policy setting allows you to remove the Default Programs link from the Star Clicking the Default Programs link from the Start menu opens the Default Programs control panel and provides administrators the ability to specify default programs for certain activities, such as Web browsing or sending e-mail, as well as which programs are accessible from the Start menu, desktop, and other locations. -- If you disable or do not configure this policy setting, the Default Programs link is available from the Start menu. +- If you disable or don't configure this policy setting, the Default Programs link is available from the Start menu. > [!NOTE] -> This policy setting does not prevent the Set Default Programs for This Computer option from appearing in the Default Programs control panel. +> This policy setting doesn't prevent the Set Default Programs for This Computer option from appearing in the Default Programs control panel. @@ -2485,13 +2444,12 @@ Clicking the Default Programs link from the Start menu opens the Default Program | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2518,7 +2476,7 @@ Clicking the Default Programs link from the Start menu opens the Default Program | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2531,12 +2489,12 @@ Clicking the Default Programs link from the Start menu opens the Default Program This policy setting allows you to remove the Documents icon from the Start menu and its submenus. -- If you enable this policy setting, the Documents icon is removed from the Start menu and its submenus. Enabling this policy setting only removes the icon. It does not prevent the user from using other methods to gain access to the contents of the Documents folder. +- If you enable this policy setting, the Documents icon is removed from the Start menu and its submenus. Enabling this policy setting only removes the icon. It doesn't prevent the user from using other methods to gain access to the contents of the Documents folder. > [!NOTE] > To make changes to this policy setting effective, you must log off and then log on. -- If you disable or do not configure this policy setting, he Documents icon is available from the Start menu. +- If you disable or don't configure this policy setting, he Documents icon is available from the Start menu. Also, see the "Remove Documents icon on the desktop" policy setting. @@ -2550,13 +2508,12 @@ Also, see the "Remove Documents icon on the desktop" policy setting. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2583,7 +2540,7 @@ Also, see the "Remove Documents icon on the desktop" policy setting. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2598,7 +2555,7 @@ This policy setting allows you to remove the Music icon from Start Menu. - If you enable this policy setting, the Music icon is no longer available from Start Menu. -- If you disable or do not configure this policy setting, the Music icon is available from Start Menu. +- If you disable or don't configure this policy setting, the Music icon is available from Start Menu. @@ -2610,13 +2567,12 @@ This policy setting allows you to remove the Music icon from Start Menu. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2643,7 +2599,7 @@ This policy setting allows you to remove the Music icon from Start Menu. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2658,7 +2614,7 @@ This policy setting allows you to remove the Network icon from Start Menu. - If you enable this policy setting, the Network icon is no longer available from Start Menu. -- If you disable or do not configure this policy setting, the Network icon is available from Start Menu. +- If you disable or don't configure this policy setting, the Network icon is available from Start Menu. @@ -2670,13 +2626,12 @@ This policy setting allows you to remove the Network icon from Start Menu. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2703,7 +2658,7 @@ This policy setting allows you to remove the Network icon from Start Menu. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2718,7 +2673,7 @@ This policy setting allows you to remove the Pictures icon from Start Menu. - If you enable this policy setting, the Pictures icon is no longer available from Start Menu. -- If you disable or do not configure this policy setting, the Pictures icon is available from Start Menu. +- If you disable or don't configure this policy setting, the Pictures icon is available from Start Menu. @@ -2730,13 +2685,12 @@ This policy setting allows you to remove the Pictures icon from Start Menu. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2763,7 +2717,7 @@ This policy setting allows you to remove the Pictures icon from Start Menu. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2776,9 +2730,9 @@ This policy setting allows you to remove the Pictures icon from Start Menu. This policy setting allows you to remove the Downloads link from the Start Menu. -- If you enable this policy setting, the Start Menu does not show a link to the Downloads folder. +- If you enable this policy setting, the Start Menu doesn't show a link to the Downloads folder. -- If you disable or do not configure this policy setting, the Downloads link is available from the Start Menu. +- If you disable or don't configure this policy setting, the Downloads link is available from the Start Menu. @@ -2790,13 +2744,12 @@ This policy setting allows you to remove the Downloads link from the Start Menu. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2823,7 +2776,7 @@ This policy setting allows you to remove the Downloads link from the Start Menu. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2835,9 +2788,9 @@ This policy setting allows you to remove the Downloads link from the Start Menu. -- If you enable this policy the Start menu will not show a link to Homegroup. It also removes the homegroup item from the Start Menu options. As a result, users cannot add the homegroup link to the Start Menu. +- If you enable this policy the Start menu won't show a link to Homegroup. It also removes the homegroup item from the Start Menu options. As a result, users can't add the homegroup link to the Start Menu. -- If you disable or do not configure this policy, users can use the Start Menu options to add or remove the homegroup link from the Start Menu. +- If you disable or don't configure this policy, users can use the Start Menu options to add or remove the homegroup link from the Start Menu. @@ -2849,13 +2802,12 @@ This policy setting allows you to remove the Downloads link from the Start Menu. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2882,7 +2834,7 @@ This policy setting allows you to remove the Downloads link from the Start Menu. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2895,9 +2847,9 @@ This policy setting allows you to remove the Downloads link from the Start Menu. This policy setting allows you to remove the Recorded TV link from the Start Menu. -- If you enable this policy setting, the Start Menu does not show a link to the Recorded TV library. +- If you enable this policy setting, the Start Menu doesn't show a link to the Recorded TV library. -- If you disable or do not configure this policy setting, the Recorded TV link is available from the Start Menu. +- If you disable or don't configure this policy setting, the Recorded TV link is available from the Start Menu. @@ -2909,13 +2861,12 @@ This policy setting allows you to remove the Recorded TV link from the Start Men | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2942,7 +2893,7 @@ This policy setting allows you to remove the Recorded TV link from the Start Men | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2957,11 +2908,11 @@ Hides all folders on the user-specific (top) section of the Start menu. Other it This setting is designed for use with redirected folders. Redirected folders appear on the main (bottom) section of the Start menu. However, the original, user-specific version of the folder still appears on the top section of the Start menu. Because the appearance of two folders with the same name might confuse users, you can use this setting to hide user-specific folders. -**Note** that this setting hides all user-specific folders, not just those associated with redirected folders. +Note that this setting hides all user-specific folders, not just those associated with redirected folders. - If you enable this setting, no folders appear on the top section of the Start menu. If users add folders to the Start Menu directory in their user profiles, the folders appear in the directory but not on the Start menu. -- If you disable this setting or do not configured it, Windows 2000 Professional and Windows XP Professional display folders on both sections of the Start menu. +- If you disable this setting or don't configured it, Windows 2000 Professional and Windows XP Professional display folders on both sections of the Start menu. @@ -2973,13 +2924,12 @@ This setting is designed for use with redirected folders. Redirected folders app | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3006,7 +2956,7 @@ This setting is designed for use with redirected folders. Redirected folders app | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3019,9 +2969,9 @@ This setting is designed for use with redirected folders. Redirected folders app This policy setting allows you to remove the Videos link from the Start Menu. -- If you enable this policy setting, the Start Menu does not show a link to the Videos library. +- If you enable this policy setting, the Start Menu doesn't show a link to the Videos library. -- If you disable or do not configure this policy setting, the Videos link is available from the Start Menu. +- If you disable or don't configure this policy setting, the Videos link is available from the Start Menu. @@ -3033,13 +2983,12 @@ This policy setting allows you to remove the Videos link from the Start Menu. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3066,7 +3015,7 @@ This policy setting allows you to remove the Videos link from the Start Menu. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3085,7 +3034,7 @@ The classic Start menu in Windows 2000 Professional allows users to begin common - If you disable this setting, the Start menu only displays in the new style, meaning the desktop icons are now on the Start page. -- If you do not configure this setting, the default is the new style, and the user can change the view. +- If you don't configure this setting, the default is the new style, and the user can change the view. @@ -3097,13 +3046,12 @@ The classic Start menu in Windows 2000 Professional allows users to begin common | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3130,7 +3078,7 @@ The classic Start menu in Windows 2000 Professional allows users to begin common | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3143,9 +3091,9 @@ The classic Start menu in Windows 2000 Professional allows users to begin common Prevents the clock in the system notification area from being displayed. -- If you enable this setting, the clock will not be displayed in the system notification area. +- If you enable this setting, the clock won't be displayed in the system notification area. -- If you disable or do not configure this setting, the default behavior of the clock appearing in the notification area will occur. +- If you disable or don't configure this setting, the default behavior of the clock appearing in the notification area will occur. @@ -3157,13 +3105,12 @@ Prevents the clock in the system notification area from being displayed. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3190,7 +3137,7 @@ Prevents the clock in the system notification area from being displayed. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3207,7 +3154,7 @@ Taskbar grouping consolidates similar applications when there is no room on the - If you enable this setting, it prevents the taskbar from grouping items that share the same program name. By default, this setting is always enabled. -- If you disable or do not configure it, items on the taskbar that share the same program are grouped together. The users have the option to disable grouping if they choose. +- If you disable or don't configure it, items on the taskbar that share the same program are grouped together. The users have the option to disable grouping if they choose. @@ -3219,13 +3166,12 @@ Taskbar grouping consolidates similar applications when there is no room on the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3252,7 +3198,7 @@ Taskbar grouping consolidates similar applications when there is no room on the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3267,9 +3213,9 @@ This setting affects the taskbar. The taskbar includes the Start button, buttons for currently running tasks, custom toolbars, the notification area, and the system clock. Toolbars include Quick Launch, Address, Links, Desktop, and other custom toolbars created by the user or by an application. -- If this setting is enabled, the taskbar does not display any custom toolbars, and the user cannot add any custom toolbars to the taskbar. Moreover, the "Toolbars" menu command and submenu are removed from the context menu. The taskbar displays only the Start button, taskbar buttons, the notification area, and the system clock. +- If this setting is enabled, the taskbar doesn't display any custom toolbars, and the user can't add any custom toolbars to the taskbar. Moreover, the "Toolbars" menu command and submenu are removed from the context menu. The taskbar displays only the Start button, taskbar buttons, the notification area, and the system clock. -- If this setting is disabled or is not configured, the taskbar displays all toolbars. Users can add or remove custom toolbars, and the "Toolbars" command appears in the context menu. +- If this setting is disabled or isn't configured, the taskbar displays all toolbars. Users can add or remove custom toolbars, and the "Toolbars" command appears in the context menu. @@ -3281,13 +3227,12 @@ The taskbar includes the Start button, buttons for currently running tasks, cust | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3314,7 +3259,7 @@ The taskbar includes the Start button, buttons for currently running tasks, cust | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3333,9 +3278,9 @@ This policy setting allows you to remove access to the context menus for the tas - If you enable this policy setting, the menus that appear when you right-click the taskbar and items on the taskbar are hidden, such as the Start button, the clock, and the taskbar buttons. -- If you disable or do not configure this policy setting, the context menus for the taskbar are available. +- If you disable or don't configure this policy setting, the context menus for the taskbar are available. -This policy setting does not prevent users from using other methods to issue the commands that appear on these menus. +This policy setting doesn't prevent users from using other methods to issue the commands that appear on these menus. @@ -3347,13 +3292,12 @@ This policy setting does not prevent users from using other methods to issue the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3380,7 +3324,7 @@ This policy setting does not prevent users from using other methods to issue the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3397,7 +3341,7 @@ Description: The notification area is located at the far right end of the task b - If this setting is enabled, the user's entire notification area, including the notification icons, is hidden. The taskbar displays only the Start button, taskbar buttons, custom toolbars (if any), and the system clock. -- If this setting is disabled or is not configured, the notification area is shown in the user's taskbar. +- If this setting is disabled or isn't configured, the notification area is shown in the user's taskbar. > [!NOTE] > Enabling this setting overrides the "Turn off notification area cleanup" setting, because if the notification area is hidden, there is no need to clean up the icons. @@ -3412,13 +3356,12 @@ Description: The notification area is located at the far right end of the task b | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3445,7 +3388,7 @@ Description: The notification area is located at the far right end of the task b | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3461,9 +3404,9 @@ Description: The notification area is located at the far right end of the task b -- If you enable this setting, users cannot uninstall apps from Start. +- If you enable this setting, users can't uninstall apps from Start. -- If you disable this setting or do not configure it, users can access the uninstall command from Start. +- If you disable this setting or don't configure it, users can access the uninstall command from Start. @@ -3475,13 +3418,12 @@ Description: The notification area is located at the far right end of the task b | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3508,7 +3450,7 @@ Description: The notification area is located at the far right end of the task b | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3520,9 +3462,9 @@ Description: The notification area is located at the far right end of the task b -- If you enable this policy the start menu will not show a link to the user's storage folder. +- If you enable this policy the start menu won't show a link to the user's storage folder. -- If you disable or do not configure this policy, the start menu will display a link, unless the user chooses to remove it in the start menu control panel. +- If you disable or don't configure this policy, the start menu will display a link, unless the user chooses to remove it in the start menu control panel. @@ -3534,13 +3476,12 @@ Description: The notification area is located at the far right end of the task b | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3567,7 +3508,7 @@ Description: The notification area is located at the far right end of the task b | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3584,7 +3525,7 @@ This policy setting allows you to remove the user name label from the Start Menu To remove the user name folder on Windows Vista, set the "Remove user folder link from Start Menu" policy setting. -- If you disable or do not configure this policy setting, the user name label appears on the Start Menu in Windows XP and Windows Server 2003. +- If you disable or don't configure this policy setting, the user name label appears on the Start Menu in Windows XP and Windows Server 2003. @@ -3596,13 +3537,12 @@ To remove the user name folder on Windows Vista, set the "Remove user folder lin | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3629,7 +3569,7 @@ To remove the user name folder on Windows Vista, set the "Remove user folder lin | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3648,7 +3588,7 @@ Enabling this policy setting blocks user access to the Windows Update Web site a Windows Update, the online extension of Windows, offers software updates to keep a user's system up-to-date. The Windows Update Product Catalog determines any system files, security fixes, and Microsoft updates that users need and shows the newest versions available for download. -- If you disable or do not configure this policy setting, the Windows Update hyperlink is available from the Start menu and from the Tools menu in Internet Explorer. +- If you disable or don't configure this policy setting, the Windows Update hyperlink is available from the Start menu and from the Tools menu in Internet Explorer. Also, see the "Hide the "Add programs from Microsoft" option" policy setting. @@ -3662,13 +3602,12 @@ Also, see the "Hide the "Add programs from Microsoft" option" policy setting. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3695,7 +3634,7 @@ Also, see the "Hide the "Add programs from Microsoft" option" policy setting. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3710,9 +3649,9 @@ Set the default action of the power button on the Start menu. - If you enable this setting, the Start Menu will set the power button to the chosen action, and not let the user change this action. -If you set the button to either Sleep or Hibernate, and that state is not supported on a computer, then the button will fall back to Shut Down. +If you set the button to either Sleep or Hibernate, and that state isn't supported on a computer, then the button will fall back to Shut Down. -- If you disable or do not configure this setting, the Start Menu power button will be set to Shut Down by default, and the user can change this setting to another action. +- If you disable or don't configure this setting, the Start Menu power button will be set to Shut Down by default, and the user can change this setting to another action. @@ -3724,13 +3663,12 @@ If you set the button to either Sleep or Hibernate, and that state is not suppor | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3756,7 +3694,7 @@ If you set the button to either Sleep or Hibernate, and that state is not suppor | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3769,11 +3707,11 @@ If you set the button to either Sleep or Hibernate, and that state is not suppor This policy setting controls whether the QuickLaunch bar is displayed in the Taskbar. -- If you enable this policy setting, the QuickLaunch bar will be visible and cannot be turned off. +- If you enable this policy setting, the QuickLaunch bar will be visible and can't be turned off. -- If you disable this policy setting, the QuickLaunch bar will be hidden and cannot be turned on. +- If you disable this policy setting, the QuickLaunch bar will be hidden and can't be turned on. -- If you do not configure this policy setting, then users will be able to turn the QuickLaunch bar on and off. +- If you don't configure this policy setting, then users will be able to turn the QuickLaunch bar on and off. @@ -3785,13 +3723,12 @@ This policy setting controls whether the QuickLaunch bar is displayed in the Tas | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3818,7 +3755,7 @@ This policy setting controls whether the QuickLaunch bar is displayed in the Tas | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3830,9 +3767,9 @@ This policy setting controls whether the QuickLaunch bar is displayed in the Tas -- If you enable this setting, the "Undock PC" button is removed from the simple Start Menu, and your PC cannot be undocked. +- If you enable this setting, the "Undock PC" button is removed from the simple Start Menu, and your PC can't be undocked. -- If you disable this setting or do not configure it, the "Undock PC" button remains on the simple Start menu, and your PC can be undocked. +- If you disable this setting or don't configure it, the "Undock PC" button remains on the simple Start menu, and your PC can be undocked. @@ -3844,13 +3781,12 @@ This policy setting controls whether the QuickLaunch bar is displayed in the Tas | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3877,7 +3813,7 @@ This policy setting controls whether the QuickLaunch bar is displayed in the Tas | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3904,13 +3840,12 @@ This policy setting allows the Apps view to be opened by default when the user g | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3937,7 +3872,7 @@ This policy setting allows the Apps view to be opened by default when the user g | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3952,10 +3887,10 @@ This policy setting shows or hides the "Run as different user" command on the St - If you enable this setting, users can access the "Run as different user" command from Start for applications which support this functionality. -- If you disable this setting or do not configure it, users cannot access the "Run as different user" command from Start for any applications. +- If you disable this setting or don't configure it, users can't access the "Run as different user" command from Start for any applications. > [!NOTE] -> This setting does not prevent users from using other methods, such as the shift right-click menu on application's jumplists in the taskbar to issue the "Run as different user" command. +> This setting doesn't prevent users from using other methods, such as the shift right-click menu on application's jumplists in the taskbar to issue the "Run as different user" command. @@ -3967,13 +3902,12 @@ This policy setting shows or hides the "Run as different user" command on the St | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4000,7 +3934,7 @@ This policy setting shows or hides the "Run as different user" command on the St | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4013,7 +3947,8 @@ This policy setting shows or hides the "Run as different user" command on the St - If you enable this setting, the Run command is added to the Start menu. -- If you disable or do not configure this setting, the Run command is not visible on the Start menu by default, but it can be added from the Taskbar and Start menu properties. If the Remove Run link from Start Menu policy is set, the Add the Run command to the Start menu policy has no effect. + +- If you disable or don't configure this setting, the Run command isn't visible on the Start menu by default, but it can be added from the Taskbar and Start menu properties. If the Remove Run link from Start Menu policy is set, the Add the Run command to the Start menu policy has no effect. @@ -4025,13 +3960,12 @@ This policy setting shows or hides the "Run as different user" command on the St | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4058,7 +3992,7 @@ This policy setting shows or hides the "Run as different user" command on the St | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4085,13 +4019,12 @@ This policy setting allows the Start screen to appear on the display the user is | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4118,7 +4051,7 @@ This policy setting allows the Start screen to appear on the display the user is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4131,11 +4064,11 @@ This policy setting allows the Start screen to appear on the display the user is This policy setting allows you to removes the "Log Off ``" item from the Start menu and prevents users from restoring it. -- If you enable this policy setting, the Log Off `` item does not appear in the Start menu. This policy setting also removes the Display Logoff item from Start Menu Options. As a result, users cannot restore the Log Off `` item to the Start Menu. +- If you enable this policy setting, the Log Off `` item doesn't appear in the Start menu. This policy setting also removes the Display Logoff item from Start Menu Options. As a result, users can't restore the Log Off `` item to the Start Menu. -- If you disable or do not configure this policy setting, users can use the Display Logoff item to add and remove the Log Off item. +- If you disable or don't configure this policy setting, users can use the Display Logoff item to add and remove the Log Off item. -This policy setting affects the Start menu only. It does not affect the Log Off item on the Windows Security dialog box that appears when you press Ctrl+Alt+Del, and it does not prevent users from using other methods to log off. +This policy setting affects the Start menu only. It doesn't affect the Log Off item on the Windows Security dialog box that appears when you press Ctrl+Alt+Del, and it doesn't prevent users from using other methods to log off. > [!TIP] > To add or remove the Log Off item on a computer, click Start, click Settings, click Taskbar and Start Menu, click the Start Menu Options tab and, in the Start Menu Settings box, click Display Logoff. @@ -4152,13 +4085,12 @@ See also: "Remove Logoff" policy setting in User Configuration\Administrative Te | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4185,7 +4117,7 @@ See also: "Remove Logoff" policy setting in User Configuration\Administrative Te | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4200,7 +4132,7 @@ See also: "Remove Logoff" policy setting in User Configuration\Administrative Te -This policy setting allows pinning apps to Start by default, when they are included by AppID on the list. +This policy setting allows pinning apps to Start by default, when they're included by AppID on the list. @@ -4212,13 +4144,12 @@ This policy setting allows pinning apps to Start by default, when they are inclu | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-systemrestore.md b/windows/client-management/mdm/policy-csp-admx-systemrestore.md index 1880514363..1c5b268e45 100644 --- a/windows/client-management/mdm/policy-csp-admx-systemrestore.md +++ b/windows/client-management/mdm/policy-csp-admx-systemrestore.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_SystemRestore Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_SystemRestore -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -50,7 +47,7 @@ System Restore enables users, in the event of a problem, to restore their comput - If you enable this policy setting, the option to configure System Restore through System Protection is disabled. -- If you disable or do not configure this policy setting, users can change the System Restore settings through System Protection. +- If you disable or don't configure this policy setting, users can change the System Restore settings through System Protection. Also, see the "Turn off System Restore" policy setting. If the "Turn off System Restore" policy setting is enabled, the "Turn off System Restore configuration" policy setting is overwritten. @@ -64,13 +61,12 @@ Also, see the "Turn off System Restore" policy setting. If the "Turn off System | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-tabletpcinputpanel.md b/windows/client-management/mdm/policy-csp-admx-tabletpcinputpanel.md index b83e3d74c0..89ec7e937f 100644 --- a/windows/client-management/mdm/policy-csp-admx-tabletpcinputpanel.md +++ b/windows/client-management/mdm/policy-csp-admx-tabletpcinputpanel.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_TabletPCInputPanel Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_TabletPCInputPanel -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,11 +43,11 @@ Turns off the integration of application auto complete lists with Tablet PC Inpu Tablet PC Input Panel is a Tablet PC accessory that enables you to use handwriting or an on-screen keyboard to enter text, symbols, numbers, or keyboard shortcuts. -- If you enable this policy, application auto complete lists will never appear next to Input Panel. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you enable this policy, application auto complete lists will never appear next to Input Panel. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you disable this policy, application auto complete lists will appear next to Input Panel in applications where the functionality is available. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you disable this policy, application auto complete lists will appear next to Input Panel in applications where the functionality is available. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you do not configure this policy, application auto complete lists will appear next to Input Panel in applications where the functionality is available. Users will be able to configure this setting on the Text completion tab in Input Panel Options. +- If you don't configure this policy, application auto complete lists will appear next to Input Panel in applications where the functionality is available. Users will be able to configure this setting on the Text completion tab in Input Panel Options. @@ -62,13 +59,12 @@ Tablet PC Input Panel is a Tablet PC accessory that enables you to use handwriti | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -95,7 +91,7 @@ Tablet PC Input Panel is a Tablet PC accessory that enables you to use handwriti | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -110,11 +106,11 @@ Turns off the integration of application auto complete lists with Tablet PC Inpu Tablet PC Input Panel is a Tablet PC accessory that enables you to use handwriting or an on-screen keyboard to enter text, symbols, numbers, or keyboard shortcuts. -- If you enable this policy, application auto complete lists will never appear next to Input Panel. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you enable this policy, application auto complete lists will never appear next to Input Panel. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you disable this policy, application auto complete lists will appear next to Input Panel in applications where the functionality is available. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you disable this policy, application auto complete lists will appear next to Input Panel in applications where the functionality is available. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you do not configure this policy, application auto complete lists will appear next to Input Panel in applications where the functionality is available. Users will be able to configure this setting on the Text completion tab in Input Panel Options. +- If you don't configure this policy, application auto complete lists will appear next to Input Panel in applications where the functionality is available. Users will be able to configure this setting on the Text completion tab in Input Panel Options. @@ -126,13 +122,12 @@ Tablet PC Input Panel is a Tablet PC accessory that enables you to use handwriti | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -159,7 +154,7 @@ Tablet PC Input Panel is a Tablet PC accessory that enables you to use handwriti | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -174,11 +169,11 @@ Prevents Input Panel tab from appearing on the edge of the Tablet PC screen. Tablet PC Input Panel is a Tablet PC accessory that enables you to use handwriting or an on-screen keyboard to enter text, symbols, numbers, or keyboard shortcuts. -- If you enable this policy, Input Panel tab will not appear on the edge of the Tablet PC screen. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you enable this policy, Input Panel tab won't appear on the edge of the Tablet PC screen. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you disable this policy, Input Panel tab will appear on the edge of the Tablet PC screen. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you disable this policy, Input Panel tab will appear on the edge of the Tablet PC screen. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you do not configure this policy, Input Panel tab will appear on the edge of the Tablet PC screen. Users will be able to configure this setting on the Opening tab in Input Panel Options. +- If you don't configure this policy, Input Panel tab will appear on the edge of the Tablet PC screen. Users will be able to configure this setting on the Opening tab in Input Panel Options. > [!CAUTION] > If you enable both the "Prevent Input Panel from appearing next to text entry areas" policy and the "Prevent Input Panel tab from appearing" policy, and disable the "Show Input Panel taskbar icon" policy, the user will then have no way to access Input Panel. @@ -193,13 +188,12 @@ Tablet PC Input Panel is a Tablet PC accessory that enables you to use handwriti | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -226,7 +220,7 @@ Tablet PC Input Panel is a Tablet PC accessory that enables you to use handwriti | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -241,11 +235,11 @@ Prevents Input Panel tab from appearing on the edge of the Tablet PC screen. Tablet PC Input Panel is a Tablet PC accessory that enables you to use handwriting or an on-screen keyboard to enter text, symbols, numbers, or keyboard shortcuts. -- If you enable this policy, Input Panel tab will not appear on the edge of the Tablet PC screen. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you enable this policy, Input Panel tab won't appear on the edge of the Tablet PC screen. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you disable this policy, Input Panel tab will appear on the edge of the Tablet PC screen. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you disable this policy, Input Panel tab will appear on the edge of the Tablet PC screen. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you do not configure this policy, Input Panel tab will appear on the edge of the Tablet PC screen. Users will be able to configure this setting on the Opening tab in Input Panel Options. +- If you don't configure this policy, Input Panel tab will appear on the edge of the Tablet PC screen. Users will be able to configure this setting on the Opening tab in Input Panel Options. > [!CAUTION] > If you enable both the "Prevent Input Panel from appearing next to text entry areas" policy and the "Prevent Input Panel tab from appearing" policy, and disable the "Show Input Panel taskbar icon" policy, the user will then have no way to access Input Panel. @@ -260,13 +254,12 @@ Tablet PC Input Panel is a Tablet PC accessory that enables you to use handwriti | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -293,7 +286,7 @@ Tablet PC Input Panel is a Tablet PC accessory that enables you to use handwriti | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -308,11 +301,11 @@ Prevents the Tablet PC Input Panel icon from appearing next to any text entry ar Tablet PC Input Panel is a Tablet PC accessory that enables you to use handwriting or an on-screen keyboard to enter text, symbols, numbers, or keyboard shortcuts. -- If you enable this policy, Input Panel will never appear next to text entry areas when using a tablet pen as an input device. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you enable this policy, Input Panel will never appear next to text entry areas when using a tablet pen as an input device. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you disable this policy, Input Panel will appear next to any text entry area in applications where this behavior is available. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you disable this policy, Input Panel will appear next to any text entry area in applications where this behavior is available. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you do not configure this policy, Input Panel will appear next to text entry areas in applications where this behavior is available. Users will be able to configure this setting on the Opening tab in Input Panel Options. +- If you don't configure this policy, Input Panel will appear next to text entry areas in applications where this behavior is available. Users will be able to configure this setting on the Opening tab in Input Panel Options. > [!CAUTION] > If you enable both the "Prevent Input Panel from appearing next to text entry areas" policy and the "Prevent Input Panel tab from appearing" policy, and disable the "Show Input Panel taskbar icon" policy, the user will then have no way to access Input Panel. @@ -327,13 +320,12 @@ Tablet PC Input Panel is a Tablet PC accessory that enables you to use handwriti | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -360,7 +352,7 @@ Tablet PC Input Panel is a Tablet PC accessory that enables you to use handwriti | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -375,11 +367,11 @@ Prevents the Tablet PC Input Panel icon from appearing next to any text entry ar Tablet PC Input Panel is a Tablet PC accessory that enables you to use handwriting or an on-screen keyboard to enter text, symbols, numbers, or keyboard shortcuts. -- If you enable this policy, Input Panel will never appear next to text entry areas when using a tablet pen as an input device. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you enable this policy, Input Panel will never appear next to text entry areas when using a tablet pen as an input device. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you disable this policy, Input Panel will appear next to any text entry area in applications where this behavior is available. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you disable this policy, Input Panel will appear next to any text entry area in applications where this behavior is available. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you do not configure this policy, Input Panel will appear next to text entry areas in applications where this behavior is available. Users will be able to configure this setting on the Opening tab in Input Panel Options. +- If you don't configure this policy, Input Panel will appear next to text entry areas in applications where this behavior is available. Users will be able to configure this setting on the Opening tab in Input Panel Options. > [!CAUTION] > If you enable both the "Prevent Input Panel from appearing next to text entry areas" policy and the "Prevent Input Panel tab from appearing" policy, and disable the "Show Input Panel taskbar icon" policy, the user will then have no way to access Input Panel. @@ -394,13 +386,12 @@ Tablet PC Input Panel is a Tablet PC accessory that enables you to use handwriti | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -427,7 +418,7 @@ Tablet PC Input Panel is a Tablet PC accessory that enables you to use handwriti | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -442,11 +433,11 @@ Prevents the Tablet PC Input Panel icon from appearing next to any text entry ar Tablet PC Input Panel is a Tablet PC accessory that enables you to use handwriting or an on-screen keyboard to enter text, symbols, numbers, or keyboard shortcuts. -- If you enable this policy, Input Panel will never appear next to any text entry area when a user is using touch input. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you enable this policy, Input Panel will never appear next to any text entry area when a user is using touch input. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you disable this policy, Input Panel will appear next to text entry areas in applications where this behavior is available. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you disable this policy, Input Panel will appear next to text entry areas in applications where this behavior is available. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you do not configure this policy, Input Panel will appear next to text entry areas in applications where this behavior is available. Users will be able to configure this setting on the Opening tab in Input Panel Options. +- If you don't configure this policy, Input Panel will appear next to text entry areas in applications where this behavior is available. Users will be able to configure this setting on the Opening tab in Input Panel Options. @@ -458,13 +449,12 @@ Tablet PC Input Panel is a Tablet PC accessory that enables you to use handwriti | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -491,7 +481,7 @@ Tablet PC Input Panel is a Tablet PC accessory that enables you to use handwriti | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -506,11 +496,11 @@ Prevents the Tablet PC Input Panel icon from appearing next to any text entry ar Tablet PC Input Panel is a Tablet PC accessory that enables you to use handwriting or an on-screen keyboard to enter text, symbols, numbers, or keyboard shortcuts. -- If you enable this policy, Input Panel will never appear next to any text entry area when a user is using touch input. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you enable this policy, Input Panel will never appear next to any text entry area when a user is using touch input. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you disable this policy, Input Panel will appear next to text entry areas in applications where this behavior is available. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you disable this policy, Input Panel will appear next to text entry areas in applications where this behavior is available. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you do not configure this policy, Input Panel will appear next to text entry areas in applications where this behavior is available. Users will be able to configure this setting on the Opening tab in Input Panel Options. +- If you don't configure this policy, Input Panel will appear next to text entry areas in applications where this behavior is available. Users will be able to configure this setting on the Opening tab in Input Panel Options. @@ -522,13 +512,12 @@ Tablet PC Input Panel is a Tablet PC accessory that enables you to use handwriti | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -555,7 +544,7 @@ Tablet PC Input Panel is a Tablet PC accessory that enables you to use handwriti | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -570,19 +559,19 @@ Adjusts password security settings in Touch Keyboard and Handwriting panel (a.k. Touch Keyboard and Handwriting panel enables you to use handwriting or an on-screen keyboard to enter text, symbols, numbers, or keyboard shortcuts. -- If you enable this policy and choose "Low" from the drop-down box, password security is set to "Low." At this setting, all password security settings are turned off. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you enable this policy and choose "Low" from the drop-down box, password security is set to "Low". At this setting, all password security settings are turned off. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you enable this policy and choose "Medium-Low" from the drop-down box, password security is set to "Medium-Low." At this setting, when users enter passwords from Input Panel they use the on-screen keyboard by default, skin switching is allowed, and Input Panel displays the cursor and which keys are tapped. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you enable this policy and choose "Medium-Low" from the drop-down box, password security is set to "Medium-Low". At this setting, when users enter passwords from Input Panel they use the on-screen keyboard by default, skin switching is allowed, and Input Panel displays the cursor and which keys are tapped. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you enable this policy and choose "Medium" from the drop-down box, password security is set to "Medium." At this setting, when users enter passwords from Input Panel they use the on-screen keyboard by default, skin switching is not allowed, and Input Panel displays the cursor and which keys are tapped. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you enable this policy and choose "Medium" from the drop-down box, password security is set to "Medium". At this setting, when users enter passwords from Input Panel they use the on-screen keyboard by default, skin switching isn't allowed, and Input Panel displays the cursor and which keys are tapped. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you enable this policy and choose to "Medium-High" from the drop-down box, password security is set to "Medium-High." At this setting, when users enter passwords from Input Panel they use the on-screen keyboard by default, skin switching is allowed, and Input Panel does not display the cursor or which keys are tapped. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you enable this policy and choose to "Medium-High" from the drop-down box, password security is set to "Medium-High". At this setting, when users enter passwords from Input Panel they use the on-screen keyboard by default, skin switching is allowed, and Input Panel doesn't display the cursor or which keys are tapped. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you enable this policy and choose "High" from the drop-down box, password security is set to "High." At this setting, when users enter passwords from Input Panel they use the on-screen keyboard by default, skin switching is not allowed, and Input Panel does not display the cursor or which keys are tapped. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you enable this policy and choose "High" from the drop-down box, password security is set to "High". At this setting, when users enter passwords from Input Panel they use the on-screen keyboard by default, skin switching isn't allowed, and Input Panel doesn't display the cursor or which keys are tapped. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you disable this policy, password security is set to "Medium-High." At this setting, when users enter passwords from Input Panel they use the on-screen keyboard by default, skin switching is allowed, and Input Panel does not display the cursor or which keys are tapped. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you disable this policy, password security is set to "Medium-High". At this setting, when users enter passwords from Input Panel they use the on-screen keyboard by default, skin switching is allowed, and Input Panel doesn't display the cursor or which keys are tapped. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you do not configure this policy, password security is set to "Medium-High" by default. At this setting, when users enter passwords from Input Panel they use the on-screen keyboard by default, skin switching is allowed, and Input Panel does not display the cursor or which keys are tapped. Users will be able to configure this setting on the Advanced tab in Input Panel Options in Windows 7 and Windows Vista. +- If you don't configure this policy, password security is set to "Medium-High" by default. At this setting, when users enter passwords from Input Panel they use the on-screen keyboard by default, skin switching is allowed, and Input Panel doesn't display the cursor or which keys are tapped. Users will be able to configure this setting on the Advanced tab in Input Panel Options in Windows 7 and Windows Vista. > [!CAUTION] > If you lower password security settings, people who can see the user's screen might be able to see their passwords. @@ -597,13 +586,12 @@ Touch Keyboard and Handwriting panel enables you to use handwriting or an on-scr | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -630,7 +618,7 @@ Touch Keyboard and Handwriting panel enables you to use handwriting or an on-scr | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -645,19 +633,19 @@ Adjusts password security settings in Touch Keyboard and Handwriting panel (a.k. Touch Keyboard and Handwriting panel enables you to use handwriting or an on-screen keyboard to enter text, symbols, numbers, or keyboard shortcuts. -- If you enable this policy and choose "Low" from the drop-down box, password security is set to "Low." At this setting, all password security settings are turned off. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you enable this policy and choose "Low" from the drop-down box, password security is set to "Low". At this setting, all password security settings are turned off. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you enable this policy and choose "Medium-Low" from the drop-down box, password security is set to "Medium-Low." At this setting, when users enter passwords from Input Panel they use the on-screen keyboard by default, skin switching is allowed, and Input Panel displays the cursor and which keys are tapped. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you enable this policy and choose "Medium-Low" from the drop-down box, password security is set to "Medium-Low". At this setting, when users enter passwords from Input Panel they use the on-screen keyboard by default, skin switching is allowed, and Input Panel displays the cursor and which keys are tapped. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you enable this policy and choose "Medium" from the drop-down box, password security is set to "Medium." At this setting, when users enter passwords from Input Panel they use the on-screen keyboard by default, skin switching is not allowed, and Input Panel displays the cursor and which keys are tapped. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you enable this policy and choose "Medium" from the drop-down box, password security is set to "Medium". At this setting, when users enter passwords from Input Panel they use the on-screen keyboard by default, skin switching isn't allowed, and Input Panel displays the cursor and which keys are tapped. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you enable this policy and choose to "Medium-High" from the drop-down box, password security is set to "Medium-High." At this setting, when users enter passwords from Input Panel they use the on-screen keyboard by default, skin switching is allowed, and Input Panel does not display the cursor or which keys are tapped. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you enable this policy and choose to "Medium-High" from the drop-down box, password security is set to "Medium-High". At this setting, when users enter passwords from Input Panel they use the on-screen keyboard by default, skin switching is allowed, and Input Panel doesn't display the cursor or which keys are tapped. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you enable this policy and choose "High" from the drop-down box, password security is set to "High." At this setting, when users enter passwords from Input Panel they use the on-screen keyboard by default, skin switching is not allowed, and Input Panel does not display the cursor or which keys are tapped. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you enable this policy and choose "High" from the drop-down box, password security is set to "High". At this setting, when users enter passwords from Input Panel they use the on-screen keyboard by default, skin switching isn't allowed, and Input Panel doesn't display the cursor or which keys are tapped. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you disable this policy, password security is set to "Medium-High." At this setting, when users enter passwords from Input Panel they use the on-screen keyboard by default, skin switching is allowed, and Input Panel does not display the cursor or which keys are tapped. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you disable this policy, password security is set to "Medium-High". At this setting, when users enter passwords from Input Panel they use the on-screen keyboard by default, skin switching is allowed, and Input Panel doesn't display the cursor or which keys are tapped. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you do not configure this policy, password security is set to "Medium-High" by default. At this setting, when users enter passwords from Input Panel they use the on-screen keyboard by default, skin switching is allowed, and Input Panel does not display the cursor or which keys are tapped. Users will be able to configure this setting on the Advanced tab in Input Panel Options in Windows 7 and Windows Vista. +- If you don't configure this policy, password security is set to "Medium-High" by default. At this setting, when users enter passwords from Input Panel they use the on-screen keyboard by default, skin switching is allowed, and Input Panel doesn't display the cursor or which keys are tapped. Users will be able to configure this setting on the Advanced tab in Input Panel Options in Windows 7 and Windows Vista. > [!CAUTION] > If you lower password security settings, people who can see the user's screen might be able to see their passwords. @@ -672,13 +660,12 @@ Touch Keyboard and Handwriting panel enables you to use handwriting or an on-scr | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -705,7 +692,7 @@ Touch Keyboard and Handwriting panel enables you to use handwriting or an on-scr | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -720,11 +707,11 @@ Prevents the Touch Keyboard and Handwriting panel (a.k.a. Tablet PC Input Panel Touch Keyboard and Handwriting panel enables you to use handwriting or an on-screen keyboard to enter text, symbols, numbers, or keyboard shortcuts. -- If you enable this policy, Input Panel will not provide text prediction suggestions. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you enable this policy, Input Panel won't provide text prediction suggestions. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you disable this policy, Input Panel will provide text prediction suggestions. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you disable this policy, Input Panel will provide text prediction suggestions. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you do not configure this policy, Input Panel will provide text prediction suggestions. Users will be able to configure this setting on the Text Completion tab in Input Panel Options in Windows 7 and Windows Vista. +- If you don't configure this policy, Input Panel will provide text prediction suggestions. Users will be able to configure this setting on the Text Completion tab in Input Panel Options in Windows 7 and Windows Vista. @@ -736,13 +723,12 @@ Touch Keyboard and Handwriting panel enables you to use handwriting or an on-scr | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -769,7 +755,7 @@ Touch Keyboard and Handwriting panel enables you to use handwriting or an on-scr | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -784,11 +770,11 @@ Prevents the Touch Keyboard and Handwriting panel (a.k.a. Tablet PC Input Panel Touch Keyboard and Handwriting panel enables you to use handwriting or an on-screen keyboard to enter text, symbols, numbers, or keyboard shortcuts. -- If you enable this policy, Input Panel will not provide text prediction suggestions. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you enable this policy, Input Panel won't provide text prediction suggestions. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you disable this policy, Input Panel will provide text prediction suggestions. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you disable this policy, Input Panel will provide text prediction suggestions. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you do not configure this policy, Input Panel will provide text prediction suggestions. Users will be able to configure this setting on the Text Completion tab in Input Panel Options in Windows 7 and Windows Vista. +- If you don't configure this policy, Input Panel will provide text prediction suggestions. Users will be able to configure this setting on the Text Completion tab in Input Panel Options in Windows 7 and Windows Vista. @@ -800,13 +786,12 @@ Touch Keyboard and Handwriting panel enables you to use handwriting or an on-scr | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -833,7 +818,7 @@ Touch Keyboard and Handwriting panel enables you to use handwriting or an on-scr | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -848,11 +833,11 @@ Includes rarely used Chinese, Kanji, and Hanja characters when handwriting is co Touch Keyboard and Handwriting panel (a.k.a. Tablet PC Input Panel in Windows 7 and Windows Vista) enables you to use handwriting or an on-screen keyboard to enter text, symbols, numbers, or keyboard shortcuts. -- If you enable this policy, rarely used Chinese, Kanji, and Hanja characters will be included in recognition results when handwriting is converted to typed text. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you enable this policy, rarely used Chinese, Kanji, and Hanja characters will be included in recognition results when handwriting is converted to typed text. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you disable this policy, rarely used Chinese, Kanji, and Hanja characters will not be included in recognition results when handwriting is converted to typed text. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you disable this policy, rarely used Chinese, Kanji, and Hanja characters won't be included in recognition results when handwriting is converted to typed text. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you do not configure this policy, rarely used Chinese, Kanji, and Hanja characters will not be included in recognition results when handwriting is converted to typed text. Users will be able to configure this setting on the Ink to text conversion tab in Input Panel Options (in Windows 7 and Windows Vista). +- If you don't configure this policy, rarely used Chinese, Kanji, and Hanja characters won't be included in recognition results when handwriting is converted to typed text. Users will be able to configure this setting on the Ink to text conversion tab in Input Panel Options (in Windows 7 and Windows Vista). @@ -864,13 +849,12 @@ Touch Keyboard and Handwriting panel (a.k.a. Tablet PC Input Panel in Windows 7 | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -897,7 +881,7 @@ Touch Keyboard and Handwriting panel (a.k.a. Tablet PC Input Panel in Windows 7 | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -912,11 +896,11 @@ Includes rarely used Chinese, Kanji, and Hanja characters when handwriting is co Touch Keyboard and Handwriting panel (a.k.a. Tablet PC Input Panel in Windows 7 and Windows Vista) enables you to use handwriting or an on-screen keyboard to enter text, symbols, numbers, or keyboard shortcuts. -- If you enable this policy, rarely used Chinese, Kanji, and Hanja characters will be included in recognition results when handwriting is converted to typed text. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you enable this policy, rarely used Chinese, Kanji, and Hanja characters will be included in recognition results when handwriting is converted to typed text. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you disable this policy, rarely used Chinese, Kanji, and Hanja characters will not be included in recognition results when handwriting is converted to typed text. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you disable this policy, rarely used Chinese, Kanji, and Hanja characters won't be included in recognition results when handwriting is converted to typed text. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you do not configure this policy, rarely used Chinese, Kanji, and Hanja characters will not be included in recognition results when handwriting is converted to typed text. Users will be able to configure this setting on the Ink to text conversion tab in Input Panel Options (in Windows 7 and Windows Vista). +- If you don't configure this policy, rarely used Chinese, Kanji, and Hanja characters won't be included in recognition results when handwriting is converted to typed text. Users will be able to configure this setting on the Ink to text conversion tab in Input Panel Options (in Windows 7 and Windows Vista). @@ -928,13 +912,12 @@ Touch Keyboard and Handwriting panel (a.k.a. Tablet PC Input Panel in Windows 7 | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -961,7 +944,7 @@ Touch Keyboard and Handwriting panel (a.k.a. Tablet PC Input Panel in Windows 7 | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -978,15 +961,15 @@ The tolerant gestures let users scratch out ink in Input Panel by using striketh Tablet PC Input Panel is a Tablet PC accessory that enables you to use handwriting or an on-screen keyboard to enter text, symbols, numbers, or keyboard shortcuts. -- If you enable this policy and choose "All" from the drop-down menu, no scratch-out gestures will be available in Input Panel. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you enable this policy and choose "All" from the drop-down menu, no scratch-out gestures will be available in Input Panel. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you enable this policy and choose "Tolerant," users will be able to use the Z-shaped scratch-out gesture that was available in Microsoft Windows XP Tablet PC Edition. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you enable this policy and choose "Tolerant," users will be able to use the Z-shaped scratch-out gesture that was available in Microsoft Windows XP Tablet PC Edition. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you enable this policy and choose "None," users will be able to use both the tolerant scratch-out gestures and the Z-shaped scratch-out gesture. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you enable this policy and choose "None," users will be able to use both the tolerant scratch-out gestures and the Z-shaped scratch-out gesture. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you disable this policy, users will be able to use both the tolerant scratch-out gestures and the Z-shaped scratch-out gesture. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you disable this policy, users will be able to use both the tolerant scratch-out gestures and the Z-shaped scratch-out gesture. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you do not configure this policy, users will be able to use both the tolerant scratch-out gestures and the Z-shaped scratch-out gesture. Users will be able to configure this setting on the Gestures tab in Input Panel Options. +- If you don't configure this policy, users will be able to use both the tolerant scratch-out gestures and the Z-shaped scratch-out gesture. Users will be able to configure this setting on the Gestures tab in Input Panel Options. @@ -998,13 +981,12 @@ Tablet PC Input Panel is a Tablet PC accessory that enables you to use handwriti | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1031,7 +1013,7 @@ Tablet PC Input Panel is a Tablet PC accessory that enables you to use handwriti | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1048,15 +1030,15 @@ The tolerant gestures let users scratch out ink in Input Panel by using striketh Tablet PC Input Panel is a Tablet PC accessory that enables you to use handwriting or an on-screen keyboard to enter text, symbols, numbers, or keyboard shortcuts. -- If you enable this policy and choose "All" from the drop-down menu, no scratch-out gestures will be available in Input Panel. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you enable this policy and choose "All" from the drop-down menu, no scratch-out gestures will be available in Input Panel. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you enable this policy and choose "Tolerant," users will be able to use the Z-shaped scratch-out gesture that was available in Microsoft Windows XP Tablet PC Edition. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you enable this policy and choose "Tolerant," users will be able to use the Z-shaped scratch-out gesture that was available in Microsoft Windows XP Tablet PC Edition. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you enable this policy and choose "None," users will be able to use both the tolerant scratch-out gestures and the Z-shaped scratch-out gesture. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you enable this policy and choose "None," users will be able to use both the tolerant scratch-out gestures and the Z-shaped scratch-out gesture. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you disable this policy, users will be able to use both the tolerant scratch-out gestures and the Z-shaped scratch-out gesture. Users will not be able to configure this setting in the Input Panel Options dialog box. +- If you disable this policy, users will be able to use both the tolerant scratch-out gestures and the Z-shaped scratch-out gesture. Users won't be able to configure this setting in the Input Panel Options dialog box. -- If you do not configure this policy, users will be able to use both the tolerant scratch-out gestures and the Z-shaped scratch-out gesture. Users will be able to configure this setting on the Gestures tab in Input Panel Options. +- If you don't configure this policy, users will be able to use both the tolerant scratch-out gestures and the Z-shaped scratch-out gesture. Users will be able to configure this setting on the Gestures tab in Input Panel Options. @@ -1068,13 +1050,12 @@ Tablet PC Input Panel is a Tablet PC accessory that enables you to use handwriti | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-tabletshell.md b/windows/client-management/mdm/policy-csp-admx-tabletshell.md index bb04b3fb84..065e07cce1 100644 --- a/windows/client-management/mdm/policy-csp-admx-tabletshell.md +++ b/windows/client-management/mdm/policy-csp-admx-tabletshell.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_TabletShell Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_TabletShell -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,11 +41,11 @@ ms.topic: reference Prevents start of InkBall game. -- If you enable this policy, the InkBall game will not run. +- If you enable this policy, the InkBall game won't run. - If you disable this policy, the InkBall game will run. -- If you do not configure this policy, the InkBall game will run. +- If you don't configure this policy, the InkBall game will run. @@ -60,13 +57,12 @@ Prevents start of InkBall game. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -93,7 +89,7 @@ Prevents start of InkBall game. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -106,11 +102,11 @@ Prevents start of InkBall game. Prevents start of InkBall game. -- If you enable this policy, the InkBall game will not run. +- If you enable this policy, the InkBall game won't run. - If you disable this policy, the InkBall game will run. -- If you do not configure this policy, the InkBall game will run. +- If you don't configure this policy, the InkBall game will run. @@ -122,13 +118,12 @@ Prevents start of InkBall game. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -155,7 +150,7 @@ Prevents start of InkBall game. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -168,11 +163,11 @@ Prevents start of InkBall game. Prevents start of Windows Journal. -- If you enable this policy, the Windows Journal accessory will not run. +- If you enable this policy, the Windows Journal accessory won't run. - If you disable this policy, the Windows Journal accessory will run. -- If you do not configure this policy, the Windows Journal accessory will run. +- If you don't configure this policy, the Windows Journal accessory will run. @@ -184,13 +179,12 @@ Prevents start of Windows Journal. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -217,7 +211,7 @@ Prevents start of Windows Journal. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -230,11 +224,11 @@ Prevents start of Windows Journal. Prevents start of Windows Journal. -- If you enable this policy, the Windows Journal accessory will not run. +- If you enable this policy, the Windows Journal accessory won't run. - If you disable this policy, the Windows Journal accessory will run. -- If you do not configure this policy, the Windows Journal accessory will run. +- If you don't configure this policy, the Windows Journal accessory will run. @@ -246,13 +240,12 @@ Prevents start of Windows Journal. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -279,7 +272,7 @@ Prevents start of Windows Journal. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -292,11 +285,11 @@ Prevents start of Windows Journal. Prevents printing to Journal Note Writer. -- If you enable this policy, the Journal Note Writer printer driver will not allow printing to it. It will remain displayed in the list of available printers, but attempts to print to it will fail. +- If you enable this policy, the Journal Note Writer printer driver won't allow printing to it. It will remain displayed in the list of available printers, but attempts to print to it will fail. -- If you disable this policy, you will be able to use this feature to print to a Journal Note. +- If you disable this policy, you'll be able to use this feature to print to a Journal Note. -- If you do not configure this policy, users will be able to use this feature to print to a Journal Note. +- If you don't configure this policy, users will be able to use this feature to print to a Journal Note. @@ -308,13 +301,12 @@ Prevents printing to Journal Note Writer. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -341,7 +333,7 @@ Prevents printing to Journal Note Writer. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -354,11 +346,11 @@ Prevents printing to Journal Note Writer. Prevents printing to Journal Note Writer. -- If you enable this policy, the Journal Note Writer printer driver will not allow printing to it. It will remain displayed in the list of available printers, but attempts to print to it will fail. +- If you enable this policy, the Journal Note Writer printer driver won't allow printing to it. It will remain displayed in the list of available printers, but attempts to print to it will fail. -- If you disable this policy, you will be able to use this feature to print to a Journal Note. +- If you disable this policy, you'll be able to use this feature to print to a Journal Note. -- If you do not configure this policy, users will be able to use this feature to print to a Journal Note. +- If you don't configure this policy, users will be able to use this feature to print to a Journal Note. @@ -370,13 +362,12 @@ Prevents printing to Journal Note Writer. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -403,7 +394,7 @@ Prevents printing to Journal Note Writer. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -416,11 +407,11 @@ Prevents printing to Journal Note Writer. Prevents the snipping tool from running. -- If you enable this policy setting, the Snipping Tool will not run. +- If you enable this policy setting, the Snipping Tool won't run. - If you disable this policy setting, the Snipping Tool will run. -- If you do not configure this policy setting, the Snipping Tool will run. +- If you don't configure this policy setting, the Snipping Tool will run. @@ -432,13 +423,12 @@ Prevents the snipping tool from running. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -465,7 +455,7 @@ Prevents the snipping tool from running. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -478,11 +468,11 @@ Prevents the snipping tool from running. Prevents the snipping tool from running. -- If you enable this policy setting, the Snipping Tool will not run. +- If you enable this policy setting, the Snipping Tool won't run. - If you disable this policy setting, the Snipping Tool will run. -- If you do not configure this policy setting, the Snipping Tool will run. +- If you don't configure this policy setting, the Snipping Tool will run. @@ -494,13 +484,12 @@ Prevents the snipping tool from running. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -527,7 +516,7 @@ Prevents the snipping tool from running. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -540,11 +529,11 @@ Prevents the snipping tool from running. Removes the Back->ESC mapping that normally occurs when menus are visible, and for applications that subscribe to this behavior. -- If you enable this policy, a button assigned to Back will not map to ESC. +- If you enable this policy, a button assigned to Back won't map to ESC. - If you disable this policy, Back->ESC mapping will occur. -- If you do not configure this policy, Back->ESC mapping will occur. +- If you don't configure this policy, Back->ESC mapping will occur. @@ -556,13 +545,12 @@ Removes the Back->ESC mapping that normally occurs when menus are visible, and f | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -589,7 +577,7 @@ Removes the Back->ESC mapping that normally occurs when menus are visible, and f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -602,11 +590,11 @@ Removes the Back->ESC mapping that normally occurs when menus are visible, and f Removes the Back->ESC mapping that normally occurs when menus are visible, and for applications that subscribe to this behavior. -- If you enable this policy, a button assigned to Back will not map to ESC. +- If you enable this policy, a button assigned to Back won't map to ESC. - If you disable this policy, Back->ESC mapping will occur. -- If you do not configure this policy, Back->ESC mapping will occur. +- If you don't configure this policy, Back->ESC mapping will occur. @@ -618,13 +606,12 @@ Removes the Back->ESC mapping that normally occurs when menus are visible, and f | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -651,7 +638,7 @@ Removes the Back->ESC mapping that normally occurs when menus are visible, and f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -666,7 +653,7 @@ Makes pen flicks and all related features unavailable. - If you enable this policy, pen flicks and all related features are unavailable. This includes: pen flicks themselves, pen flicks training, pen flicks training triggers in Internet Explorer, the pen flicks notification and the pen flicks tray icon. -- If you disable or do not configure this policy, pen flicks and related features are available. +- If you disable or don't configure this policy, pen flicks and related features are available. @@ -678,13 +665,12 @@ Makes pen flicks and all related features unavailable. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -711,7 +697,7 @@ Makes pen flicks and all related features unavailable. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -726,7 +712,7 @@ Makes pen flicks and all related features unavailable. - If you enable this policy, pen flicks and all related features are unavailable. This includes: pen flicks themselves, pen flicks training, pen flicks training triggers in Internet Explorer, the pen flicks notification and the pen flicks tray icon. -- If you disable or do not configure this policy, pen flicks and related features are available. +- If you disable or don't configure this policy, pen flicks and related features are available. @@ -738,13 +724,12 @@ Makes pen flicks and all related features unavailable. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -771,7 +756,7 @@ Makes pen flicks and all related features unavailable. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -784,9 +769,9 @@ Makes pen flicks and all related features unavailable. Makes pen flicks learning mode unavailable. -- If you enable this policy, pen flicks are still available but learning mode is not. Pen flicks are off by default and can be turned on system-wide, but cannot be restricted to learning mode applications. This means that the pen flicks training triggers in Internet Explorer are disabled and that the pen flicks notification will never be displayed. However, pen flicks, the pen flicks tray icon and pen flicks training (that can be accessed through CPL) are still available. Conceptually this policy is a subset of the Disable pen flicks policy. +- If you enable this policy, pen flicks are still available but learning mode is not. Pen flicks are off by default and can be turned on system-wide, but can't be restricted to learning mode applications. This means that the pen flicks training triggers in Internet Explorer are disabled and that the pen flicks notification will never be displayed. However, pen flicks, the pen flicks tray icon and pen flicks training (that can be accessed through CPL) are still available. Conceptually this policy is a subset of the Disable pen flicks policy. -- If you disable or do not configure this policy, all the features described above will be available. +- If you disable or don't configure this policy, all the features described above will be available. @@ -798,13 +783,12 @@ Makes pen flicks learning mode unavailable. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -831,7 +815,7 @@ Makes pen flicks learning mode unavailable. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -844,9 +828,9 @@ Makes pen flicks learning mode unavailable. Makes pen flicks learning mode unavailable. -- If you enable this policy, pen flicks are still available but learning mode is not. Pen flicks are off by default and can be turned on system-wide, but cannot be restricted to learning mode applications. This means that the pen flicks training triggers in Internet Explorer are disabled and that the pen flicks notification will never be displayed. However, pen flicks, the pen flicks tray icon and pen flicks training (that can be accessed through CPL) are still available. Conceptually this policy is a subset of the Disable pen flicks policy. +- If you enable this policy, pen flicks are still available but learning mode is not. Pen flicks are off by default and can be turned on system-wide, but can't be restricted to learning mode applications. This means that the pen flicks training triggers in Internet Explorer are disabled and that the pen flicks notification will never be displayed. However, pen flicks, the pen flicks tray icon and pen flicks training (that can be accessed through CPL) are still available. Conceptually this policy is a subset of the Disable pen flicks policy. -- If you disable or do not configure this policy, all the features described above will be available. +- If you disable or don't configure this policy, all the features described above will be available. @@ -858,13 +842,12 @@ Makes pen flicks learning mode unavailable. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -891,7 +874,7 @@ Makes pen flicks learning mode unavailable. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -904,11 +887,11 @@ Makes pen flicks learning mode unavailable. Prevents the user from launching an application from a Tablet PC hardware button. -- If you enable this policy, applications cannot be launched from a hardware button, and "Launch an application" is removed from the drop down menu for configuring button actions (in the Tablet PC Control Panel buttons tab). +- If you enable this policy, applications can't be launched from a hardware button, and "Launch an application" is removed from the drop down menu for configuring button actions (in the Tablet PC Control Panel buttons tab). - If you disable this policy, applications can be launched from a hardware button. -- If you do not configure this policy, applications can be launched from a hardware button. +- If you don't configure this policy, applications can be launched from a hardware button. @@ -920,13 +903,12 @@ Prevents the user from launching an application from a Tablet PC hardware button | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -953,7 +935,7 @@ Prevents the user from launching an application from a Tablet PC hardware button | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -966,11 +948,11 @@ Prevents the user from launching an application from a Tablet PC hardware button Prevents the user from launching an application from a Tablet PC hardware button. -- If you enable this policy, applications cannot be launched from a hardware button, and "Launch an application" is removed from the drop down menu for configuring button actions (in the Tablet PC Control Panel buttons tab). +- If you enable this policy, applications can't be launched from a hardware button, and "Launch an application" is removed from the drop down menu for configuring button actions (in the Tablet PC Control Panel buttons tab). - If you disable this policy, applications can be launched from a hardware button. -- If you do not configure this policy, applications can be launched from a hardware button. +- If you don't configure this policy, applications can be launched from a hardware button. @@ -982,13 +964,12 @@ Prevents the user from launching an application from a Tablet PC hardware button | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1015,7 +996,7 @@ Prevents the user from launching an application from a Tablet PC hardware button | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1028,11 +1009,11 @@ Prevents the user from launching an application from a Tablet PC hardware button Prevents press and hold actions on hardware buttons, so that only one action is available per button. -- If you enable this policy, press and hold actions are unavailable, and the button configuration dialog will display the following text: "Some settings are controlled by Group Policy. If a setting is unavailable, contact your system administrator." +- If you enable this policy, press and hold actions are unavailable, and the button configuration dialog will display the following text: "Some settings are controlled by Group Policy. If a setting is unavailable, contact your system administrator". - If you disable this policy, press and hold actions for buttons will be available. -- If you do not configure this policy, press and hold actions will be available. +- If you don't configure this policy, press and hold actions will be available. @@ -1044,13 +1025,12 @@ Prevents press and hold actions on hardware buttons, so that only one action is | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1077,7 +1057,7 @@ Prevents press and hold actions on hardware buttons, so that only one action is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1090,11 +1070,11 @@ Prevents press and hold actions on hardware buttons, so that only one action is Prevents press and hold actions on hardware buttons, so that only one action is available per button. -- If you enable this policy, press and hold actions are unavailable, and the button configuration dialog will display the following text: "Some settings are controlled by Group Policy. If a setting is unavailable, contact your system administrator." +- If you enable this policy, press and hold actions are unavailable, and the button configuration dialog will display the following text: "Some settings are controlled by Group Policy. If a setting is unavailable, contact your system administrator". - If you disable this policy, press and hold actions for buttons will be available. -- If you do not configure this policy, press and hold actions will be available. +- If you don't configure this policy, press and hold actions will be available. @@ -1106,13 +1086,12 @@ Prevents press and hold actions on hardware buttons, so that only one action is | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1139,7 +1118,7 @@ Prevents press and hold actions on hardware buttons, so that only one action is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1156,7 +1135,7 @@ Turns off Tablet PC hardware buttons. - If you disable this policy, user and OEM defined button actions will occur when the buttons are pressed. -- If you do not configure this policy, user and OEM defined button actions will occur when the buttons are pressed. +- If you don't configure this policy, user and OEM defined button actions will occur when the buttons are pressed. @@ -1168,13 +1147,12 @@ Turns off Tablet PC hardware buttons. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1201,7 +1179,7 @@ Turns off Tablet PC hardware buttons. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1218,7 +1196,7 @@ Turns off Tablet PC hardware buttons. - If you disable this policy, user and OEM defined button actions will occur when the buttons are pressed. -- If you do not configure this policy, user and OEM defined button actions will occur when the buttons are pressed. +- If you don't configure this policy, user and OEM defined button actions will occur when the buttons are pressed. @@ -1230,13 +1208,12 @@ Turns off Tablet PC hardware buttons. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1263,7 +1240,7 @@ Turns off Tablet PC hardware buttons. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1278,7 +1255,7 @@ Disables visual pen action feedback, except for press and hold feedback. - If you enable this policy, all visual pen action feedback is disabled except for press and hold feedback. Additionally, the mouse cursors are shown instead of the pen cursors. -- If you disable or do not configure this policy, visual feedback and pen cursors will be shown unless the user disables them in Control Panel. +- If you disable or don't configure this policy, visual feedback and pen cursors will be shown unless the user disables them in Control Panel. @@ -1290,13 +1267,12 @@ Disables visual pen action feedback, except for press and hold feedback. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1323,7 +1299,7 @@ Disables visual pen action feedback, except for press and hold feedback. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1338,7 +1314,7 @@ Disables visual pen action feedback, except for press and hold feedback. - If you enable this policy, all visual pen action feedback is disabled except for press and hold feedback. Additionally, the mouse cursors are shown instead of the pen cursors. -- If you disable or do not configure this policy, visual feedback and pen cursors will be shown unless the user disables them in Control Panel. +- If you disable or don't configure this policy, visual feedback and pen cursors will be shown unless the user disables them in Control Panel. @@ -1350,13 +1326,12 @@ Disables visual pen action feedback, except for press and hold feedback. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-taskbar.md b/windows/client-management/mdm/policy-csp-admx-taskbar.md index 5324e13ac0..0bb76d65e5 100644 --- a/windows/client-management/mdm/policy-csp-admx-taskbar.md +++ b/windows/client-management/mdm/policy-csp-admx-taskbar.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_Taskbar Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_Taskbar -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -50,9 +47,9 @@ This policy setting removes Notifications and Action Center from the notificatio The notification area is located at the far right end of the taskbar and includes icons for current notifications and the system clock. -- If this setting is enabled, Notifications and Action Center is not displayed in the notification area. The user will be able to read notifications when they appear, but they won't be able to review any notifications they miss. +- If this setting is enabled, Notifications and Action Center isn't displayed in the notification area. The user will be able to read notifications when they appear, but they won't be able to review any notifications they miss. -- If you disable or do not configure this policy setting, Notification and Security and Maintenance will be displayed on the taskbar. +- If you disable or don't configure this policy setting, Notification and Security and Maintenance will be displayed on the taskbar. A reboot is required for this policy setting to take effect. @@ -66,13 +63,12 @@ A reboot is required for this policy setting to take effect. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -99,7 +95,7 @@ A reboot is required for this policy setting to take effect. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -130,13 +126,12 @@ A reboot is required for this policy setting to take effect. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -163,7 +158,7 @@ A reboot is required for this policy setting to take effect. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -176,9 +171,9 @@ A reboot is required for this policy setting to take effect. This policy setting allows you to remove Security and Maintenance from the system control area. -- If you enable this policy setting, the Security and Maintenance icon is not displayed in the system notification area. +- If you enable this policy setting, the Security and Maintenance icon isn't displayed in the system notification area. -- If you disable or do not configure this policy setting, the Security and Maintenance icon is displayed in the system notification area. +- If you disable or don't configure this policy setting, the Security and Maintenance icon is displayed in the system notification area. @@ -190,13 +185,12 @@ This policy setting allows you to remove Security and Maintenance from the syste | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -223,7 +217,7 @@ This policy setting allows you to remove Security and Maintenance from the syste | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -236,9 +230,9 @@ This policy setting allows you to remove Security and Maintenance from the syste This policy setting allows you to remove the networking icon from the system control area. -- If you enable this policy setting, the networking icon is not displayed in the system notification area. +- If you enable this policy setting, the networking icon isn't displayed in the system notification area. -- If you disable or do not configure this policy setting, the networking icon is displayed in the system notification area. +- If you disable or don't configure this policy setting, the networking icon is displayed in the system notification area. @@ -250,13 +244,12 @@ This policy setting allows you to remove the networking icon from the system con | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -283,7 +276,7 @@ This policy setting allows you to remove the networking icon from the system con | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -296,9 +289,9 @@ This policy setting allows you to remove the networking icon from the system con This policy setting allows you to remove the battery meter from the system control area. -- If you enable this policy setting, the battery meter is not displayed in the system notification area. +- If you enable this policy setting, the battery meter isn't displayed in the system notification area. -- If you disable or do not configure this policy setting, the battery meter is displayed in the system notification area. +- If you disable or don't configure this policy setting, the battery meter is displayed in the system notification area. @@ -310,13 +303,12 @@ This policy setting allows you to remove the battery meter from the system contr | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -343,7 +335,7 @@ This policy setting allows you to remove the battery meter from the system contr | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -356,9 +348,9 @@ This policy setting allows you to remove the battery meter from the system contr This policy setting allows you to remove the volume control icon from the system control area. -- If you enable this policy setting, the volume control icon is not displayed in the system notification area. +- If you enable this policy setting, the volume control icon isn't displayed in the system notification area. -- If you disable or do not configure this policy setting, the volume control icon is displayed in the system notification area. +- If you disable or don't configure this policy setting, the volume control icon is displayed in the system notification area. @@ -370,13 +362,12 @@ This policy setting allows you to remove the volume control icon from the system | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -403,7 +394,7 @@ This policy setting allows you to remove the volume control icon from the system | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -416,9 +407,9 @@ This policy setting allows you to remove the volume control icon from the system This policy setting allows you to turn off feature advertisement balloon notifications. -If you enable this policy setting, certain notification balloons that are marked as feature advertisements are not shown. +If you enable this policy setting, certain notification balloons that are marked as feature advertisements aren't shown. -If you disable do not configure this policy setting, feature advertisement balloons are shown. +If you disable don't configure this policy setting, feature advertisement balloons are shown. @@ -430,13 +421,12 @@ If you disable do not configure this policy setting, feature advertisement ballo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -463,7 +453,7 @@ If you disable do not configure this policy setting, feature advertisement ballo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -476,9 +466,9 @@ If you disable do not configure this policy setting, feature advertisement ballo This policy setting allows you to control pinning the Store app to the Taskbar. -- If you enable this policy setting, users cannot pin the Store app to the Taskbar. If the Store app is already pinned to the Taskbar, it will be removed from the Taskbar on next login. +- If you enable this policy setting, users can't pin the Store app to the Taskbar. If the Store app is already pinned to the Taskbar, it will be removed from the Taskbar on next login. -- If you disable or do not configure this policy setting, users can pin the Store app to the Taskbar. +- If you disable or don't configure this policy setting, users can pin the Store app to the Taskbar. @@ -490,13 +480,12 @@ This policy setting allows you to control pinning the Store app to the Taskbar. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -523,7 +512,7 @@ This policy setting allows you to control pinning the Store app to the Taskbar. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -536,9 +525,9 @@ This policy setting allows you to control pinning the Store app to the Taskbar. This policy setting allows you to control pinning items in Jump Lists. -- If you enable this policy setting, users cannot pin files, folders, websites, or other items to their Jump Lists in the Start Menu and Taskbar. Users also cannot unpin existing items pinned to their Jump Lists. Existing items already pinned to their Jump Lists will continue to show. +- If you enable this policy setting, users can't pin files, folders, websites, or other items to their Jump Lists in the Start Menu and Taskbar. Users also can't unpin existing items pinned to their Jump Lists. Existing items already pinned to their Jump Lists will continue to show. -- If you disable or do not configure this policy setting, users can pin files, folders, websites, and other items to a program's Jump List so that the items is always present in this menu. +- If you disable or don't configure this policy setting, users can pin files, folders, websites, and other items to a program's Jump List so that the items is always present in this menu. @@ -550,13 +539,12 @@ This policy setting allows you to control pinning items in Jump Lists. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -583,7 +571,7 @@ This policy setting allows you to control pinning items in Jump Lists. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -596,9 +584,9 @@ This policy setting allows you to control pinning items in Jump Lists. This policy setting allows you to control pinning programs to the Taskbar. -- If you enable this policy setting, users cannot change the programs currently pinned to the Taskbar. If any programs are already pinned to the Taskbar, these programs continue to show in the Taskbar. However, users cannot unpin these programs already pinned to the Taskbar, and they cannot pin new programs to the Taskbar. +- If you enable this policy setting, users can't change the programs currently pinned to the Taskbar. If any programs are already pinned to the Taskbar, these programs continue to show in the Taskbar. However, users can't unpin these programs already pinned to the Taskbar, and they can't pin new programs to the Taskbar. -- If you disable or do not configure this policy setting, users can change the programs currently pinned to the Taskbar. +- If you disable or don't configure this policy setting, users can change the programs currently pinned to the Taskbar. @@ -610,13 +598,12 @@ This policy setting allows you to control pinning programs to the Taskbar. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -643,7 +630,7 @@ This policy setting allows you to control pinning programs to the Taskbar. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -658,12 +645,12 @@ This policy setting allows you to control displaying or tracking items in Jump L The Start Menu and Taskbar display Jump Lists off of programs. These menus include files, folders, websites and other relevant items for that program. This helps users more easily reopen their most important documents and other tasks. -- If you enable this policy setting, the Start Menu and Taskbar only track the files that the user opens locally on this computer. Files that the user opens over the network from remote computers are not tracked or shown in the Jump Lists. Use this setting to reduce network traffic, particularly over slow network connections. +- If you enable this policy setting, the Start Menu and Taskbar only track the files that the user opens locally on this computer. Files that the user opens over the network from remote computers aren't tracked or shown in the Jump Lists. Use this setting to reduce network traffic, particularly over slow network connections. -- If you disable or do not configure this policy setting, all files that the user opens appear in the menus, including files located remotely on another computer. +- If you disable or don't configure this policy setting, all files that the user opens appear in the menus, including files located remotely on another computer. > [!NOTE] -> This setting does not prevent Windows from displaying remote files that the user has explicitly pinned to the Jump Lists. See the "Do not allow pinning items in Jump Lists" policy setting. +> This setting doesn't prevent Windows from displaying remote files that the user has explicitly pinned to the Jump Lists. See the "Do not allow pinning items in Jump Lists" policy setting. @@ -675,13 +662,12 @@ The Start Menu and Taskbar display Jump Lists off of programs. These menus inclu | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -708,7 +694,7 @@ The Start Menu and Taskbar display Jump Lists off of programs. These menus inclu | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -721,9 +707,9 @@ The Start Menu and Taskbar display Jump Lists off of programs. These menus inclu This policy setting allows you to turn off automatic promotion of notification icons to the taskbar. -- If you enable this policy setting, newly added notification icons are not temporarily promoted to the Taskbar. Users can still configure icons to be shown or hidden in the Notification Control Panel. +- If you enable this policy setting, newly added notification icons aren't temporarily promoted to the Taskbar. Users can still configure icons to be shown or hidden in the Notification Control Panel. -- If you disable or do not configure this policy setting, newly added notification icons are temporarily promoted to the Taskbar. +- If you disable or don't configure this policy setting, newly added notification icons are temporarily promoted to the Taskbar. @@ -735,13 +721,12 @@ This policy setting allows you to turn off automatic promotion of notification i | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -768,7 +753,7 @@ This policy setting allows you to turn off automatic promotion of notification i | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -797,13 +782,12 @@ This policy setting allows users to see Windows Store apps on the taskbar. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -830,7 +814,7 @@ This policy setting allows users to see Windows Store apps on the taskbar. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -843,9 +827,9 @@ This policy setting allows users to see Windows Store apps on the taskbar. This policy setting allows you to lock all taskbar settings. -- If you enable this policy setting, the user cannot access the taskbar control panel. The user is also unable to resize, move or rearrange toolbars on their taskbar. +- If you enable this policy setting, the user can't access the taskbar control panel. The user is also unable to resize, move or rearrange toolbars on their taskbar. -- If you disable or do not configure this policy setting, the user will be able to set any taskbar setting that is not prevented by another policy setting. +- If you disable or don't configure this policy setting, the user will be able to set any taskbar setting that isn't prevented by another policy setting. @@ -857,13 +841,12 @@ This policy setting allows you to lock all taskbar settings. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -890,7 +873,7 @@ This policy setting allows you to lock all taskbar settings. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -903,9 +886,9 @@ This policy setting allows you to lock all taskbar settings. This policy setting allows you to prevent users from adding or removing toolbars. -- If you enable this policy setting, the user is not allowed to add or remove any toolbars to the taskbar. Applications are not able to add toolbars either. +- If you enable this policy setting, the user isn't allowed to add or remove any toolbars to the taskbar. Applications aren't able to add toolbars either. -- If you disable or do not configure this policy setting, the users and applications are able to add toolbars to the taskbar. +- If you disable or don't configure this policy setting, the users and applications are able to add toolbars to the taskbar. @@ -917,13 +900,12 @@ This policy setting allows you to prevent users from adding or removing toolbars | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -950,7 +932,7 @@ This policy setting allows you to prevent users from adding or removing toolbars | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -963,9 +945,9 @@ This policy setting allows you to prevent users from adding or removing toolbars This policy setting allows you to prevent users from rearranging toolbars. -- If you enable this policy setting, users are not able to drag or drop toolbars to the taskbar. +- If you enable this policy setting, users aren't able to drag or drop toolbars to the taskbar. -- If you disable or do not configure this policy setting, users are able to rearrange the toolbars on the taskbar. +- If you disable or don't configure this policy setting, users are able to rearrange the toolbars on the taskbar. @@ -977,13 +959,12 @@ This policy setting allows you to prevent users from rearranging toolbars. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1010,7 +991,7 @@ This policy setting allows you to prevent users from rearranging toolbars. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1023,9 +1004,9 @@ This policy setting allows you to prevent users from rearranging toolbars. This policy setting allows you to prevent taskbars from being displayed on more than one monitor. -- If you enable this policy setting, users are not able to show taskbars on more than one display. The multiple display section is not enabled in the taskbar properties dialog. +- If you enable this policy setting, users aren't able to show taskbars on more than one display. The multiple display section isn't enabled in the taskbar properties dialog. -- If you disable or do not configure this policy setting, users can show taskbars on more than one display. +- If you disable or don't configure this policy setting, users can show taskbars on more than one display. @@ -1037,13 +1018,12 @@ This policy setting allows you to prevent taskbars from being displayed on more | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1070,7 +1050,7 @@ This policy setting allows you to prevent taskbars from being displayed on more | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1085,7 +1065,7 @@ This policy setting allows you to turn off all notification balloons. - If you enable this policy setting, no notification balloons are shown to the user. -- If you disable or do not configure this policy setting, notification balloons are shown to the user. +- If you disable or don't configure this policy setting, notification balloons are shown to the user. @@ -1097,13 +1077,12 @@ This policy setting allows you to turn off all notification balloons. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1130,7 +1109,7 @@ This policy setting allows you to turn off all notification balloons. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1147,9 +1126,9 @@ This policy setting allows you to turn off all notification balloons. This policy setting allows you to remove pinned programs from the taskbar. -- If you enable this policy setting, pinned programs are prevented from being shown on the Taskbar. Users cannot pin programs to the Taskbar. +- If you enable this policy setting, pinned programs are prevented from being shown on the Taskbar. Users can't pin programs to the Taskbar. -- If you disable or do not configure this policy setting, users can pin programs so that the program shortcuts stay on the Taskbar. +- If you disable or don't configure this policy setting, users can pin programs so that the program shortcuts stay on the Taskbar. @@ -1161,13 +1140,12 @@ This policy setting allows you to remove pinned programs from the taskbar. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1194,7 +1172,7 @@ This policy setting allows you to remove pinned programs from the taskbar. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1207,9 +1185,9 @@ This policy setting allows you to remove pinned programs from the taskbar. This policy setting allows you to prevent users from moving taskbar to another screen dock location. -- If you enable this policy setting, users are not able to drag their taskbar to another area of the monitor(s). +- If you enable this policy setting, users aren't able to drag their taskbar to another area of the monitor(s). -- If you disable or do not configure this policy setting, users are able to drag their taskbar to another area of the monitor unless prevented by another policy setting. +- If you disable or don't configure this policy setting, users are able to drag their taskbar to another area of the monitor unless prevented by another policy setting. @@ -1221,13 +1199,12 @@ This policy setting allows you to prevent users from moving taskbar to another s | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1254,7 +1231,7 @@ This policy setting allows you to prevent users from moving taskbar to another s | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1267,9 +1244,9 @@ This policy setting allows you to prevent users from moving taskbar to another s This policy setting allows you to prevent users from resizing the taskbar. -- If you enable this policy setting, users are not be able to resize their taskbar. +- If you enable this policy setting, users aren't be able to resize their taskbar. -- If you disable or do not configure this policy setting, users are able to resize their taskbar unless prevented by another setting. +- If you disable or don't configure this policy setting, users are able to resize their taskbar unless prevented by another setting. @@ -1281,13 +1258,12 @@ This policy setting allows you to prevent users from resizing the taskbar. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1314,7 +1290,7 @@ This policy setting allows you to prevent users from resizing the taskbar. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1327,9 +1303,9 @@ This policy setting allows you to prevent users from resizing the taskbar. This policy setting allows you to turn off taskbar thumbnails. -- If you enable this policy setting, the taskbar thumbnails are not displayed and the system uses standard text for the tooltips. +- If you enable this policy setting, the taskbar thumbnails aren't displayed and the system uses standard text for the tooltips. -- If you disable or do not configure this policy setting, the taskbar thumbnails are displayed. +- If you disable or don't configure this policy setting, the taskbar thumbnails are displayed. @@ -1341,13 +1317,12 @@ This policy setting allows you to turn off taskbar thumbnails. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-tcpip.md b/windows/client-management/mdm/policy-csp-admx-tcpip.md index 07885bdc4a..b532bdadd9 100644 --- a/windows/client-management/mdm/policy-csp-admx-tcpip.md +++ b/windows/client-management/mdm/policy-csp-admx-tcpip.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_tcpip Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_tcpip -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -42,11 +39,11 @@ ms.topic: reference -This policy setting allows you to specify a 6to4 relay name for a 6to4 host. A 6to4 relay is used as a default gateway for IPv6 network traffic sent by the 6to4 host. The 6to4 relay name setting has no effect if 6to4 connectivity is not available on the host. +This policy setting allows you to specify a 6to4 relay name for a 6to4 host. A 6to4 relay is used as a default gateway for IPv6 network traffic sent by the 6to4 host. The 6to4 relay name setting has no effect if 6to4 connectivity isn't available on the host. - If you enable this policy setting, you can specify a relay name for a 6to4 host. -- If you disable or do not configure this policy setting, the local host setting is used, and you cannot specify a relay name for a 6to4 host. +- If you disable or don't configure this policy setting, the local host setting is used, and you can't specify a relay name for a 6to4 host. @@ -58,13 +55,12 @@ This policy setting allows you to specify a 6to4 relay name for a 6to4 host. A 6 | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -90,7 +86,7 @@ This policy setting allows you to specify a 6to4 relay name for a 6to4 host. A 6 | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -101,11 +97,11 @@ This policy setting allows you to specify a 6to4 relay name for a 6to4 host. A 6 -This policy setting allows you to specify the interval at which the relay name is resolved. The 6to4 relay name resolution interval setting has no effect if 6to4 connectivity is not available on the host. +This policy setting allows you to specify the interval at which the relay name is resolved. The 6to4 relay name resolution interval setting has no effect if 6to4 connectivity isn't available on the host. - If you enable this policy setting, you can specify the value for the duration at which the relay name is resolved periodically. -- If you disable or do not configure this policy setting, the local host setting is used. +- If you disable or don't configure this policy setting, the local host setting is used. @@ -117,13 +113,12 @@ This policy setting allows you to specify the interval at which the relay name i | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -149,7 +144,7 @@ This policy setting allows you to specify the interval at which the relay name i | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -160,17 +155,17 @@ This policy setting allows you to specify the interval at which the relay name i -This policy setting allows you to configure 6to4, an address assignment and router-to-router automatic tunneling technology that is used to provide unicast IPv6 connectivity between IPv6 sites and hosts across the IPv4 Internet. 6to4 uses the global address prefix: 2002:WWXX:YYZZ::/48 in which the letters are a hexadecimal representation of the global IPv4 address (w.x.y.z) assigned to a site. +This policy setting allows you to configure 6to4, an address assignment and router-to-router automatic tunneling technology that's used to provide unicast IPv6 connectivity between IPv6 sites and hosts across the IPv4 Internet. 6to4 uses the global address prefix: 2002:WWXX:YYZZ::/48 in which the letters are a hexadecimal representation of the global IPv4 address (w.x.y.z) assigned to a site. -- If you disable or do not configure this policy setting, the local host setting is used. +- If you disable or don't configure this policy setting, the local host setting is used. - If you enable this policy setting, you can configure 6to4 with one of the following settings: -Policy Default State: 6to4 is turned off and connectivity with 6to4 will not be available. +Policy Default State: 6to4 is turned off and connectivity with 6to4 won't be available. -Policy Enabled State: If a global IPv4 address is present, the host will have a 6to4 interface. If no global IPv4 address is present, the host will not have a 6to4 interface. +Policy Enabled State: If a global IPv4 address is present, the host will have a 6to4 interface. If no global IPv4 address is present, the host won't have a 6to4 interface. -Policy Disabled State: 6to4 is turned off and connectivity with 6to4 will not be available. +Policy Disabled State: 6to4 is turned off and connectivity with 6to4 won't be available. @@ -182,13 +177,12 @@ Policy Disabled State: 6to4 is turned off and connectivity with 6to4 will not be | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -214,7 +208,7 @@ Policy Disabled State: 6to4 is turned off and connectivity with 6to4 will not be | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -227,9 +221,9 @@ Policy Disabled State: 6to4 is turned off and connectivity with 6to4 will not be This policy setting allows you to configure IP Stateless Autoconfiguration Limits. -- If you enable or do not configure this policy setting, IP Stateless Autoconfiguration Limits will be enabled and system will limit the number of autoconfigured addresses and routes. +- If you enable or don't configure this policy setting, IP Stateless Autoconfiguration Limits will be enabled and system will limit the number of autoconfigured addresses and routes. -- If you disable this policy setting, IP Stateless Autoconfiguration Limits will be disabled and system will not limit the number of autoconfigured addresses and routes. +- If you disable this policy setting, IP Stateless Autoconfiguration Limits will be disabled and system won't limit the number of autoconfigured addresses and routes. @@ -241,13 +235,12 @@ This policy setting allows you to configure IP Stateless Autoconfiguration Limit | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -274,7 +267,7 @@ This policy setting allows you to configure IP Stateless Autoconfiguration Limit | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -287,9 +280,9 @@ This policy setting allows you to configure IP Stateless Autoconfiguration Limit This policy setting allows you to configure IP-HTTPS, a tunneling technology that uses the HTTPS protocol to provide IP connectivity to a remote network. -- If you disable or do not configure this policy setting, the local host settings are used. +- If you disable or don't configure this policy setting, the local host settings are used. -- If you enable this policy setting, you can specify an IP-HTTPS server URL. You will be able to configure IP-HTTPS with one of the following settings: +- If you enable this policy setting, you can specify an IP-HTTPS server URL. You'll be able to configure IP-HTTPS with one of the following settings: Policy Default State: The IP-HTTPS interface is used when there are no other connectivity options. @@ -307,13 +300,12 @@ Policy Disabled State: No IP-HTTPS interfaces are present on the host. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -339,7 +331,7 @@ Policy Disabled State: No IP-HTTPS interfaces are present on the host. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -352,9 +344,9 @@ Policy Disabled State: No IP-HTTPS interfaces are present on the host. This policy setting allows you to specify a router name or Internet Protocol version 4 (IPv4) address for an ISATAP router. -- If you enable this policy setting, you can specify a router name or IPv4 address for an ISATAP router. If you enter an IPv4 address of the ISATAP router in the text box, DNS services are not required. +- If you enable this policy setting, you can specify a router name or IPv4 address for an ISATAP router. If you enter an IPv4 address of the ISATAP router in the text box, DNS services aren't required. -- If you disable or do not configure this policy setting, the local host setting is used. +- If you disable or don't configure this policy setting, the local host setting is used. @@ -366,13 +358,12 @@ This policy setting allows you to specify a router name or Internet Protocol ver | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -398,7 +389,7 @@ This policy setting allows you to specify a router name or Internet Protocol ver | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -409,15 +400,15 @@ This policy setting allows you to specify a router name or Internet Protocol ver -This policy setting allows you to configure Intra-Site Automatic Tunnel Addressing Protocol (ISATAP), an address-to-router and host-to-host, host-to-router and router-to-host automatic tunneling technology that is used to provide unicast IPv6 connectivity between IPv6 hosts across an IPv4 intranet. +This policy setting allows you to configure Intra-Site Automatic Tunnel Addressing Protocol (ISATAP), an address-to-router and host-to-host, host-to-router and router-to-host automatic tunneling technology that's used to provide unicast IPv6 connectivity between IPv6 hosts across an IPv4 intranet. -- If you disable or do not configure this policy setting, the local host setting is used. +- If you disable or don't configure this policy setting, the local host setting is used. - If you enable this policy setting, you can configure ISATAP with one of the following settings: Policy Default State: No ISATAP interfaces are present on the host. -Policy Enabled State: If the ISATAP name is resolved successfully, the host will have ISATAP configured with a link-local address and an address for each prefix received from the ISATAP router through stateless address auto-configuration. If the ISATAP name is not resolved successfully, the host will have an ISATAP interface configured with a link-local address. +Policy Enabled State: If the ISATAP name is resolved successfully, the host will have ISATAP configured with a link-local address and an address for each prefix received from the ISATAP router through stateless address auto-configuration. If the ISATAP name isn't resolved successfully, the host will have an ISATAP interface configured with a link-local address. Policy Disabled State: No ISATAP interfaces are present on the host. @@ -431,13 +422,12 @@ Policy Disabled State: No ISATAP interfaces are present on the host. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -463,7 +453,7 @@ Policy Disabled State: No ISATAP interfaces are present on the host. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -474,11 +464,11 @@ Policy Disabled State: No ISATAP interfaces are present on the host. -This policy setting allows you to select the UDP port the Teredo client will use to send packets. If you leave the default of 0, the operating system will select a port (recommended). If you select a UDP port that is already in use by a system, the Teredo client will fail to initialize. +This policy setting allows you to select the UDP port the Teredo client will use to send packets. If you leave the default of 0, the operating system will select a port (recommended). If you select a UDP port that's already in use by a system, the Teredo client will fail to initialize. - If you enable this policy setting, you can customize a UDP port for the Teredo client. -- If you disable or do not configure this policy setting, the local host setting is used. +- If you disable or don't configure this policy setting, the local host setting is used. @@ -490,13 +480,12 @@ This policy setting allows you to select the UDP port the Teredo client will use | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -522,7 +511,7 @@ This policy setting allows you to select the UDP port the Teredo client will use | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -535,7 +524,7 @@ This policy setting allows you to select the UDP port the Teredo client will use This policy setting allows you to set Teredo to be ready to communicate, a process referred to as qualification. By default, Teredo enters a dormant state when not in use. The qualification process brings it out of a dormant state. -If you disable or do not configure this policy setting, the local host setting is used. +If you disable or don't configure this policy setting, the local host setting is used. This policy setting contains only one state: @@ -551,13 +540,12 @@ Policy Enabled State: If Default Qualified is enabled, Teredo will attempt quali | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -583,7 +571,7 @@ Policy Enabled State: If Default Qualified is enabled, Teredo will attempt quali | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -601,7 +589,7 @@ This policy setting allows you to configure the Teredo refresh rate. - If you enable this policy setting, you can specify the refresh rate. If you choose a refresh rate longer than the port mapping in the Teredo client's NAT device, Teredo might stop working or connectivity might be intermittent. -- If you disable or do not configure this policy setting, the refresh rate is configured using the local settings on the computer. The default refresh rate is 30 seconds. +- If you disable or don't configure this policy setting, the refresh rate is configured using the local settings on the computer. The default refresh rate is 30 seconds. @@ -613,13 +601,12 @@ This policy setting allows you to configure the Teredo refresh rate. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -645,7 +632,7 @@ This policy setting allows you to configure the Teredo refresh rate. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -660,7 +647,7 @@ This policy setting allows you to specify the name of the Teredo server. This se - If you enable this policy setting, you can specify a Teredo server name that applies to a Teredo client. -- If you disable or do not configure this policy setting, the local settings on the computer are used to determine the Teredo server name. +- If you disable or don't configure this policy setting, the local settings on the computer are used to determine the Teredo server name. @@ -672,13 +659,12 @@ This policy setting allows you to specify the name of the Teredo server. This se | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -704,7 +690,7 @@ This policy setting allows you to specify the name of the Teredo server. This se | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -717,15 +703,15 @@ This policy setting allows you to specify the name of the Teredo server. This se This policy setting allows you to configure Teredo, an address assignment and automatic tunneling technology that provides unicast IPv6 connectivity across the IPv4 Internet. -- If you disable or do not configure this policy setting, the local host settings are used. +- If you disable or don't configure this policy setting, the local host settings are used. - If you enable this policy setting, you can configure Teredo with one of the following settings: -Default: The default state is "Client." +Default: The default state is "Client". Disabled: No Teredo interfaces are present on the host. -Client: The Teredo interface is present only when the host is not on a network that includes a domain controller. +Client: The Teredo interface is present only when the host isn't on a network that includes a domain controller. Enterprise Client: The Teredo interface is always present, even if the host is on a network that includes a domain controller. @@ -739,13 +725,12 @@ Enterprise Client: The Teredo interface is always present, even if the host is o | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -771,7 +756,7 @@ Enterprise Client: The Teredo interface is always present, even if the host is o | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -784,11 +769,11 @@ Enterprise Client: The Teredo interface is always present, even if the host is o This policy setting allows you to configure Window Scaling Heuristics. Window Scaling Heuristics is an algorithm to identify connectivity and throughput problems caused by many Firewalls and other middle boxes that don't interpret Window Scaling option correctly. -- If you do not configure this policy setting, the local host settings are used. +- If you don't configure this policy setting, the local host settings are used. - If you enable this policy setting, Window Scaling Heuristics will be enabled and system will try to identify connectivity and throughput problems and take appropriate measures. -- If you disable this policy setting, Window Scaling Heuristics will be disabled and system will not try to identify connectivity and throughput problems casued by Firewalls or other middle boxes. +- If you disable this policy setting, Window Scaling Heuristics will be disabled and system won't try to identify connectivity and throughput problems casued by Firewalls or other middle boxes. @@ -800,13 +785,12 @@ This policy setting allows you to configure Window Scaling Heuristics. Window Sc | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-terminalserver.md b/windows/client-management/mdm/policy-csp-admx-terminalserver.md index 31bdd76413..a372de4237 100644 --- a/windows/client-management/mdm/policy-csp-admx-terminalserver.md +++ b/windows/client-management/mdm/policy-csp-admx-terminalserver.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_TerminalServer Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_TerminalServer -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -48,7 +45,7 @@ If the status is set to Enabled, automatic reconnection is attempted for all cli If the status is set to Disabled, automatic reconnection of clients is prohibited. -If the status is set to Not Configured, automatic reconnection is not specified at the Group Policy level. However, users can configure automatic reconnection using the "Reconnect if connection is dropped" checkbox on the Experience tab in Remote Desktop Connection. +If the status is set to Not Configured, automatic reconnection isn't specified at the Group Policy level. However, users can configure automatic reconnection using the "Reconnect if connection is dropped" checkbox on the Experience tab in Remote Desktop Connection. @@ -60,13 +57,12 @@ If the status is set to Not Configured, automatic reconnection is not specified | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -93,7 +89,7 @@ If the status is set to Not Configured, automatic reconnection is not specified | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -108,9 +104,9 @@ This policy setting lets you control the redirection of video capture devices to By default, Remote Desktop Services allows redirection of video capture devices. -- If you enable this policy setting, users cannot redirect their video capture devices to the remote computer. +- If you enable this policy setting, users can't redirect their video capture devices to the remote computer. -- If you disable or do not configure this policy setting, users can redirect their video capture devices to the remote computer. Users can use the More option on the Local Resources tab of Remote Desktop Connection to choose the video capture devices to redirect to the remote computer. +- If you disable or don't configure this policy setting, users can redirect their video capture devices to the remote computer. Users can use the More option on the Local Resources tab of Remote Desktop Connection to choose the video capture devices to redirect to the remote computer. @@ -122,13 +118,12 @@ By default, Remote Desktop Services allows redirection of video capture devices. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -155,7 +150,7 @@ By default, Remote Desktop Services allows redirection of video capture devices. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -170,11 +165,11 @@ This policy setting allows you to specify the name of the certificate template t A certificate is needed to authenticate an RD Session Host server when TLS 1.0, 1.1 or 1.2 is used to secure communication between a client and an RD Session Host server during RDP connections. -- If you enable this policy setting, you need to specify a certificate template name. Only certificates created by using the specified certificate template will be considered when a certificate to authenticate the RD Session Host server is automatically selected. Automatic certificate selection only occurs when a specific certificate has not been selected. +- If you enable this policy setting, you need to specify a certificate template name. Only certificates created by using the specified certificate template will be considered when a certificate to authenticate the RD Session Host server is automatically selected. Automatic certificate selection only occurs when a specific certificate hasn't been selected. If no certificate can be found that was created with the specified certificate template, the RD Session Host server will issue a certificate enrollment request and will use the current certificate until the request is completed. If more than one certificate is found that was created with the specified certificate template, the certificate that will expire latest and that matches the current name of the RD Session Host server will be selected. -- If you disable or do not configure this policy, the certificate template name is not specified at the Group Policy level. By default, a self-signed certificate is used to authenticate the RD Session Host server. +- If you disable or don't configure this policy, the certificate template name isn't specified at the Group Policy level. By default, a self-signed certificate is used to authenticate the RD Session Host server. > [!NOTE] > If you select a specific certificate to be used to authenticate the RD Session Host server, that certificate will take precedence over this policy setting. @@ -189,13 +184,12 @@ If no certificate can be found that was created with the specified certificate t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -221,7 +215,7 @@ If no certificate can be found that was created with the specified certificate t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -234,12 +228,13 @@ If no certificate can be found that was created with the specified certificate t This policy setting allows you to specify whether users can run Remote Desktop Protocol (.rdp) files from a publisher that signed the file with a valid certificate. A valid certificate is one issued by an authority recognized by the client, such as the issuers in the client's Third-Party Root Certification Authorities certificate store. This policy setting also controls whether the user can start an RDP session by using default .rdp settings (for example, when a user directly opens the Remote Desktop Connection [RDC] client without specifying an .rdp file). -- If you enable or do not configure this policy setting, users can run .rdp files that are signed with a valid certificate. Users can also start an RDP session with default .rdp settings by directly opening the RDC client. When a user starts an RDP session, the user is asked to confirm whether they want to connect. +- If you enable or don't configure this policy setting, users can run .rdp files that are signed with a valid certificate. Users can also start an RDP session with default .rdp settings by directly opening the RDC client. When a user starts an RDP session, the user is asked to confirm whether they want to connect. -- If you disable this policy setting, users cannot run .rdp files that are signed with a valid certificate. Additionally, users cannot start an RDP session by directly opening the RDC client and specifying the remote computer name. When a user tries to start an RDP session, the user receives a message that the publisher has been blocked. +- If you disable this policy setting, users can't run .rdp files that are signed with a valid certificate. Additionally, users can't start an RDP session by directly opening the RDC client and specifying the remote computer name. When a user tries to start an RDP session, the user receives a message that the publisher has been blocked. > [!NOTE] > You can define this policy setting in the Computer Configuration node or in the User Configuration node. + - If you configure this policy setting for the computer, all users on the computer are affected. @@ -252,13 +247,12 @@ This policy setting allows you to specify whether users can run Remote Desktop P | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -285,7 +279,7 @@ This policy setting allows you to specify whether users can run Remote Desktop P | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -296,14 +290,15 @@ This policy setting allows you to specify whether users can run Remote Desktop P -This policy setting allows you to specify whether users can run Remote Desktop Protocol (.rdp) files from a publisher that signed the file with a valid certificate. A valid certificate is one that is issued by an authority recognized by the client, such as the issuers in the client's Third-Party Root Certification Authorities certificate store. This policy setting also controls whether the user can start an RDP session by using default .rdp settings (for example, when a user directly opens the Remote Desktop Connection [RDC] client without specifying an .rdp file). +This policy setting allows you to specify whether users can run Remote Desktop Protocol (.rdp) files from a publisher that signed the file with a valid certificate. A valid certificate is one that's issued by an authority recognized by the client, such as the issuers in the client's Third-Party Root Certification Authorities certificate store. This policy setting also controls whether the user can start an RDP session by using default .rdp settings (for example, when a user directly opens the Remote Desktop Connection [RDC] client without specifying an .rdp file). -- If you enable or do not configure this policy setting, users can run .rdp files that are signed with a valid certificate. Users can also start an RDP session with default .rdp settings by directly opening the RDC client. When a user starts an RDP session, the user is asked to confirm whether they want to connect. +- If you enable or don't configure this policy setting, users can run .rdp files that are signed with a valid certificate. Users can also start an RDP session with default .rdp settings by directly opening the RDC client. When a user starts an RDP session, the user is asked to confirm whether they want to connect. -- If you disable this policy setting, users cannot run .rdp files that are signed with a valid certificate. Additionally, users cannot start an RDP session by directly opening the RDC client and specifying the remote computer name. When a user tries to start an RDP session, the user receives a message that the publisher has been blocked. +- If you disable this policy setting, users can't run .rdp files that are signed with a valid certificate. Additionally, users can't start an RDP session by directly opening the RDC client and specifying the remote computer name. When a user tries to start an RDP session, the user receives a message that the publisher has been blocked. > [!NOTE] > You can define this policy setting in the Computer Configuration node or in the User Configuration node. + - If you configure this policy setting for the computer, all users on the computer are affected. @@ -316,13 +311,12 @@ This policy setting allows you to specify whether users can run Remote Desktop P | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -349,7 +343,7 @@ This policy setting allows you to specify whether users can run Remote Desktop P | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -362,9 +356,9 @@ This policy setting allows you to specify whether users can run Remote Desktop P This policy setting allows you to specify whether users can run unsigned Remote Desktop Protocol (.rdp) files and .rdp files from unknown publishers on the client computer. -- If you enable or do not configure this policy setting, users can run unsigned .rdp files and .rdp files from unknown publishers on the client computer. Before a user starts an RDP session, the user receives a warning message and is asked to confirm whether they want to connect. +- If you enable or don't configure this policy setting, users can run unsigned .rdp files and .rdp files from unknown publishers on the client computer. Before a user starts an RDP session, the user receives a warning message and is asked to confirm whether they want to connect. -- If you disable this policy setting, users cannot run unsigned .rdp files and .rdp files from unknown publishers on the client computer. If the user tries to start an RDP session, the user receives a message that the publisher has been blocked. +- If you disable this policy setting, users can't run unsigned .rdp files and .rdp files from unknown publishers on the client computer. If the user tries to start an RDP session, the user receives a message that the publisher has been blocked. @@ -376,13 +370,12 @@ This policy setting allows you to specify whether users can run unsigned Remote | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -409,7 +402,7 @@ This policy setting allows you to specify whether users can run unsigned Remote | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -422,9 +415,9 @@ This policy setting allows you to specify whether users can run unsigned Remote This policy setting allows you to specify whether users can run unsigned Remote Desktop Protocol (.rdp) files and .rdp files from unknown publishers on the client computer. -- If you enable or do not configure this policy setting, users can run unsigned .rdp files and .rdp files from unknown publishers on the client computer. Before a user starts an RDP session, the user receives a warning message and is asked to confirm whether they want to connect. +- If you enable or don't configure this policy setting, users can run unsigned .rdp files and .rdp files from unknown publishers on the client computer. Before a user starts an RDP session, the user receives a warning message and is asked to confirm whether they want to connect. -- If you disable this policy setting, users cannot run unsigned .rdp files and .rdp files from unknown publishers on the client computer. If the user tries to start an RDP session, the user receives a message that the publisher has been blocked. +- If you disable this policy setting, users can't run unsigned .rdp files and .rdp files from unknown publishers on the client computer. If the user tries to start an RDP session, the user receives a message that the publisher has been blocked. @@ -436,13 +429,12 @@ This policy setting allows you to specify whether users can run unsigned Remote | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -469,7 +461,7 @@ This policy setting allows you to specify whether users can run unsigned Remote | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -481,15 +473,16 @@ This policy setting allows you to specify whether users can run unsigned Remote This policy setting allows you to specify whether users can redirect the remote computer's audio and video output in a Remote Desktop Services session. + Users can specify where to play the remote computer's audio output by configuring the remote audio settings on the Local Resources tab in Remote Desktop Connection (RDC). Users can choose to play the remote audio on the remote computer or on the local computer. Users can also choose to not play the audio. Video playback can be configured by using the videoplayback setting in a Remote Desktop Protocol (.rdp) file. By default, video playback is enabled. -By default, audio and video playback redirection is not allowed when connecting to a computer running Windows Server 2008 R2, Windows Server 2008, or Windows Server 2003. Audio and video playback redirection is allowed by default when connecting to a computer running Windows 8, Windows Server 2012, Windows 7, Windows Vista, or Windows XP Professional. +By default, audio and video playback redirection isn't allowed when connecting to a computer running Windows Server 2008 R2, Windows Server 2008, or Windows Server 2003. Audio and video playback redirection is allowed by default when connecting to a computer running Windows 8, Windows Server 2012, Windows 7, Windows Vista, or Windows XP Professional. - If you enable this policy setting, audio and video playback redirection is allowed. -- If you disable this policy setting, audio and video playback redirection is not allowed, even if audio playback redirection is specified in RDC, or video playback is specified in the .rdp file. +- If you disable this policy setting, audio and video playback redirection isn't allowed, even if audio playback redirection is specified in RDC, or video playback is specified in the .rdp file. -- If you do not configure this policy setting audio and video playback redirection is not specified at the Group Policy level. +- If you don't configure this policy setting audio and video playback redirection isn't specified at the Group Policy level. @@ -501,13 +494,12 @@ By default, audio and video playback redirection is not allowed when connecting | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -534,7 +526,7 @@ By default, audio and video playback redirection is not allowed when connecting | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -546,15 +538,16 @@ By default, audio and video playback redirection is not allowed when connecting This policy setting allows you to specify whether users can record audio to the remote computer in a Remote Desktop Services session. + Users can specify whether to record audio to the remote computer by configuring the remote audio settings on the Local Resources tab in Remote Desktop Connection (RDC). Users can record audio by using an audio input device on the local computer, such as a built-in microphone. -By default, audio recording redirection is not allowed when connecting to a computer running Windows Server 2008 R2. Audio recording redirection is allowed by default when connecting to a computer running at least Windows 7, or Windows Server 2008 R2. +By default, audio recording redirection isn't allowed when connecting to a computer running Windows Server 2008 R2. Audio recording redirection is allowed by default when connecting to a computer running at least Windows 7, or Windows Server 2008 R2. - If you enable this policy setting, audio recording redirection is allowed. -- If you disable this policy setting, audio recording redirection is not allowed, even if audio recording redirection is specified in RDC. +- If you disable this policy setting, audio recording redirection isn't allowed, even if audio recording redirection is specified in RDC. -- If you do not configure this policy setting, Audio recording redirection is not specified at the Group Policy level. +- If you don't configure this policy setting, Audio recording redirection isn't specified at the Group Policy level. @@ -566,13 +559,12 @@ By default, audio recording redirection is not allowed when connecting to a comp | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -599,7 +591,7 @@ By default, audio recording redirection is not allowed when connecting to a comp | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -612,13 +604,13 @@ By default, audio recording redirection is not allowed when connecting to a comp This policy setting allows you to limit the audio playback quality for a Remote Desktop Services session. Limiting the quality of audio playback can improve connection performance, particularly over slow links. -- If you enable this policy setting, you must select one of the following: High, Medium, or Dynamic. If you select High, the audio will be sent without any compression and with minimum latency. This requires a large amount of bandwidth. If you select Medium, the audio will be sent with some compression and with minimum latency as determined by the codec that is being used. If you select Dynamic, the audio will be sent with a level of compression that is determined by the bandwidth of the remote connection. +- If you enable this policy setting, you must select one of the following: High, Medium, or Dynamic. If you select High, the audio will be sent without any compression and with minimum latency. This requires a large amount of bandwidth. If you select Medium, the audio will be sent with some compression and with minimum latency as determined by the codec that's being used. If you select Dynamic, the audio will be sent with a level of compression that's determined by the bandwidth of the remote connection. The audio playback quality that you specify on the remote computer by using this policy setting is the maximum quality that can be used for a Remote Desktop Services session, regardless of the audio playback quality configured on the client computer. For example, if the audio playback quality configured on the client computer is higher than the audio playback quality configured on the remote computer, the lower level of audio playback quality will be used. Audio playback quality can be configured on the client computer by using the audioqualitymode setting in a Remote Desktop Protocol (.rdp) file. By default, audio playback quality is set to Dynamic. -- If you disable or do not configure this policy setting, audio playback quality will be set to Dynamic. +- If you disable or don't configure this policy setting, audio playback quality will be set to Dynamic. @@ -630,13 +622,12 @@ Audio playback quality can be configured on the client computer by using the aud | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -662,7 +653,7 @@ Audio playback quality can be configured on the client computer by using the aud | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -677,11 +668,11 @@ This policy setting specifies whether to prevent the sharing of Clipboard conten You can use this setting to prevent users from redirecting Clipboard data to and from the remote computer and the local computer. By default, Remote Desktop Services allows Clipboard redirection. -- If you enable this policy setting, users cannot redirect Clipboard data. +- If you enable this policy setting, users can't redirect Clipboard data. - If you disable this policy setting, Remote Desktop Services always allows Clipboard redirection. -- If you do not configure this policy setting, Clipboard redirection is not specified at the Group Policy level. +- If you don't configure this policy setting, Clipboard redirection isn't specified at the Group Policy level. @@ -693,13 +684,12 @@ You can use this setting to prevent users from redirecting Clipboard data to and | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -726,7 +716,7 @@ You can use this setting to prevent users from redirecting Clipboard data to and | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -739,13 +729,13 @@ You can use this setting to prevent users from redirecting Clipboard data to and This policy setting specifies whether to prevent the redirection of data to client COM ports from the remote computer in a Remote Desktop Services session. -You can use this setting to prevent users from redirecting data to COM port peripherals or mapping local COM ports while they are logged on to a Remote Desktop Services session. By default, Remote Desktop Services allows this COM port redirection. +You can use this setting to prevent users from redirecting data to COM port peripherals or mapping local COM ports while they're logged-on to a Remote Desktop Services session. By default, Remote Desktop Services allows this COM port redirection. -- If you enable this policy setting, users cannot redirect server data to the local COM port. +- If you enable this policy setting, users can't redirect server data to the local COM port. - If you disable this policy setting, Remote Desktop Services always allows COM port redirection. -- If you do not configure this policy setting, COM port redirection is not specified at the Group Policy level. +- If you don't configure this policy setting, COM port redirection isn't specified at the Group Policy level. @@ -757,13 +747,12 @@ You can use this setting to prevent users from redirecting data to COM port peri | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -790,7 +779,7 @@ You can use this setting to prevent users from redirecting data to COM port peri | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -809,7 +798,7 @@ By default, Remote Desktop Services automatically designates the client default - If you disable this policy setting, the RD Session Host server automatically maps the client default printer and sets it as the default printer upon connection. -- If you do not configure this policy setting, the default printer is not specified at the Group Policy level. +- If you don't configure this policy setting, the default printer isn't specified at the Group Policy level. @@ -821,13 +810,12 @@ By default, Remote Desktop Services automatically designates the client default | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -854,7 +842,7 @@ By default, Remote Desktop Services automatically designates the client default | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -865,7 +853,7 @@ By default, Remote Desktop Services automatically designates the client default -This policy setting specifies whether the Remote Desktop Connection can use hardware acceleration if supported hardware is available. If you use this setting, the Remote Desktop Client will use only software decoding. For example, if you have a problem that you suspect may be related to hardware acceleration, use this setting to disable the acceleration; then, if the problem still occurs, you will know that there are additional issues to investigate. If you disable this setting or leave it not configured, the Remote Desktop client will use hardware accelerated decoding if supported hardware is available. +This policy setting specifies whether the Remote Desktop Connection can use hardware acceleration if supported hardware is available. If you use this setting, the Remote Desktop Client will use only software decoding. For example, if you have a problem that you suspect may be related to hardware acceleration, use this setting to disable the acceleration; then, if the problem still occurs, you'll know that there are additional issues to investigate. If you disable this setting or leave it not configured, the Remote Desktop client will use hardware accelerated decoding if supported hardware is available. @@ -877,13 +865,12 @@ This policy setting specifies whether the Remote Desktop Connection can use hard | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -910,7 +897,7 @@ This policy setting specifies whether the Remote Desktop Connection can use hard | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -937,13 +924,12 @@ Controls whether a user can save passwords using Remote Desktop Connection. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -970,7 +956,7 @@ Controls whether a user can save passwords using Remote Desktop Connection. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -985,11 +971,11 @@ This policy setting specifies whether to prevent the redirection of data to clie You can use this setting to prevent users from mapping local LPT ports and redirecting data from the remote computer to local LPT port peripherals. By default, Remote Desktop Services allows LPT port redirection. -- If you enable this policy setting, users in a Remote Desktop Services session cannot redirect server data to the local LPT port. +- If you enable this policy setting, users in a Remote Desktop Services session can't redirect server data to the local LPT port. - If you disable this policy setting, LPT port redirection is always allowed. -- If you do not configure this policy setting, LPT port redirection is not specified at the Group Policy level. +- If you don't configure this policy setting, LPT port redirection isn't specified at the Group Policy level. @@ -1001,13 +987,12 @@ You can use this setting to prevent users from mapping local LPT ports and redir | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1034,7 +1019,7 @@ You can use this setting to prevent users from mapping local LPT ports and redir | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1047,12 +1032,13 @@ You can use this setting to prevent users from mapping local LPT ports and redir This policy setting lets you control the redirection of supported Plug and Play and RemoteFX USB devices, such as Windows Portable Devices, to the remote computer in a Remote Desktop Services session. -By default, Remote Desktop Services does not allow redirection of supported Plug and Play and RemoteFX USB devices. +By default, Remote Desktop Services doesn't allow redirection of supported Plug and Play and RemoteFX USB devices. - If you disable this policy setting, users can redirect their supported Plug and Play devices to the remote computer. Users can use the More option on the Local Resources tab of Remote Desktop Connection to choose the supported Plug and Play devices to redirect to the remote computer. -- If you enable this policy setting, users cannot redirect their supported Plug and Play devices to the remote computer. -- If you do not configure this policy setting, users can redirect their supported Plug and Play devices to the remote computer only if it is running Windows Server 2012 R2 and earlier versions. +- If you enable this policy setting, users can't redirect their supported Plug and Play devices to the remote computer. + +- If you don't configure this policy setting, users can redirect their supported Plug and Play devices to the remote computer only if it's running Windows Server 2012 R2 and earlier versions. > [!NOTE] > You can disable redirection of specific types of supported Plug and Play devices by using Computer Configuration\Administrative Templates\System\Device Installation\Device Installation Restrictions policy settings. @@ -1067,13 +1053,12 @@ By default, Remote Desktop Services does not allow redirection of supported Plug | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1100,7 +1085,7 @@ By default, Remote Desktop Services does not allow redirection of supported Plug | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1115,11 +1100,11 @@ This policy setting allows you to specify whether to prevent the mapping of clie You can use this policy setting to prevent users from redirecting print jobs from the remote computer to a printer attached to their local (client) computer. By default, Remote Desktop Services allows this client printer mapping. -- If you enable this policy setting, users cannot redirect print jobs from the remote computer to a local client printer in Remote Desktop Services sessions. +- If you enable this policy setting, users can't redirect print jobs from the remote computer to a local client printer in Remote Desktop Services sessions. - If you disable this policy setting, users can redirect print jobs with client printer mapping. -- If you do not configure this policy setting, client printer mapping is not specified at the Group Policy level. +- If you don't configure this policy setting, client printer mapping isn't specified at the Group Policy level. @@ -1131,13 +1116,12 @@ You can use this policy setting to prevent users from redirecting print jobs fro | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1164,7 +1148,7 @@ You can use this policy setting to prevent users from redirecting print jobs fro | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1177,18 +1161,19 @@ You can use this policy setting to prevent users from redirecting print jobs fro This policy setting allows you to specify a list of Secure Hash Algorithm 1 (SHA1) certificate thumbprints that represent trusted Remote Desktop Protocol (.rdp) file publishers. -- If you enable this policy setting, any certificate with an SHA1 thumbprint that matches a thumbprint on the list is trusted. If a user tries to start an .rdp file that is signed by a trusted certificate, the user does not receive any warning messages when they start the file. To obtain the thumbprint, view the certificate details, and then click the Thumbprint field. +- If you enable this policy setting, any certificate with an SHA1 thumbprint that matches a thumbprint on the list is trusted. If a user tries to start an .rdp file that's signed by a trusted certificate, the user doesn't receive any warning messages when they start the file. To obtain the thumbprint, view the certificate details, and then click the Thumbprint field. -- If you disable or do not configure this policy setting, no publisher is treated as a trusted .rdp publisher. +- If you disable or don't configure this policy setting, no publisher is treated as a trusted .rdp publisher. -**Note**: +Note: You can define this policy setting in the Computer Configuration node or in the User Configuration node. + - If you configure this policy setting for the computer, the list of certificate thumbprints trusted for a user is a combination of the list defined for the computer and the list defined for the user. This policy setting overrides the behavior of the "Allow .rdp files from valid publishers and user's default .rdp settings" policy setting. -If the list contains a string that is not a certificate thumbprint, it is ignored. +If the list contains a string that isn't a certificate thumbprint, it's ignored. @@ -1200,13 +1185,12 @@ If the list contains a string that is not a certificate thumbprint, it is ignore | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1232,7 +1216,7 @@ If the list contains a string that is not a certificate thumbprint, it is ignore | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1245,18 +1229,19 @@ If the list contains a string that is not a certificate thumbprint, it is ignore This policy setting allows you to specify a list of Secure Hash Algorithm 1 (SHA1) certificate thumbprints that represent trusted Remote Desktop Protocol (.rdp) file publishers. -- If you enable this policy setting, any certificate with an SHA1 thumbprint that matches a thumbprint on the list is trusted. If a user tries to start an .rdp file that is signed by a trusted certificate, the user does not receive any warning messages when they start the file. To obtain the thumbprint, view the certificate details, and then click the Thumbprint field. +- If you enable this policy setting, any certificate with an SHA1 thumbprint that matches a thumbprint on the list is trusted. If a user tries to start an .rdp file that's signed by a trusted certificate, the user doesn't receive any warning messages when they start the file. To obtain the thumbprint, view the certificate details, and then click the Thumbprint field. -- If you disable or do not configure this policy setting, no publisher is treated as a trusted .rdp publisher. +- If you disable or don't configure this policy setting, no publisher is treated as a trusted .rdp publisher. -**Note**: +Note: You can define this policy setting in the Computer Configuration node or in the User Configuration node. + - If you configure this policy setting for the computer, the list of certificate thumbprints trusted for a user is a combination of the list defined for the computer and the list defined for the user. This policy setting overrides the behavior of the "Allow .rdp files from valid publishers and user's default .rdp settings" policy setting. -If the list contains a string that is not a certificate thumbprint, it is ignored. +If the list contains a string that isn't a certificate thumbprint, it's ignored. @@ -1268,13 +1253,12 @@ If the list contains a string that is not a certificate thumbprint, it is ignore | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1300,7 +1284,7 @@ If the list contains a string that is not a certificate thumbprint, it is ignore | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1315,7 +1299,7 @@ This policy setting specifies whether the UDP protocol will be used to access se - If you enable this policy setting, Remote Desktop Protocol traffic will only use the TCP protocol. -- If you disable or do not configure this policy setting, Remote Desktop Protocol traffic will attempt to use both TCP and UDP protocols. +- If you disable or don't configure this policy setting, Remote Desktop Protocol traffic will attempt to use both TCP and UDP protocols. @@ -1327,13 +1311,12 @@ This policy setting specifies whether the UDP protocol will be used to access se | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1360,7 +1343,7 @@ This policy setting specifies whether the UDP protocol will be used to access se | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1377,19 +1360,19 @@ You can use this policy setting to set a limit on the color depth of any connect - If you enable this policy setting, the color depth that you specify is the maximum color depth allowed for a user's RDP connection. The actual color depth for the connection is determined by the color support available on the client computer. If you select Client Compatible, the highest color depth supported by the client will be used. -- If you disable or do not configure this policy setting, the color depth for connections is not specified at the Group Policy level. +- If you disable or don't configure this policy setting, the color depth for connections isn't specified at the Group Policy level. -**Note**: +Note: 1. Setting the color depth to 24 bits is only supported on Windows Server 2003 and Windows XP Professional. -2. The value specified in this policy setting is not applied to connections from client computers that are using at least Remote Desktop Protocol 8.0 (computers running at least Windows 8 or Windows Server 2012). The 32-bit color depth format is always used for these connections. + +2. The value specified in this policy setting isn't applied to connections from client computers that are using at least Remote Desktop Protocol 8.0 (computers running at least Windows 8 or Windows Server 2012). The 32-bit color depth format is always used for these connections. 3. For connections from client computers that are using Remote Desktop Protocol 7.1 or earlier versions that are connecting to computers running at least Windows 8 or Windows Server 2012, the minimum of the following values is used as the color depth format: -a. Value specified by this policy setting -b. Maximum color depth supported by the client -c. Value requested by the client -If the client does not support at least 16 bits, the connection is terminated. +a. Value specified by this policy setting b. Maximum color depth supported by the client c. Value requested by the client. + +If the client doesn't support at least 16 bits, the connection is terminated. @@ -1401,13 +1384,12 @@ If the client does not support at least 16 bits, the connection is terminated. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1433,7 +1415,7 @@ If the client does not support at least 16 bits, the connection is terminated. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1451,7 +1433,7 @@ This policy setting allows you to limit the size of the entire roaming user prof - If you enable this policy setting, you must specify a monitoring interval (in minutes) and a maximum size (in gigabytes) for the entire roaming user profile cache. The monitoring interval determines how often the size of the entire roaming user profile cache is checked. When the size of the entire roaming user profile cache exceeds the maximum size that you have specified, the oldest (least recently used) roaming user profiles will be deleted until the size of the entire roaming user profile cache is less than the maximum size specified. -- If you disable or do not configure this policy setting, no restriction is placed on the size of the entire roaming user profile cache on the local drive. +- If you disable or don't configure this policy setting, no restriction is placed on the size of the entire roaming user profile cache on the local drive. > [!NOTE] > This policy setting is ignored if the "Prevent Roaming Profile changes from propagating to the server" policy setting located in Computer Configuration\Policies\Administrative Templates\System\User Profiles is enabled. @@ -1466,13 +1448,12 @@ This policy setting allows you to limit the size of the entire roaming user prof | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1499,7 +1480,7 @@ This policy setting allows you to limit the size of the entire roaming user prof | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1512,7 +1493,7 @@ This policy setting allows you to limit the size of the entire roaming user prof Specifies whether desktop wallpaper is displayed to remote clients connecting via Remote Desktop Services. -You can use this setting to enforce the removal of wallpaper during a Remote Desktop Services session. By default, Windows XP Professional displays wallpaper to remote clients connecting through Remote Desktop, depending on the client configuration (see the Experience tab in the Remote Desktop Connection options for more information). Servers running Windows Server 2003 do not display wallpaper by default to Remote Desktop Services sessions. +You can use this setting to enforce the removal of wallpaper during a Remote Desktop Services session. By default, Windows XP Professional displays wallpaper to remote clients connecting through Remote Desktop, depending on the client configuration (see the Experience tab in the Remote Desktop Connection options for more information). Servers running Windows Server 2003 don't display wallpaper by default to Remote Desktop Services sessions. If the status is set to Enabled, wallpaper never appears in a Remote Desktop Services session. @@ -1530,13 +1511,12 @@ If the status is set to Not Configured, the default behavior applies. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1563,7 +1543,7 @@ If the status is set to Not Configured, the default behavior applies. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1580,10 +1560,10 @@ This policy setting enables system administrators to change the graphics renderi - If you disable this policy setting, all Remote Desktop Services sessions use the Microsoft Basic Render Driver as the default adapter. -- If you do not configure this policy setting, Remote Desktop Services sessions on the RD Session Host server use the Microsoft Basic Render Driver as the default adapter. In all other cases, Remote Desktop Services sessions use the hardware graphics renderer by default. +- If you don't configure this policy setting, Remote Desktop Services sessions on the RD Session Host server use the Microsoft Basic Render Driver as the default adapter. In all other cases, Remote Desktop Services sessions use the hardware graphics renderer by default. > [!NOTE] -> The policy setting enables load-balancing of graphics processing units (GPU) on a computer with more than one GPU installed. The GPU configuration of the local session is not affected by this policy setting. +> The policy setting enables load-balancing of graphics processing units (GPU) on a computer with more than one GPU installed. The GPU configuration of the local session isn't affected by this policy setting. @@ -1595,13 +1575,12 @@ This policy setting enables system administrators to change the graphics renderi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1628,7 +1607,7 @@ This policy setting enables system administrators to change the graphics renderi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1641,9 +1620,9 @@ This policy setting enables system administrators to change the graphics renderi This policy setting allows you to specify whether the Remote Desktop Easy Print printer driver is used first to install all client printers. -- If you enable or do not configure this policy setting, the RD Session Host server first tries to use the Remote Desktop Easy Print printer driver to install all client printers. If for any reason the Remote Desktop Easy Print printer driver cannot be used, a printer driver on the RD Session Host server that matches the client printer is used. If the RD Session Host server does not have a printer driver that matches the client printer, the client printer is not available for the Remote Desktop session. +- If you enable or don't configure this policy setting, the RD Session Host server first tries to use the Remote Desktop Easy Print printer driver to install all client printers. If for any reason the Remote Desktop Easy Print printer driver can't be used, a printer driver on the RD Session Host server that matches the client printer is used. If the RD Session Host server doesn't have a printer driver that matches the client printer, the client printer isn't available for the Remote Desktop session. -- If you disable this policy setting, the RD Session Host server tries to find a suitable printer driver to install the client printer. If the RD Session Host server does not have a printer driver that matches the client printer, the server tries to use the Remote Desktop Easy Print driver to install the client printer. If for any reason the Remote Desktop Easy Print printer driver cannot be used, the client printer is not available for the Remote Desktop Services session. +- If you disable this policy setting, the RD Session Host server tries to find a suitable printer driver to install the client printer. If the RD Session Host server doesn't have a printer driver that matches the client printer, the server tries to use the Remote Desktop Easy Print driver to install the client printer. If for any reason the Remote Desktop Easy Print printer driver can't be used, the client printer isn't available for the Remote Desktop Services session. > [!NOTE] > If the "Do not allow client printer redirection" policy setting is enabled, the "Use Remote Desktop Easy Print printer driver first" policy setting is ignored. @@ -1658,13 +1637,12 @@ This policy setting allows you to specify whether the Remote Desktop Easy Print | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1691,7 +1669,7 @@ This policy setting allows you to specify whether the Remote Desktop Easy Print | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1704,9 +1682,9 @@ This policy setting allows you to specify whether the Remote Desktop Easy Print This policy setting allows you to specify whether the Remote Desktop Easy Print printer driver is used first to install all client printers. -- If you enable or do not configure this policy setting, the RD Session Host server first tries to use the Remote Desktop Easy Print printer driver to install all client printers. If for any reason the Remote Desktop Easy Print printer driver cannot be used, a printer driver on the RD Session Host server that matches the client printer is used. If the RD Session Host server does not have a printer driver that matches the client printer, the client printer is not available for the Remote Desktop session. +- If you enable or don't configure this policy setting, the RD Session Host server first tries to use the Remote Desktop Easy Print printer driver to install all client printers. If for any reason the Remote Desktop Easy Print printer driver can't be used, a printer driver on the RD Session Host server that matches the client printer is used. If the RD Session Host server doesn't have a printer driver that matches the client printer, the client printer isn't available for the Remote Desktop session. -- If you disable this policy setting, the RD Session Host server tries to find a suitable printer driver to install the client printer. If the RD Session Host server does not have a printer driver that matches the client printer, the server tries to use the Remote Desktop Easy Print driver to install the client printer. If for any reason the Remote Desktop Easy Print printer driver cannot be used, the client printer is not available for the Remote Desktop Services session. +- If you disable this policy setting, the RD Session Host server tries to find a suitable printer driver to install the client printer. If the RD Session Host server doesn't have a printer driver that matches the client printer, the server tries to use the Remote Desktop Easy Print driver to install the client printer. If for any reason the Remote Desktop Easy Print printer driver can't be used, the client printer isn't available for the Remote Desktop Services session. > [!NOTE] > If the "Do not allow client printer redirection" policy setting is enabled, the "Use Remote Desktop Easy Print printer driver first" policy setting is ignored. @@ -1721,13 +1699,12 @@ This policy setting allows you to specify whether the Remote Desktop Easy Print | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1754,7 +1731,7 @@ This policy setting allows you to specify whether the Remote Desktop Easy Print | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1775,7 +1752,7 @@ When deployed on an RD Session Host server, RemoteFX delivers a rich user experi - If you disable this policy setting, RemoteFX will be disabled. -- If you do not configure this policy setting, the default behavior will be used. By default, RemoteFX for RD Virtualization Host is enabled and RemoteFX for RD Session Host is disabled. +- If you don't configure this policy setting, the default behavior will be used. By default, RemoteFX for RD Virtualization Host is enabled and RemoteFX for RD Session Host is disabled. @@ -1787,13 +1764,12 @@ When deployed on an RD Session Host server, RemoteFX delivers a rich user experi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1820,7 +1796,7 @@ When deployed on an RD Session Host server, RemoteFX delivers a rich user experi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1833,21 +1809,21 @@ When deployed on an RD Session Host server, RemoteFX delivers a rich user experi This policy setting allows you to specify the RD Session Host server fallback printer driver behavior. -By default, the RD Session Host server fallback printer driver is disabled. If the RD Session Host server does not have a printer driver that matches the client's printer, no printer will be available for the Remote Desktop Services session. +By default, the RD Session Host server fallback printer driver is disabled. If the RD Session Host server doesn't have a printer driver that matches the client's printer, no printer will be available for the Remote Desktop Services session. -- If you enable this policy setting, the fallback printer driver is enabled, and the default behavior is for the RD Session Host server to find a suitable printer driver. If one is not found, the client's printer is not available. You can choose to change this default behavior. The available options are: +- If you enable this policy setting, the fallback printer driver is enabled, and the default behavior is for the RD Session Host server to find a suitable printer driver. If one isn't found, the client's printer isn't available. You can choose to change this default behavior. The available options are: -"Do nothing if one is not found" - If there is a printer driver mismatch, the server will attempt to find a suitable driver. If one is not found, the client's printer is not available. This is the default behavior. +"Do nothing if one isn't found" - If there is a printer driver mismatch, the server will attempt to find a suitable driver. If one isn't found, the client's printer isn't available. This is the default behavior. -"Default to PCL if one is not found" - If no suitable printer driver can be found, default to the Printer Control Language (PCL) fallback printer driver. +"Default to PCL if one isn't found" - If no suitable printer driver can be found, default to the Printer Control Language (PCL) fallback printer driver. -"Default to PS if one is not found" - If no suitable printer driver can be found, default to the PostScript (PS) fallback printer driver. +"Default to PS if one isn't found" - If no suitable printer driver can be found, default to the PostScript (PS) fallback printer driver. -"Show both PCL and PS if one is not found" - If no suitable driver can be found, show both PS and PCL-based fallback printer drivers. +"Show both PCL and PS if one isn't found" - If no suitable driver can be found, show both PS and PCL-based fallback printer drivers. -- If you disable this policy setting, the RD Session Host server fallback driver is disabled and the RD Session Host server will not attempt to use the fallback printer driver. +- If you disable this policy setting, the RD Session Host server fallback driver is disabled and the RD Session Host server won't attempt to use the fallback printer driver. -- If you do not configure this policy setting, the fallback printer driver behavior is off by default. +- If you don't configure this policy setting, the fallback printer driver behavior is off by default. > [!NOTE] > If the "Do not allow client printer redirection" setting is enabled, this policy setting is ignored and the fallback printer driver is disabled. @@ -1862,13 +1838,12 @@ By default, the RD Session Host server fallback printer driver is disabled. If t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1895,7 +1870,7 @@ By default, the RD Session Host server fallback printer driver is disabled. If t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1906,13 +1881,13 @@ By default, the RD Session Host server fallback printer driver is disabled. If t -This policy setting determines whether an administrator attempting to connect remotely to the console of a server can log off an administrator currently logged on to the console. +This policy setting determines whether an administrator attempting to connect remotely to the console of a server can log off an administrator currently logged-on to the console. -This policy is useful when the currently connected administrator does not want to be logged off by another administrator. If the connected administrator is logged off, any data not previously saved is lost. +This policy is useful when the currently connected administrator doesn't want to be logged off by another administrator. If the connected administrator is logged off, any data not previously saved is lost. -- If you enable this policy setting, logging off the connected administrator is not allowed. +- If you enable this policy setting, logging off the connected administrator isn't allowed. -- If you disable or do not configure this policy setting, logging off the connected administrator is allowed. +- If you disable or don't configure this policy setting, logging off the connected administrator is allowed. > [!NOTE] > The console session is also known as Session 0. Console access can be obtained by using the /console switch from Remote Desktop Connection in the computer field name or from the command line. @@ -1927,13 +1902,12 @@ This policy is useful when the currently connected administrator does not want t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1960,7 +1934,7 @@ This policy is useful when the currently connected administrator does not want t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1971,11 +1945,11 @@ This policy is useful when the currently connected administrator does not want t -Specifies the authentication method that clients must use when attempting to connect to an RD Session Host server through an RD Gateway server. You can enforce this policy setting or you can allow users to overwrite this policy setting. By default, when you enable this policy setting, it is enforced. When this policy setting is enforced, users cannot override this setting, even if they select the "Use these RD Gateway server settings" option on the client. +Specifies the authentication method that clients must use when attempting to connect to an RD Session Host server through an RD Gateway server. You can enforce this policy setting or you can allow users to overwrite this policy setting. By default, when you enable this policy setting, it's enforced. When this policy setting is enforced, users can't override this setting, even if they select the "Use these RD Gateway server settings" option on the client. -To allow users to overwrite this policy setting, select the "Allow users to change this setting" check box. When you do this, users can specify an alternate authentication method by configuring settings on the client, using an RDP file, or using an HTML script. If users do not specify an alternate authentication method, the authentication method that you specify in this policy setting is used by default. +To allow users to overwrite this policy setting, select the "Allow users to change this setting" check box. When you do this, users can specify an alternate authentication method by configuring settings on the client, using an RDP file, or using an HTML script. If users don't specify an alternate authentication method, the authentication method that you specify in this policy setting is used by default. -If you disable or do not configure this policy setting, the authentication method that is specified by the user is used, if one is specified. If an authentication method is not specified, the Negotiate protocol that is enabled on the client or a smart card can be used for authentication. +If you disable or don't configure this policy setting, the authentication method that's specified by the user is used, if one is specified. If an authentication method isn't specified, the Negotiate protocol that's enabled on the client or a smart card can be used for authentication. @@ -1987,13 +1961,12 @@ If you disable or do not configure this policy setting, the authentication metho | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2019,7 +1992,7 @@ If you disable or do not configure this policy setting, the authentication metho | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2031,16 +2004,16 @@ If you disable or do not configure this policy setting, the authentication metho -- If you enable this policy setting, when Remote Desktop Connection cannot connect directly to a remote computer (an RD Session Host server or a computer with Remote Desktop enabled), the clients will attempt to connect to the remote computer through an RD Gateway server. In this case, the clients will attempt to connect to the RD Gateway server that is specified in the "Set RD Gateway server address" policy setting. +- If you enable this policy setting, when Remote Desktop Connection can't connect directly to a remote computer (an RD Session Host server or a computer with Remote Desktop enabled), the clients will attempt to connect to the remote computer through an RD Gateway server. In this case, the clients will attempt to connect to the RD Gateway server that's specified in the "Set RD Gateway server address" policy setting. -You can enforce this policy setting or you can allow users to overwrite this setting. By default, when you enable this policy setting, it is enforced. When this policy setting is enforced, users cannot override this setting, even if they select the "Use these RD Gateway server settings" option on the client. +You can enforce this policy setting or you can allow users to overwrite this setting. By default, when you enable this policy setting, it's enforced. When this policy setting is enforced, users can't override this setting, even if they select the "Use these RD Gateway server settings" option on the client. > [!NOTE] -> To enforce this policy setting, you must also specify the address of the RD Gateway server by using the "Set RD Gateway server address" policy setting, or client connection attempts to any remote computer will fail, if the client cannot connect directly to the remote computer. To enhance security, it is also highly recommended that you specify the authentication method by using the "Set RD Gateway authentication method" policy setting. If you do not specify an authentication method by using this policy setting, either the NTLM protocol that is enabled on the client or a smart card can be used. +> To enforce this policy setting, you must also specify the address of the RD Gateway server by using the "Set RD Gateway server address" policy setting, or client connection attempts to any remote computer will fail, if the client can't connect directly to the remote computer. To enhance security, it's also highly recommended that you specify the authentication method by using the "Set RD Gateway authentication method" policy setting. If you don't specify an authentication method by using this policy setting, either the NTLM protocol that's enabled on the client or a smart card can be used. -To allow users to overwrite this policy setting, select the "Allow users to change this setting" check box. When you do this, users on the client can choose not to connect through the RD Gateway server by selecting the "Do not use an RD Gateway server" option. Users can specify a connection method by configuring settings on the client, using an RDP file, or using an HTML script. If users do not specify a connection method, the connection method that you specify in this policy setting is used by default. +To allow users to overwrite this policy setting, select the "Allow users to change this setting" check box. When you do this, users on the client can choose not to connect through the RD Gateway server by selecting the "Do not use an RD Gateway server" option. Users can specify a connection method by configuring settings on the client, using an RDP file, or using an HTML script. If users don't specify a connection method, the connection method that you specify in this policy setting is used by default. -- If you disable or do not configure this policy setting, clients will not use the RD Gateway server address that is specified in the "Set RD Gateway server address" policy setting. If an RD Gateway server is specified by the user, a client connection attempt will be made through that RD Gateway server. +- If you disable or don't configure this policy setting, clients won't use the RD Gateway server address that's specified in the "Set RD Gateway server address" policy setting. If an RD Gateway server is specified by the user, a client connection attempt will be made through that RD Gateway server. @@ -2052,13 +2025,12 @@ To allow users to overwrite this policy setting, select the "Allow users to chan | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2085,7 +2057,7 @@ To allow users to overwrite this policy setting, select the "Allow users to chan | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2096,15 +2068,15 @@ To allow users to overwrite this policy setting, select the "Allow users to chan -Specifies the address of the RD Gateway server that clients must use when attempting to connect to an RD Session Host server. You can enforce this policy setting or you can allow users to overwrite this policy setting. By default, when you enable this policy setting, it is enforced. When this policy setting is enforced, users cannot override this setting, even if they select the "Use these RD Gateway server settings" option on the client. +Specifies the address of the RD Gateway server that clients must use when attempting to connect to an RD Session Host server. You can enforce this policy setting or you can allow users to overwrite this policy setting. By default, when you enable this policy setting, it's enforced. When this policy setting is enforced, users can't override this setting, even if they select the "Use these RD Gateway server settings" option on the client. > [!NOTE] -> It is highly recommended that you also specify the authentication method by using the "Set RD Gateway authentication method" policy setting. If you do not specify an authentication method by using this setting, either the NTLM protocol that is enabled on the client or a smart card can be used. +> It's highly recommended that you also specify the authentication method by using the "Set RD Gateway authentication method" policy setting. If you don't specify an authentication method by using this setting, either the NTLM protocol that's enabled on the client or a smart card can be used. -To allow users to overwrite the "Set RD Gateway server address" policy setting and connect to another RD Gateway server, you must select the "Allow users to change this setting" check box and users will be allowed to specify an alternate RD Gateway server. Users can specify an alternative RD Gateway server by configuring settings on the client, using an RDP file, or using an HTML script. If users do not specify an alternate RD Gateway server, the server that you specify in this policy setting is used by default. +To allow users to overwrite the "Set RD Gateway server address" policy setting and connect to another RD Gateway server, you must select the "Allow users to change this setting" check box and users will be allowed to specify an alternate RD Gateway server. Users can specify an alternative RD Gateway server by configuring settings on the client, using an RDP file, or using an HTML script. If users don't specify an alternate RD Gateway server, the server that you specify in this policy setting is used by default. > [!NOTE] -> If you disable or do not configure this policy setting, but enable the "Enable connections through RD Gateway" policy setting, client connection attempts to any remote computer will fail, if the client cannot connect directly to the remote computer. If an RD Gateway server is specified by the user, a client connection attempt will be made through that RD Gateway server. +> If you disable or don't configure this policy setting, but enable the "Enable connections through RD Gateway" policy setting, client connection attempts to any remote computer will fail, if the client can't connect directly to the remote computer. If an RD Gateway server is specified by the user, a client connection attempt will be made through that RD Gateway server. @@ -2116,13 +2088,12 @@ To allow users to overwrite the "Set RD Gateway server address" policy setting a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2148,7 +2119,7 @@ To allow users to overwrite the "Set RD Gateway server address" policy setting a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2161,13 +2132,13 @@ To allow users to overwrite the "Set RD Gateway server address" policy setting a This policy setting allows you to specify whether the RD Session Host server should join a farm in RD Connection Broker. RD Connection Broker tracks user sessions and allows a user to reconnect to their existing session in a load-balanced RD Session Host server farm. To participate in RD Connection Broker, the Remote Desktop Session Host role service must be installed on the server. -If the policy setting is enabled, the RD Session Host server joins the farm that is specified in the RD Connection Broker farm name policy setting. The farm exists on the RD Connection Broker server that is specified in the Configure RD Connection Broker server name policy setting. +If the policy setting is enabled, the RD Session Host server joins the farm that's specified in the RD Connection Broker farm name policy setting. The farm exists on the RD Connection Broker server that's specified in the Configure RD Connection Broker server name policy setting. -- If you disable this policy setting, the server does not join a farm in RD Connection Broker, and user session tracking is not performed. If the policy setting is disabled, you cannot use either the Remote Desktop Session Host Configuration tool or the Remote Desktop Services WMI Provider to join the server to RD Connection Broker. +- If you disable this policy setting, the server doesn't join a farm in RD Connection Broker, and user session tracking isn't performed. If the policy setting is disabled, you can't use either the Remote Desktop Session Host Configuration tool or the Remote Desktop Services WMI Provider to join the server to RD Connection Broker. -If the policy setting is not configured, the policy setting is not specified at the Group Policy level. +If the policy setting isn't configured, the policy setting isn't specified at the Group Policy level. -**Note**: +Note: 1. @@ -2185,13 +2156,12 @@ If the policy setting is not configured, the policy setting is not specified at | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2218,7 +2188,7 @@ If the policy setting is not configured, the policy setting is not specified at | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2235,7 +2205,7 @@ After an RD Session Host server client loses the connection to an RD Session Hos - If you enable this policy setting, you must enter a keep-alive interval. The keep-alive interval determines how often, in minutes, the server checks the session state. The range of values you can enter is 1 to 999,999. -- If you disable or do not configure this policy setting, a keep-alive interval is not set and the server will not check the session state. +- If you disable or don't configure this policy setting, a keep-alive interval isn't set and the server won't check the session state. @@ -2247,13 +2217,12 @@ After an RD Session Host server client loses the connection to an RD Session Hos | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2280,7 +2249,7 @@ After an RD Session Host server client loses the connection to an RD Session Hos | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2299,7 +2268,7 @@ You can use this policy setting to control which RD Session Host servers are iss By default, the RDS Endpoint Servers group is empty. -- If you disable or do not configure this policy setting, the Remote Desktop license server issues an RDS CAL to any RD Session Host server that requests one. The RDS Endpoint Servers group is not deleted or changed in any way by disabling or not configuring this policy setting. +- If you disable or don't configure this policy setting, the Remote Desktop license server issues an RDS CAL to any RD Session Host server that requests one. The RDS Endpoint Servers group isn't deleted or changed in any way by disabling or not configuring this policy setting. > [!NOTE] > You should only enable this policy setting when the license server is a member of a domain. You can only add computer accounts for RD Session Host servers to the RDS Endpoint Servers group when the license server is a member of a domain. @@ -2314,13 +2283,12 @@ By default, the RDS Endpoint Servers group is empty. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2347,7 +2315,7 @@ By default, the RDS Endpoint Servers group is empty. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2360,13 +2328,13 @@ By default, the RDS Endpoint Servers group is empty. This policy setting allows you to specify the order in which an RD Session Host server attempts to locate Remote Desktop license servers. -- If you enable this policy setting, an RD Session Host server first attempts to locate the specified license servers. If the specified license servers cannot be located, the RD Session Host server will attempt automatic license server discovery. In the automatic license server discovery process, an RD Session Host server in a Windows Server-based domain attempts to contact a license server in the following order: +- If you enable this policy setting, an RD Session Host server first attempts to locate the specified license servers. If the specified license servers can't be located, the RD Session Host server will attempt automatic license server discovery. In the automatic license server discovery process, an RD Session Host server in a Windows Server-based domain attempts to contact a license server in the following order: 1. Remote Desktop license servers that are published in Active Directory Domain Services. 2. Remote Desktop license servers that are installed on domain controllers in the same domain as the RD Session Host server. -- If you disable or do not configure this policy setting, the RD Session Host server does not specify a license server at the Group Policy level. +- If you disable or don't configure this policy setting, the RD Session Host server doesn't specify a license server at the Group Policy level. @@ -2378,13 +2346,12 @@ This policy setting allows you to specify the order in which an RD Session Host | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2410,7 +2377,7 @@ This policy setting allows you to specify the order in which an RD Session Host | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2425,9 +2392,9 @@ This policy setting determines whether notifications are displayed on an RD Sess By default, notifications are displayed on an RD Session Host server after you log on as a local administrator, if there are problems with RD Licensing that affect the RD Session Host server. If applicable, a notification will also be displayed that notes the number of days until the licensing grace period for the RD Session Host server will expire. -- If you enable this policy setting, these notifications will not be displayed on the RD Session Host server. +- If you enable this policy setting, these notifications won't be displayed on the RD Session Host server. -- If you disable or do not configure this policy setting, these notifications will be displayed on the RD Session Host server after you log on as a local administrator. +- If you disable or don't configure this policy setting, these notifications will be displayed on the RD Session Host server after you log on as a local administrator. @@ -2439,13 +2406,12 @@ By default, notifications are displayed on an RD Session Host server after you l | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2471,7 +2437,7 @@ By default, notifications are displayed on an RD Session Host server after you l | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2482,7 +2448,7 @@ By default, notifications are displayed on an RD Session Host server after you l -This policy setting allows you to specify the type of Remote Desktop Services client access license (RDS CAL) that is required to connect to this RD Session Host server. +This policy setting allows you to specify the type of Remote Desktop Services client access license (RDS CAL) that's required to connect to this RD Session Host server. You can use this policy setting to select one of two licensing modes: Per User or Per Device. @@ -2492,7 +2458,7 @@ Per Device licensing mode requires that each device connecting to this RD Sessio - If you enable this policy setting, the Remote Desktop licensing mode that you specify is honored by the Remote Desktop license server and RD Session Host. -- If you disable or do not configure this policy setting, the licensing mode is not specified at the Group Policy level. +- If you disable or don't configure this policy setting, the licensing mode isn't specified at the Group Policy level. @@ -2504,13 +2470,12 @@ Per Device licensing mode requires that each device connecting to this RD Sessio | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2536,7 +2501,7 @@ Per Device licensing mode requires that each device connecting to this RD Sessio | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2555,7 +2520,7 @@ To use this setting, enter the number of connections you want to specify as the If the status is set to Enabled, the maximum number of connections is limited to the specified number consistent with the version of Windows and the mode of Remote Desktop Services running on the server. -If the status is set to Disabled or Not Configured, limits to the number of connections are not enforced at the Group Policy level. +If the status is set to Disabled or Not Configured, limits to the number of connections aren't enforced at the Group Policy level. > [!NOTE] > This setting is designed to be used on RD Session Host servers (that is, on servers running Windows with Remote Desktop Session Host role service installed). @@ -2570,13 +2535,12 @@ If the status is set to Disabled or Not Configured, limits to the number of conn | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2602,7 +2566,7 @@ If the status is set to Disabled or Not Configured, limits to the number of conn | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2617,7 +2581,7 @@ This policy setting allows you to specify the maximum display resolution that ca - If you enable this policy setting, you must specify a resolution width and height. The resolution specified will be the maximum resolution that can be used by each monitor used to display a Remote Desktop Services session. -- If you disable or do not configure this policy setting, the maximum resolution that can be used by each monitor to display a Remote Desktop Services session will be determined by the values specified on the Display Settings tab in the Remote Desktop Session Host Configuration tool. +- If you disable or don't configure this policy setting, the maximum resolution that can be used by each monitor to display a Remote Desktop Services session will be determined by the values specified on the Display Settings tab in the Remote Desktop Session Host Configuration tool. @@ -2629,13 +2593,12 @@ This policy setting allows you to specify the maximum display resolution that ca | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2661,7 +2624,7 @@ This policy setting allows you to specify the maximum display resolution that ca | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2676,7 +2639,7 @@ This policy setting allows you to limit the number of monitors that a user can u - If you enable this policy setting, you can specify the number of monitors that can be used to display a Remote Desktop Services session. You can specify a number from 1 to 16. -- If you disable or do not configure this policy setting, the number of monitors that can be used to display a Remote Desktop Services session is not specified at the Group Policy level. +- If you disable or don't configure this policy setting, the number of monitors that can be used to display a Remote Desktop Services session isn't specified at the Group Policy level. @@ -2688,13 +2651,12 @@ This policy setting allows you to limit the number of monitors that a user can u | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2720,7 +2682,7 @@ This policy setting allows you to limit the number of monitors that a user can u | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2735,12 +2697,12 @@ This policy setting allows you to remove the "Disconnect" option from the Shut D You can use this policy setting to prevent users from using this familiar method to disconnect their client from an RD Session Host server. -- If you enable this policy setting, "Disconnect" does not appear as an option in the drop-down list in the Shut Down Windows dialog box. +- If you enable this policy setting, "Disconnect" doesn't appear as an option in the drop-down list in the Shut Down Windows dialog box. -- If you disable or do not configure this policy setting, "Disconnect" is not removed from the list in the Shut Down Windows dialog box. +- If you disable or don't configure this policy setting, "Disconnect" isn't removed from the list in the Shut Down Windows dialog box. > [!NOTE] -> This policy setting affects only the Shut Down Windows dialog box. It does not prevent users from using other methods to disconnect from a Remote Desktop Services session. This policy setting also does not prevent disconnected sessions at the server. You can control how long a disconnected session remains active on the server by configuring the "Computer Configuration\Administrative Templates\Windows Components\Remote Desktop Services\RD Session Host\Session Time Limits\Set time limit for disconnected sessions" policy setting. +> This policy setting affects only the Shut Down Windows dialog box. It doesn't prevent users from using other methods to disconnect from a Remote Desktop Services session. This policy setting also doesn't prevent disconnected sessions at the server. You can control how long a disconnected session remains active on the server by configuring the "Computer Configuration\Administrative Templates\Windows Components\Remote Desktop Services\RD Session Host\Session Time Limits\Set time limit for disconnected sessions" policy setting. @@ -2752,13 +2714,12 @@ You can use this policy setting to prevent users from using this familiar method | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2785,7 +2746,7 @@ You can use this policy setting to prevent users from using this familiar method | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2798,7 +2759,7 @@ You can use this policy setting to prevent users from using this familiar method Specifies whether to remove the Windows Security item from the Settings menu on Remote Desktop clients. You can use this setting to prevent inexperienced users from logging off from Remote Desktop Services inadvertently. -If the status is set to Enabled, Windows Security does not appear in Settings on the Start menu. As a result, users must type a security attention sequence, such as CTRL+ALT+END, to open the Windows Security dialog box on the client computer. +If the status is set to Enabled, Windows Security doesn't appear in Settings on the Start menu. As a result, users must type a security attention sequence, such as CTRL+ALT+END, to open the Windows Security dialog box on the client computer. If the status is set to Disabled or Not Configured, Windows Security remains in the Settings menu. @@ -2812,13 +2773,12 @@ If the status is set to Disabled or Not Configured, Windows Security remains in | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2845,7 +2805,7 @@ If the status is set to Disabled or Not Configured, Windows Security remains in | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2860,14 +2820,14 @@ This policy setting allows you to specify which version of Remote Desktop Servic A license server attempts to provide the most appropriate RDS or TS CAL for a connection. For example, a Windows Server 2008 license server will try to issue a Windows Server 2008 TS CAL for clients connecting to a terminal server running Windows Server 2008, and will try to issue a Windows Server 2003 TS CAL for clients connecting to a terminal server running Windows Server 2003. -By default, if the most appropriate RDS CAL is not available for a connection, a Windows Server 2008 license server will issue a Windows Server 2008 TS CAL, if available, to the following: +By default, if the most appropriate RDS CAL isn't available for a connection, a Windows Server 2008 license server will issue a Windows Server 2008 TS CAL, if available, to the following: * A client connecting to a Windows Server 2003 terminal server -* A client connecting to a Windows 2000 terminal server +* A client connecting to a Windows 2000 terminal server. -- If you enable this policy setting, the license server will only issue a temporary RDS CAL to the client if an appropriate RDS CAL for the RD Session Host server is not available. If the client has already been issued a temporary RDS CAL and the temporary RDS CAL has expired, the client will not be able to connect to the RD Session Host server unless the RD Licensing grace period for the RD Session Host server has not expired. +- If you enable this policy setting, the license server will only issue a temporary RDS CAL to the client if an appropriate RDS CAL for the RD Session Host server isn't available. If the client has already been issued a temporary RDS CAL and the temporary RDS CAL has expired, the client won't be able to connect to the RD Session Host server unless the RD Licensing grace period for the RD Session Host server hasn't expired. -- If you disable or do not configure this policy setting, the license server will exhibit the default behavior noted earlier. +- If you disable or don't configure this policy setting, the license server will exhibit the default behavior noted earlier. @@ -2879,13 +2839,12 @@ By default, if the most appropriate RDS CAL is not available for a connection, a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2912,7 +2871,7 @@ By default, if the most appropriate RDS CAL is not available for a connection, a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2925,12 +2884,12 @@ By default, if the most appropriate RDS CAL is not available for a connection, a This policy setting determines whether a user will be prompted on the client computer to provide credentials for a remote connection to an RD Session Host server. -- If you enable this policy setting, a user will be prompted on the client computer instead of on the RD Session Host server to provide credentials for a remote connection to an RD Session Host server. If saved credentials for the user are available on the client computer, the user will not be prompted to provide credentials. +- If you enable this policy setting, a user will be prompted on the client computer instead of on the RD Session Host server to provide credentials for a remote connection to an RD Session Host server. If saved credentials for the user are available on the client computer, the user won't be prompted to provide credentials. > [!NOTE] > If you enable this policy setting in releases of Windows Server 2008 R2 with SP1 or Windows Server 2008 R2, and a user is prompted on both the client computer and on the RD Session Host server to provide credentials, clear the Always prompt for password check box on the Log on Settings tab in Remote Desktop Session Host Configuration. -- If you disable or do not configure this policy setting, the version of the operating system on the RD Session Host server will determine when a user is prompted to provide credentials for a remote connection to an RD Session Host server. For Windows Server 2003 and Windows 2000 Server a user will be prompted on the terminal server to provide credentials for a remote connection. For Windows Server 2008 and Windows Server 2008 R2, a user will be prompted on the client computer to provide credentials for a remote connection. +- If you disable or don't configure this policy setting, the version of the operating system on the RD Session Host server will determine when a user is prompted to provide credentials for a remote connection to an RD Session Host server. For Windows Server 2003 and Windows 2000 Server a user will be prompted on the terminal server to provide credentials for a remote connection. For Windows Server 2008 and Windows Server 2008 R2, a user will be prompted on the client computer to provide credentials for a remote connection. @@ -2942,13 +2901,12 @@ This policy setting determines whether a user will be prompted on the client com | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2975,7 +2933,7 @@ This policy setting determines whether a user will be prompted on the client com | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2990,9 +2948,9 @@ This policy setting specifies the default connection URL for RemoteApp and Deskt The default connection URL must be configured in the form of< https://contoso.com/rdweb/Feed/webfeed.aspx>. -- If you enable this policy setting, the specified URL is configured as the default connection URL for the user and replaces any existing connection URL. The user cannot change the default connection URL. The user's default logon credentials are used when setting up the default connection URL. +- If you enable this policy setting, the specified URL is configured as the default connection URL for the user and replaces any existing connection URL. The user can't change the default connection URL. The user's default logon credentials are used when setting up the default connection URL. -- If you disable or do not configure this policy setting, the user has no default connection URL. +- If you disable or don't configure this policy setting, the user has no default connection URL. > [!NOTE] > RemoteApp programs that are installed through RemoteApp and Desktop Connections from an untrusted server can compromise the security of a user's account. @@ -3007,13 +2965,12 @@ The default connection URL must be configured in the form of< https://contoso.co | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3039,7 +2996,7 @@ The default connection URL must be configured in the form of< https://contoso.co | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3056,7 +3013,7 @@ By default, when a new user signs in to a computer, the Start screen is shown an - If you enable this policy setting, user sign-in is blocked for up to 6 minutes to complete the app registration. You can use this policy setting when customizing the Start screen on Remote Desktop Session Host servers. -- If you disable or do not configure this policy setting, the Start screen is shown and apps are registered in the background. +- If you disable or don't configure this policy setting, the Start screen is shown and apps are registered in the background. @@ -3068,13 +3025,12 @@ By default, when a new user signs in to a computer, the Start screen is shown an | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3101,7 +3057,7 @@ By default, when a new user signs in to a computer, the Start screen is shown an | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3116,9 +3072,11 @@ By default, when a new user signs in to a computer, the Start screen is shown an - If you enable this policy setting, administrators can interact with a user's Remote Desktop Services session based on the option selected. Select the desired level of control and permission from the options list: 1. No remote control allowed: Disallows an administrator to use remote control or view a remote user session. + 2. Full Control with user's permission: Allows the administrator to interact with the session, with the user's consent. 3. Full Control without user's permission: Allows the administrator to interact with the session, without the user's consent. + 4. View Session with user's permission: Allows the administrator to watch the session of a remote user with the user's consent. 5. View Session without user's permission: Allows the administrator to watch the session of a remote user without the user's consent. @@ -3135,13 +3093,12 @@ By default, when a new user signs in to a computer, the Start screen is shown an | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3167,7 +3124,7 @@ By default, when a new user signs in to a computer, the Start screen is shown an | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3182,9 +3139,11 @@ By default, when a new user signs in to a computer, the Start screen is shown an - If you enable this policy setting, administrators can interact with a user's Remote Desktop Services session based on the option selected. Select the desired level of control and permission from the options list: 1. No remote control allowed: Disallows an administrator to use remote control or view a remote user session. + 2. Full Control with user's permission: Allows the administrator to interact with the session, with the user's consent. 3. Full Control without user's permission: Allows the administrator to interact with the session, without the user's consent. + 4. View Session with user's permission: Allows the administrator to watch the session of a remote user with the user's consent. 5. View Session without user's permission: Allows the administrator to watch the session of a remote user without the user's consent. @@ -3201,13 +3160,12 @@ By default, when a new user signs in to a computer, the Start screen is shown an | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3233,7 +3191,7 @@ By default, when a new user signs in to a computer, the Start screen is shown an | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3244,13 +3202,13 @@ By default, when a new user signs in to a computer, the Start screen is shown an -This policy setting allows you to specify the visual experience that remote users will have in Remote Desktop Connection (RDC) connections that use RemoteFX. You can use this policy to balance the network bandwidth usage with the type of graphics experience that is delivered. +This policy setting allows you to specify the visual experience that remote users will have in Remote Desktop Connection (RDC) connections that use RemoteFX. You can use this policy to balance the network bandwidth usage with the type of graphics experience that's delivered. -Depending on the requirements of your users, you can reduce network bandwidth usage by reducing the screen capture rate. You can also reduce network bandwidth usage by reducing the image quality (increasing the amount of image compression that is performed). +Depending on the requirements of your users, you can reduce network bandwidth usage by reducing the screen capture rate. You can also reduce network bandwidth usage by reducing the image quality (increasing the amount of image compression that's performed). If you have a higher than average bandwidth network, you can maximize the utilization of bandwidth by selecting the highest setting for screen capture rate and the highest setting for image quality. -By default, Remote Desktop Connection sessions that use RemoteFX are optimized for a balanced experience over LAN conditions. If you disable or do not configure this policy setting, Remote Desktop Connection sessions that use RemoteFX will be the same as if the medium screen capture rate and the medium image compression settings were selected (the default behavior). +By default, Remote Desktop Connection sessions that use RemoteFX are optimized for a balanced experience over LAN conditions. If you disable or don't configure this policy setting, Remote Desktop Connection sessions that use RemoteFX will be the same as if the medium screen capture rate and the medium image compression settings were selected (the default behavior). @@ -3262,13 +3220,12 @@ By default, Remote Desktop Connection sessions that use RemoteFX are optimized f | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3294,7 +3251,7 @@ By default, Remote Desktop Connection sessions that use RemoteFX are optimized f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3305,17 +3262,17 @@ By default, Remote Desktop Connection sessions that use RemoteFX are optimized f -This policy setting allows you to specify the name of a farm to join in RD Connection Broker. RD Connection Broker uses the farm name to determine which RD Session Host servers are in the same RD Session Host server farm. Therefore, you must use the same farm name for all RD Session Host servers in the same load-balanced farm. The farm name does not have to correspond to a name in Active Directory Domain Services. +This policy setting allows you to specify the name of a farm to join in RD Connection Broker. RD Connection Broker uses the farm name to determine which RD Session Host servers are in the same RD Session Host server farm. Therefore, you must use the same farm name for all RD Session Host servers in the same load-balanced farm. The farm name doesn't have to correspond to a name in Active Directory Domain Services. If you specify a new farm name, a new farm is created in RD Connection Broker. If you specify an existing farm name, the server joins that farm in RD Connection Broker. - If you enable this policy setting, you must specify the name of a farm in RD Connection Broker. -- If you disable or do not configure this policy setting, the farm name is not specified at the Group Policy level. +- If you disable or don't configure this policy setting, the farm name isn't specified at the Group Policy level. -**Note**: +Note: -1. This policy setting is not effective unless both the Join RD Connection Broker and the Configure RD Connection Broker server name policy settings are enabled and configured by using Group Policy. +1. This policy setting isn't effective unless both the Join RD Connection Broker and the Configure RD Connection Broker server name policy settings are enabled and configured by using Group Policy. 2. For Windows Server 2008, this policy setting is supported on at least Windows Server 2008 Standard. @@ -3329,13 +3286,12 @@ If you specify a new farm name, a new farm is created in RD Connection Broker. I | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3361,7 +3317,7 @@ If you specify a new farm name, a new farm is created in RD Connection Broker. I | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3372,15 +3328,15 @@ If you specify a new farm name, a new farm is created in RD Connection Broker. I -This policy setting allows you to specify the redirection method to use when a client device reconnects to an existing Remote Desktop Services session in a load-balanced RD Session Host server farm. This setting applies to an RD Session Host server that is configured to use RD Connection Broker and not to the RD Connection Broker server. +This policy setting allows you to specify the redirection method to use when a client device reconnects to an existing Remote Desktop Services session in a load-balanced RD Session Host server farm. This setting applies to an RD Session Host server that's configured to use RD Connection Broker and not to the RD Connection Broker server. - If you enable this policy setting, a Remote Desktop Services client queries the RD Connection Broker server and is redirected to their existing session by using the IP address of the RD Session Host server where their session exists. To use this redirection method, client computers must be able to connect directly by IP address to RD Session Host servers in the farm. -- If you disable this policy setting, the IP address of the RD Session Host server is not sent to the client. Instead, the IP address is embedded in a token. When a client reconnects to the load balancer, the routing token is used to redirect the client to their existing session on the correct RD Session Host server in the farm. Only disable this setting when your network load-balancing solution supports the use of RD Connection Broker routing tokens and you do not want clients to directly connect by IP address to RD Session Host servers in the load-balanced farm. +- If you disable this policy setting, the IP address of the RD Session Host server isn't sent to the client. Instead, the IP address is embedded in a token. When a client reconnects to the load balancer, the routing token is used to redirect the client to their existing session on the correct RD Session Host server in the farm. Only disable this setting when your network load-balancing solution supports the use of RD Connection Broker routing tokens and you don't want clients to directly connect by IP address to RD Session Host servers in the load-balanced farm. -- If you do not configure this policy setting, the Use IP address redirection policy setting is not enforced at the group Group policy Policy level and the default will be used. This setting is enabled by default. +- If you don't configure this policy setting, the Use IP address redirection policy setting isn't enforced at the group Group policy Policy level and the default will be used. This setting is enabled by default. -**Note**: +Note: 1. For Windows Server 2008, this policy setting is supported on at least Windows Server 2008 Standard. @@ -3394,13 +3350,12 @@ This policy setting allows you to specify the redirection method to use when a c | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3427,7 +3382,7 @@ This policy setting allows you to specify the redirection method to use when a c | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3442,13 +3397,13 @@ This policy setting allows you to specify the RD Connection Broker server that t - If you enable this policy setting, you must specify the RD Connection Broker server by using its fully qualified domain name (FQDN). In Windows Server 2012, for a high availability setup with multiple RD Connection Broker servers, you must provide a semi-colon separated list of the FQDNs of all the RD Connection Broker servers. -- If you disable or do not configure this policy setting, the policy setting is not specified at the Group Policy level. +- If you disable or don't configure this policy setting, the policy setting isn't specified at the Group Policy level. -**Note**: +Note: 1. For Windows Server 2008, this policy setting is supported on at least Windows Server 2008 Standard. -2. This policy setting is not effective unless the Join RD Connection Broker policy setting is enabled. +2. This policy setting isn't effective unless the Join RD Connection Broker policy setting is enabled. 3. To be an active member of an RD Session Host server farm, the computer account for each RD Session Host server in the farm must be a member of one of the following local groups on the RD Connection Broker server: Session Directory Computers, Session Broker Computers, or RDS Endpoint Servers. @@ -3462,13 +3417,12 @@ This policy setting allows you to specify the RD Connection Broker server that t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3494,7 +3448,7 @@ This policy setting allows you to specify the RD Connection Broker server that t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3509,13 +3463,13 @@ This policy setting specifies whether to require the use of a specific security - If you enable this policy setting, all communications between clients and RD Session Host servers during remote connections must use the security method specified in this setting. The following security methods are available: -* Negotiate: The Negotiate method enforces the most secure method that is supported by the client. If Transport Layer Security (TLS) version 1.0 is supported, it is used to authenticate the RD Session Host server. If TLS is not supported, native Remote Desktop Protocol (RDP) encryption is used to secure communications, but the RD Session Host server is not authenticated. Native RDP encryption (as opposed to SSL encryption) is not recommended. +* Negotiate: The Negotiate method enforces the most secure method that's supported by the client. If Transport Layer Security (TLS) version 1.0 is supported, it's used to authenticate the RD Session Host server. If TLS isn't supported, native Remote Desktop Protocol (RDP) encryption is used to secure communications, but the RD Session Host server isn't authenticated. Native RDP encryption (as opposed to SSL encryption) isn't recommended. -* RDP: The RDP method uses native RDP encryption to secure communications between the client and RD Session Host server. If you select this setting, the RD Session Host server is not authenticated. Native RDP encryption (as opposed to SSL encryption) is not recommended. +* RDP: The RDP method uses native RDP encryption to secure communications between the client and RD Session Host server. If you select this setting, the RD Session Host server isn't authenticated. Native RDP encryption (as opposed to SSL encryption) isn't recommended. -* SSL (TLS 1.0): The SSL method requires the use of TLS 1.0 to authenticate the RD Session Host server. If TLS is not supported, the connection fails. This is the recommended setting for this policy. +* SSL (TLS 1.0): The SSL method requires the use of TLS 1.0 to authenticate the RD Session Host server. If TLS isn't supported, the connection fails. This is the recommended setting for this policy. -- If you disable or do not configure this policy setting, the security method to be used for remote connections to RD Session Host servers is not specified at the Group Policy level. +- If you disable or don't configure this policy setting, the security method to be used for remote connections to RD Session Host servers isn't specified at the Group Policy level. @@ -3527,13 +3481,12 @@ This policy setting specifies whether to require the use of a specific security | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3559,7 +3512,7 @@ This policy setting specifies whether to require the use of a specific security | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3574,13 +3527,13 @@ This policy setting allows you to specify how the Remote Desktop Protocol will t You can choose to disable Connect Time Detect, Continuous Network Detect, or both Connect Time Detect and Continuous Network Detect. -If you disable Connect Time Detect, Remote Desktop Protocol will not determine the network quality at the connect time, and it will assume that all traffic to this server originates from a low-speed connection. +If you disable Connect Time Detect, Remote Desktop Protocol won't determine the network quality at the connect time, and it will assume that all traffic to this server originates from a low-speed connection. -If you disable Continuous Network Detect, Remote Desktop Protocol will not try to adapt the remote user experience to varying network quality. +If you disable Continuous Network Detect, Remote Desktop Protocol won't try to adapt the remote user experience to varying network quality. -If you disable Connect Time Detect and Continuous Network Detect, Remote Desktop Protocol will not try to determine the network quality at the connect time; instead it will assume that all traffic to this server originates from a low-speed connection, and it will not try to adapt the user experience to varying network quality. +If you disable Connect Time Detect and Continuous Network Detect, Remote Desktop Protocol won't try to determine the network quality at the connect time; instead it will assume that all traffic to this server originates from a low-speed connection, and it won't try to adapt the user experience to varying network quality. -If you disable or do not configure this policy setting, Remote Desktop Protocol will spend up to a few seconds trying to determine the network quality prior to the connection, and it will continuously try to adapt the user experience to varying network quality. +If you disable or don't configure this policy setting, Remote Desktop Protocol will spend up to a few seconds trying to determine the network quality prior to the connection, and it will continuously try to adapt the user experience to varying network quality. @@ -3592,13 +3545,12 @@ If you disable or do not configure this policy setting, Remote Desktop Protocol | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3624,7 +3576,7 @@ If you disable or do not configure this policy setting, Remote Desktop Protocol | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3639,13 +3591,13 @@ This policy setting allows you to specify which protocols can be used for Remote - If you enable this policy setting, you must specify if you would like RDP to use UDP. -You can select one of the following options: "Use both UDP and TCP", "Use only TCP" or "Use either UDP or TCP (default)" +You can select one of the following options: "Use both UDP and TCP", "Use only TCP" or "Use either UDP or TCP (default)". If you select "Use either UDP or TCP" and the UDP connection is successful, most of the RDP traffic will use UDP. -If the UDP connection is not successful or if you select "Use only TCP," all of the RDP traffic will use TCP. +If the UDP connection isn't successful or if you select "Use only TCP," all of the RDP traffic will use TCP. -- If you disable or do not configure this policy setting, RDP will choose the optimal protocols for delivering the best user experience. +- If you disable or don't configure this policy setting, RDP will choose the optimal protocols for delivering the best user experience. @@ -3657,13 +3609,12 @@ If the UDP connection is not successful or if you select "Use only TCP," all of | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3689,7 +3640,7 @@ If the UDP connection is not successful or if you select "Use only TCP," all of | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3700,11 +3651,11 @@ If the UDP connection is not successful or if you select "Use only TCP," all of -This policy setting allows you to enable RemoteApp programs to use advanced graphics, including support for transparency, live thumbnails, and seamless application moves. This policy setting applies only to RemoteApp programs and does not apply to remote desktop sessions. +This policy setting allows you to enable RemoteApp programs to use advanced graphics, including support for transparency, live thumbnails, and seamless application moves. This policy setting applies only to RemoteApp programs and doesn't apply to remote desktop sessions. -- If you enable or do not configure this policy setting, RemoteApp programs published from this RD Session Host server will use these advanced graphics. +- If you enable or don't configure this policy setting, RemoteApp programs published from this RD Session Host server will use these advanced graphics. -- If you disable this policy setting, RemoteApp programs published from this RD Session Host server will not use these advanced graphics. You may want to choose this option if you discover that applications published as RemoteApp programs do not support these advanced graphics. +- If you disable this policy setting, RemoteApp programs published from this RD Session Host server won't use these advanced graphics. You may want to choose this option if you discover that applications published as RemoteApp programs don't support these advanced graphics. @@ -3716,13 +3667,12 @@ This policy setting allows you to enable RemoteApp programs to use advanced grap | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3749,7 +3699,7 @@ This policy setting allows you to enable RemoteApp programs to use advanced grap | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3760,17 +3710,17 @@ This policy setting allows you to enable RemoteApp programs to use advanced grap -This policy setting allows you to specify whether the client will establish a connection to the RD Session Host server when the client cannot authenticate the RD Session Host server. +This policy setting allows you to specify whether the client will establish a connection to the RD Session Host server when the client can't authenticate the RD Session Host server. - If you enable this policy setting, you must specify one of the following settings: -Always connect, even if authentication fails: The client connects to the RD Session Host server even if the client cannot authenticate the RD Session Host server. +Always connect, even if authentication fails: The client connects to the RD Session Host server even if the client can't authenticate the RD Session Host server. -Warn me if authentication fails: The client attempts to authenticate the RD Session Host server. If the RD Session Host server can be authenticated, the client establishes a connection to the RD Session Host server. If the RD Session Host server cannot be authenticated, the user is prompted to choose whether to connect to the RD Session Host server without authenticating the RD Session Host server. +Warn me if authentication fails: The client attempts to authenticate the RD Session Host server. If the RD Session Host server can be authenticated, the client establishes a connection to the RD Session Host server. If the RD Session Host server can't be authenticated, the user is prompted to choose whether to connect to the RD Session Host server without authenticating the RD Session Host server. -Do not connect if authentication fails: The client establishes a connection to the RD Session Host server only if the RD Session Host server can be authenticated. +Don't connect if authentication fails: The client establishes a connection to the RD Session Host server only if the RD Session Host server can be authenticated. -- If you disable or do not configure this policy setting, the authentication setting that is specified in Remote Desktop Connection or in the .rdp file determines whether the client establishes a connection to the RD Session Host server when the client cannot authenticate the RD Session Host server. +- If you disable or don't configure this policy setting, the authentication setting that's specified in Remote Desktop Connection or in the .rdp file determines whether the client establishes a connection to the RD Session Host server when the client can't authenticate the RD Session Host server. @@ -3782,13 +3732,12 @@ Do not connect if authentication fails: The client establishes a connection to t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3814,7 +3763,7 @@ Do not connect if authentication fails: The client establishes a connection to t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3825,7 +3774,7 @@ Do not connect if authentication fails: The client establishes a connection to t -This policy setting lets you enable H.264/AVC hardware encoding support for Remote Desktop Connections. When you enable hardware encoding, if an error occurs, we will attempt to use software encoding. If you disable or do not configure this policy, we will always use software encoding. +This policy setting lets you enable H.264/AVC hardware encoding support for Remote Desktop Connections. When you enable hardware encoding, if an error occurs, we will attempt to use software encoding. If you disable or don't configure this policy, we will always use software encoding. @@ -3837,13 +3786,12 @@ This policy setting lets you enable H.264/AVC hardware encoding support for Remo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3870,7 +3818,7 @@ This policy setting lets you enable H.264/AVC hardware encoding support for Remo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3893,13 +3841,12 @@ This policy setting prioritizes the H.264/AVC 444 graphics mode for non-RemoteFX | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3926,7 +3873,7 @@ This policy setting prioritizes the H.264/AVC 444 graphics mode for non-RemoteFX | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3939,13 +3886,13 @@ This policy setting prioritizes the H.264/AVC 444 graphics mode for non-RemoteFX This policy setting allows you to specify which Remote Desktop Protocol (RDP) compression algorithm to use. -By default, servers use an RDP compression algorithm that is based on the server's hardware configuration. +By default, servers use an RDP compression algorithm that's based on the server's hardware configuration. -- If you enable this policy setting, you can specify which RDP compression algorithm to use. If you select the algorithm that is optimized to use less memory, this option is less memory-intensive, but uses more network bandwidth. If you select the algorithm that is optimized to use less network bandwidth, this option uses less network bandwidth, but is more memory-intensive. Additionally, a third option is available that balances memory usage and network bandwidth. In Windows 8 only the compression algorithm that balances memory usage and bandwidth is used. +- If you enable this policy setting, you can specify which RDP compression algorithm to use. If you select the algorithm that's optimized to use less memory, this option is less memory-intensive, but uses more network bandwidth. If you select the algorithm that's optimized to use less network bandwidth, this option uses less network bandwidth, but is more memory-intensive. Additionally, a third option is available that balances memory usage and network bandwidth. In Windows 8 only the compression algorithm that balances memory usage and bandwidth is used. -You can also choose not to use an RDP compression algorithm. Choosing not to use an RDP compression algorithm will use more network bandwidth and is only recommended if you are using a hardware device that is designed to optimize network traffic. Even if you choose not to use an RDP compression algorithm, some graphics data will still be compressed. +You can also choose not to use an RDP compression algorithm. Choosing not to use an RDP compression algorithm will use more network bandwidth and is only recommended if you are using a hardware device that's designed to optimize network traffic. Even if you choose not to use an RDP compression algorithm, some graphics data will still be compressed. -- If you disable or do not configure this policy setting, the default RDP compression algorithm will be used. +- If you disable or don't configure this policy setting, the default RDP compression algorithm will be used. @@ -3957,13 +3904,12 @@ You can also choose not to use an RDP compression algorithm. Choosing not to use | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3989,7 +3935,7 @@ You can also choose not to use an RDP compression algorithm. Choosing not to use | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4000,7 +3946,7 @@ You can also choose not to use an RDP compression algorithm. Choosing not to use -This policy setting allows you to specify the visual quality for remote users when connecting to this computer by using Remote Desktop Connection. You can use this policy setting to balance the network bandwidth usage with the visual quality that is delivered. +This policy setting allows you to specify the visual quality for remote users when connecting to this computer by using Remote Desktop Connection. You can use this policy setting to balance the network bandwidth usage with the visual quality that's delivered. - If you enable this policy setting and set quality to Low, RemoteFX Adaptive Graphics uses an encoding mechanism that results in low quality images. This mode consumes the lowest amount of network bandwidth of the quality modes. @@ -4008,8 +3954,9 @@ This policy setting allows you to specify the visual quality for remote users wh - If you enable this policy setting and set quality to High, RemoteFX Adaptive Graphics uses an encoding mechanism that results in high quality images and consumes moderate network bandwidth. -- If you enable this policy setting and set quality to Lossless, RemoteFX Adaptive Graphics uses lossless encoding. In this mode, the color integrity of the graphics data is not impacted. However, this setting results in a significant increase in network bandwidth consumption. We recommend that you set this for very specific cases only. -- If you disable or do not configure this policy setting, RemoteFX Adaptive Graphics uses an encoding mechanism that results in medium quality images. +- If you enable this policy setting and set quality to Lossless, RemoteFX Adaptive Graphics uses lossless encoding. In this mode, the color integrity of the graphics data isn't impacted. However, this setting results in a significant increase in network bandwidth consumption. We recommend that you set this for very specific cases only. + +- If you disable or don't configure this policy setting, RemoteFX Adaptive Graphics uses an encoding mechanism that results in medium quality images. @@ -4021,13 +3968,12 @@ This policy setting allows you to specify the visual quality for remote users wh | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4053,7 +3999,7 @@ This policy setting allows you to specify the visual quality for remote users wh | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4067,7 +4013,8 @@ This policy setting allows you to specify the visual quality for remote users wh This policy setting allows you to configure graphics encoding to use the RemoteFX Codec on the Remote Desktop Session Host server so that the sessions are compatible with non-Windows thin client devices designed for Windows Server 2008 R2 SP1. These clients only support the Windows Server 2008 R2 SP1 RemoteFX Codec. - If you enable this policy setting, users' sessions on this server will only use the Windows Server 2008 R2 SP1 RemoteFX Codec for encoding. This mode is compatible with thin client devices that only support the Windows Server 2008 R2 SP1 RemoteFX Codec. -- If you disable or do not configure this policy setting, non-Windows thin clients that only support the Windows Server 2008 R2 SP1 RemoteFX Codec will not be able to connect to this server. This policy setting applies only to clients that are using Remote Desktop Protocol (RDP) 7.1, and does not affect clients that are using other RDP versions. + +- If you disable or don't configure this policy setting, non-Windows thin clients that only support the Windows Server 2008 R2 SP1 RemoteFX Codec won't be able to connect to this server. This policy setting applies only to clients that are using Remote Desktop Protocol (RDP) 7.1, and doesn't affect clients that are using other RDP versions. @@ -4079,13 +4026,12 @@ This policy setting allows you to configure graphics encoding to use the RemoteF | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4112,7 +4058,7 @@ This policy setting allows you to configure graphics encoding to use the RemoteF | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4128,11 +4074,11 @@ This policy setting allows the administrator to configure the RemoteFX experienc - If you enable this policy setting, the RemoteFX experience could be set to one of the following options: 1. Let the system choose the experience for the network condition -2. Optimize for server scalability +2. Optimize for server scalability. -3. Optimize for minimum bandwidth usage +3. Optimize for minimum bandwidth usage. -- If you disable or do not configure this policy setting, the RemoteFX experience will change dynamically based on the network condition." +- If you disable or don't configure this policy setting, the RemoteFX experience will change dynamically based on the network condition". @@ -4144,13 +4090,12 @@ This policy setting allows the administrator to configure the RemoteFX experienc | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4176,7 +4121,7 @@ This policy setting allows the administrator to configure the RemoteFX experienc | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4193,7 +4138,7 @@ By default, Remote Desktop Services sessions are optimized for rich multimedia, - If you enable this policy setting, you must select the visual experience for which you want to optimize Remote Desktop Services sessions. You can select either Rich multimedia or Text. -- If you disable or do not configure this policy setting, Remote Desktop Services sessions are optimized for rich multimedia. +- If you disable or don't configure this policy setting, Remote Desktop Services sessions are optimized for rich multimedia. @@ -4205,13 +4150,12 @@ By default, Remote Desktop Services sessions are optimized for rich multimedia, | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4237,7 +4181,7 @@ By default, Remote Desktop Services sessions are optimized for rich multimedia, | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4250,7 +4194,7 @@ By default, Remote Desktop Services sessions are optimized for rich multimedia, This policy setting lets you enable WDDM graphics display driver for Remote Desktop Connections. -- If you enable or do not configure this policy setting, Remote Desktop Connections will use WDDM graphics display driver. +- If you enable or don't configure this policy setting, Remote Desktop Connections will use WDDM graphics display driver. - If you disable this policy setting, Remote Desktop Connections will NOT use WDDM graphics display driver. In this case, the Remote Desktop Connections will use XDDM graphics display driver. @@ -4266,13 +4210,12 @@ For this change to take effect, you must restart Windows. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4299,7 +4242,7 @@ For this change to take effect, you must restart Windows. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4320,10 +4263,10 @@ Time limits are set locally by the server administrator or by using Group Policy - If you disable this policy setting, Remote Desktop Services always disconnects a timed-out session, even if specified otherwise by the server administrator. -- If you do not configure this policy setting, Remote Desktop Services disconnects a timed-out session, unless specified otherwise in local settings. +- If you don't configure this policy setting, Remote Desktop Services disconnects a timed-out session, unless specified otherwise in local settings. > [!NOTE] -> This policy setting only applies to time-out limits that are explicitly set by the administrator. This policy setting does not apply to time-out events that occur due to connectivity or network conditions. This setting appears in both Computer Configuration and User Configuration. If both settings are configured, the Computer Configuration setting takes precedence. +> This policy setting only applies to time-out limits that are explicitly set by the administrator. This policy setting doesn't apply to time-out events that occur due to connectivity or network conditions. This setting appears in both Computer Configuration and User Configuration. If both settings are configured, the Computer Configuration setting takes precedence. @@ -4335,13 +4278,12 @@ Time limits are set locally by the server administrator or by using Group Policy | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4368,7 +4310,7 @@ Time limits are set locally by the server administrator or by using Group Policy | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4389,10 +4331,10 @@ Time limits are set locally by the server administrator or by using Group Policy - If you disable this policy setting, Remote Desktop Services always disconnects a timed-out session, even if specified otherwise by the server administrator. -- If you do not configure this policy setting, Remote Desktop Services disconnects a timed-out session, unless specified otherwise in local settings. +- If you don't configure this policy setting, Remote Desktop Services disconnects a timed-out session, unless specified otherwise in local settings. > [!NOTE] -> This policy setting only applies to time-out limits that are explicitly set by the administrator. This policy setting does not apply to time-out events that occur due to connectivity or network conditions. This setting appears in both Computer Configuration and User Configuration. If both settings are configured, the Computer Configuration setting takes precedence. +> This policy setting only applies to time-out limits that are explicitly set by the administrator. This policy setting doesn't apply to time-out events that occur due to connectivity or network conditions. This setting appears in both Computer Configuration and User Configuration. If both settings are configured, the Computer Configuration setting takes precedence. @@ -4404,13 +4346,12 @@ Time limits are set locally by the server administrator or by using Group Policy | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4437,7 +4378,7 @@ Time limits are set locally by the server administrator or by using Group Policy | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4454,9 +4395,9 @@ You can use this policy setting to specify the maximum amount of time that a dis When a session is in a disconnected state, running programs are kept active even though the user is no longer actively connected. By default, these disconnected sessions are maintained for an unlimited time on the server. -- If you enable this policy setting, disconnected sessions are deleted from the server after the specified amount of time. To enforce the default behavior that disconnected sessions are maintained for an unlimited time, select Never. If you have a console session, disconnected session time limits do not apply. +- If you enable this policy setting, disconnected sessions are deleted from the server after the specified amount of time. To enforce the default behavior that disconnected sessions are maintained for an unlimited time, select Never. If you have a console session, disconnected session time limits don't apply. -- If you disable or do not configure this policy setting, this policy setting is not specified at the Group Policy level. Be y default, Remote Desktop Services disconnected sessions are maintained for an unlimited amount of time. +- If you disable or don't configure this policy setting, this policy setting isn't specified at the Group Policy level. Be y default, Remote Desktop Services disconnected sessions are maintained for an unlimited amount of time. > [!NOTE] > This policy setting appears in both Computer Configuration and User Configuration. If both policy settings are configured, the Computer Configuration policy setting takes precedence. @@ -4471,13 +4412,12 @@ When a session is in a disconnected state, running programs are kept active even | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4503,7 +4443,7 @@ When a session is in a disconnected state, running programs are kept active even | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4520,9 +4460,9 @@ You can use this policy setting to specify the maximum amount of time that a dis When a session is in a disconnected state, running programs are kept active even though the user is no longer actively connected. By default, these disconnected sessions are maintained for an unlimited time on the server. -- If you enable this policy setting, disconnected sessions are deleted from the server after the specified amount of time. To enforce the default behavior that disconnected sessions are maintained for an unlimited time, select Never. If you have a console session, disconnected session time limits do not apply. +- If you enable this policy setting, disconnected sessions are deleted from the server after the specified amount of time. To enforce the default behavior that disconnected sessions are maintained for an unlimited time, select Never. If you have a console session, disconnected session time limits don't apply. -- If you disable or do not configure this policy setting, this policy setting is not specified at the Group Policy level. Be y default, Remote Desktop Services disconnected sessions are maintained for an unlimited amount of time. +- If you disable or don't configure this policy setting, this policy setting isn't specified at the Group Policy level. Be y default, Remote Desktop Services disconnected sessions are maintained for an unlimited amount of time. > [!NOTE] > This policy setting appears in both Computer Configuration and User Configuration. If both policy settings are configured, the Computer Configuration policy setting takes precedence. @@ -4537,13 +4477,12 @@ When a session is in a disconnected state, running programs are kept active even | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4569,7 +4508,7 @@ When a session is in a disconnected state, running programs are kept active even | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4580,13 +4519,13 @@ When a session is in a disconnected state, running programs are kept active even -This policy setting allows you to specify the maximum amount of time that an active Remote Desktop Services session can be idle (without user input) before it is automatically disconnected. +This policy setting allows you to specify the maximum amount of time that an active Remote Desktop Services session can be idle (without user input) before it's automatically disconnected. -- If you enable this policy setting, you must select the desired time limit in the Idle session limit list. Remote Desktop Services will automatically disconnect active but idle sessions after the specified amount of time. The user receives a warning two minutes before the session disconnects, which allows the user to press a key or move the mouse to keep the session active. If you have a console session, idle session time limits do not apply. +- If you enable this policy setting, you must select the desired time limit in the Idle session limit list. Remote Desktop Services will automatically disconnect active but idle sessions after the specified amount of time. The user receives a warning two minutes before the session disconnects, which allows the user to press a key or move the mouse to keep the session active. If you have a console session, idle session time limits don't apply. -- If you disable or do not configure this policy setting, the time limit is not specified at the Group Policy level. By default, Remote Desktop Services allows sessions to remain active but idle for an unlimited amount of time. +- If you disable or don't configure this policy setting, the time limit isn't specified at the Group Policy level. By default, Remote Desktop Services allows sessions to remain active but idle for an unlimited amount of time. -If you want Remote Desktop Services to end instead of disconnect a session when the time limit is reached, you can configure the policy setting Computer Configuration\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Session Time Limits\End session when time limits are reached. +If you want Remote Desktop Services to end instead of disconnect a session when the time limit's reached, you can configure the policy setting Computer Configuration\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Session Time Limits\End session when time limits are reached. > [!NOTE] > This policy setting appears in both Computer Configuration and User Configuration. If both policy settings are configured, the Computer Configuration policy setting takes precedence. @@ -4601,13 +4540,12 @@ If you want Remote Desktop Services to end instead of disconnect a session when | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4633,7 +4571,7 @@ If you want Remote Desktop Services to end instead of disconnect a session when | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4644,13 +4582,13 @@ If you want Remote Desktop Services to end instead of disconnect a session when -This policy setting allows you to specify the maximum amount of time that an active Remote Desktop Services session can be idle (without user input) before it is automatically disconnected. +This policy setting allows you to specify the maximum amount of time that an active Remote Desktop Services session can be idle (without user input) before it's automatically disconnected. -- If you enable this policy setting, you must select the desired time limit in the Idle session limit list. Remote Desktop Services will automatically disconnect active but idle sessions after the specified amount of time. The user receives a warning two minutes before the session disconnects, which allows the user to press a key or move the mouse to keep the session active. If you have a console session, idle session time limits do not apply. +- If you enable this policy setting, you must select the desired time limit in the Idle session limit list. Remote Desktop Services will automatically disconnect active but idle sessions after the specified amount of time. The user receives a warning two minutes before the session disconnects, which allows the user to press a key or move the mouse to keep the session active. If you have a console session, idle session time limits don't apply. -- If you disable or do not configure this policy setting, the time limit is not specified at the Group Policy level. By default, Remote Desktop Services allows sessions to remain active but idle for an unlimited amount of time. +- If you disable or don't configure this policy setting, the time limit isn't specified at the Group Policy level. By default, Remote Desktop Services allows sessions to remain active but idle for an unlimited amount of time. -If you want Remote Desktop Services to end instead of disconnect a session when the time limit is reached, you can configure the policy setting Computer Configuration\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Session Time Limits\End session when time limits are reached. +If you want Remote Desktop Services to end instead of disconnect a session when the time limit's reached, you can configure the policy setting Computer Configuration\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Session Time Limits\End session when time limits are reached. > [!NOTE] > This policy setting appears in both Computer Configuration and User Configuration. If both policy settings are configured, the Computer Configuration policy setting takes precedence. @@ -4665,13 +4603,12 @@ If you want Remote Desktop Services to end instead of disconnect a session when | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4697,7 +4634,7 @@ If you want Remote Desktop Services to end instead of disconnect a session when | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4708,13 +4645,13 @@ If you want Remote Desktop Services to end instead of disconnect a session when -This policy setting allows you to specify the maximum amount of time that a Remote Desktop Services session can be active before it is automatically disconnected. +This policy setting allows you to specify the maximum amount of time that a Remote Desktop Services session can be active before it's automatically disconnected. -- If you enable this policy setting, you must select the desired time limit in the Active session limit list. Remote Desktop Services will automatically disconnect active sessions after the specified amount of time. The user receives a warning two minutes before the Remote Desktop Services session disconnects, which allows the user to save open files and close programs. If you have a console session, active session time limits do not apply. +- If you enable this policy setting, you must select the desired time limit in the Active session limit list. Remote Desktop Services will automatically disconnect active sessions after the specified amount of time. The user receives a warning two minutes before the Remote Desktop Services session disconnects, which allows the user to save open files and close programs. If you have a console session, active session time limits don't apply. -- If you disable or do not configure this policy setting, this policy setting is not specified at the Group Policy level. By default, Remote Desktop Services allows sessions to remain active for an unlimited amount of time. +- If you disable or don't configure this policy setting, this policy setting isn't specified at the Group Policy level. By default, Remote Desktop Services allows sessions to remain active for an unlimited amount of time. -If you want Remote Desktop Services to end instead of disconnect a session when the time limit is reached, you can configure the policy setting Computer Configuration\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Session Time Limits\End session when time limits are reached. +If you want Remote Desktop Services to end instead of disconnect a session when the time limit's reached, you can configure the policy setting Computer Configuration\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Session Time Limits\End session when time limits are reached. > [!NOTE] > This policy setting appears in both Computer Configuration and User Configuration. If both policy settings are configured, the Computer Configuration policy setting takes precedence. @@ -4729,13 +4666,12 @@ If you want Remote Desktop Services to end instead of disconnect a session when | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4761,7 +4697,7 @@ If you want Remote Desktop Services to end instead of disconnect a session when | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4772,13 +4708,13 @@ If you want Remote Desktop Services to end instead of disconnect a session when -This policy setting allows you to specify the maximum amount of time that a Remote Desktop Services session can be active before it is automatically disconnected. +This policy setting allows you to specify the maximum amount of time that a Remote Desktop Services session can be active before it's automatically disconnected. -- If you enable this policy setting, you must select the desired time limit in the Active session limit list. Remote Desktop Services will automatically disconnect active sessions after the specified amount of time. The user receives a warning two minutes before the Remote Desktop Services session disconnects, which allows the user to save open files and close programs. If you have a console session, active session time limits do not apply. +- If you enable this policy setting, you must select the desired time limit in the Active session limit list. Remote Desktop Services will automatically disconnect active sessions after the specified amount of time. The user receives a warning two minutes before the Remote Desktop Services session disconnects, which allows the user to save open files and close programs. If you have a console session, active session time limits don't apply. -- If you disable or do not configure this policy setting, this policy setting is not specified at the Group Policy level. By default, Remote Desktop Services allows sessions to remain active for an unlimited amount of time. +- If you disable or don't configure this policy setting, this policy setting isn't specified at the Group Policy level. By default, Remote Desktop Services allows sessions to remain active for an unlimited amount of time. -If you want Remote Desktop Services to end instead of disconnect a session when the time limit is reached, you can configure the policy setting Computer Configuration\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Session Time Limits\End session when time limits are reached. +If you want Remote Desktop Services to end instead of disconnect a session when the time limit's reached, you can configure the policy setting Computer Configuration\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Session Time Limits\End session when time limits are reached. > [!NOTE] > This policy setting appears in both Computer Configuration and User Configuration. If both policy settings are configured, the Computer Configuration policy setting takes precedence. @@ -4793,13 +4729,12 @@ If you want Remote Desktop Services to end instead of disconnect a session when | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4825,7 +4760,7 @@ If you want Remote Desktop Services to end instead of disconnect a session when | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4842,7 +4777,7 @@ This policy setting allows you to restrict users to a single Remote Desktop Serv - If you disable this policy setting, users are allowed to make unlimited simultaneous remote connections by using Remote Desktop Services. -- If you do not configure this policy setting, this policy setting is not specified at the Group Policy level. +- If you don't configure this policy setting, this policy setting isn't specified at the Group Policy level. @@ -4854,13 +4789,12 @@ This policy setting allows you to restrict users to a single Remote Desktop Serv | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4887,7 +4821,7 @@ This policy setting allows you to restrict users to a single Remote Desktop Serv | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4900,9 +4834,9 @@ This policy setting allows you to restrict users to a single Remote Desktop Serv This policy setting allows you to control the redirection of smart card devices in a Remote Desktop Services session. -- If you enable this policy setting, Remote Desktop Services users cannot use a smart card to log on to a Remote Desktop Services session. +- If you enable this policy setting, Remote Desktop Services users can't use a smart card to log on to a Remote Desktop Services session. -- If you disable or do not configure this policy setting, smart card device redirection is allowed. By default, Remote Desktop Services automatically redirects smart card devices on connection. +- If you disable or don't configure this policy setting, smart card device redirection is allowed. By default, Remote Desktop Services automatically redirects smart card devices on connection. > [!NOTE] > The client computer must be running at least Microsoft Windows 2000 Server or at least Microsoft Windows XP Professional and the target server must be joined to a domain. @@ -4917,13 +4851,12 @@ This policy setting allows you to control the redirection of smart card devices | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4950,7 +4883,7 @@ This policy setting allows you to control the redirection of smart card devices | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4965,13 +4898,13 @@ Configures Remote Desktop Services to run a specified program automatically upon You can use this setting to specify a program to run automatically when a user logs on to a remote computer. -By default, Remote Desktop Services sessions provide access to the full Windows desktop, unless otherwise specified with this setting, by the server administrator, or by the user in configuring the client connection. Enabling this setting overrides the "Start Program" settings set by the server administrator or user. The Start menu and Windows Desktop are not displayed, and when the user exits the program the session is automatically logged off. +By default, Remote Desktop Services sessions provide access to the full Windows desktop, unless otherwise specified with this setting, by the server administrator, or by the user in configuring the client connection. Enabling this setting overrides the "Start Program" settings set by the server administrator or user. The Start menu and Windows Desktop aren't displayed, and when the user exits the program the session is automatically logged off. -To use this setting, in Program path and file name, type the fully qualified path and file name of the executable file to be run when the user logs on. If necessary, in Working Directory, type the fully qualified path to the starting directory for the program. If you leave Working Directory blank, the program runs with its default working directory. If the specified program path, file name, or working directory is not the name of a valid directory, the RD Session Host server connection fails with an error message. +To use this setting, in Program path and file name, type the fully qualified path and file name of the executable file to be run when the user logs on. If necessary, in Working Directory, type the fully qualified path to the starting directory for the program. If you leave Working Directory blank, the program runs with its default working directory. If the specified program path, file name, or working directory isn't the name of a valid directory, the RD Session Host server connection fails with an error message. -If the status is set to Enabled, Remote Desktop Services sessions automatically run the specified program and use the specified Working Directory (or the program default directory, if Working Directory is not specified) as the working directory for the program. +If the status is set to Enabled, Remote Desktop Services sessions automatically run the specified program and use the specified Working Directory (or the program default directory, if Working Directory isn't specified) as the working directory for the program. -If the status is set to Disabled or Not Configured, Remote Desktop Services sessions start with the full desktop, unless the server administrator or user specify otherwise. (See "Computer Configuration\Administrative Templates\System\Logon\Run these programs at user logon" setting.) +If the status is set to Disabled or Not Configured, Remote Desktop Services sessions start with the full desktop, unless the server administrator or user specify otherwise. (See "Computer Configuration\Administrative Templates\System\Logon\Run these programs at user logon" setting). > [!NOTE] > This setting appears in both Computer Configuration and User Configuration. If both settings are configured, the Computer Configuration setting overrides. @@ -4986,13 +4919,12 @@ If the status is set to Disabled or Not Configured, Remote Desktop Services sess | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5019,7 +4951,7 @@ If the status is set to Disabled or Not Configured, Remote Desktop Services sess | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5034,13 +4966,13 @@ Configures Remote Desktop Services to run a specified program automatically upon You can use this setting to specify a program to run automatically when a user logs on to a remote computer. -By default, Remote Desktop Services sessions provide access to the full Windows desktop, unless otherwise specified with this setting, by the server administrator, or by the user in configuring the client connection. Enabling this setting overrides the "Start Program" settings set by the server administrator or user. The Start menu and Windows Desktop are not displayed, and when the user exits the program the session is automatically logged off. +By default, Remote Desktop Services sessions provide access to the full Windows desktop, unless otherwise specified with this setting, by the server administrator, or by the user in configuring the client connection. Enabling this setting overrides the "Start Program" settings set by the server administrator or user. The Start menu and Windows Desktop aren't displayed, and when the user exits the program the session is automatically logged off. -To use this setting, in Program path and file name, type the fully qualified path and file name of the executable file to be run when the user logs on. If necessary, in Working Directory, type the fully qualified path to the starting directory for the program. If you leave Working Directory blank, the program runs with its default working directory. If the specified program path, file name, or working directory is not the name of a valid directory, the RD Session Host server connection fails with an error message. +To use this setting, in Program path and file name, type the fully qualified path and file name of the executable file to be run when the user logs on. If necessary, in Working Directory, type the fully qualified path to the starting directory for the program. If you leave Working Directory blank, the program runs with its default working directory. If the specified program path, file name, or working directory isn't the name of a valid directory, the RD Session Host server connection fails with an error message. -If the status is set to Enabled, Remote Desktop Services sessions automatically run the specified program and use the specified Working Directory (or the program default directory, if Working Directory is not specified) as the working directory for the program. +If the status is set to Enabled, Remote Desktop Services sessions automatically run the specified program and use the specified Working Directory (or the program default directory, if Working Directory isn't specified) as the working directory for the program. -If the status is set to Disabled or Not Configured, Remote Desktop Services sessions start with the full desktop, unless the server administrator or user specify otherwise. (See "Computer Configuration\Administrative Templates\System\Logon\Run these programs at user logon" setting.) +If the status is set to Disabled or Not Configured, Remote Desktop Services sessions start with the full desktop, unless the server administrator or user specify otherwise. (See "Computer Configuration\Administrative Templates\System\Logon\Run these programs at user logon" setting). > [!NOTE] > This setting appears in both Computer Configuration and User Configuration. If both settings are configured, the Computer Configuration setting overrides. @@ -5055,13 +4987,12 @@ If the status is set to Disabled or Not Configured, Remote Desktop Services sess | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5087,7 +5018,7 @@ If the status is set to Disabled or Not Configured, Remote Desktop Services sess | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5106,10 +5037,10 @@ You can use this setting to maintain a user's session-specific temporary folders - If you disable this policy setting, temporary folders are deleted when a user logs off, even if the server administrator specifies otherwise. -- If you do not configure this policy setting, Remote Desktop Services deletes the temporary folders from the remote computer at logoff, unless specified otherwise by the server administrator. +- If you don't configure this policy setting, Remote Desktop Services deletes the temporary folders from the remote computer at logoff, unless specified otherwise by the server administrator. > [!NOTE] -> This setting only takes effect if per-session temporary folders are in use on the server. If you enable the Do not use temporary folders per session policy setting, this policy setting has no effect. +> This setting only takes effect if per-session temporary folders are in use on the server. If you enable the Don't use temporary folders per session policy setting, this policy setting has no effect. @@ -5121,13 +5052,12 @@ You can use this setting to maintain a user's session-specific temporary folders | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5154,7 +5084,7 @@ You can use this setting to maintain a user's session-specific temporary folders | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5169,11 +5099,11 @@ This policy setting allows you to prevent Remote Desktop Services from creating You can use this policy setting to disable the creation of separate temporary folders on a remote computer for each session. By default, Remote Desktop Services creates a separate temporary folder for each active session that a user maintains on a remote computer. These temporary folders are created on the remote computer in a Temp folder under the user's profile folder and are named with the sessionid. -- If you enable this policy setting, per-session temporary folders are not created. Instead, a user's temporary files for all sessions on the remote computer are stored in a common Temp folder under the user's profile folder on the remote computer. +- If you enable this policy setting, per-session temporary folders aren't created. Instead, a user's temporary files for all sessions on the remote computer are stored in a common Temp folder under the user's profile folder on the remote computer. - If you disable this policy setting, per-session temporary folders are always created, even if the server administrator specifies otherwise. -- If you do not configure this policy setting, per-session temporary folders are created unless the server administrator specifies otherwise. +- If you don't configure this policy setting, per-session temporary folders are created unless the server administrator specifies otherwise. @@ -5185,13 +5115,12 @@ You can use this policy setting to disable the creation of separate temporary fo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5218,7 +5147,7 @@ You can use this policy setting to disable the creation of separate temporary fo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5233,7 +5162,7 @@ This policy setting determines whether the client computer redirects its time zo - If you enable this policy setting, clients that are capable of time zone redirection send their time zone information to the server. The server base time is then used to calculate the current session time (current session time = server base time + client time zone). -- If you disable or do not configure this policy setting, the client computer does not redirect its time zone information and the session time zone is the same as the server time zone. +- If you disable or don't configure this policy setting, the client computer doesn't redirect its time zone information and the session time zone is the same as the server time zone. > [!NOTE] > Time zone redirection is possible only when connecting to at least a Microsoft Windows Server 2003 terminal server with a client using RDP 5.1 and later. @@ -5248,13 +5177,12 @@ This policy setting determines whether the client computer redirects its time zo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5281,7 +5209,7 @@ This policy setting determines whether the client computer redirects its time zo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5296,9 +5224,9 @@ This policy setting specifies whether to disable the administrator rights to cus You can use this setting to prevent administrators from making changes to the user groups allowed to connect remotely to the RD Session Host server. By default, administrators are able to make such changes. -- If you enable this policy setting the default security descriptors for existing groups on the RD Session Host server cannot be changed. All the security descriptors are read-only. +- If you enable this policy setting the default security descriptors for existing groups on the RD Session Host server can't be changed. All the security descriptors are read-only. -- If you disable or do not configure this policy setting, server administrators have full read/write permissions to the user security descriptors by using the Remote Desktop Session WMI Provider. +- If you disable or don't configure this policy setting, server administrators have full read/write permissions to the user security descriptors by using the Remote Desktop Session WMI Provider. > [!NOTE] > The preferred method of managing user access is by adding a user to the Remote Desktop Users group. @@ -5313,13 +5241,12 @@ You can use this setting to prevent administrators from making changes to the us | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5346,7 +5273,7 @@ You can use this setting to prevent administrators from making changes to the us | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5361,7 +5288,7 @@ This policy setting determines whether the desktop is always displayed after a c - If you enable this policy setting, the desktop is always displayed when a client connects to a remote computer. This policy setting overrides any initial program policy settings. -- If you disable or do not configure this policy setting, an initial program can be specified that runs on the remote computer after the client connects to the remote computer. If an initial program is not specified, the desktop is always displayed on the remote computer after the client connects to the remote computer. +- If you disable or don't configure this policy setting, an initial program can be specified that runs on the remote computer after the client connects to the remote computer. If an initial program isn't specified, the desktop is always displayed on the remote computer after the client connects to the remote computer. > [!NOTE] > If this policy setting is enabled, then the "Start a program on connection" policy setting is ignored. @@ -5376,13 +5303,12 @@ This policy setting determines whether the desktop is always displayed after a c | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5409,7 +5335,7 @@ This policy setting determines whether the desktop is always displayed after a c | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5440,13 +5366,12 @@ Remote Desktop sessions don't currently support UI Automation redirection. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5473,7 +5398,7 @@ Remote Desktop sessions don't currently support UI Automation redirection. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5484,11 +5409,11 @@ Remote Desktop sessions don't currently support UI Automation redirection. -This policy setting allows you to permit RDP redirection of other supported RemoteFX USB devices from this computer. Redirected RemoteFX USB devices will not be available for local usage on this computer. +This policy setting allows you to permit RDP redirection of other supported RemoteFX USB devices from this computer. Redirected RemoteFX USB devices won't be available for local usage on this computer. - If you enable this policy setting, you can choose to give the ability to redirect other supported RemoteFX USB devices over RDP to all users or only to users who are in the Administrators group on the computer. -- If you disable or do not configure this policy setting, other supported RemoteFX USB devices are not available for RDP redirection by using any user account. +- If you disable or don't configure this policy setting, other supported RemoteFX USB devices aren't available for RDP redirection by using any user account. For this change to take effect, you must restart Windows. @@ -5502,13 +5427,12 @@ For this change to take effect, you must restart Windows. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5534,7 +5458,7 @@ For this change to take effect, you must restart Windows. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5551,9 +5475,9 @@ This policy setting allows you to specify whether to require user authentication To determine whether a client computer supports Network Level Authentication, start Remote Desktop Connection on the client computer, click the icon in the upper-left corner of the Remote Desktop Connection dialog box, and then click About. In the About Remote Desktop Connection dialog box, look for the phrase Network Level Authentication supported. -- If you disable this policy setting, Network Level Authentication is not required for user authentication before allowing remote connections to the RD Session Host server. +- If you disable this policy setting, Network Level Authentication isn't required for user authentication before allowing remote connections to the RD Session Host server. -- If you do not configure this policy setting, the local setting on the target computer will be enforced. On Windows Server 2012 and Windows 8, Network Level Authentication is enforced by default. +- If you don't configure this policy setting, the local setting on the target computer will be enforced. On Windows Server 2012 and Windows 8, Network Level Authentication is enforced by default. > [!IMPORTANT] > Disabling this policy setting provides less security because user authentication will occur later in the remote connection process. @@ -5568,13 +5492,12 @@ To determine whether a client computer supports Network Level Authentication, st | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5601,7 +5524,7 @@ To determine whether a client computer supports Network Level Authentication, st | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5616,7 +5539,7 @@ Specifies whether Remote Desktop Services uses the specified network share or lo To use this setting, select the location for the home directory (network or local) from the Location drop-down list. If you choose to place the directory on a network share, type the Home Dir Root Path in the form \\Computername\Sharename, and then select the drive letter to which you want the network share to be mapped. -If you choose to keep the home directory on the local computer, type the Home Dir Root Path in the form "Drive:\Path" (without quotes), without environment variables or ellipses. Do not specify a placeholder for user alias, because Remote Desktop Services automatically appends this at logon. +If you choose to keep the home directory on the local computer, type the Home Dir Root Path in the form "Drive:\Path" (without quotes), without environment variables or ellipses. Don't specify a placeholder for user alias, because Remote Desktop Services automatically appends this at logon. > [!NOTE] > The Drive Letter field is ignored if you choose to specify a local path. If you choose to specify a local path but then type the name of a network share in Home Dir Root Path, Remote Desktop Services places user home directories in the network location. @@ -5635,13 +5558,12 @@ If the status is set to Disabled or Not Configured, the user's home directory is | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5667,7 +5589,7 @@ If the status is set to Disabled or Not Configured, the user's home directory is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5682,9 +5604,9 @@ This policy setting allows you to specify whether Remote Desktop Services uses a - If you enable this policy setting, Remote Desktop Services uses the path specified in the "Set path for Remote Desktop Services Roaming User Profile" policy setting as the root folder for the mandatory user profile. All users connecting remotely to the RD Session Host server use the same user profile. -- If you disable or do not configure this policy setting, mandatory user profiles are not used by users connecting remotely to the RD Session Host server. +- If you disable or don't configure this policy setting, mandatory user profiles aren't used by users connecting remotely to the RD Session Host server. -**Note**: +Note: For this policy setting to take effect, you must also enable and configure the "Set path for Remote Desktop Services Roaming User Profile" policy setting. @@ -5698,13 +5620,12 @@ For this policy setting to take effect, you must also enable and configure the " | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5731,7 +5652,7 @@ For this policy setting to take effect, you must also enable and configure the " | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5748,13 +5669,14 @@ By default, Remote Desktop Services stores all user profiles locally on the RD S - If you enable this policy setting, Remote Desktop Services uses the specified path as the root directory for all user profiles. The profiles are contained in subfolders named for the account name of each user. -To configure this policy setting, type the path to the network share in the form of \\Computername\Sharename. Do not specify a placeholder for the user account name, because Remote Desktop Services automatically adds this when the user logs on and the profile is created. If the specified network share does not exist, Remote Desktop Services displays an error message on the RD Session Host server and will store the user profiles locally on the RD Session Host server. +To configure this policy setting, type the path to the network share in the form of \\Computername\Sharename. Don't specify a placeholder for the user account name, because Remote Desktop Services automatically adds this when the user logs on and the profile is created. If the specified network share doesn't exist, Remote Desktop Services displays an error message on the RD Session Host server and will store the user profiles locally on the RD Session Host server. -- If you disable or do not configure this policy setting, user profiles are stored locally on the RD Session Host server. You can configure a user's profile path on the Remote Desktop Services Profile tab on the user's account Properties dialog box. +- If you disable or don't configure this policy setting, user profiles are stored locally on the RD Session Host server. You can configure a user's profile path on the Remote Desktop Services Profile tab on the user's account Properties dialog box. -**Note**: +Note: 1. The roaming user profiles enabled by the policy setting apply only to Remote Desktop Services connections. A user might also have a Windows roaming user profile configured. The Remote Desktop Services roaming user profile always takes precedence in a Remote Desktop Services session. + 2. To configure a mandatory Remote Desktop Services roaming user profile for all users connecting remotely to the RD Session Host server, use this policy setting together with the "Use mandatory profiles on the RD Session Host server" policy setting located in Computer Configuration\Administrative Templates\Windows Components\Remote Desktop Services\RD Session Host\Profiles. The path set in the "Set path for Remote Desktop Services Roaming User Profile" policy setting should contain the mandatory profile. @@ -5767,13 +5689,12 @@ To configure this policy setting, type the path to the network share in the form | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-thumbnails.md b/windows/client-management/mdm/policy-csp-admx-thumbnails.md index 8e006a237e..8bec5bef40 100644 --- a/windows/client-management/mdm/policy-csp-admx-thumbnails.md +++ b/windows/client-management/mdm/policy-csp-admx-thumbnails.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_Thumbnails Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_Thumbnails -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -48,7 +45,7 @@ File Explorer displays thumbnail images by default. - If you enable this policy setting, File Explorer displays only icons and never displays thumbnail images. -- If you disable or do not configure this policy setting, File Explorer displays only thumbnail images. +- If you disable or don't configure this policy setting, File Explorer displays only thumbnail images. @@ -60,13 +57,12 @@ File Explorer displays thumbnail images by default. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -93,7 +89,7 @@ File Explorer displays thumbnail images by default. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -110,7 +106,7 @@ File Explorer displays thumbnail images on network folders by default. - If you enable this policy setting, File Explorer displays only icons and never displays thumbnail images on network folders. -- If you disable or do not configure this policy setting, File Explorer displays only thumbnail images on network folders. +- If you disable or don't configure this policy setting, File Explorer displays only thumbnail images on network folders. @@ -122,13 +118,12 @@ File Explorer displays thumbnail images on network folders by default. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -155,7 +150,7 @@ File Explorer displays thumbnail images on network folders by default. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -170,9 +165,9 @@ Turns off the caching of thumbnails in hidden thumbs.db files. This policy setting allows you to configure File Explorer to cache thumbnails of items residing in network folders in hidden thumbs.db files. -- If you enable this policy setting, File Explorer does not create, read from, or write to thumbs.db files. +- If you enable this policy setting, File Explorer doesn't create, read from, or write to thumbs.db files. -- If you disable or do not configure this policy setting, File Explorer creates, reads from, and writes to thumbs.db files. +- If you disable or don't configure this policy setting, File Explorer creates, reads from, and writes to thumbs.db files. @@ -184,13 +179,12 @@ This policy setting allows you to configure File Explorer to cache thumbnails of | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-touchinput.md b/windows/client-management/mdm/policy-csp-admx-touchinput.md index 28c4c48fb4..a0905b6d96 100644 --- a/windows/client-management/mdm/policy-csp-admx-touchinput.md +++ b/windows/client-management/mdm/policy-csp-admx-touchinput.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_TouchInput Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_TouchInput -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -42,17 +39,18 @@ ms.topic: reference -Turn off Panning +Turn off Panning. + Turns off touch panning, which allows users pan inside windows by touch. On a compatible PC with a touch digitizer, by default users are able to scroll or pan inside a scrolling area by dragging up or down directly on the scrolling content. -- If you enable this setting, the user will not be able to pan windows by touch. +- If you enable this setting, the user won't be able to pan windows by touch. - If you disable this setting, the user can pan windows by touch. -- If you do not configure this setting, Touch Panning is on by default. +- If you don't configure this setting, Touch Panning is on by default. > [!NOTE] -> Changes to this setting will not take effect until the user logs off. +> Changes to this setting won't take effect until the user logs off. @@ -64,13 +62,12 @@ Turns off touch panning, which allows users pan inside windows by touch. On a co | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -97,7 +94,7 @@ Turns off touch panning, which allows users pan inside windows by touch. On a co | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -108,17 +105,18 @@ Turns off touch panning, which allows users pan inside windows by touch. On a co -Turn off Panning +Turn off Panning. + Turns off touch panning, which allows users pan inside windows by touch. On a compatible PC with a touch digitizer, by default users are able to scroll or pan inside a scrolling area by dragging up or down directly on the scrolling content. -- If you enable this setting, the user will not be able to pan windows by touch. +- If you enable this setting, the user won't be able to pan windows by touch. - If you disable this setting, the user can pan windows by touch. -- If you do not configure this setting, Touch Panning is on by default. +- If you don't configure this setting, Touch Panning is on by default. > [!NOTE] -> Changes to this setting will not take effect until the user logs off. +> Changes to this setting won't take effect until the user logs off. @@ -130,13 +128,12 @@ Turns off touch panning, which allows users pan inside windows by touch. On a co | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -163,7 +160,7 @@ Turns off touch panning, which allows users pan inside windows by touch. On a co | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -174,18 +171,18 @@ Turns off touch panning, which allows users pan inside windows by touch. On a co -Turn off Tablet PC touch input +Turn off Tablet PC touch input. Turns off touch input, which allows the user to interact with their computer using their finger. -- If you enable this setting, the user will not be able to produce input with touch. They will not be able to use touch input or touch gestures such as tap and double tap, the touch pointer, and other touch-specific features. +- If you enable this setting, the user won't be able to produce input with touch. They won't be able to use touch input or touch gestures such as tap and double tap, the touch pointer, and other touch-specific features. - If you disable this setting, the user can produce input with touch, by using gestures, the touch pointer, and other-touch specific features. -- If you do not configure this setting, touch input is on by default. +- If you don't configure this setting, touch input is on by default. > [!NOTE] -> Changes to this setting will not take effect until the user logs off. +> Changes to this setting won't take effect until the user logs off. @@ -197,13 +194,12 @@ Turns off touch input, which allows the user to interact with their computer usi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -230,7 +226,7 @@ Turns off touch input, which allows the user to interact with their computer usi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -241,18 +237,18 @@ Turns off touch input, which allows the user to interact with their computer usi -Turn off Tablet PC touch input +Turn off Tablet PC touch input. Turns off touch input, which allows the user to interact with their computer using their finger. -- If you enable this setting, the user will not be able to produce input with touch. They will not be able to use touch input or touch gestures such as tap and double tap, the touch pointer, and other touch-specific features. +- If you enable this setting, the user won't be able to produce input with touch. They won't be able to use touch input or touch gestures such as tap and double tap, the touch pointer, and other touch-specific features. - If you disable this setting, the user can produce input with touch, by using gestures, the touch pointer, and other-touch specific features. -- If you do not configure this setting, touch input is on by default. +- If you don't configure this setting, touch input is on by default. > [!NOTE] -> Changes to this setting will not take effect until the user logs off. +> Changes to this setting won't take effect until the user logs off. @@ -264,13 +260,12 @@ Turns off touch input, which allows the user to interact with their computer usi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-tpm.md b/windows/client-management/mdm/policy-csp-admx-tpm.md index b22b7d4527..079119d22b 100644 --- a/windows/client-management/mdm/policy-csp-admx-tpm.md +++ b/windows/client-management/mdm/policy-csp-admx-tpm.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_TPM Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_TPM -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,7 +43,7 @@ This policy setting allows you to manage the Group Policy list of Trusted Platfo - If you enable this policy setting, Windows will block the specified commands from being sent to the TPM on the computer. TPM commands are referenced by a command number. For example, command number 129 is TPM_OwnerReadInternalPub, and command number 170 is TPM_FieldUpgrade. To find the command number associated with each TPM command with TPM 1.2, run "tpm.msc" and navigate to the "Command Management" section. -- If you disable or do not configure this policy setting, only those TPM commands specified through the default or local lists may be blocked by Windows. The default list of blocked TPM commands is pre-configured by Windows. You can view the default list by running "tpm.msc", navigating to the "Command Management" section, and making visible the "On Default Block List" column. The local list of blocked TPM commands is configured outside of Group Policy by running "tpm.msc" or through scripting against the Win32_Tpm interface. See related policy settings to enforce or ignore the default and local lists of blocked TPM commands. +- If you disable or don't configure this policy setting, only those TPM commands specified through the default or local lists may be blocked by Windows. The default list of blocked TPM commands is pre-configured by Windows. You can view the default list by running "tpm.msc", navigating to the "Command Management" section, and making visible the "On Default Block List" column. The local list of blocked TPM commands is configured outside of Group Policy by running "tpm.msc" or through scripting against the Win32_Tpm interface. See related policy settings to enforce or ignore the default and local lists of blocked TPM commands. @@ -58,13 +55,12 @@ This policy setting allows you to manage the Group Policy list of Trusted Platfo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -91,7 +87,7 @@ This policy setting allows you to manage the Group Policy list of Trusted Platfo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -114,13 +110,12 @@ This policy setting configures the system to prompt the user to clear the TPM if | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -147,7 +142,7 @@ This policy setting configures the system to prompt the user to clear the TPM if | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -164,7 +159,7 @@ This policy setting allows you to enforce or ignore the computer's default list The default list of blocked TPM commands is pre-configured by Windows. You can view the default list by running "tpm.msc", navigating to the "Command Management" section, and making visible the "On Default Block List" column. The local list of blocked TPM commands is configured outside of Group Policy by running "tpm.msc" or through scripting against the Win32_Tpm interface. See the related policy setting to configure the Group Policy list of blocked TPM commands. -- If you disable or do not configure this policy setting, Windows will block the TPM commands in the default list, in addition to commands in the Group Policy and local lists of blocked TPM commands. +- If you disable or don't configure this policy setting, Windows will block the TPM commands in the default list, in addition to commands in the Group Policy and local lists of blocked TPM commands. @@ -176,13 +171,12 @@ The default list of blocked TPM commands is pre-configured by Windows. You can v | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -209,7 +203,7 @@ The default list of blocked TPM commands is pre-configured by Windows. You can v | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -226,7 +220,7 @@ This policy setting allows you to enforce or ignore the computer's local list of The local list of blocked TPM commands is configured outside of Group Policy by running "tpm.msc" or through scripting against the Win32_Tpm interface. The default list of blocked TPM commands is pre-configured by Windows. See the related policy setting to configure the Group Policy list of blocked TPM commands. -- If you disable or do not configure this policy setting, Windows will block the TPM commands found in the local list, in addition to commands in the Group Policy and default lists of blocked TPM commands. +- If you disable or don't configure this policy setting, Windows will block the TPM commands found in the local list, in addition to commands in the Group Policy and default lists of blocked TPM commands. @@ -238,13 +232,12 @@ The local list of blocked TPM commands is configured outside of Group Policy by | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -271,7 +264,7 @@ The local list of blocked TPM commands is configured outside of Group Policy by | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -282,7 +275,7 @@ The local list of blocked TPM commands is configured outside of Group Policy by -This group policy enables Device Health Attestation reporting (DHA-report) on supported devices. It enables supported devices to send Device Health Attestation related information (device boot logs, PCR values, TPM certificate, etc.) to Device Health Attestation Service (DHA-Service) every time a device starts. Device Health Attestation Service validates the security state and health of the devices, and makes the findings accessible to enterprise administrators via a cloud based reporting portal. This policy is independent of DHA reports that are initiated by device manageability solutions (like MDM or SCCM), and will not interfere with their workflows. +This group policy enables Device Health Attestation reporting (DHA-report) on supported devices. It enables supported devices to send Device Health Attestation related information (device boot logs, PCR values, TPM certificate, etc.) to Device Health Attestation Service (DHA-Service) every time a device starts. Device Health Attestation Service validates the security state and health of the devices, and makes the findings accessible to enterprise administrators via a cloud based reporting portal. This policy is independent of DHA reports that are initiated by device manageability solutions (like MDM or SCCM), and won't interfere with their workflows. @@ -294,13 +287,12 @@ This group policy enables Device Health Attestation reporting (DHA-report) on su | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -327,7 +319,7 @@ This group policy enables Device Health Attestation reporting (DHA-report) on su | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -344,7 +336,7 @@ You can choose to have the operating system store either the full TPM owner auth If you enable this policy setting, Windows will store the TPM owner authorization in the registry of the local computer according to the operating system managed TPM authentication setting you choose. -Choose the operating system managed TPM authentication setting of "Full" to store the full TPM owner authorization, the TPM administrative delegation blob and the TPM user delegation blob in the local registry. This setting allows use of the TPM without requiring remote or external storage of the TPM owner authorization value. This setting is appropriate for scenarios which do not depend on preventing reset of the TPM anti-hammering logic or changing the TPM owner authorization value. Some TPM-based applications may require this setting be changed before features which depend on the TPM anti-hammering logic can be used. +Choose the operating system managed TPM authentication setting of "Full" to store the full TPM owner authorization, the TPM administrative delegation blob and the TPM user delegation blob in the local registry. This setting allows use of the TPM without requiring remote or external storage of the TPM owner authorization value. This setting is appropriate for scenarios which don't depend on preventing reset of the TPM anti-hammering logic or changing the TPM owner authorization value. Some TPM-based applications may require this setting be changed before features which depend on the TPM anti-hammering logic can be used. Choose the operating system managed TPM authentication setting of "Delegated" to store only the TPM administrative delegation blob and the TPM user delegation blob in the local registry. This setting is appropriate for use with TPM-based applications that depend on the TPM anti-hammering logic. @@ -363,13 +355,12 @@ Choose the operating system managed TPM authentication setting of "None" for com | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -395,7 +386,7 @@ Choose the operating system managed TPM authentication setting of "None" for com | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -414,15 +405,15 @@ An authorization failure occurs each time a standard user sends a command to the For each standard user two thresholds apply. Exceeding either threshold will prevent the standard user from sending a command to the TPM that requires authorization. -The Standard User Lockout Threshold Individual value is the maximum number of authorization failures each standard user may have before the user is not allowed to send commands requiring authorization to the TPM. +The Standard User Lockout Threshold Individual value is the maximum number of authorization failures each standard user may have before the user isn't allowed to send commands requiring authorization to the TPM. -The Standard User Lockout Total Threshold value is the maximum total number of authorization failures all standard users may have before all standard users are not allowed to send commands requiring authorization to the TPM. +The Standard User Lockout Total Threshold value is the maximum total number of authorization failures all standard users may have before all standard users aren't allowed to send commands requiring authorization to the TPM. -The TPM is designed to protect itself against password guessing attacks by entering a hardware lockout mode when it receives too many commands with an incorrect authorization value. When the TPM enters a lockout mode it is global for all users including administrators and Windows features like BitLocker Drive Encryption. The number of authorization failures a TPM allows and how long it stays locked out vary by TPM manufacturer. Some TPMs may enter lockout mode for successively longer periods of time with fewer authorization failures depending on past failures. Some TPMs may require a system restart to exit the lockout mode. Other TPMs may require the system to be on so enough clock cycles elapse before the TPM exits the lockout mode. +The TPM is designed to protect itself against password guessing attacks by entering a hardware lockout mode when it receives too many commands with an incorrect authorization value. When the TPM enters a lockout mode it's global for all users including administrators and Windows features like BitLocker Drive Encryption. The number of authorization failures a TPM allows and how long it stays locked out vary by TPM manufacturer. Some TPMs may enter lockout mode for successively longer periods of time with fewer authorization failures depending on past failures. Some TPMs may require a system restart to exit the lockout mode. Other TPMs may require the system to be on so enough clock cycles elapse before the TPM exits the lockout mode. An administrator with the TPM owner password may fully reset the TPM's hardware lockout logic using the TPM Management Console (tpm.msc). Each time an administrator resets the TPM's hardware lockout logic all prior standard user TPM authorization failures are ignored; allowing standard users to use the TPM normally again immediately. -If this value is not configured, a default value of 480 minutes (8 hours) is used. +If this value isn't configured, a default value of 480 minutes (8 hours) is used. @@ -434,13 +425,12 @@ If this value is not configured, a default value of 480 minutes (8 hours) is use | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -467,7 +457,7 @@ If this value is not configured, a default value of 480 minutes (8 hours) is use | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -486,17 +476,17 @@ An authorization failure occurs each time a standard user sends a command to the For each standard user two thresholds apply. Exceeding either threshold will prevent the standard user from sending a command to the TPM that requires authorization. -This value is the maximum number of authorization failures each standard user may have before the user is not allowed to send commands requiring authorization to the TPM. +This value is the maximum number of authorization failures each standard user may have before the user isn't allowed to send commands requiring authorization to the TPM. -The Standard User Lockout Total Threshold value is the maximum total number of authorization failures all standard users may have before all standard users are not allowed to send commands requiring authorization to the TPM. +The Standard User Lockout Total Threshold value is the maximum total number of authorization failures all standard users may have before all standard users aren't allowed to send commands requiring authorization to the TPM. -The TPM is designed to protect itself against password guessing attacks by entering a hardware lockout mode when it receives too many commands with an incorrect authorization value. When the TPM enters a lockout mode it is global for all users including administrators and Windows features like BitLocker Drive Encryption. The number of authorization failures a TPM allows and how long it stays locked out vary by TPM manufacturer. Some TPMs may enter lockout mode for successively longer periods of time with fewer authorization failures depending on past failures. Some TPMs may require a system restart to exit the lockout mode. Other TPMs may require the system to be on so enough clock cycles elapse before the TPM exits the lockout mode. +The TPM is designed to protect itself against password guessing attacks by entering a hardware lockout mode when it receives too many commands with an incorrect authorization value. When the TPM enters a lockout mode it's global for all users including administrators and Windows features like BitLocker Drive Encryption. The number of authorization failures a TPM allows and how long it stays locked out vary by TPM manufacturer. Some TPMs may enter lockout mode for successively longer periods of time with fewer authorization failures depending on past failures. Some TPMs may require a system restart to exit the lockout mode. Other TPMs may require the system to be on so enough clock cycles elapse before the TPM exits the lockout mode. An administrator with the TPM owner password may fully reset the TPM's hardware lockout logic using the TPM Management Console (tpm.msc). Each time an administrator resets the TPM's hardware lockout logic all prior standard user TPM authorization failures are ignored; allowing standard users to use the TPM normally again immediately. -If this value is not configured, a default value of 4 is used. +If this value isn't configured, a default value of 4 is used. -A value of zero means the OS will not allow standard users to send commands to the TPM which may cause an authorization failure. +A value of zero means the OS won't allow standard users to send commands to the TPM which may cause an authorization failure. @@ -508,13 +498,12 @@ A value of zero means the OS will not allow standard users to send commands to t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -541,7 +530,7 @@ A value of zero means the OS will not allow standard users to send commands to t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -560,17 +549,17 @@ An authorization failure occurs each time a standard user sends a command to the For each standard user two thresholds apply. Exceeding either threshold will prevent the standard user from sending a command to the TPM that requires authorization. -The Standard User Individual Lockout value is the maximum number of authorization failures each standard user may have before the user is not allowed to send commands requiring authorization to the TPM. +The Standard User Individual Lockout value is the maximum number of authorization failures each standard user may have before the user isn't allowed to send commands requiring authorization to the TPM. -This value is the maximum total number of authorization failures all standard users may have before all standard users are not allowed to send commands requiring authorization to the TPM. +This value is the maximum total number of authorization failures all standard users may have before all standard users aren't allowed to send commands requiring authorization to the TPM. -The TPM is designed to protect itself against password guessing attacks by entering a hardware lockout mode when it receives too many commands with an incorrect authorization value. When the TPM enters a lockout mode it is global for all users including administrators and Windows features like BitLocker Drive Encryption. The number of authorization failures a TPM allows and how long it stays locked out vary by TPM manufacturer. Some TPMs may enter lockout mode for successively longer periods of time with fewer authorization failures depending on past failures. Some TPMs may require a system restart to exit the lockout mode. Other TPMs may require the system to be on so enough clock cycles elapse before the TPM exits the lockout mode. +The TPM is designed to protect itself against password guessing attacks by entering a hardware lockout mode when it receives too many commands with an incorrect authorization value. When the TPM enters a lockout mode it's global for all users including administrators and Windows features like BitLocker Drive Encryption. The number of authorization failures a TPM allows and how long it stays locked out vary by TPM manufacturer. Some TPMs may enter lockout mode for successively longer periods of time with fewer authorization failures depending on past failures. Some TPMs may require a system restart to exit the lockout mode. Other TPMs may require the system to be on so enough clock cycles elapse before the TPM exits the lockout mode. An administrator with the TPM owner password may fully reset the TPM's hardware lockout logic using the TPM Management Console (tpm.msc). Each time an administrator resets the TPM's hardware lockout logic all prior standard user TPM authorization failures are ignored; allowing standard users to use the TPM normally again immediately. -If this value is not configured, a default value of 9 is used. +If this value isn't configured, a default value of 9 is used. -A value of zero means the OS will not allow standard users to send commands to the TPM which may cause an authorization failure. +A value of zero means the OS won't allow standard users to send commands to the TPM which may cause an authorization failure. @@ -582,13 +571,12 @@ A value of zero means the OS will not allow standard users to send commands to t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -615,7 +603,7 @@ A value of zero means the OS will not allow standard users to send commands to t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -626,7 +614,7 @@ A value of zero means the OS will not allow standard users to send commands to t -This policy setting configures the TPM to use the Dictionary Attack Prevention Parameters (lockout threshold and recovery time) to the values that were used for Windows 10 Version 1607 and below. Setting this policy will take effect only if a) the TPM was originally prepared using a version of Windows after Windows 10 Version 1607 and b) the System has a TPM 2.0. **Note** that enabling this policy will only take effect after the TPM maintenance task runs (which typically happens after a system restart). Once this policy has been enabled on a system and has taken effect (after a system restart), disabling it will have no impact and the system's TPM will remain configured using the legacy Dictionary Attack Prevention parameters, regardless of the value of this group policy. The only way for the disabled setting of this policy to take effect on a system where it was once enabled is to a) disable it from group policy and b)clear the TPM on the system. +This policy setting configures the TPM to use the Dictionary Attack Prevention Parameters (lockout threshold and recovery time) to the values that were used for Windows 10 Version 1607 and below. Setting this policy will take effect only if a) the TPM was originally prepared using a version of Windows after Windows 10 Version 1607 and b) the System has a TPM 2.0. Note that enabling this policy will only take effect after the TPM maintenance task runs (which typically happens after a system restart). Once this policy has been enabled on a system and has taken effect (after a system restart), disabling it will have no impact and the system's TPM will remain configured using the legacy Dictionary Attack Prevention parameters, regardless of the value of this group policy. The only way for the disabled setting of this policy to take effect on a system where it was once enabled is to a) disable it from group policy and b)clear the TPM on the system. @@ -638,13 +626,12 @@ This policy setting configures the TPM to use the Dictionary Attack Prevention P | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-userexperiencevirtualization.md b/windows/client-management/mdm/policy-csp-admx-userexperiencevirtualization.md index f802208d23..93388ebc6f 100644 --- a/windows/client-management/mdm/policy-csp-admx-userexperiencevirtualization.md +++ b/windows/client-management/mdm/policy-csp-admx-userexperiencevirtualization.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_UserExperienceVirtualization Area in Poli author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_UserExperienceVirtualization -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -47,11 +44,14 @@ ms.topic: reference This policy setting configures the synchronization of user settings of Calculator. + By default, the user settings of Calculator synchronize between computers. Use the policy setting to prevent the user settings of Calculator from synchronization between computers. - If you enable this policy setting, the Calculator user settings continue to synchronize. + - If you disable this policy setting, Calculator user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -63,13 +63,12 @@ By default, the user settings of Calculator synchronize between computers. Use t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -96,7 +95,7 @@ By default, the user settings of Calculator synchronize between computers. Use t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -112,11 +111,16 @@ By default, the user settings of Calculator synchronize between computers. Use t This policy setting configures the sync provider used by User Experience Virtualization (UE-V) to sync settings between users' computers. With Sync Method set to "SyncProvider," the UE-V Agent uses a built-in sync provider to keep user settings synchronized between the computer and the settings storage location. This is the default value. You can disable the sync provider on computers that never go offline and are always connected to the settings storage location. + When SyncMethod is set to "None," the UE-V Agent uses no sync provider. Settings are written directly to the settings storage location rather than being cached to sync later. + Set SyncMethod to "External" when an external synchronization engine is being deployed for settings sync. This could use OneDrive, Work Folders, SharePoint or any other engine that uses a local folder to synchronize data between users' computers. In this mode, UE-V writes settings data to the local folder specified in the settings storage path. These settings are then synchronized to other computers by an external synchronization engine. UE-V has no control over this synchronization. It only reads and writes the settings data when the normal UE-V triggers take place. + With notifications enabled, UE-V users receive a message when the settings sync is delayed. The notification delay policy setting defines the delay before a notification appears. + - If you disable this policy setting, the sync provider is used to synchronize settings between computers and the settings storage location. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -128,13 +132,12 @@ With notifications enabled, UE-V users receive a message when the settings sync | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -160,7 +163,7 @@ With notifications enabled, UE-V users receive a message when the settings sync | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -178,8 +181,10 @@ With notifications enabled, UE-V users receive a message when the settings sync This policy setting configures the synchronization of User Experience Virtualization (UE-V) rollback information for computers running in a non-persistent, pooled VDI environment. UE-V settings rollback data and checkpoints are normally stored only on the local computer. With this policy setting enabled, the rollback information is copied to the settings storage location when the user logs off or shuts down their VDI session. Enable this setting to register a VDI-specific settings location template and restore data on computers in pooled VDI environments that reset to a clean state on logout. With this policy enabled you can roll settings back to the state when UE-V was installed or to "last-known-good" configurations. Only enable this policy setting on computers running in a non-persistent VDI environment. The VDI Collection Name defines the name of the virtual desktop collection containing the virtual computers. - If you enable this policy setting, the UE-V rollback state is copied to the settings storage location on logout and restored on login. + - If you disable this policy setting, no UE-V rollback state is copied to the settings storage location. -- If you do not configure this policy, no UE-V rollback state is copied to the settings storage location. + +- If you don't configure this policy, no UE-V rollback state is copied to the settings storage location. @@ -191,13 +196,12 @@ This policy setting configures the synchronization of User Experience Virtualiza | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -224,7 +228,7 @@ This policy setting configures the synchronization of User Experience Virtualiza | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -238,8 +242,10 @@ This policy setting configures the synchronization of User Experience Virtualiza This policy setting specifies the text of the Contact IT URL hyperlink in the Company Settings Center. - If you enable this policy setting, the Company Settings Center displays the specified text in the link to the Contact IT URL. -- If you disable this policy setting, the Company Settings Center does not display an IT Contact link. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you disable this policy setting, the Company Settings Center doesn't display an IT Contact link. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -251,13 +257,12 @@ This policy setting specifies the text of the Contact IT URL hyperlink in the Co | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -283,7 +288,7 @@ This policy setting specifies the text of the Contact IT URL hyperlink in the Co | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -297,8 +302,10 @@ This policy setting specifies the text of the Contact IT URL hyperlink in the Co This policy setting specifies the URL for the Contact IT link in the Company Settings Center. - If you enable this policy setting, the Company Settings Center Contact IT text links to the specified URL. The link can be of any standard protocol such as http or mailto. -- If you disable this policy setting, the Company Settings Center does not display an IT Contact link. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you disable this policy setting, the Company Settings Center doesn't display an IT Contact link. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -310,13 +317,12 @@ This policy setting specifies the URL for the Contact IT link in the Company Set | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -342,7 +348,7 @@ This policy setting specifies the URL for the Contact IT link in the Company Set | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -358,14 +364,17 @@ This policy setting specifies the URL for the Contact IT link in the Company Set This policy setting defines whether the User Experience Virtualization (UE-V) Agent synchronizes settings for Windows apps. + By default, the UE-V Agent synchronizes settings for Windows apps between the computer and the settings storage location. -- If you enable this policy setting, the UE-V Agent will not synchronize settings for Windows apps. +- If you enable this policy setting, the UE-V Agent won't synchronize settings for Windows apps. + - If you disable this policy setting, the UE-V Agent will synchronize settings for Windows apps. -- If you do not configure this policy setting, any defined values are deleted. + +- If you don't configure this policy setting, any defined values are deleted. > [!NOTE] -> If the user connects their Microsoft account for their computer then the UE-V Agent will not synchronize Windows apps. The Windows apps will default to whatever settings are configured in the Sync your settings configuration in Windows. +> If the user connects their Microsoft account for their computer then the UE-V Agent won't synchronize Windows apps. The Windows apps will default to whatever settings are configured in the Sync your settings configuration in Windows. @@ -377,13 +386,12 @@ By default, the UE-V Agent synchronizes settings for Windows apps between the co | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -410,7 +418,7 @@ By default, the UE-V Agent synchronizes settings for Windows apps between the co | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -426,11 +434,14 @@ By default, the UE-V Agent synchronizes settings for Windows apps between the co This policy setting configures the synchronization of Windows settings between computers. + Certain Windows settings will synchronize between computers by default. These settings include Windows themes, Windows desktop settings, Ease of Access settings, and network printers. Use this policy setting to specify which Windows settings synchronize between computers. You can also use these settings to enable synchronization of users' sign-in information for certain apps, networks, and certificates. - If you enable this policy setting, only the selected Windows settings synchronize. Unselected Windows settings are excluded from settings synchronization. + - If you disable this policy setting, all Windows Settings are excluded from the settings synchronization. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -442,13 +453,12 @@ Certain Windows settings will synchronize between computers by default. These se | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -474,7 +484,7 @@ Certain Windows settings will synchronize between computers by default. These se | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -497,13 +507,12 @@ This policy setting allows you to enable or disable User Experience Virtualizati | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -530,7 +539,7 @@ This policy setting allows you to enable or disable User Experience Virtualizati | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -546,11 +555,14 @@ This policy setting allows you to enable or disable User Experience Virtualizati This policy setting configures the synchronization of user settings for the Finance app. + By default, the user settings of Finance sync between computers. Use the policy setting to prevent the user settings of Finance from synchronizing between computers. - If you enable this policy setting, Finance user settings continue to sync. + - If you disable this policy setting, Finance user settings are excluded from synchronization. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -562,13 +574,12 @@ By default, the user settings of Finance sync between computers. Use the policy | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -595,7 +606,7 @@ By default, the user settings of Finance sync between computers. Use the policy | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -607,10 +618,14 @@ By default, the user settings of Finance sync between computers. Use the policy This policy setting enables a notification in the system tray that appears when the User Experience Virtualization (UE-V) Agent runs for the first time. + By default, a notification informs users that Company Settings Center, the user-facing name for the UE-V Agent, now helps to synchronize settings between their work computers. + With this setting enabled, the notification appears the first time that the UE-V Agent runs. + With this setting disabled, no notification appears. -If you do not configure this policy setting, any defined values are deleted. + +If you don't configure this policy setting, any defined values are deleted. @@ -622,13 +637,12 @@ If you do not configure this policy setting, any defined values are deleted. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -655,7 +669,7 @@ If you do not configure this policy setting, any defined values are deleted. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -671,11 +685,14 @@ If you do not configure this policy setting, any defined values are deleted. This policy setting configures the synchronization of user settings for the Games app. + By default, the user settings of Games sync between computers. Use the policy setting to prevent the user settings of Games from synchronizing between computers. - If you enable this policy setting, Games user settings continue to sync. + - If you disable this policy setting, Games user settings are excluded from synchronization. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -687,13 +704,12 @@ By default, the user settings of Games sync between computers. Use the policy se | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -720,7 +736,7 @@ By default, the user settings of Games sync between computers. Use the policy se | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -736,11 +752,14 @@ By default, the user settings of Games sync between computers. Use the policy se This policy setting configures the synchronization of user settings of Internet Explorer 10. + By default, the user settings of Internet Explorer 10 synchronize between computers. Use the policy setting to prevent the user settings for Internet Explorer 10 from synchronization between computers. - If you enable this policy setting, the Internet Explorer 10 user settings continue to synchronize. + - If you disable this policy setting, Internet Explorer 10 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -752,13 +771,12 @@ By default, the user settings of Internet Explorer 10 synchronize between comput | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -785,7 +803,7 @@ By default, the user settings of Internet Explorer 10 synchronize between comput | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -801,11 +819,14 @@ By default, the user settings of Internet Explorer 10 synchronize between comput This policy setting configures the synchronization of user settings of Internet Explorer 11. + By default, the user settings of Internet Explorer 11 synchronize between computers. Use the policy setting to prevent the user settings for Internet Explorer 11 from synchronization between computers. - If you enable this policy setting, the Internet Explorer 11 user settings continue to synchronize. + - If you disable this policy setting, Internet Explorer 11 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -817,13 +838,12 @@ By default, the user settings of Internet Explorer 11 synchronize between comput | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -850,7 +870,7 @@ By default, the user settings of Internet Explorer 11 synchronize between comput | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -866,11 +886,14 @@ By default, the user settings of Internet Explorer 11 synchronize between comput This policy setting configures the synchronization of user settings for Internet Explorer 8. + By default, the user settings of Internet Explorer 8 synchronize between computers. Use the policy setting to prevent the user settings for Internet Explorer 8 from synchronization between computers. - If you enable this policy setting, the Internet Explorer 8 user settings continue to synchronize. + - If you disable this policy setting, Internet Explorer 8 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -882,13 +905,12 @@ By default, the user settings of Internet Explorer 8 synchronize between compute | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -915,7 +937,7 @@ By default, the user settings of Internet Explorer 8 synchronize between compute | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -931,11 +953,14 @@ By default, the user settings of Internet Explorer 8 synchronize between compute This policy setting configures the synchronization of user settings for Internet Explorer 9. + By default, the user settings of Internet Explorer 9 synchronize between computers. Use the policy setting to prevent the user settings for Internet Explorer 9 from synchronization between computers. - If you enable this policy setting, the Internet Explorer 9 user settings continue to synchronize. + - If you disable this policy setting, Internet Explorer 9 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -947,13 +972,12 @@ By default, the user settings of Internet Explorer 9 synchronize between compute | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -980,7 +1004,7 @@ By default, the user settings of Internet Explorer 9 synchronize between compute | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -996,11 +1020,14 @@ By default, the user settings of Internet Explorer 9 synchronize between compute This policy setting configures the synchronization of user settings which are common between the versions of Internet Explorer. + By default, the user settings which are common between the versions of Internet Explorer synchronize between computers. Use the policy setting to prevent the user settings of Internet Explorer from synchronization between computers. - If you enable this policy setting, the user settings which are common between the versions of Internet Explorer continue to synchronize. -- If you disable this policy setting, the user settings which are common between the versions of Internet Explorer are excluded from settings synchronization. If any version of the Internet Explorer settings are enabled this policy setting should not be disabled. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you disable this policy setting, the user settings which are common between the versions of Internet Explorer are excluded from settings synchronization. If any version of the Internet Explorer settings are enabled this policy setting shouldn't be disabled. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -1012,13 +1039,12 @@ By default, the user settings which are common between the versions of Internet | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1044,7 +1070,7 @@ By default, the user settings which are common between the versions of Internet | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1060,11 +1086,14 @@ By default, the user settings which are common between the versions of Internet This policy setting configures the synchronization of user settings for the Maps app. + By default, the user settings of Maps sync between computers. Use the policy setting to prevent the user settings of Maps from synchronizing between computers. - If you enable this policy setting, Maps user settings continue to sync. + - If you disable this policy setting, Maps user settings are excluded from synchronization. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -1076,13 +1105,12 @@ By default, the user settings of Maps sync between computers. Use the policy set | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1109,7 +1137,7 @@ By default, the user settings of Maps sync between computers. Use the policy set | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1124,10 +1152,11 @@ By default, the user settings of Maps sync between computers. Use the policy set -This policy setting allows you to configure the UE-V Agent to write a warning event to the event log when a settings package file size reaches a defined threshold. By default the UE-V Agent does not report information about package file size. +This policy setting allows you to configure the UE-V Agent to write a warning event to the event log when a settings package file size reaches a defined threshold. By default the UE-V Agent doesn't report information about package file size. - If you enable this policy setting, specify the threshold file size in bytes. When the settings package file exceeds this threshold the UE-V Agent will write a warning event to the event log. -- If you disable or do not configure this policy setting, no event is written to the event log to report settings package size. + +- If you disable or don't configure this policy setting, no event is written to the event log to report settings package size. @@ -1139,13 +1168,12 @@ This policy setting allows you to configure the UE-V Agent to write a warning ev | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1171,7 +1199,7 @@ This policy setting allows you to configure the UE-V Agent to write a warning ev | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1187,11 +1215,14 @@ This policy setting allows you to configure the UE-V Agent to write a warning ev This policy setting configures the synchronization of user settings for Microsoft Access 2010. + By default, the user settings of Microsoft Access 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Access 2010 from synchronization between computers. - If you enable this policy setting, Microsoft Access 2010 user settings continue to synchronize. + - If you disable this policy setting, Microsoft Access 2010 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -1203,13 +1234,12 @@ By default, the user settings of Microsoft Access 2010 synchronize between compu | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1235,7 +1265,7 @@ By default, the user settings of Microsoft Access 2010 synchronize between compu | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1251,11 +1281,13 @@ By default, the user settings of Microsoft Access 2010 synchronize between compu This policy setting configures the synchronization of user settings which are common between the Microsoft Office Suite 2010 applications. + By default, the user settings which are common between the Microsoft Office Suite 2010 applications synchronize between computers. Use the policy setting to prevent the user settings which are common between the Microsoft Office Suite 2010 applications from synchronization between computers. - If you enable this policy setting, the user settings which are common between the Microsoft Office Suite 2010 applications continue to synchronize. -- If you disable this policy setting, the user settings which are common between the Microsoft Office Suite 2010 applications are excluded from the synchronization settings. If any of the Microsoft Office Suite 2010 applications are enabled, this policy setting should not be disabled -- If you do not configure this policy setting, any defined values will be deleted. + +- If you disable this policy setting, the user settings which are common between the Microsoft Office Suite 2010 applications are excluded from the synchronization settings. If any of the Microsoft Office Suite 2010 applications are enabled, this policy setting shouldn't be disabled +- If you don't configure this policy setting, any defined values will be deleted. @@ -1267,13 +1299,12 @@ By default, the user settings which are common between the Microsoft Office Suit | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1299,7 +1330,7 @@ By default, the user settings which are common between the Microsoft Office Suit | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1315,11 +1346,14 @@ By default, the user settings which are common between the Microsoft Office Suit This policy setting configures the synchronization of user settings for Microsoft Excel 2010. + By default, the user settings of Microsoft Excel 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Excel 2010 from synchronization between computers. - If you enable this policy setting, Microsoft Excel 2010 user settings continue to synchronize. + - If you disable this policy setting, Microsoft Excel 2010 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -1331,13 +1365,12 @@ By default, the user settings of Microsoft Excel 2010 synchronize between comput | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1363,7 +1396,7 @@ By default, the user settings of Microsoft Excel 2010 synchronize between comput | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1379,11 +1412,14 @@ By default, the user settings of Microsoft Excel 2010 synchronize between comput This policy setting configures the synchronization of user settings for Microsoft InfoPath 2010. + By default, the user settings of Microsoft InfoPath 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft InfoPath 2010 from synchronization between computers. - If you enable this policy setting, Microsoft InfoPath 2010 user settings continue to synchronize. + - If you disable this policy setting, Microsoft InfoPath 2010 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -1395,13 +1431,12 @@ By default, the user settings of Microsoft InfoPath 2010 synchronize between com | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1427,7 +1462,7 @@ By default, the user settings of Microsoft InfoPath 2010 synchronize between com | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1443,11 +1478,14 @@ By default, the user settings of Microsoft InfoPath 2010 synchronize between com This policy setting configures the synchronization of user settings for Microsoft Lync 2010. + By default, the user settings of Microsoft Lync 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Lync 2010 from synchronization between computers. - If you enable this policy setting, Microsoft Lync 2010 user settings continue to synchronize. + - If you disable this policy setting, Microsoft Lync 2010 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -1459,13 +1497,12 @@ By default, the user settings of Microsoft Lync 2010 synchronize between compute | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1492,7 +1529,7 @@ By default, the user settings of Microsoft Lync 2010 synchronize between compute | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1508,11 +1545,14 @@ By default, the user settings of Microsoft Lync 2010 synchronize between compute This policy setting configures the synchronization of user settings for Microsoft OneNote 2010. + By default, the user settings of Microsoft OneNote 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft OneNote 2010 from synchronization between computers. - If you enable this policy setting, Microsoft OneNote 2010 user settings continue to synchronize. + - If you disable this policy setting, Microsoft OneNote 2010 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -1524,13 +1564,12 @@ By default, the user settings of Microsoft OneNote 2010 synchronize between comp | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1556,7 +1595,7 @@ By default, the user settings of Microsoft OneNote 2010 synchronize between comp | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1572,11 +1611,14 @@ By default, the user settings of Microsoft OneNote 2010 synchronize between comp This policy setting configures the synchronization of user settings for Microsoft Outlook 2010. + By default, the user settings of Microsoft Outlook 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Outlook 2010 from synchronization between computers. - If you enable this policy setting, Microsoft Outlook 2010 user settings continue to synchronize. + - If you disable this policy setting, Microsoft Outlook 2010 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -1588,13 +1630,12 @@ By default, the user settings of Microsoft Outlook 2010 synchronize between comp | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1620,7 +1661,7 @@ By default, the user settings of Microsoft Outlook 2010 synchronize between comp | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1636,11 +1677,14 @@ By default, the user settings of Microsoft Outlook 2010 synchronize between comp This policy setting configures the synchronization of user settings for Microsoft PowerPoint 2010. + By default, the user settings of Microsoft PowerPoint 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft PowerPoint 2010 from synchronization between computers. - If you enable this policy setting, Microsoft PowerPoint 2010 user settings continue to synchronize. + - If you disable this policy setting, Microsoft PowerPoint 2010 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -1652,13 +1696,12 @@ By default, the user settings of Microsoft PowerPoint 2010 synchronize between c | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1684,7 +1727,7 @@ By default, the user settings of Microsoft PowerPoint 2010 synchronize between c | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1700,11 +1743,14 @@ By default, the user settings of Microsoft PowerPoint 2010 synchronize between c This policy setting configures the synchronization of user settings for Microsoft Project 2010. + By default, the user settings of Microsoft Project 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Project 2010 from synchronization between computers. - If you enable this policy setting, Microsoft Project 2010 user settings continue to synchronize. + - If you disable this policy setting, Microsoft Project 2010 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -1716,13 +1762,12 @@ By default, the user settings of Microsoft Project 2010 synchronize between comp | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1748,7 +1793,7 @@ By default, the user settings of Microsoft Project 2010 synchronize between comp | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1764,11 +1809,14 @@ By default, the user settings of Microsoft Project 2010 synchronize between comp This policy setting configures the synchronization of user settings for Microsoft Publisher 2010. + By default, the user settings of Microsoft Publisher 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Publisher 2010 from synchronization between computers. - If you enable this policy setting, Microsoft Publisher 2010 user settings continue to synchronize. + - If you disable this policy setting, Microsoft Publisher 2010 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -1780,13 +1828,12 @@ By default, the user settings of Microsoft Publisher 2010 synchronize between co | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1812,7 +1859,7 @@ By default, the user settings of Microsoft Publisher 2010 synchronize between co | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1828,11 +1875,14 @@ By default, the user settings of Microsoft Publisher 2010 synchronize between co This policy setting configures the synchronization of user settings for Microsoft SharePoint Designer 2010. + By default, the user settings of Microsoft SharePoint Designer 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft SharePoint Designer 2010 from synchronization between computers. - If you enable this policy setting, Microsoft SharePoint Designer 2010 user settings continue to synchronize. + - If you disable this policy setting, Microsoft SharePoint Designer 2010 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -1844,13 +1894,12 @@ By default, the user settings of Microsoft SharePoint Designer 2010 synchronize | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1876,7 +1925,7 @@ By default, the user settings of Microsoft SharePoint Designer 2010 synchronize | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1892,11 +1941,14 @@ By default, the user settings of Microsoft SharePoint Designer 2010 synchronize This policy setting configures the synchronization of user settings for Microsoft SharePoint Workspace 2010. + By default, the user settings of Microsoft SharePoint Workspace 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft SharePoint Workspace 2010 from synchronization between computers. - If you enable this policy setting, Microsoft SharePoint Workspace 2010 user settings continue to synchronize. + - If you disable this policy setting, Microsoft SharePoint Workspace 2010 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -1908,13 +1960,12 @@ By default, the user settings of Microsoft SharePoint Workspace 2010 synchronize | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1940,7 +1991,7 @@ By default, the user settings of Microsoft SharePoint Workspace 2010 synchronize | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1956,11 +2007,14 @@ By default, the user settings of Microsoft SharePoint Workspace 2010 synchronize This policy setting configures the synchronization of user settings for Microsoft Visio 2010. + By default, the user settings of Microsoft Visio 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Visio 2010 from synchronization between computers. - If you enable this policy setting, Microsoft Visio 2010 user settings continue to synchronize. + - If you disable this policy setting, Microsoft Visio 2010 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -1972,13 +2026,12 @@ By default, the user settings of Microsoft Visio 2010 synchronize between comput | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2004,7 +2057,7 @@ By default, the user settings of Microsoft Visio 2010 synchronize between comput | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2020,11 +2073,14 @@ By default, the user settings of Microsoft Visio 2010 synchronize between comput This policy setting configures the synchronization of user settings for Microsoft Word 2010. + By default, the user settings of Microsoft Word 2010 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Word 2010 from synchronization between computers. - If you enable this policy setting, Microsoft Word 2010 user settings continue to synchronize. + - If you disable this policy setting, Microsoft Word 2010 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -2036,13 +2092,12 @@ By default, the user settings of Microsoft Word 2010 synchronize between compute | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2068,7 +2123,7 @@ By default, the user settings of Microsoft Word 2010 synchronize between compute | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2084,11 +2139,14 @@ By default, the user settings of Microsoft Word 2010 synchronize between compute This policy setting configures the synchronization of user settings for Microsoft Access 2013. + By default, the user settings of Microsoft Access 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Access 2013 from synchronization between computers. - If you enable this policy setting, Microsoft Access 2013 user settings continue to synchronize. + - If you disable this policy setting, Microsoft Access 2013 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -2100,13 +2158,12 @@ By default, the user settings of Microsoft Access 2013 synchronize between compu | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2132,7 +2189,7 @@ By default, the user settings of Microsoft Access 2013 synchronize between compu | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2148,11 +2205,14 @@ By default, the user settings of Microsoft Access 2013 synchronize between compu This policy setting configures the backup of certain user settings for Microsoft Access 2013. + Microsoft Access 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Access 2013 settings. - If you enable this policy setting, certain user settings of Microsoft Access 2013 will continue to be backed up. -- If you disable this policy setting, certain user settings of Microsoft Access 2013 will not be backed up. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you disable this policy setting, certain user settings of Microsoft Access 2013 won't be backed up. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -2164,13 +2224,12 @@ Microsoft Access 2013 has user settings that are backed up instead of synchroniz | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2196,7 +2255,7 @@ Microsoft Access 2013 has user settings that are backed up instead of synchroniz | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2212,11 +2271,14 @@ Microsoft Access 2013 has user settings that are backed up instead of synchroniz This policy setting configures the synchronization of user settings which are common between the Microsoft Office Suite 2013 applications. + By default, the user settings which are common between the Microsoft Office Suite 2013 applications synchronize between computers. Use the policy setting to prevent the user settings which are common between the Microsoft Office Suite 2013 applications from synchronization between computers. - If you enable this policy setting, the user settings which are common between the Microsoft Office Suite 2013 applications continue to synchronize. -- If you disable this policy setting, the user settings which are common between the Microsoft Office Suite 2013 applications are excluded from the synchronization settings. If any of the Microsoft Office Suite 2013 applications are enabled, this policy setting should not be disabled. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you disable this policy setting, the user settings which are common between the Microsoft Office Suite 2013 applications are excluded from the synchronization settings. If any of the Microsoft Office Suite 2013 applications are enabled, this policy setting shouldn't be disabled. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -2228,13 +2290,12 @@ By default, the user settings which are common between the Microsoft Office Suit | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2260,7 +2321,7 @@ By default, the user settings which are common between the Microsoft Office Suit | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2276,11 +2337,14 @@ By default, the user settings which are common between the Microsoft Office Suit This policy setting configures the backup of certain user settings which are common between the Microsoft Office Suite 2013 applications. + Microsoft Office Suite 2013 has user settings which are common between applications and are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific common Microsoft Office Suite 2013 applications. - If you enable this policy setting, certain user settings which are common between the Microsoft Office Suite 2013 applications will continue to be backed up. -- If you disable this policy setting, certain user settings which are common between the Microsoft Office Suite 2013 applications will not be backed up. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you disable this policy setting, certain user settings which are common between the Microsoft Office Suite 2013 applications won't be backed up. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -2292,13 +2356,12 @@ Microsoft Office Suite 2013 has user settings which are common between applicati | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2324,7 +2387,7 @@ Microsoft Office Suite 2013 has user settings which are common between applicati | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2340,11 +2403,14 @@ Microsoft Office Suite 2013 has user settings which are common between applicati This policy setting configures the synchronization of user settings for Microsoft Excel 2013. + By default, the user settings of Microsoft Excel 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Excel 2013 from synchronization between computers. - If you enable this policy setting, Microsoft Excel 2013 user settings continue to synchronize. + - If you disable this policy setting, Microsoft Excel 2013 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -2356,13 +2422,12 @@ By default, the user settings of Microsoft Excel 2013 synchronize between comput | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2388,7 +2453,7 @@ By default, the user settings of Microsoft Excel 2013 synchronize between comput | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2404,11 +2469,14 @@ By default, the user settings of Microsoft Excel 2013 synchronize between comput This policy setting configures the backup of certain user settings for Microsoft Excel 2013. + Microsoft Excel 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Excel 2013 settings. - If you enable this policy setting, certain user settings of Microsoft Excel 2013 will continue to be backed up. -- If you disable this policy setting, certain user settings of Microsoft Excel 2013 will not be backed up. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you disable this policy setting, certain user settings of Microsoft Excel 2013 won't be backed up. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -2420,13 +2488,12 @@ Microsoft Excel 2013 has user settings that are backed up instead of synchronizi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2452,7 +2519,7 @@ Microsoft Excel 2013 has user settings that are backed up instead of synchronizi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2468,11 +2535,14 @@ Microsoft Excel 2013 has user settings that are backed up instead of synchronizi This policy setting configures the synchronization of user settings for Microsoft InfoPath 2013. + By default, the user settings of Microsoft InfoPath 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft InfoPath 2013 from synchronization between computers. - If you enable this policy setting, Microsoft InfoPath 2013 user settings continue to synchronize. + - If you disable this policy setting, Microsoft InfoPath 2013 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -2484,13 +2554,12 @@ By default, the user settings of Microsoft InfoPath 2013 synchronize between com | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2516,7 +2585,7 @@ By default, the user settings of Microsoft InfoPath 2013 synchronize between com | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2532,11 +2601,14 @@ By default, the user settings of Microsoft InfoPath 2013 synchronize between com This policy setting configures the backup of certain user settings for Microsoft InfoPath 2013. + Microsoft InfoPath 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft InfoPath 2013 settings. - If you enable this policy setting, certain user settings of Microsoft InfoPath 2013 will continue to be backed up. -- If you disable this policy setting, certain user settings of Microsoft InfoPath 2013 will not be backed up. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you disable this policy setting, certain user settings of Microsoft InfoPath 2013 won't be backed up. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -2548,13 +2620,12 @@ Microsoft InfoPath 2013 has user settings that are backed up instead of synchron | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2580,7 +2651,7 @@ Microsoft InfoPath 2013 has user settings that are backed up instead of synchron | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2596,11 +2667,14 @@ Microsoft InfoPath 2013 has user settings that are backed up instead of synchron This policy setting configures the synchronization of user settings for Microsoft Lync 2013. + By default, the user settings of Microsoft Lync 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Lync 2013 from synchronization between computers. - If you enable this policy setting, Microsoft Lync 2013 user settings continue to synchronize. + - If you disable this policy setting, Microsoft Lync 2013 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -2612,13 +2686,12 @@ By default, the user settings of Microsoft Lync 2013 synchronize between compute | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2644,7 +2717,7 @@ By default, the user settings of Microsoft Lync 2013 synchronize between compute | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2660,11 +2733,14 @@ By default, the user settings of Microsoft Lync 2013 synchronize between compute This policy setting configures the backup of certain user settings for Microsoft Lync 2013. + Microsoft Lync 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Lync 2013 settings. - If you enable this policy setting, certain user settings of Microsoft Lync 2013 will continue to be backed up. -- If you disable this policy setting, certain user settings of Microsoft Lync 2013 will not be backed up. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you disable this policy setting, certain user settings of Microsoft Lync 2013 won't be backed up. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -2676,13 +2752,12 @@ Microsoft Lync 2013 has user settings that are backed up instead of synchronizin | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2708,7 +2783,7 @@ Microsoft Lync 2013 has user settings that are backed up instead of synchronizin | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2724,11 +2799,14 @@ Microsoft Lync 2013 has user settings that are backed up instead of synchronizin This policy setting configures the synchronization of user settings for OneDrive for Business 2013. + By default, the user settings of OneDrive for Business 2013 synchronize between computers. Use the policy setting to prevent the user settings of OneDrive for Business 2013 from synchronization between computers. - If you enable this policy setting, OneDrive for Business 2013 user settings continue to synchronize. + - If you disable this policy setting, OneDrive for Business 2013 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -2740,13 +2818,12 @@ By default, the user settings of OneDrive for Business 2013 synchronize between | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2772,7 +2849,7 @@ By default, the user settings of OneDrive for Business 2013 synchronize between | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2788,11 +2865,14 @@ By default, the user settings of OneDrive for Business 2013 synchronize between This policy setting configures the synchronization of user settings for Microsoft OneNote 2013. + By default, the user settings of Microsoft OneNote 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft OneNote 2013 from synchronization between computers. - If you enable this policy setting, Microsoft OneNote 2013 user settings continue to synchronize. + - If you disable this policy setting, Microsoft OneNote 2013 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -2804,13 +2884,12 @@ By default, the user settings of Microsoft OneNote 2013 synchronize between comp | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2836,7 +2915,7 @@ By default, the user settings of Microsoft OneNote 2013 synchronize between comp | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2852,11 +2931,14 @@ By default, the user settings of Microsoft OneNote 2013 synchronize between comp This policy setting configures the backup of certain user settings for Microsoft OneNote 2013. + Microsoft OneNote 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft OneNote 2013 settings. - If you enable this policy setting, certain user settings of Microsoft OneNote 2013 will continue to be backed up. -- If you disable this policy setting, certain user settings of Microsoft OneNote 2013 will not be backed up. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you disable this policy setting, certain user settings of Microsoft OneNote 2013 won't be backed up. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -2868,13 +2950,12 @@ Microsoft OneNote 2013 has user settings that are backed up instead of synchroni | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2900,7 +2981,7 @@ Microsoft OneNote 2013 has user settings that are backed up instead of synchroni | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2916,11 +2997,14 @@ Microsoft OneNote 2013 has user settings that are backed up instead of synchroni This policy setting configures the synchronization of user settings for Microsoft Outlook 2013. + By default, the user settings of Microsoft Outlook 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Outlook 2013 from synchronization between computers. - If you enable this policy setting, Microsoft Outlook 2013 user settings continue to synchronize. + - If you disable this policy setting, Microsoft Outlook 2013 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -2932,13 +3016,12 @@ By default, the user settings of Microsoft Outlook 2013 synchronize between comp | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2964,7 +3047,7 @@ By default, the user settings of Microsoft Outlook 2013 synchronize between comp | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2980,11 +3063,14 @@ By default, the user settings of Microsoft Outlook 2013 synchronize between comp This policy setting configures the backup of certain user settings for Microsoft Outlook 2013. + Microsoft Outlook 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Outlook 2013 settings. - If you enable this policy setting, certain user settings of Microsoft Outlook 2013 will continue to be backed up. -- If you disable this policy setting, certain user settings of Microsoft Outlook 2013 will not be backed up. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you disable this policy setting, certain user settings of Microsoft Outlook 2013 won't be backed up. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -2996,13 +3082,12 @@ Microsoft Outlook 2013 has user settings that are backed up instead of synchroni | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3028,7 +3113,7 @@ Microsoft Outlook 2013 has user settings that are backed up instead of synchroni | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3044,11 +3129,14 @@ Microsoft Outlook 2013 has user settings that are backed up instead of synchroni This policy setting configures the synchronization of user settings for Microsoft PowerPoint 2013. + By default, the user settings of Microsoft PowerPoint 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft PowerPoint 2013 from synchronization between computers. - If you enable this policy setting, Microsoft PowerPoint 2013 user settings continue to synchronize. + - If you disable this policy setting, Microsoft PowerPoint 2013 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -3060,13 +3148,12 @@ By default, the user settings of Microsoft PowerPoint 2013 synchronize between c | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3092,7 +3179,7 @@ By default, the user settings of Microsoft PowerPoint 2013 synchronize between c | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3108,11 +3195,14 @@ By default, the user settings of Microsoft PowerPoint 2013 synchronize between c This policy setting configures the backup of certain user settings for Microsoft PowerPoint 2013. + Microsoft PowerPoint 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft PowerPoint 2013 settings. - If you enable this policy setting, certain user settings of Microsoft PowerPoint 2013 will continue to be backed up. -- If you disable this policy setting, certain user settings of Microsoft PowerPoint 2013 will not be backed up. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you disable this policy setting, certain user settings of Microsoft PowerPoint 2013 won't be backed up. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -3124,13 +3214,12 @@ Microsoft PowerPoint 2013 has user settings that are backed up instead of synchr | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3156,7 +3245,7 @@ Microsoft PowerPoint 2013 has user settings that are backed up instead of synchr | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3172,11 +3261,14 @@ Microsoft PowerPoint 2013 has user settings that are backed up instead of synchr This policy setting configures the synchronization of user settings for Microsoft Project 2013. + By default, the user settings of Microsoft Project 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Project 2013 from synchronization between computers. - If you enable this policy setting, Microsoft Project 2013 user settings continue to synchronize. + - If you disable this policy setting, Microsoft Project 2013 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -3188,13 +3280,12 @@ By default, the user settings of Microsoft Project 2013 synchronize between comp | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3220,7 +3311,7 @@ By default, the user settings of Microsoft Project 2013 synchronize between comp | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3236,11 +3327,14 @@ By default, the user settings of Microsoft Project 2013 synchronize between comp This policy setting configures the backup of certain user settings for Microsoft Project 2013. + Microsoft Project 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Project 2013 settings. - If you enable this policy setting, certain user settings of Microsoft Project 2013 will continue to be backed up. -- If you disable this policy setting, certain user settings of Microsoft Project 2013 will not be backed up. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you disable this policy setting, certain user settings of Microsoft Project 2013 won't be backed up. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -3252,13 +3346,12 @@ Microsoft Project 2013 has user settings that are backed up instead of synchroni | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3284,7 +3377,7 @@ Microsoft Project 2013 has user settings that are backed up instead of synchroni | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3300,11 +3393,14 @@ Microsoft Project 2013 has user settings that are backed up instead of synchroni This policy setting configures the synchronization of user settings for Microsoft Publisher 2013. + By default, the user settings of Microsoft Publisher 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Publisher 2013 from synchronization between computers. - If you enable this policy setting, Microsoft Publisher 2013 user settings continue to synchronize. + - If you disable this policy setting, Microsoft Publisher 2013 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -3316,13 +3412,12 @@ By default, the user settings of Microsoft Publisher 2013 synchronize between co | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3348,7 +3443,7 @@ By default, the user settings of Microsoft Publisher 2013 synchronize between co | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3364,11 +3459,14 @@ By default, the user settings of Microsoft Publisher 2013 synchronize between co This policy setting configures the backup of certain user settings for Microsoft Publisher 2013. + Microsoft Publisher 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Publisher 2013 settings. - If you enable this policy setting, certain user settings of Microsoft Publisher 2013 will continue to be backed up. -- If you disable this policy setting, certain user settings of Microsoft Publisher 2013 will not be backed up. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you disable this policy setting, certain user settings of Microsoft Publisher 2013 won't be backed up. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -3380,13 +3478,12 @@ Microsoft Publisher 2013 has user settings that are backed up instead of synchro | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3412,7 +3509,7 @@ Microsoft Publisher 2013 has user settings that are backed up instead of synchro | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3428,11 +3525,14 @@ Microsoft Publisher 2013 has user settings that are backed up instead of synchro This policy setting configures the synchronization of user settings for Microsoft SharePoint Designer 2013. + By default, the user settings of Microsoft SharePoint Designer 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft SharePoint Designer 2013 from synchronization between computers. - If you enable this policy setting, Microsoft SharePoint Designer 2013 user settings continue to synchronize. + - If you disable this policy setting, Microsoft SharePoint Designer 2013 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -3444,13 +3544,12 @@ By default, the user settings of Microsoft SharePoint Designer 2013 synchronize | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3476,7 +3575,7 @@ By default, the user settings of Microsoft SharePoint Designer 2013 synchronize | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3492,11 +3591,14 @@ By default, the user settings of Microsoft SharePoint Designer 2013 synchronize This policy setting configures the backup of certain user settings for Microsoft SharePoint Designer 2013. + Microsoft SharePoint Designer 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft SharePoint Designer 2013 settings. - If you enable this policy setting, certain user settings of Microsoft SharePoint Designer 2013 will continue to be backed up. -- If you disable this policy setting, certain user settings of Microsoft SharePoint Designer 2013 will not be backed up. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you disable this policy setting, certain user settings of Microsoft SharePoint Designer 2013 won't be backed up. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -3508,13 +3610,12 @@ Microsoft SharePoint Designer 2013 has user settings that are backed up instead | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3540,7 +3641,7 @@ Microsoft SharePoint Designer 2013 has user settings that are backed up instead | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3556,11 +3657,14 @@ Microsoft SharePoint Designer 2013 has user settings that are backed up instead This policy setting configures the synchronization of user settings for Microsoft Office 2013 Upload Center. + By default, the user settings of Microsoft Office 2013 Upload Center synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Office 2013 Upload Center from synchronization between computers. - If you enable this policy setting, Microsoft Office 2013 Upload Center user settings continue to synchronize. + - If you disable this policy setting, Microsoft Office 2013 Upload Center user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -3572,13 +3676,12 @@ By default, the user settings of Microsoft Office 2013 Upload Center synchronize | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3604,7 +3707,7 @@ By default, the user settings of Microsoft Office 2013 Upload Center synchronize | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3620,11 +3723,14 @@ By default, the user settings of Microsoft Office 2013 Upload Center synchronize This policy setting configures the synchronization of user settings for Microsoft Visio 2013. + By default, the user settings of Microsoft Visio 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Visio 2013 from synchronization between computers. - If you enable this policy setting, Microsoft Visio 2013 user settings continue to synchronize. + - If you disable this policy setting, Microsoft Visio 2013 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -3636,13 +3742,12 @@ By default, the user settings of Microsoft Visio 2013 synchronize between comput | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3668,7 +3773,7 @@ By default, the user settings of Microsoft Visio 2013 synchronize between comput | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3684,11 +3789,14 @@ By default, the user settings of Microsoft Visio 2013 synchronize between comput This policy setting configures the backup of certain user settings for Microsoft Visio 2013. + Microsoft Visio 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Visio 2013 settings. - If you enable this policy setting, certain user settings of Microsoft Visio 2013 will continue to be backed up. -- If you disable this policy setting, certain user settings of Microsoft Visio 2013 will not be backed up. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you disable this policy setting, certain user settings of Microsoft Visio 2013 won't be backed up. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -3700,13 +3808,12 @@ Microsoft Visio 2013 has user settings that are backed up instead of synchronizi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3732,7 +3839,7 @@ Microsoft Visio 2013 has user settings that are backed up instead of synchronizi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3748,11 +3855,14 @@ Microsoft Visio 2013 has user settings that are backed up instead of synchronizi This policy setting configures the synchronization of user settings for Microsoft Word 2013. + By default, the user settings of Microsoft Word 2013 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Word 2013 from synchronization between computers. - If you enable this policy setting, Microsoft Word 2013 user settings continue to synchronize. + - If you disable this policy setting, Microsoft Word 2013 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -3764,13 +3874,12 @@ By default, the user settings of Microsoft Word 2013 synchronize between compute | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3796,7 +3905,7 @@ By default, the user settings of Microsoft Word 2013 synchronize between compute | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3812,11 +3921,14 @@ By default, the user settings of Microsoft Word 2013 synchronize between compute This policy setting configures the backup of certain user settings for Microsoft Word 2013. + Microsoft Word 2013 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Word 2013 settings. - If you enable this policy setting, certain user settings of Microsoft Word 2013 will continue to be backed up. -- If you disable this policy setting, certain user settings of Microsoft Word 2013 will not be backed up. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you disable this policy setting, certain user settings of Microsoft Word 2013 won't be backed up. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -3828,13 +3940,12 @@ Microsoft Word 2013 has user settings that are backed up instead of synchronizin | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3860,7 +3971,7 @@ Microsoft Word 2013 has user settings that are backed up instead of synchronizin | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3876,11 +3987,14 @@ Microsoft Word 2013 has user settings that are backed up instead of synchronizin This policy setting configures the synchronization of user settings for Microsoft Access 2016. + By default, the user settings of Microsoft Access 2016 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Access 2016 from synchronization between computers. - If you enable this policy setting, Microsoft Access 2016 user settings continue to synchronize. + - If you disable this policy setting, Microsoft Access 2016 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -3892,13 +4006,12 @@ By default, the user settings of Microsoft Access 2016 synchronize between compu | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3924,7 +4037,7 @@ By default, the user settings of Microsoft Access 2016 synchronize between compu | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3940,11 +4053,14 @@ By default, the user settings of Microsoft Access 2016 synchronize between compu This policy setting configures the backup of certain user settings for Microsoft Access 2016. + Microsoft Access 2016 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Access 2016 settings. - If you enable this policy setting, certain user settings of Microsoft Access 2016 will continue to be backed up. -- If you disable this policy setting, certain user settings of Microsoft Access 2016 will not be backed up. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you disable this policy setting, certain user settings of Microsoft Access 2016 won't be backed up. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -3956,13 +4072,12 @@ Microsoft Access 2016 has user settings that are backed up instead of synchroniz | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3988,7 +4103,7 @@ Microsoft Access 2016 has user settings that are backed up instead of synchroniz | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4004,11 +4119,14 @@ Microsoft Access 2016 has user settings that are backed up instead of synchroniz This policy setting configures the synchronization of user settings which are common between the Microsoft Office Suite 2016 applications. + By default, the user settings which are common between the Microsoft Office Suite 2016 applications synchronize between computers. Use the policy setting to prevent the user settings which are common between the Microsoft Office Suite 2016 applications from synchronization between computers. - If you enable this policy setting, the user settings which are common between the Microsoft Office Suite 2016 applications continue to synchronize. -- If you disable this policy setting, the user settings which are common between the Microsoft Office Suite 2016 applications are excluded from the synchronization settings. If any of the Microsoft Office Suite 2016 applications are enabled, this policy setting should not be disabled. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you disable this policy setting, the user settings which are common between the Microsoft Office Suite 2016 applications are excluded from the synchronization settings. If any of the Microsoft Office Suite 2016 applications are enabled, this policy setting shouldn't be disabled. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -4020,13 +4138,12 @@ By default, the user settings which are common between the Microsoft Office Suit | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4052,7 +4169,7 @@ By default, the user settings which are common between the Microsoft Office Suit | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4068,11 +4185,14 @@ By default, the user settings which are common between the Microsoft Office Suit This policy setting configures the backup of certain user settings which are common between the Microsoft Office Suite 2016 applications. + Microsoft Office Suite 2016 has user settings which are common between applications and are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific common Microsoft Office Suite 2016 applications. - If you enable this policy setting, certain user settings which are common between the Microsoft Office Suite 2016 applications will continue to be backed up. -- If you disable this policy setting, certain user settings which are common between the Microsoft Office Suite 2016 applications will not be backed up. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you disable this policy setting, certain user settings which are common between the Microsoft Office Suite 2016 applications won't be backed up. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -4084,13 +4204,12 @@ Microsoft Office Suite 2016 has user settings which are common between applicati | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4116,7 +4235,7 @@ Microsoft Office Suite 2016 has user settings which are common between applicati | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4132,11 +4251,14 @@ Microsoft Office Suite 2016 has user settings which are common between applicati This policy setting configures the synchronization of user settings for Microsoft Excel 2016. + By default, the user settings of Microsoft Excel 2016 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Excel 2016 from synchronization between computers. - If you enable this policy setting, Microsoft Excel 2016 user settings continue to synchronize. + - If you disable this policy setting, Microsoft Excel 2016 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -4148,13 +4270,12 @@ By default, the user settings of Microsoft Excel 2016 synchronize between comput | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4180,7 +4301,7 @@ By default, the user settings of Microsoft Excel 2016 synchronize between comput | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4196,11 +4317,14 @@ By default, the user settings of Microsoft Excel 2016 synchronize between comput This policy setting configures the backup of certain user settings for Microsoft Excel 2016. + Microsoft Excel 2016 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Excel 2016 settings. - If you enable this policy setting, certain user settings of Microsoft Excel 2016 will continue to be backed up. -- If you disable this policy setting, certain user settings of Microsoft Excel 2016 will not be backed up. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you disable this policy setting, certain user settings of Microsoft Excel 2016 won't be backed up. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -4212,13 +4336,12 @@ Microsoft Excel 2016 has user settings that are backed up instead of synchronizi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4244,7 +4367,7 @@ Microsoft Excel 2016 has user settings that are backed up instead of synchronizi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4260,11 +4383,14 @@ Microsoft Excel 2016 has user settings that are backed up instead of synchronizi This policy setting configures the synchronization of user settings for Microsoft Lync 2016. + By default, the user settings of Microsoft Lync 2016 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Lync 2016 from synchronization between computers. - If you enable this policy setting, Microsoft Lync 2016 user settings continue to synchronize. + - If you disable this policy setting, Microsoft Lync 2016 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -4276,13 +4402,12 @@ By default, the user settings of Microsoft Lync 2016 synchronize between compute | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4308,7 +4433,7 @@ By default, the user settings of Microsoft Lync 2016 synchronize between compute | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4324,11 +4449,14 @@ By default, the user settings of Microsoft Lync 2016 synchronize between compute This policy setting configures the backup of certain user settings for Microsoft Lync 2016. + Microsoft Lync 2016 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Lync 2016 settings. - If you enable this policy setting, certain user settings of Microsoft Lync 2016 will continue to be backed up. -- If you disable this policy setting, certain user settings of Microsoft Lync 2016 will not be backed up. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you disable this policy setting, certain user settings of Microsoft Lync 2016 won't be backed up. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -4340,13 +4468,12 @@ Microsoft Lync 2016 has user settings that are backed up instead of synchronizin | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4372,7 +4499,7 @@ Microsoft Lync 2016 has user settings that are backed up instead of synchronizin | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4388,11 +4515,14 @@ Microsoft Lync 2016 has user settings that are backed up instead of synchronizin This policy setting configures the synchronization of user settings for OneDrive for Business 2016. + By default, the user settings of OneDrive for Business 2016 synchronize between computers. Use the policy setting to prevent the user settings of OneDrive for Business 2016 from synchronization between computers. - If you enable this policy setting, OneDrive for Business 2016 user settings continue to synchronize. + - If you disable this policy setting, OneDrive for Business 2016 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -4404,13 +4534,12 @@ By default, the user settings of OneDrive for Business 2016 synchronize between | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4436,7 +4565,7 @@ By default, the user settings of OneDrive for Business 2016 synchronize between | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4452,11 +4581,14 @@ By default, the user settings of OneDrive for Business 2016 synchronize between This policy setting configures the synchronization of user settings for Microsoft OneNote 2016. + By default, the user settings of Microsoft OneNote 2016 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft OneNote 2016 from synchronization between computers. - If you enable this policy setting, Microsoft OneNote 2016 user settings continue to synchronize. + - If you disable this policy setting, Microsoft OneNote 2016 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -4468,13 +4600,12 @@ By default, the user settings of Microsoft OneNote 2016 synchronize between comp | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4500,7 +4631,7 @@ By default, the user settings of Microsoft OneNote 2016 synchronize between comp | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4516,11 +4647,14 @@ By default, the user settings of Microsoft OneNote 2016 synchronize between comp This policy setting configures the backup of certain user settings for Microsoft OneNote 2016. + Microsoft OneNote 2016 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft OneNote 2016 settings. - If you enable this policy setting, certain user settings of Microsoft OneNote 2016 will continue to be backed up. -- If you disable this policy setting, certain user settings of Microsoft OneNote 2016 will not be backed up. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you disable this policy setting, certain user settings of Microsoft OneNote 2016 won't be backed up. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -4532,13 +4666,12 @@ Microsoft OneNote 2016 has user settings that are backed up instead of synchroni | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4564,7 +4697,7 @@ Microsoft OneNote 2016 has user settings that are backed up instead of synchroni | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4580,11 +4713,14 @@ Microsoft OneNote 2016 has user settings that are backed up instead of synchroni This policy setting configures the synchronization of user settings for Microsoft Outlook 2016. + By default, the user settings of Microsoft Outlook 2016 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Outlook 2016 from synchronization between computers. - If you enable this policy setting, Microsoft Outlook 2016 user settings continue to synchronize. + - If you disable this policy setting, Microsoft Outlook 2016 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -4596,13 +4732,12 @@ By default, the user settings of Microsoft Outlook 2016 synchronize between comp | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4628,7 +4763,7 @@ By default, the user settings of Microsoft Outlook 2016 synchronize between comp | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4644,11 +4779,14 @@ By default, the user settings of Microsoft Outlook 2016 synchronize between comp This policy setting configures the backup of certain user settings for Microsoft Outlook 2016. + Microsoft Outlook 2016 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Outlook 2016 settings. - If you enable this policy setting, certain user settings of Microsoft Outlook 2016 will continue to be backed up. -- If you disable this policy setting, certain user settings of Microsoft Outlook 2016 will not be backed up. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you disable this policy setting, certain user settings of Microsoft Outlook 2016 won't be backed up. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -4660,13 +4798,12 @@ Microsoft Outlook 2016 has user settings that are backed up instead of synchroni | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4692,7 +4829,7 @@ Microsoft Outlook 2016 has user settings that are backed up instead of synchroni | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4708,11 +4845,14 @@ Microsoft Outlook 2016 has user settings that are backed up instead of synchroni This policy setting configures the synchronization of user settings for Microsoft PowerPoint 2016. + By default, the user settings of Microsoft PowerPoint 2016 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft PowerPoint 2016 from synchronization between computers. - If you enable this policy setting, Microsoft PowerPoint 2016 user settings continue to synchronize. + - If you disable this policy setting, Microsoft PowerPoint 2016 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -4724,13 +4864,12 @@ By default, the user settings of Microsoft PowerPoint 2016 synchronize between c | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4756,7 +4895,7 @@ By default, the user settings of Microsoft PowerPoint 2016 synchronize between c | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4772,11 +4911,14 @@ By default, the user settings of Microsoft PowerPoint 2016 synchronize between c This policy setting configures the backup of certain user settings for Microsoft PowerPoint 2016. + Microsoft PowerPoint 2016 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft PowerPoint 2016 settings. - If you enable this policy setting, certain user settings of Microsoft PowerPoint 2016 will continue to be backed up. -- If you disable this policy setting, certain user settings of Microsoft PowerPoint 2016 will not be backed up. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you disable this policy setting, certain user settings of Microsoft PowerPoint 2016 won't be backed up. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -4788,13 +4930,12 @@ Microsoft PowerPoint 2016 has user settings that are backed up instead of synchr | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4820,7 +4961,7 @@ Microsoft PowerPoint 2016 has user settings that are backed up instead of synchr | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4836,11 +4977,14 @@ Microsoft PowerPoint 2016 has user settings that are backed up instead of synchr This policy setting configures the synchronization of user settings for Microsoft Project 2016. + By default, the user settings of Microsoft Project 2016 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Project 2016 from synchronization between computers. - If you enable this policy setting, Microsoft Project 2016 user settings continue to synchronize. + - If you disable this policy setting, Microsoft Project 2016 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -4852,13 +4996,12 @@ By default, the user settings of Microsoft Project 2016 synchronize between comp | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4884,7 +5027,7 @@ By default, the user settings of Microsoft Project 2016 synchronize between comp | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4900,11 +5043,14 @@ By default, the user settings of Microsoft Project 2016 synchronize between comp This policy setting configures the backup of certain user settings for Microsoft Project 2016. + Microsoft Project 2016 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Project 2016 settings. - If you enable this policy setting, certain user settings of Microsoft Project 2016 will continue to be backed up. -- If you disable this policy setting, certain user settings of Microsoft Project 2016 will not be backed up. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you disable this policy setting, certain user settings of Microsoft Project 2016 won't be backed up. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -4916,13 +5062,12 @@ Microsoft Project 2016 has user settings that are backed up instead of synchroni | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4948,7 +5093,7 @@ Microsoft Project 2016 has user settings that are backed up instead of synchroni | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4964,11 +5109,14 @@ Microsoft Project 2016 has user settings that are backed up instead of synchroni This policy setting configures the synchronization of user settings for Microsoft Publisher 2016. + By default, the user settings of Microsoft Publisher 2016 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Publisher 2016 from synchronization between computers. - If you enable this policy setting, Microsoft Publisher 2016 user settings continue to synchronize. + - If you disable this policy setting, Microsoft Publisher 2016 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -4980,13 +5128,12 @@ By default, the user settings of Microsoft Publisher 2016 synchronize between co | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5012,7 +5159,7 @@ By default, the user settings of Microsoft Publisher 2016 synchronize between co | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5028,11 +5175,14 @@ By default, the user settings of Microsoft Publisher 2016 synchronize between co This policy setting configures the backup of certain user settings for Microsoft Publisher 2016. + Microsoft Publisher 2016 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Publisher 2016 settings. - If you enable this policy setting, certain user settings of Microsoft Publisher 2016 will continue to be backed up. -- If you disable this policy setting, certain user settings of Microsoft Publisher 2016 will not be backed up. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you disable this policy setting, certain user settings of Microsoft Publisher 2016 won't be backed up. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -5044,13 +5194,12 @@ Microsoft Publisher 2016 has user settings that are backed up instead of synchro | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5076,7 +5225,7 @@ Microsoft Publisher 2016 has user settings that are backed up instead of synchro | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5092,11 +5241,14 @@ Microsoft Publisher 2016 has user settings that are backed up instead of synchro This policy setting configures the synchronization of user settings for Microsoft Office 2016 Upload Center. + By default, the user settings of Microsoft Office 2016 Upload Center synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Office 2016 Upload Center from synchronization between computers. - If you enable this policy setting, Microsoft Office 2016 Upload Center user settings continue to synchronize. + - If you disable this policy setting, Microsoft Office 2016 Upload Center user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -5108,13 +5260,12 @@ By default, the user settings of Microsoft Office 2016 Upload Center synchronize | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5140,7 +5291,7 @@ By default, the user settings of Microsoft Office 2016 Upload Center synchronize | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5156,11 +5307,14 @@ By default, the user settings of Microsoft Office 2016 Upload Center synchronize This policy setting configures the synchronization of user settings for Microsoft Visio 2016. + By default, the user settings of Microsoft Visio 2016 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Visio 2016 from synchronization between computers. - If you enable this policy setting, Microsoft Visio 2016 user settings continue to synchronize. + - If you disable this policy setting, Microsoft Visio 2016 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -5172,13 +5326,12 @@ By default, the user settings of Microsoft Visio 2016 synchronize between comput | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5204,7 +5357,7 @@ By default, the user settings of Microsoft Visio 2016 synchronize between comput | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5220,11 +5373,14 @@ By default, the user settings of Microsoft Visio 2016 synchronize between comput This policy setting configures the backup of certain user settings for Microsoft Visio 2016. + Microsoft Visio 2016 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Visio 2016 settings. - If you enable this policy setting, certain user settings of Microsoft Visio 2016 will continue to be backed up. -- If you disable this policy setting, certain user settings of Microsoft Visio 2016 will not be backed up. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you disable this policy setting, certain user settings of Microsoft Visio 2016 won't be backed up. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -5236,13 +5392,12 @@ Microsoft Visio 2016 has user settings that are backed up instead of synchronizi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5268,7 +5423,7 @@ Microsoft Visio 2016 has user settings that are backed up instead of synchronizi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5284,11 +5439,14 @@ Microsoft Visio 2016 has user settings that are backed up instead of synchronizi This policy setting configures the synchronization of user settings for Microsoft Word 2016. + By default, the user settings of Microsoft Word 2016 synchronize between computers. Use the policy setting to prevent the user settings of Microsoft Word 2016 from synchronization between computers. - If you enable this policy setting, Microsoft Word 2016 user settings continue to synchronize. + - If you disable this policy setting, Microsoft Word 2016 user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -5300,13 +5458,12 @@ By default, the user settings of Microsoft Word 2016 synchronize between compute | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5332,7 +5489,7 @@ By default, the user settings of Microsoft Word 2016 synchronize between compute | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5348,11 +5505,14 @@ By default, the user settings of Microsoft Word 2016 synchronize between compute This policy setting configures the backup of certain user settings for Microsoft Word 2016. + Microsoft Word 2016 has user settings that are backed up instead of synchronizing between computers. Use the policy setting to suppress the backup of specific Microsoft Word 2016 settings. - If you enable this policy setting, certain user settings of Microsoft Word 2016 will continue to be backed up. -- If you disable this policy setting, certain user settings of Microsoft Word 2016 will not be backed up. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you disable this policy setting, certain user settings of Microsoft Word 2016 won't be backed up. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -5364,13 +5524,12 @@ Microsoft Word 2016 has user settings that are backed up instead of synchronizin | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5396,7 +5555,7 @@ Microsoft Word 2016 has user settings that are backed up instead of synchronizin | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5412,11 +5571,14 @@ Microsoft Word 2016 has user settings that are backed up instead of synchronizin This policy setting configures the synchronization of user settings for Microsoft Office 365 Access 2013. + Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Access 2013 will synchronize between a user's work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Access 2013 from synchronization between computers with UE-V. - If you enable this policy setting, Microsoft Office 365 Access 2013 user settings continue to sync with UE-V. + - If you disable this policy setting, Microsoft Office 365 Access 2013 user settings are excluded from synchronization with UE-V. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -5428,13 +5590,12 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5460,7 +5621,7 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5476,11 +5637,14 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t This policy setting configures the synchronization of user settings for Microsoft Office 365 Access 2016. + Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Access 2016 will synchronize between a user's work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Access 2016 from synchronization between computers with UE-V. - If you enable this policy setting, Microsoft Office 365 Access 2016 user settings continue to sync with UE-V. + - If you disable this policy setting, Microsoft Office 365 Access 2016 user settings are excluded from synchronization with UE-V. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -5492,13 +5656,12 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5524,7 +5687,7 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5540,11 +5703,14 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t This policy setting configures the synchronization of user settings which are common between the Microsoft Office Suite 2013 applications. + Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings which are common between the Microsoft Office Suite 2013 applications will synchronize between a user's work computers with UE-V by default. Use this policy setting to prevent the user settings which are common between the Microsoft Office Suite 2013 applications from synchronization between computers with UE-V. - If you enable this policy setting, user settings which are common between the Microsoft Office Suite 2013 applications continue to synchronize with UE-V. + - If you disable this policy setting, user settings which are common between the Microsoft Office Suite 2013 applications are excluded from synchronization with UE-V. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -5556,13 +5722,12 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5588,7 +5753,7 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5604,11 +5769,14 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t This policy setting configures the synchronization of user settings which are common between the Microsoft Office Suite 2016 applications. + Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings which are common between the Microsoft Office Suite 2016 applications will synchronize between a user's work computers with UE-V by default. Use this policy setting to prevent the user settings which are common between the Microsoft Office Suite 2016 applications from synchronization between computers with UE-V. - If you enable this policy setting, user settings which are common between the Microsoft Office Suite 2016 applications continue to synchronize with UE-V. + - If you disable this policy setting, user settings which are common between the Microsoft Office Suite 2016 applications are excluded from synchronization with UE-V. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -5620,13 +5788,12 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5652,7 +5819,7 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5668,11 +5835,14 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t This policy setting configures the synchronization of user settings for Microsoft Office 365 Excel 2013. + Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Excel 2013 will synchronize between a user's work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Excel 2013 from synchronization between computers with UE-V. - If you enable this policy setting, Microsoft Office 365 Excel 2013 user settings continue to sync with UE-V. + - If you disable this policy setting, Microsoft Office 365 Excel 2013 user settings are excluded from synchronization with UE-V. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -5684,13 +5854,12 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5716,7 +5885,7 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5732,11 +5901,14 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t This policy setting configures the synchronization of user settings for Microsoft Office 365 Excel 2016. + Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Excel 2016 will synchronize between a user's work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Excel 2016 from synchronization between computers with UE-V. - If you enable this policy setting, Microsoft Office 365 Excel 2016 user settings continue to sync with UE-V. + - If you disable this policy setting, Microsoft Office 365 Excel 2016 user settings are excluded from synchronization with UE-V. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -5748,13 +5920,12 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5780,7 +5951,7 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5796,11 +5967,14 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t This policy setting configures the synchronization of user settings for Microsoft Office 365 InfoPath 2013. + Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 InfoPath 2013 will synchronize between a user's work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 InfoPath 2013 from synchronization between computers with UE-V. - If you enable this policy setting, Microsoft Office 365 InfoPath 2013 user settings continue to sync with UE-V. + - If you disable this policy setting, Microsoft Office 365 InfoPath 2013 user settings are excluded from synchronization with UE-V. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -5812,13 +5986,12 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5844,7 +6017,7 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5860,11 +6033,14 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t This policy setting configures the synchronization of user settings for Microsoft Office 365 Lync 2013. + Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Lync 2013 will synchronize between a user's work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Lync 2013 from synchronization between computers with UE-V. - If you enable this policy setting, Microsoft Office 365 Lync 2013 user settings continue to sync with UE-V. + - If you disable this policy setting, Microsoft Office 365 Lync 2013 user settings are excluded from synchronization with UE-V. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -5876,13 +6052,12 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5908,7 +6083,7 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5924,11 +6099,14 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t This policy setting configures the synchronization of user settings for Microsoft Office 365 Lync 2016. + Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Lync 2016 will synchronize between a user's work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Lync 2016 from synchronization between computers with UE-V. - If you enable this policy setting, Microsoft Office 365 Lync 2016 user settings continue to sync with UE-V. + - If you disable this policy setting, Microsoft Office 365 Lync 2016 user settings are excluded from synchronization with UE-V. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -5940,13 +6118,12 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5972,7 +6149,7 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5988,11 +6165,14 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t This policy setting configures the synchronization of user settings for Microsoft Office 365 OneNote 2013. + Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 OneNote 2013 will synchronize between a user's work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 OneNote 2013 from synchronization between computers with UE-V. - If you enable this policy setting, Microsoft Office 365 OneNote 2013 user settings continue to sync with UE-V. + - If you disable this policy setting, Microsoft Office 365 OneNote 2013 user settings are excluded from synchronization with UE-V. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -6004,13 +6184,12 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6036,7 +6215,7 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -6052,11 +6231,14 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t This policy setting configures the synchronization of user settings for Microsoft Office 365 OneNote 2016. + Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 OneNote 2016 will synchronize between a user's work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 OneNote 2016 from synchronization between computers with UE-V. - If you enable this policy setting, Microsoft Office 365 OneNote 2016 user settings continue to sync with UE-V. + - If you disable this policy setting, Microsoft Office 365 OneNote 2016 user settings are excluded from synchronization with UE-V. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -6068,13 +6250,12 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6100,7 +6281,7 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -6116,11 +6297,14 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t This policy setting configures the synchronization of user settings for Microsoft Office 365 Outlook 2013. + Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Outlook 2013 will synchronize between a user's work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Outlook 2013 from synchronization between computers with UE-V. - If you enable this policy setting, Microsoft Office 365 Outlook 2013 user settings continue to sync with UE-V. + - If you disable this policy setting, Microsoft Office 365 Outlook 2013 user settings are excluded from synchronization with UE-V. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -6132,13 +6316,12 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6164,7 +6347,7 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -6180,11 +6363,14 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t This policy setting configures the synchronization of user settings for Microsoft Office 365 Outlook 2016. + Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Outlook 2016 will synchronize between a user's work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Outlook 2016 from synchronization between computers with UE-V. - If you enable this policy setting, Microsoft Office 365 Outlook 2016 user settings continue to sync with UE-V. + - If you disable this policy setting, Microsoft Office 365 Outlook 2016 user settings are excluded from synchronization with UE-V. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -6196,13 +6382,12 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6228,7 +6413,7 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -6244,11 +6429,14 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t This policy setting configures the synchronization of user settings for Microsoft Office 365 PowerPoint 2013. + Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 PowerPoint 2013 will synchronize between a user's work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 PowerPoint 2013 from synchronization between computers with UE-V. - If you enable this policy setting, Microsoft Office 365 PowerPoint 2013 user settings continue to sync with UE-V. + - If you disable this policy setting, Microsoft Office 365 PowerPoint 2013 user settings are excluded from synchronization with UE-V. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -6260,13 +6448,12 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6292,7 +6479,7 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -6308,11 +6495,14 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t This policy setting configures the synchronization of user settings for Microsoft Office 365 PowerPoint 2016. + Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 PowerPoint 2016 will synchronize between a user's work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 PowerPoint 2016 from synchronization between computers with UE-V. - If you enable this policy setting, Microsoft Office 365 PowerPoint 2016 user settings continue to sync with UE-V. + - If you disable this policy setting, Microsoft Office 365 PowerPoint 2016 user settings are excluded from synchronization with UE-V. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -6324,13 +6514,12 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6356,7 +6545,7 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -6372,11 +6561,14 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t This policy setting configures the synchronization of user settings for Microsoft Office 365 Project 2013. + Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Project 2013 will synchronize between a user's work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Project 2013 from synchronization between computers with UE-V. - If you enable this policy setting, Microsoft Office 365 Project 2013 user settings continue to sync with UE-V. + - If you disable this policy setting, Microsoft Office 365 Project 2013 user settings are excluded from synchronization with UE-V. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -6388,13 +6580,12 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6420,7 +6611,7 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -6436,11 +6627,14 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t This policy setting configures the synchronization of user settings for Microsoft Office 365 Project 2016. + Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Project 2016 will synchronize between a user's work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Project 2016 from synchronization between computers with UE-V. - If you enable this policy setting, Microsoft Office 365 Project 2016 user settings continue to sync with UE-V. + - If you disable this policy setting, Microsoft Office 365 Project 2016 user settings are excluded from synchronization with UE-V. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -6452,13 +6646,12 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6484,7 +6677,7 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -6500,11 +6693,14 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t This policy setting configures the synchronization of user settings for Microsoft Office 365 Publisher 2013. + Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Publisher 2013 will synchronize between a user's work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Publisher 2013 from synchronization between computers with UE-V. - If you enable this policy setting, Microsoft Office 365 Publisher 2013 user settings continue to sync with UE-V. + - If you disable this policy setting, Microsoft Office 365 Publisher 2013 user settings are excluded from synchronization with UE-V. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -6516,13 +6712,12 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6548,7 +6743,7 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -6564,11 +6759,14 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t This policy setting configures the synchronization of user settings for Microsoft Office 365 Publisher 2016. + Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Publisher 2016 will synchronize between a user's work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Publisher 2016 from synchronization between computers with UE-V. - If you enable this policy setting, Microsoft Office 365 Publisher 2016 user settings continue to sync with UE-V. + - If you disable this policy setting, Microsoft Office 365 Publisher 2016 user settings are excluded from synchronization with UE-V. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -6580,13 +6778,12 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6612,7 +6809,7 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -6628,11 +6825,14 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t This policy setting configures the synchronization of user settings for Microsoft Office 365 SharePoint Designer 2013. + Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 SharePoint Designer 2013 will synchronize between a user's work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 SharePoint Designer 2013 from synchronization between computers with UE-V. - If you enable this policy setting, Microsoft Office 365 SharePoint Designer 2013 user settings continue to sync with UE-V. + - If you disable this policy setting, Microsoft Office 365 SharePoint Designer 2013 user settings are excluded from synchronization with UE-V. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -6644,13 +6844,12 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6676,7 +6875,7 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -6692,11 +6891,14 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t This policy setting configures the synchronization of user settings for Microsoft Office 365 Visio 2013. + Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Visio 2013 will synchronize between a user's work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Visio 2013 from synchronization between computers with UE-V. - If you enable this policy setting, Microsoft Office 365 Visio 2013 user settings continue to sync with UE-V. + - If you disable this policy setting, Microsoft Office 365 Visio 2013 user settings are excluded from synchronization with UE-V. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -6708,13 +6910,12 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6740,7 +6941,7 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -6756,11 +6957,14 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t This policy setting configures the synchronization of user settings for Microsoft Office 365 Visio 2016. + Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Visio 2016 will synchronize between a user's work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Visio 2016 from synchronization between computers with UE-V. - If you enable this policy setting, Microsoft Office 365 Visio 2016 user settings continue to sync with UE-V. + - If you disable this policy setting, Microsoft Office 365 Visio 2016 user settings are excluded from synchronization with UE-V. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -6772,13 +6976,12 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6804,7 +7007,7 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -6820,11 +7023,14 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t This policy setting configures the synchronization of user settings for Microsoft Office 365 Word 2013. + Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Word 2013 will synchronize between a user's work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Word 2013 from synchronization between computers with UE-V. - If you enable this policy setting, Microsoft Office 365 Word 2013 user settings continue to sync with UE-V. + - If you disable this policy setting, Microsoft Office 365 Word 2013 user settings are excluded from synchronization with UE-V. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -6836,13 +7042,12 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6868,7 +7073,7 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -6884,11 +7089,14 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t This policy setting configures the synchronization of user settings for Microsoft Office 365 Word 2016. + Microsoft Office 365 synchronizes certain settings by default without UE-V. If the synchronization capabilities of Microsoft Office 365 are disabled, then the user settings of Microsoft Office 365 Word 2016 will synchronize between a user's work computers with UE-V by default. Use this policy setting to prevent the user settings of Microsoft Office 365 Word 2016 from synchronization between computers with UE-V. - If you enable this policy setting, Microsoft Office 365 Word 2016 user settings continue to sync with UE-V. + - If you disable this policy setting, Microsoft Office 365 Word 2016 user settings are excluded from synchronization with UE-V. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -6900,13 +7108,12 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6932,7 +7139,7 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -6948,11 +7155,14 @@ Microsoft Office 365 synchronizes certain settings by default without UE-V. If t This policy setting configures the synchronization of user settings for the Music app. + By default, the user settings of Music sync between computers. Use the policy setting to prevent the user settings of Music from synchronizing between computers. - If you enable this policy setting, Music user settings continue to sync. + - If you disable this policy setting, Music user settings are excluded from the synchronizing settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -6964,13 +7174,12 @@ By default, the user settings of Music sync between computers. Use the policy se | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6997,7 +7206,7 @@ By default, the user settings of Music sync between computers. Use the policy se | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -7013,11 +7222,14 @@ By default, the user settings of Music sync between computers. Use the policy se This policy setting configures the synchronization of user settings for the News app. + By default, the user settings of News sync between computers. Use the policy setting to prevent the user settings of News from synchronizing between computers. - If you enable this policy setting, News user settings continue to sync. + - If you disable this policy setting, News user settings are excluded from synchronization. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -7029,13 +7241,12 @@ By default, the user settings of News sync between computers. Use the policy set | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7062,7 +7273,7 @@ By default, the user settings of News sync between computers. Use the policy set | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -7078,11 +7289,14 @@ By default, the user settings of News sync between computers. Use the policy set This policy setting configures the synchronization of user settings of Notepad. + By default, the user settings of Notepad synchronize between computers. Use the policy setting to prevent the user settings of Notepad from synchronization between computers. - If you enable this policy setting, the Notepad user settings continue to synchronize. + - If you disable this policy setting, Notepad user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -7094,13 +7308,12 @@ By default, the user settings of Notepad synchronize between computers. Use the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7127,7 +7340,7 @@ By default, the user settings of Notepad synchronize between computers. Use the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -7143,11 +7356,14 @@ By default, the user settings of Notepad synchronize between computers. Use the This policy setting configures the synchronization of user settings for the Reader app. + By default, the user settings of Reader sync between computers. Use the policy setting to prevent the user settings of Reader from synchronizing between computers. - If you enable this policy setting, Reader user settings continue to sync. + - If you disable this policy setting, Reader user settings are excluded from the synchronization. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -7159,13 +7375,12 @@ By default, the user settings of Reader sync between computers. Use the policy s | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7192,7 +7407,7 @@ By default, the user settings of Reader sync between computers. Use the policy s | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -7208,10 +7423,12 @@ By default, the user settings of Reader sync between computers. Use the policy s This policy setting configures the number of milliseconds that the computer waits when retrieving user settings from the settings storage location. + You can use this setting to override the default value of 2000 milliseconds. - If you enable this policy setting, set the number of milliseconds that the system waits to retrieve settings. -- If you disable or do not configure this policy setting, the default value of 2000 milliseconds is used. + +- If you disable or don't configure this policy setting, the default value of 2000 milliseconds is used. @@ -7223,13 +7440,12 @@ You can use this setting to override the default value of 2000 milliseconds. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7255,7 +7471,7 @@ You can use this setting to override the default value of 2000 milliseconds. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -7273,7 +7489,8 @@ You can use this setting to override the default value of 2000 milliseconds. This policy setting configures where the settings package files that contain user settings are stored. - If you enable this policy setting, the user settings are stored in the specified location. -- If you disable or do not configure this policy setting, the user settings are stored in the user's home directory if configured for your environment. + +- If you disable or don't configure this policy setting, the user settings are stored in the user's home directory if configured for your environment. @@ -7285,13 +7502,12 @@ This policy setting configures where the settings package files that contain use | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7317,7 +7533,7 @@ This policy setting configures where the settings package files that contain use | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -7331,11 +7547,16 @@ This policy setting configures where the settings package files that contain use This policy setting configures where custom settings location templates are stored and if the catalog will be used to replace the default Microsoft templates installed with the UE-V Agent. - If you enable this policy setting, the UE-V Agent checks the specified location once each day and updates its synchronization behavior based on the templates in this location. Settings location templates added or updated since the last check are registered by the UE-V Agent. The UE-V Agent deregisters templates that were removed from this location. + If you specify a UNC path and leave the option to replace the default Microsoft templates unchecked, the UE-V Agent will use the default Microsoft templates installed by the UE-V Agent and custom templates in the settings template catalog. If there are custom templates in the settings template catalog which use the same ID as the default Microsoft templates, they will be ignored. + If you specify a UNC path and check the option to replace the default Microsoft templates, all of the default Microsoft templates installed by the UE-V Agent will be deleted from the computer and only the templates located in the settings template catalog will be used. -- If you disable this policy setting, the UE-V Agent will not use the custom settings location templates. -- If you disable this policy setting after it has been enabled, the UE-V Agent will not restore the default Microsoft templates. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you disable this policy setting, the UE-V Agent won't use the custom settings location templates. + +- If you disable this policy setting after it has been enabled, the UE-V Agent won't restore the default Microsoft templates. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -7347,13 +7568,12 @@ If you specify a UNC path and check the option to replace the default Microsoft | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7379,7 +7599,7 @@ If you specify a UNC path and check the option to replace the default Microsoft | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -7395,11 +7615,14 @@ If you specify a UNC path and check the option to replace the default Microsoft This policy setting configures the synchronization of user settings for the Sports app. + By default, the user settings of Sports sync between computers. Use the policy setting to prevent the user settings of Sports from synchronizing between computers. - If you enable this policy setting, Sports user settings continue to sync. + - If you disable this policy setting, Sports user settings are excluded from synchronization. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -7411,13 +7634,12 @@ By default, the user settings of Sports sync between computers. Use the policy s | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7444,7 +7666,7 @@ By default, the user settings of Sports sync between computers. Use the policy s | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -7471,13 +7693,12 @@ This policy setting allows you to enable or disable User Experience Virtualizati | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7504,7 +7725,7 @@ This policy setting allows you to enable or disable User Experience Virtualizati | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -7520,10 +7741,14 @@ This policy setting allows you to enable or disable User Experience Virtualizati This policy setting defines whether the User Experience Virtualization (UE-V) Agent synchronizes settings over metered connections. -By default, the UE-V Agent does not synchronize settings over a metered connection. + +By default, the UE-V Agent doesn't synchronize settings over a metered connection. + With this setting enabled, the UE-V Agent synchronizes settings over a metered connection. -With this setting disabled, the UE-V Agent does not synchronize settings over a metered connection. -If you do not configure this policy setting, any defined values are deleted. + +With this setting disabled, the UE-V Agent doesn't synchronize settings over a metered connection. + +If you don't configure this policy setting, any defined values are deleted. @@ -7535,13 +7760,12 @@ If you do not configure this policy setting, any defined values are deleted. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7568,7 +7792,7 @@ If you do not configure this policy setting, any defined values are deleted. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -7584,10 +7808,14 @@ If you do not configure this policy setting, any defined values are deleted. This policy setting defines whether the User Experience Virtualization (UE-V) Agent synchronizes settings over metered connections outside of the home provider network, for example when connected via a roaming connection. -By default, the UE-V Agent does not synchronize settings over a metered connection that is roaming. -With this setting enabled, the UE-V Agent synchronizes settings over a metered connection that is roaming. -With this setting disabled, the UE-V Agent will not synchronize settings over a metered connection that is roaming. -If you do not configure this policy setting, any defined values are deleted. + +By default, the UE-V Agent doesn't synchronize settings over a metered connection that's roaming. + +With this setting enabled, the UE-V Agent synchronizes settings over a metered connection that's roaming. + +With this setting disabled, the UE-V Agent won't synchronize settings over a metered connection that's roaming. + +If you don't configure this policy setting, any defined values are deleted. @@ -7599,13 +7827,12 @@ If you do not configure this policy setting, any defined values are deleted. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7632,7 +7859,7 @@ If you do not configure this policy setting, any defined values are deleted. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -7650,8 +7877,10 @@ If you do not configure this policy setting, any defined values are deleted. This policy setting allows you to configure the User Experience Virtualization (UE-V) sync provider to ping the settings storage path before attempting to sync settings. If the ping is successful then the sync provider attempts to synchronize the settings packages. If the ping is unsuccessful then the sync provider doesn't attempt the synchronization. - If you enable this policy setting, the sync provider pings the settings storage location before synchronizing settings packages. + - If you disable this policy setting, the sync provider doesn't ping the settings storage location before synchronizing settings packages. -- If you do not configure this policy, any defined values will be deleted. + +- If you don't configure this policy, any defined values will be deleted. @@ -7663,13 +7892,12 @@ This policy setting allows you to configure the User Experience Virtualization ( | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7696,7 +7924,7 @@ This policy setting allows you to configure the User Experience Virtualization ( | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -7707,11 +7935,15 @@ This policy setting allows you to configure the User Experience Virtualization ( -This policy setting defines the default settings sync behavior of the User Experience Virtualization (UE-V) Agent for Windows apps that are not explicitly listed in Windows App List. +This policy setting defines the default settings sync behavior of the User Experience Virtualization (UE-V) Agent for Windows apps that aren't explicitly listed in Windows App List. + By default, the UE-V Agent only synchronizes settings of those Windows apps included in the Windows App List. + With this setting enabled, the settings of all Windows apps not expressly disable in the Windows App List are synchronized. + With this setting disabled, only the settings of the Windows apps set to synchronize in the Windows App List are synchronized. -If you do not configure this policy setting, any defined values are deleted. + +If you don't configure this policy setting, any defined values are deleted. @@ -7723,13 +7955,12 @@ If you do not configure this policy setting, any defined values are deleted. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7756,7 +7987,7 @@ If you do not configure this policy setting, any defined values are deleted. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -7772,11 +8003,14 @@ If you do not configure this policy setting, any defined values are deleted. This policy setting configures the synchronization of user settings for the Travel app. + By default, the user settings of Travel sync between computers. Use the policy setting to prevent the user settings of Travel from synchronizing between computers. - If you enable this policy setting, Travel user settings continue to sync. + - If you disable this policy setting, Travel user settings are excluded from synchronization. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -7788,13 +8022,12 @@ By default, the user settings of Travel sync between computers. Use the policy s | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7821,7 +8054,7 @@ By default, the user settings of Travel sync between computers. Use the policy s | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -7833,8 +8066,10 @@ By default, the user settings of Travel sync between computers. Use the policy s This policy setting enables the User Experience Virtualization (UE-V) tray icon. By default, an icon appears in the system tray that displays notifications for UE-V. This icon also provides a link to the UE-V Agent application, Company Settings Center. Users can open the Company Settings Center by right-clicking the icon and selecting Open or by double-clicking the icon. When this group policy setting is enabled, the UE-V tray icon is visible, the UE-V notifications display, and the Company Settings Center is accessible from the tray icon. -With this setting disabled, the tray icon does not appear in the system tray, UE-V never displays notifications, and the user cannot access Company Settings Center from the system tray. The Company Settings Center remains accessible through the Control Panel and the Start menu or Start screen. -If you do not configure this policy setting, any defined values are deleted. + +With this setting disabled, the tray icon doesn't appear in the system tray, UE-V never displays notifications, and the user can't access Company Settings Center from the system tray. The Company Settings Center remains accessible through the Control Panel and the Start menu or Start screen. + +If you don't configure this policy setting, any defined values are deleted. @@ -7846,13 +8081,12 @@ If you do not configure this policy setting, any defined values are deleted. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7879,7 +8113,7 @@ If you do not configure this policy setting, any defined values are deleted. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -7895,11 +8129,14 @@ If you do not configure this policy setting, any defined values are deleted. This policy setting configures the synchronization of user settings for the Video app. + By default, the user settings of Video sync between computers. Use the policy setting to prevent the user settings of Video from synchronizing between computers. - If you enable this policy setting, Video user settings continue to sync. + - If you disable this policy setting, Video user settings are excluded from synchronization. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -7911,13 +8148,12 @@ By default, the user settings of Video sync between computers. Use the policy se | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7944,7 +8180,7 @@ By default, the user settings of Video sync between computers. Use the policy se | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -7960,11 +8196,14 @@ By default, the user settings of Video sync between computers. Use the policy se This policy setting configures the synchronization of user settings for the Weather app. + By default, the user settings of Weather sync between computers. Use the policy setting to prevent the user settings of Weather from synchronizing between computers. - If you enable this policy setting, Weather user settings continue to sync. + - If you disable this policy setting, Weather user settings are excluded from synchronization. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -7976,13 +8215,12 @@ By default, the user settings of Weather sync between computers. Use the policy | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -8009,7 +8247,7 @@ By default, the user settings of Weather sync between computers. Use the policy | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -8025,11 +8263,14 @@ By default, the user settings of Weather sync between computers. Use the policy This policy setting configures the synchronization of user settings of WordPad. + By default, the user settings of WordPad synchronize between computers. Use the policy setting to prevent the user settings of WordPad from synchronization between computers. - If you enable this policy setting, the WordPad user settings continue to synchronize. + - If you disable this policy setting, WordPad user settings are excluded from the synchronization settings. -- If you do not configure this policy setting, any defined values will be deleted. + +- If you don't configure this policy setting, any defined values will be deleted. @@ -8041,13 +8282,12 @@ By default, the user settings of WordPad synchronize between computers. Use the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-userprofiles.md b/windows/client-management/mdm/policy-csp-admx-userprofiles.md index e5f3324a38..f3cd36cf4c 100644 --- a/windows/client-management/mdm/policy-csp-admx-userprofiles.md +++ b/windows/client-management/mdm/policy-csp-admx-userprofiles.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_UserProfiles Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_UserProfiles -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -42,14 +39,14 @@ ms.topic: reference -This policy setting allows an administrator to automatically delete user profiles on system restart that have not been used within a specified number of days. +This policy setting allows an administrator to automatically delete user profiles on system restart that haven't been used within a specified number of days. > [!NOTE] > One day is interpreted as 24 hours after a specific user profile was accessed. -- If you enable this policy setting, the User Profile Service will automatically delete on the next system restart all user profiles on the computer that have not been used within the specified number of days. +- If you enable this policy setting, the User Profile Service will automatically delete on the next system restart all user profiles on the computer that haven't been used within the specified number of days. -- If you disable or do not configure this policy setting, User Profile Service will not automatically delete any profiles on the next system restart. +- If you disable or don't configure this policy setting, User Profile Service won't automatically delete any profiles on the next system restart. @@ -61,13 +58,12 @@ This policy setting allows an administrator to automatically delete user profile | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -93,7 +89,7 @@ This policy setting allows an administrator to automatically delete user profile | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -107,11 +103,11 @@ This policy setting allows an administrator to automatically delete user profile This policy setting controls whether Windows forcefully unloads the user's registry at logoff, even if there are open handles to the per-user registry keys. > [!NOTE] -> This policy setting should only be used for cases where you may be running into application compatibility issues due to this specific Windows behavior. It is not recommended to enable this policy by default as it may prevent users from getting an updated version of their roaming user profile. +> This policy setting should only be used for cases where you may be running into application compatibility issues due to this specific Windows behavior. It isn't recommended to enable this policy by default as it may prevent users from getting an updated version of their roaming user profile. -- If you enable this policy setting, Windows will not forcefully unload the users registry at logoff, but will unload the registry when all open handles to the per-user registry keys are closed. +- If you enable this policy setting, Windows won't forcefully unload the users registry at logoff, but will unload the registry when all open handles to the per-user registry keys are closed. -- If you disable or do not configure this policy setting, Windows will always unload the users registry at logoff, even if there are any open handles to the per-user registry keys at user logoff. +- If you disable or don't configure this policy setting, Windows will always unload the users registry at logoff, even if there are any open handles to the per-user registry keys at user logoff. @@ -123,13 +119,12 @@ This policy setting controls whether Windows forcefully unloads the user's regis | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -156,7 +151,7 @@ This policy setting controls whether Windows forcefully unloads the user's regis | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -171,9 +166,9 @@ This policy setting determines whether the system retains a roaming user's Windo By default Windows deletes all information related to a roaming user (which includes the user's settings, data, Windows Installer related data, and the like) when their profile is deleted. As a result, the next time a roaming user whose profile was previously deleted on that client logs on, they will need to reinstall all apps published via policy at logon increasing logon time. You can use this policy setting to change this behavior. -- If you enable this policy setting, Windows will not delete Windows Installer or Group Policy software installation data for roaming users when profiles are deleted from the machine. This will improve the performance of Group Policy based Software Installation during user logon when a user profile is deleted and that user subsequently logs on to the machine. +- If you enable this policy setting, Windows won't delete Windows Installer or Group Policy software installation data for roaming users when profiles are deleted from the machine. This will improve the performance of Group Policy based Software Installation during user logon when a user profile is deleted and that user subsequently logs on to the machine. -- If you disable or do not configure this policy setting, Windows will delete the entire profile for roaming users, including the Windows Installer and Group Policy software installation data when those profiles are deleted. +- If you disable or don't configure this policy setting, Windows will delete the entire profile for roaming users, including the Windows Installer and Group Policy software installation data when those profiles are deleted. > [!NOTE] > If this policy setting is enabled for a machine, local administrator action is required to remove the Windows Installer or Group Policy software installation data stored in the registry and file system of roaming users' profiles on the machine. @@ -188,13 +183,12 @@ By default Windows deletes all information related to a roaming user (which incl | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -221,7 +215,7 @@ By default Windows deletes all information related to a roaming user (which incl | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -234,18 +228,22 @@ By default Windows deletes all information related to a roaming user (which incl This policy setting sets the maximum size of each user profile and determines the system's response when a user profile reaches the maximum size. This policy setting affects both local and roaming profiles. -- If you disable this policy setting or do not configure it, the system does not limit the size of user profiles. +- If you disable this policy setting or don't configure it, the system doesn't limit the size of user profiles. - If you enable this policy setting, you can: - Set a maximum permitted user profile size. + - Determine whether the registry files are included in the calculation of the profile size. + - Determine whether users are notified when the profile exceeds the permitted maximum size. + - Specify a customized message notifying users of the oversized profile. + - Determine how often the customized message is displayed. > [!NOTE] -> In operating systems earlier than Microsoft Windows Vista, Windows will not allow users to log off until the profile size has been reduced to within the allowable limit. In Microsoft Windows Vista, Windows will not block users from logging off. Instead, if the user has a roaming user profile, Windows will not synchronize the user's profile with the roaming profile server if the maximum profile size limit specified here is exceeded. +> In operating systems earlier than Microsoft Windows Vista, Windows won't allow users to log off until the profile size has been reduced to within the allowable limit. In Microsoft Windows Vista, Windows won't block users from logging off. Instead, if the user has a roaming user profile, Windows won't synchronize the user's profile with the roaming profile server if the maximum profile size limit specified here is exceeded. @@ -257,13 +255,12 @@ This policy setting sets the maximum size of each user profile and determines th | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -290,7 +287,7 @@ This policy setting sets the maximum size of each user profile and determines th | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -301,13 +298,13 @@ This policy setting sets the maximum size of each user profile and determines th -This policy setting will automatically log off a user when Windows cannot load their profile. +This policy setting will automatically log off a user when Windows can't load their profile. -If Windows cannot access the user profile folder or the profile contains errors that prevent it from loading, Windows logs on the user with a temporary profile. This policy setting allows the administrator to disable this behavior, preventing Windows from loggin on the user with a temporary profile. +If Windows can't access the user profile folder or the profile contains errors that prevent it from loading, Windows logs on the user with a temporary profile. This policy setting allows the administrator to disable this behavior, preventing Windows from loggin on the user with a temporary profile. -- If you enable this policy setting, Windows will not log on a user with a temporary profile. Windows logs the user off if their profile cannot be loaded. +- If you enable this policy setting, Windows won't log on a user with a temporary profile. Windows logs the user off if their profile can't be loaded. -- If you disable this policy setting or do not configure it, Windows logs on the user with a temporary profile when Windows cannot load their user profile. +- If you disable this policy setting or don't configure it, Windows logs on the user with a temporary profile when Windows can't load their user profile. Also, see the "Delete cached copies of roaming profiles" policy setting. @@ -321,13 +318,12 @@ Also, see the "Delete cached copies of roaming profiles" policy setting. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -354,7 +350,7 @@ Also, see the "Delete cached copies of roaming profiles" policy setting. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -373,7 +369,7 @@ This policy setting and related policy settings in this folder together define t - If you enable this policy setting, you can change how long Windows waits for a response from the server before considering the connection to be slow. -- If you disable or do not configure this policy setting, Windows considers the network connection to be slow if the server returns less than 500 kilobits of data per second or take 120 milliseconds to respond. Consider increasing this value for clients using DHCP Service-assigned addresses or for computers accessing profiles across dial-up connections. +- If you disable or don't configure this policy setting, Windows considers the network connection to be slow if the server returns less than 500 kilobits of data per second or take 120 milliseconds to respond. Consider increasing this value for clients using DHCP Service-assigned addresses or for computers accessing profiles across dial-up connections. > [!IMPORTANT] > If the "Do not detect slow network connections" policy setting is enabled, this policy setting is ignored. Also, if the "Delete cached copies of roaming profiles" policy setting is enabled, there is no local copy of the roaming profile to load when the system detects a slow connection. @@ -388,13 +384,12 @@ This policy setting and related policy settings in this folder together define t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -420,7 +415,7 @@ This policy setting and related policy settings in this folder together define t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -437,12 +432,12 @@ This policy setting allows you to specify the location and root (file share or l To use this policy setting, in the Location list, choose the location for the home folder. If you choose "On the network," enter the path to a file share in the Path box (for example, \\ComputerName\ShareName), and then choose the drive letter to assign to the file share. If you choose "On the local computer," enter a local path (for example, C:\HomeFolder) in the Path box. -Do not specify environment variables or ellipses in the path. Also, do not specify a placeholder for the user name because the user name will be appended at logon. +Don't specify environment variables or ellipses in the path. Also, don't specify a placeholder for the user name because the user name will be appended at logon. > [!NOTE] > The Drive letter box is ignored if you choose "On the local computer" from the Location list. If you choose "On the local computer" and enter a file share, the user's home folder will be placed in the network location without mapping the file share to a drive letter. -- If you disable or do not configure this policy setting, the user's home folder is configured as specified in the user's Active Directory Domain Services account. +- If you disable or don't configure this policy setting, the user's home folder is configured as specified in the user's Active Directory Domain Services account. If the "Set Remote Desktop Services User Home Directory" policy setting is enabled, the "Set user home folder" policy setting has no effect. @@ -456,13 +451,12 @@ If the "Set Remote Desktop Services User Home Directory" policy setting is enabl | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -488,7 +482,7 @@ If the "Set Remote Desktop Services User Home Directory" policy setting is enabl | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -503,11 +497,11 @@ This setting prevents users from managing the ability to allow apps to access th - If you enable this policy setting, sharing of user name, picture and domain information may be controlled by setting one of the following options: -"Always on" - users will not be able to change this setting and the user's name and account picture will be shared with apps (not desktop apps). In addition apps (not desktop apps) that have the enterprise authentication capability will also be able to retrieve the user's UPN, SIP/URI, and DNS. +"Always on" - users won't be able to change this setting and the user's name and account picture will be shared with apps (not desktop apps). In addition apps (not desktop apps) that have the enterprise authentication capability will also be able to retrieve the user's UPN, SIP/URI, and DNS. -"Always off" - users will not be able to change this setting and the user's name and account picture will not be shared with apps (not desktop apps). In addition apps (not desktop apps) that have the enterprise authentication capability will not be able to retrieve the user's UPN, SIP/URI, and DNS. Selecting this option may have a negative impact on certain enterprise software and/or line of business apps that depend on the domain information protected by this setting to connect with network resources. +"Always off" - users won't be able to change this setting and the user's name and account picture won't be shared with apps (not desktop apps). In addition apps (not desktop apps) that have the enterprise authentication capability won't be able to retrieve the user's UPN, SIP/URI, and DNS. Selecting this option may have a negative impact on certain enterprise software and/or line of business apps that depend on the domain information protected by this setting to connect with network resources. -- If you do not configure or disable this policy the user will have full control over this setting and can turn it off and on. Selecting this option may have a negative impact on certain enterprise software and/or line of business apps that depend on the domain information protected by this setting to connect with network resources if users choose to turn the setting off. +- If you don't configure or disable this policy the user will have full control over this setting and can turn it off and on. Selecting this option may have a negative impact on certain enterprise software and/or line of business apps that depend on the domain information protected by this setting to connect with network resources if users choose to turn the setting off. @@ -519,13 +513,12 @@ This setting prevents users from managing the ability to allow apps to access th | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-w32time.md b/windows/client-management/mdm/policy-csp-admx-w32time.md index f35943b958..7688d55e7b 100644 --- a/windows/client-management/mdm/policy-csp-admx-w32time.md +++ b/windows/client-management/mdm/policy-csp-admx-w32time.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_W32Time Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_W32Time -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -48,80 +45,104 @@ This policy setting allows you to specify Clock discipline and General values fo For more details on individual parameters, combinations of parameter values as well as definitions of flags, see< https://go.microsoft.com/fwlink/?linkid=847809>. -FrequencyCorrectRate +FrequencyCorrectRate. + This parameter controls the rate at which the W32time corrects the local clock's frequency. Lower values cause larger corrections; larger values cause smaller corrections. Default: 4 (scalar). -HoldPeriod +HoldPeriod. + This parameter indicates how many consistent time samples the client computer must receive in a series before subsequent time samples are evaluated as potential spikes. Default: 5 -LargePhaseOffset +LargePhaseOffset. + If a time sample differs from the client computer's local clock by more than LargePhaseOffset, the local clock is deemed to have drifted considerably, or in other words, spiked. Default: 50,000,000 100-nanosecond units (ns) or 5 seconds. -MaxAllowedPhaseOffset -If a response is received that has a time variation that is larger than this parameter value, W32time sets the client computer's local clock immediately to the time that is accepted as accurate from the Network Time Protocol (NTP) server. If the time variation is less than this value, the client computer's local clock is corrected gradually. Default: 300 seconds. +MaxAllowedPhaseOffset. -MaxNegPhaseCorrection -If a time sample is received that indicates a time in the past (as compared to the client computer's local clock) that has a time difference that is greater than the MaxNegPhaseCorrection value, the time sample is discarded. Default: 172,800 seconds. +If a response is received that has a time variation that's larger than this parameter value, W32time sets the client computer's local clock immediately to the time that's accepted as accurate from the Network Time Protocol (NTP) server. If the time variation is less than this value, the client computer's local clock is corrected gradually. Default: 300 seconds. + +MaxNegPhaseCorrection. + +If a time sample is received that indicates a time in the past (as compared to the client computer's local clock) that has a time difference that's greater than the MaxNegPhaseCorrection value, the time sample is discarded. Default: 172,800 seconds. + +MaxPosPhaseCorrection. -MaxPosPhaseCorrection If a time sample is received that indicates a time in the future (as compared to the client computer's local clock) that has a time difference greater than the MaxPosPhaseCorrection value, the time sample is discarded. Default: 172,800 seconds. -PhaseCorrectRate +PhaseCorrectRate. + This parameter controls how quickly W32time corrects the client computer's local clock difference to match time samples that are accepted as accurate from the NTP server. Lower values cause the clock to correct more quickly; larger values cause the clock to correct more slowly. Default: 7 (scalar). -PollAdjustFactor +PollAdjustFactor. + This parameter controls how quickly W32time changes polling intervals. When responses are considered to be accurate, the polling interval lengthens automatically. When responses are considered to be inaccurate, the polling interval shortens automatically. Default: 5 (scalar). -SpikeWatchPeriod +SpikeWatchPeriod. + This parameter specifies the amount of time that samples with time offset larger than LargePhaseOffset are received before these samples are accepted as accurate. SpikeWatchPeriod is used in conjunction with HoldPeriod to help eliminate sporadic, inaccurate time samples that are returned from a peer. Default: 900 seconds. -UpdateInterval +UpdateInterval. + This parameter specifies the amount of time that W32time waits between corrections when the clock is being corrected gradually. When it makes a gradual correction, the service adjusts the clock slightly, waits this amount of time, and then checks to see if another adjustment is needed, until the correction is finished. Default: 100 1/100th second units, or 1 second. General parameters: -AnnounceFlags -This parameter is a bitmask value that controls how time service availability is advertised through NetLogon. Default: 0x0a hexadecimal +AnnounceFlags. + +This parameter is a bitmask value that controls how time service availability is advertised through NetLogon. Default: 0x0a hexadecimal. + +EventLogFlags. -EventLogFlags This parameter controls special events that may be logged to the Event Viewer System log. Default: 0x02 hexadecimal bitmask. -LocalClockDispersion -This parameter indicates the maximum error in seconds that is reported by the NTP server to clients that are requesting a time sample. (Applies only when the NTP server is using the time of the local CMOS clock.) Default: 10 seconds. +LocalClockDispersion. -MaxPollInterval -This parameter controls the maximum polling interval, which defines the maximum amount of time between polls of a peer. Default: 10 in log base-2, or 1024 seconds. (Should not be set higher than 15.) +This parameter indicates the maximum error in seconds that's reported by the NTP server to clients that are requesting a time sample. (Applies only when the NTP server is using the time of the local CMOS clock). Default: 10 seconds. + +MaxPollInterval. + +This parameter controls the maximum polling interval, which defines the maximum amount of time between polls of a peer. Default: 10 in log base-2, or 1024 seconds. (Should not be set higher than 15). + +MinPollInterval. -MinPollInterval This parameter controls the minimum polling interval that defines the minimum amount of time between polls of a peer. Default: 6 in log base-2, or 64 seconds. -ClockHoldoverPeriod +ClockHoldoverPeriod. + This parameter indicates the maximum number of seconds a system clock can nominally hold its accuracy without synchronizing with a time source. If this period of time passes without W32time obtaining new samples from any of its input providers, W32time initiates a rediscovery of time sources. Default: 7800 seconds. -RequireSecureTimeSyncRequests -This parameter controls whether or not the DC will respond to time sync requests that use older authentication protocols. If enabled (set to 1), the DC will not respond to requests using such protocols. Default: 0 Boolean. +RequireSecureTimeSyncRequests. -UtilizeSslTimeData -This parameter controls whether W32time will use time data computed from SSL traffic on the machine as an additional input for correcting the local clock. Default: 1 (enabled) Boolean +This parameter controls whether or not the DC will respond to time sync requests that use older authentication protocols. If enabled (set to 1), the DC won't respond to requests using such protocols. Default: 0 Boolean. + +UtilizeSslTimeData. + +This parameter controls whether W32time will use time data computed from SSL traffic on the machine as an additional input for correcting the local clock. Default: 1 (enabled) Boolean. + +ClockAdjustmentAuditLimit. -ClockAdjustmentAuditLimit This parameter specifies the smallest local clock adjustments that may be logged to the W32time service event log on the target machine. Default: 800 Parts per million (PPM). RODC parameters: -ChainEntryTimeout +ChainEntryTimeout. + This parameter specifies the maximum amount of time that an entry can remain in the chaining table before the entry is considered to be expired. Expired entries may be removed when the next request or response is processed. Default: 16 seconds. -ChainMaxEntries +ChainMaxEntries. + This parameter controls the maximum number of entries that are allowed in the chaining table. If the chaining table is full and no expired entries can be removed, any incoming requests are discarded. Default: 128 entries. -ChainMaxHostEntries +ChainMaxHostEntries. + This parameter controls the maximum number of entries that are allowed in the chaining table for a particular host. Default: 4 entries. -ChainDisable -This parameter controls whether or not the chaining mechanism is disabled. If chaining is disabled (set to 0), the RODC can synchronize with any domain controller, but hosts that do not have their passwords cached on the RODC will not be able to synchronize with the RODC. Default: 0 Boolean. +ChainDisable. + +This parameter controls whether or not the chaining mechanism is disabled. If chaining is disabled (set to 0), the RODC can synchronize with any domain controller, but hosts that don't have their passwords cached on the RODC won't be able to synchronize with the RODC. Default: 0 Boolean. + +ChainLoggingRate. -ChainLoggingRate This parameter controls the frequency at which an event that indicates the number of successful and unsuccessful chaining attempts is logged to the System log in Event Viewer. Default: 30 minutes. @@ -134,13 +155,12 @@ This parameter controls the frequency at which an event that indicates the numbe | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -166,7 +186,7 @@ This parameter controls the frequency at which an event that indicates the numbe | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -181,28 +201,35 @@ This policy setting specifies a set of parameters for controlling the Windows NT - If you enable this policy setting, you can specify the following parameters for the Windows NTP Client. -- If you disable or do not configure this policy setting, the WIndows NTP Client uses the defaults of each of the following parameters. +- If you disable or don't configure this policy setting, the Windows NTP Client uses the defaults of each of the following parameters. + +NtpServer. -NtpServer The Domain Name System (DNS) name or IP address of an NTP time source. This value is in the form of "dnsName,flags" where "flags" is a hexadecimal bitmask of the flags for that host. For more information, see the NTP Client Group Policy Settings Associated with Windows Time section of the Windows Time Service Group Policy Settings. The default value is "time.windows.com,0x09". -Type +Type. + This value controls the authentication that W32time uses. The default value is NT5DS. -CrossSiteSyncFlags -This value, expressed as a bitmask, controls how W32time chooses time sources outside its own site. The possible values are 0, 1, and 2. Setting this value to 0 (None) indicates that the time client should not attempt to synchronize time outside its site. Setting this value to 1 (PdcOnly) indicates that only the computers that function as primary domain controller (PDC) emulator operations masters in other domains can be used as synchronization partners when the client has to synchronize time with a partner outside its own site. Setting a value of 2 (All) indicates that any synchronization partner can be used. This value is ignored if the NT5DS value is not set. The default value is 2 decimal (0x02 hexadecimal). +CrossSiteSyncFlags. + +This value, expressed as a bitmask, controls how W32time chooses time sources outside its own site. The possible values are 0, 1, and 2. Setting this value to 0 (None) indicates that the time client shouldn't attempt to synchronize time outside its site. Setting this value to 1 (PdcOnly) indicates that only the computers that function as primary domain controller (PDC) emulator operations masters in other domains can be used as synchronization partners when the client has to synchronize time with a partner outside its own site. Setting a value of 2 (All) indicates that any synchronization partner can be used. This value is ignored if the NT5DS value isn't set. The default value is 2 decimal (0x02 hexadecimal). + +ResolvePeerBackoffMinutes. -ResolvePeerBackoffMinutes This value, expressed in minutes, controls how long W32time waits before it attempts to resolve a DNS name when a previous attempt failed. The default value is 15 minutes. -ResolvePeerBackoffMaxTimes +ResolvePeerBackoffMaxTimes. + This value controls how many times W32time attempts to resolve a DNS name before the discovery process is restarted. Each time DNS name resolution fails, the amount of time to wait before the next attempt will be twice the previous amount. The default value is seven attempts. -SpecialPollInterval -This NTP client value, expressed in seconds, controls how often a manually configured time source is polled when the time source is configured to use a special polling interval. If the SpecialInterval flag is enabled on the NTPServer setting, the client uses the value that is set as the SpecialPollInterval, instead of a variable interval between MinPollInterval and MaxPollInterval values, to determine how frequently to poll the time source. SpecialPollInterval must be in the range of [MinPollInterval, MaxPollInterval], else the nearest value of the range is picked. Default: 1024 seconds. +SpecialPollInterval. -EventLogFlags -This value is a bitmask that controls events that may be logged to the System log in Event Viewer. Setting this value to 0x1 indicates that W32time will create an event whenever a time jump is detected. Setting this value to 0x2 indicates that W32time will create an event whenever a time source change is made. Because it is a bitmask value, setting 0x3 (the addition of 0x1 and 0x2) indicates that both time jumps and time source changes will be logged. +This NTP client value, expressed in seconds, controls how often a manually configured time source is polled when the time source is configured to use a special polling interval. If the SpecialInterval flag is enabled on the NTPServer setting, the client uses the value that's set as the SpecialPollInterval, instead of a variable interval between MinPollInterval and MaxPollInterval values, to determine how frequently to poll the time source. SpecialPollInterval must be in the range of [MinPollInterval, MaxPollInterval], else the nearest value of the range is picked. Default: 1024 seconds. + +EventLogFlags. + +This value is a bitmask that controls events that may be logged to the System log in Event Viewer. Setting this value to 0x1 indicates that W32time will create an event whenever a time jump is detected. Setting this value to 0x2 indicates that W32time will create an event whenever a time source change is made. Because it's a bitmask value, setting 0x3 (the addition of 0x1 and 0x2) indicates that both time jumps and time source changes will be logged. @@ -214,13 +241,12 @@ This value is a bitmask that controls events that may be logged to the System lo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -246,7 +272,7 @@ This value is a bitmask that controls events that may be logged to the System lo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -263,7 +289,7 @@ Enabling the Windows NTP Client allows your computer to synchronize its computer - If you enable this policy setting, you can set the local computer clock to synchronize time with NTP servers. -- If you disable or do not configure this policy setting, the local computer clock does not synchronize time with NTP servers. +- If you disable or don't configure this policy setting, the local computer clock doesn't synchronize time with NTP servers. @@ -275,13 +301,12 @@ Enabling the Windows NTP Client allows your computer to synchronize its computer | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -308,7 +333,7 @@ Enabling the Windows NTP Client allows your computer to synchronize its computer | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -323,7 +348,7 @@ This policy setting allows you to specify whether the Windows NTP Server is enab - If you enable this policy setting for the Windows NTP Server, your computer can service NTP requests from other computers. -- If you disable or do not configure this policy setting, your computer cannot service NTP requests from other computers. +- If you disable or don't configure this policy setting, your computer can't service NTP requests from other computers. @@ -335,13 +360,12 @@ This policy setting allows you to specify whether the Windows NTP Server is enab | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-wcm.md b/windows/client-management/mdm/policy-csp-admx-wcm.md index 525dff55c9..864c2f00fc 100644 --- a/windows/client-management/mdm/policy-csp-admx-wcm.md +++ b/windows/client-management/mdm/policy-csp-admx-wcm.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_WCM Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_WCM -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,9 +41,9 @@ ms.topic: reference This policy setting specifies that power management is disabled when the machine enters connected standby mode. -- If this policy setting is enabled, Windows Connection Manager does not manage adapter radios to reduce power consumption when the machine enters connected standby mode. +- If this policy setting is enabled, Windows Connection Manager doesn't manage adapter radios to reduce power consumption when the machine enters connected standby mode. -- If this policy setting is not configured or is disabled, power management is enabled when the machine enters connected standby mode. +- If this policy setting isn't configured or is disabled, power management is enabled when the machine enters connected standby mode. @@ -58,13 +55,12 @@ This policy setting specifies that power management is disabled when the machine | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -91,7 +87,7 @@ This policy setting specifies that power management is disabled when the machine | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -109,11 +105,14 @@ This policy setting determines whether Windows will soft-disconnect a computer f - If this policy setting is disabled, Windows will disconnect a computer from a network immediately when it determines that the computer should no longer be connected to a network. When soft disconnect is enabled: - - When Windows decides that the computer should no longer be connected to a network, it waits for traffic to settle on that network. The existing TCP session will continue uninterrupted. - - Windows then checks the traffic level on the network periodically. If the traffic level is above a certain threshold, no further action is taken. The computer stays connected to the network and continues to use it. For example, if the network connection is currently being used to download files from the Internet, the files will continue to be downloaded using that network connection. - - When the network traffic drops below this threshold, the computer will be disconnected from the network. Apps that keep a network connection active even when they're not actively using it (for example, email apps) might lose their connection. If this happens, these apps should re-establish their connection over a different network. -This policy setting depends on other group policy settings. For example, if 'Minimize the number of simultaneous connections to the Internet or a Windows Domain' is disabled, Windows will not disconnect from any networks. +- When Windows decides that the computer should no longer be connected to a network, it waits for traffic to settle on that network. The existing TCP session will continue uninterrupted. + +- Windows then checks the traffic level on the network periodically. If the traffic level is above a certain threshold, no further action is taken. The computer stays connected to the network and continues to use it. For example, if the network connection is currently being used to download files from the Internet, the files will continue to be downloaded using that network connection. + +- When the network traffic drops below this threshold, the computer will be disconnected from the network. Apps that keep a network connection active even when they're not actively using it (for example, email apps) might lose their connection. If this happens, these apps should re-establish their connection over a different network. + +This policy setting depends on other group policy settings. For example, if 'Minimize the number of simultaneous connections to the Internet or a Windows Domain' is disabled, Windows won't disconnect from any networks. @@ -125,13 +124,12 @@ This policy setting depends on other group policy settings. For example, if 'Min | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -158,7 +156,7 @@ This policy setting depends on other group policy settings. For example, if 'Min | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -191,13 +189,12 @@ This policy setting is related to the "Enable Windows to soft-disconnect a compu | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-wdi.md b/windows/client-management/mdm/policy-csp-admx-wdi.md index 7091d18390..332bf3fb75 100644 --- a/windows/client-management/mdm/policy-csp-admx-wdi.md +++ b/windows/client-management/mdm/policy-csp-admx-wdi.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_WDI Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_WDI -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,13 +41,13 @@ ms.topic: reference This policy setting determines the data retention limit for Diagnostic Policy Service (DPS) scenario data. -- If you enable this policy setting, you must enter the maximum size of scenario data that should be retained in megabytes. Detailed troubleshooting data related to scenarios will be retained until this limit is reached. +- If you enable this policy setting, you must enter the maximum size of scenario data that should be retained in megabytes. Detailed troubleshooting data related to scenarios will be retained until this limit's reached. -- If you disable or do not configure this policy setting, the DPS deletes scenario data once it exceeds 128 megabytes in size. +- If you disable or don't configure this policy setting, the DPS deletes scenario data once it exceeds 128 megabytes in size. No reboots or service restarts are required for this policy setting to take effect: changes take effect immediately. -This policy setting will only take effect when the Diagnostic Policy Service is in the running state. When the service is stopped or disabled, diagnostic scenario data will not be deleted. The DPS can be configured with the Services snap-in to the Microsoft Management Console. +This policy setting will only take effect when the Diagnostic Policy Service is in the running state. When the service is stopped or disabled, diagnostic scenario data won't be deleted. The DPS can be configured with the Services snap-in to the Microsoft Management Console. @@ -62,13 +59,12 @@ This policy setting will only take effect when the Diagnostic Policy Service is | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -95,7 +91,7 @@ This policy setting will only take effect when the Diagnostic Policy Service is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -110,11 +106,11 @@ This policy setting determines the execution level for Diagnostic Policy Service - If you enable this policy setting, you must select an execution level from the drop-down menu. If you select problem detection and troubleshooting only, the DPS will detect problems and attempt to determine their root causes. These root causes will be logged to the event log when detected, but no corrective action will be taken. If you select detection, troubleshooting and resolution, the DPS will attempt to automatically fix problems it detects or indicate to the user that assisted resolution is available. -- If you disable this policy setting, Windows cannot detect, troubleshoot, or resolve any problems that are handled by the DPS. +- If you disable this policy setting, Windows can't detect, troubleshoot, or resolve any problems that are handled by the DPS. -- If you do not configure this policy setting, the DPS enables all scenarios for resolution by default, unless you configure separate scenario-specific policy settings. +- If you don't configure this policy setting, the DPS enables all scenarios for resolution by default, unless you configure separate scenario-specific policy settings. -This policy setting takes precedence over any scenario-specific policy settings when it is enabled or disabled. Scenario-specific policy settings only take effect if this policy setting is not configured. +This policy setting takes precedence over any scenario-specific policy settings when it's enabled or disabled. Scenario-specific policy settings only take effect if this policy setting isn't configured. No reboots or service restarts are required for this policy setting to take effect: changes take effect immediately. @@ -128,13 +124,12 @@ No reboots or service restarts are required for this policy setting to take effe | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-wincal.md b/windows/client-management/mdm/policy-csp-admx-wincal.md index 874461182f..e830e78e1e 100644 --- a/windows/client-management/mdm/policy-csp-admx-wincal.md +++ b/windows/client-management/mdm/policy-csp-admx-wincal.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_WinCal Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_WinCal -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,7 +43,7 @@ Windows Calendar is a feature that allows users to manage appointments and tasks - If you enable this setting, Windows Calendar will be turned off. -- If you disable or do not configure this setting, Windows Calendar will be turned on. +- If you disable or don't configure this setting, Windows Calendar will be turned on. The default is for Windows Calendar to be turned on. @@ -60,13 +57,12 @@ The default is for Windows Calendar to be turned on. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -93,7 +89,7 @@ The default is for Windows Calendar to be turned on. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -108,7 +104,7 @@ Windows Calendar is a feature that allows users to manage appointments and tasks - If you enable this setting, Windows Calendar will be turned off. -- If you disable or do not configure this setting, Windows Calendar will be turned on. +- If you disable or don't configure this setting, Windows Calendar will be turned on. The default is for Windows Calendar to be turned on. @@ -122,13 +118,12 @@ The default is for Windows Calendar to be turned on. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-windowscolorsystem.md b/windows/client-management/mdm/policy-csp-admx-windowscolorsystem.md index ddc84d4371..782b870f9c 100644 --- a/windows/client-management/mdm/policy-csp-admx-windowscolorsystem.md +++ b/windows/client-management/mdm/policy-csp-admx-windowscolorsystem.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_WindowsColorSystem Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_WindowsColorSystem -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,9 +41,9 @@ ms.topic: reference This policy setting affects the ability of users to install or uninstall color profiles. -- If you enable this policy setting, users cannot install new color profiles or uninstall previously installed color profiles. +- If you enable this policy setting, users can't install new color profiles or uninstall previously installed color profiles. -- If you disable or do not configure this policy setting, all users can install new color profiles. Standard users can uninstall color profiles that they previously installed. Administrators will be able to uninstall all color profiles. +- If you disable or don't configure this policy setting, all users can install new color profiles. Standard users can uninstall color profiles that they previously installed. Administrators will be able to uninstall all color profiles. @@ -58,13 +55,12 @@ This policy setting affects the ability of users to install or uninstall color p | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -91,7 +87,7 @@ This policy setting affects the ability of users to install or uninstall color p | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -104,9 +100,9 @@ This policy setting affects the ability of users to install or uninstall color p This policy setting affects the ability of users to install or uninstall color profiles. -- If you enable this policy setting, users cannot install new color profiles or uninstall previously installed color profiles. +- If you enable this policy setting, users can't install new color profiles or uninstall previously installed color profiles. -- If you disable or do not configure this policy setting, all users can install new color profiles. Standard users can uninstall color profiles that they previously installed. Administrators will be able to uninstall all color profiles. +- If you disable or don't configure this policy setting, all users can install new color profiles. Standard users can uninstall color profiles that they previously installed. Administrators will be able to uninstall all color profiles. @@ -118,13 +114,12 @@ This policy setting affects the ability of users to install or uninstall color p | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-windowsconnectnow.md b/windows/client-management/mdm/policy-csp-admx-windowsconnectnow.md index 5cacedd443..894b258e47 100644 --- a/windows/client-management/mdm/policy-csp-admx-windowsconnectnow.md +++ b/windows/client-management/mdm/policy-csp-admx-windowsconnectnow.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_WindowsConnectNow Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_WindowsConnectNow -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,7 +43,7 @@ This policy setting prohibits access to Windows Connect Now (WCN) wizards. - If you enable this policy setting, the wizards are turned off and users have no access to any of the wizard tasks. All the configuration related tasks, including "Set up a wireless router or access point" and "Add a wireless device" are disabled. -- If you disable or do not configure this policy setting, users can access the wizard tasks, including "Set up a wireless router or access point" and "Add a wireless device." The default for this policy setting allows users to access all WCN wizards. +- If you disable or don't configure this policy setting, users can access the wizard tasks, including "Set up a wireless router or access point" and "Add a wireless device". The default for this policy setting allows users to access all WCN wizards. @@ -58,13 +55,12 @@ This policy setting prohibits access to Windows Connect Now (WCN) wizards. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -91,7 +87,7 @@ This policy setting prohibits access to Windows Connect Now (WCN) wizards. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -106,7 +102,7 @@ This policy setting prohibits access to Windows Connect Now (WCN) wizards. - If you enable this policy setting, the wizards are turned off and users have no access to any of the wizard tasks. All the configuration related tasks, including "Set up a wireless router or access point" and "Add a wireless device" are disabled. -- If you disable or do not configure this policy setting, users can access the wizard tasks, including "Set up a wireless router or access point" and "Add a wireless device." The default for this policy setting allows users to access all WCN wizards. +- If you disable or don't configure this policy setting, users can access the wizard tasks, including "Set up a wireless router or access point" and "Add a wireless device". The default for this policy setting allows users to access all WCN wizards. @@ -118,13 +114,12 @@ This policy setting prohibits access to Windows Connect Now (WCN) wizards. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -151,7 +146,7 @@ This policy setting prohibits access to Windows Connect Now (WCN) wizards. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -170,7 +165,7 @@ Additional options are available to allow discovery and configuration over a spe - If you disable this policy setting, operations are disabled over all media. -- If you do not configure this policy setting, operations are enabled over all media. +- If you don't configure this policy setting, operations are enabled over all media. The default for this policy setting allows operations over all media. @@ -184,13 +179,12 @@ The default for this policy setting allows operations over all media. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-windowsexplorer.md b/windows/client-management/mdm/policy-csp-admx-windowsexplorer.md index be0b41abb0..d93f4952bf 100644 --- a/windows/client-management/mdm/policy-csp-admx-windowsexplorer.md +++ b/windows/client-management/mdm/policy-csp-admx-windowsexplorer.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_WindowsExplorer Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_WindowsExplorer -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,12 +41,12 @@ ms.topic: reference This policy setting allows you to prevent data loss when you change the target location for Folder Redirection, and the new and old targets point to the same network share, but have different network paths. -- If you enable this policy setting, Folder Redirection creates a temporary file in the old location in order to verify that new and old locations point to the same network share. If both new and old locations point to the same share, the target path is updated and files are not copied or deleted. The temporary file is deleted. +- If you enable this policy setting, Folder Redirection creates a temporary file in the old location in order to verify that new and old locations point to the same network share. If both new and old locations point to the same share, the target path is updated and files aren't copied or deleted. The temporary file is deleted. -- If you disable or do not configure this policy setting, Folder Redirection does not create a temporary file and functions as if both new and old locations point to different shares when their network paths are different. +- If you disable or don't configure this policy setting, Folder Redirection doesn't create a temporary file and functions as if both new and old locations point to different shares when their network paths are different. > [!NOTE] -> If the paths point to different network shares, this policy setting is not required. If the paths point to the same network share, any data contained in the redirected folders is deleted if this policy setting is not enabled. +> If the paths point to different network shares, this policy setting isn't required. If the paths point to the same network share, any data contained in the redirected folders is deleted if this policy setting isn't enabled. @@ -61,13 +58,12 @@ This policy setting allows you to prevent data loss when you change the target l | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -94,7 +90,7 @@ This policy setting allows you to prevent data loss when you change the target l | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -107,8 +103,9 @@ This policy setting allows you to prevent data loss when you change the target l This setting allows an administrator to revert specific Windows Shell behavior to classic Shell behavior. -- If you enable this setting, users cannot configure their system to open items by single-clicking (such as in Mouse in Control Panel). As a result, the user interface looks and operates like the interface for Windows NT 4.0, and users cannot restore the new features. -Enabling this policy will also turn off the preview pane and set the folder options for File Explorer to Use classic folders view and disable the users ability to change these options. +- If you enable this setting, users can't configure their system to open items by single-clicking (such as in Mouse in Control Panel). As a result, the user interface looks and operates like the interface for Windows NT 4.0, and users can't restore the new features. + +Enabling this policy will also turn off the preview pane and set the folder options for File Explorer to Use classic folders view and disable the user's ability to change these options. - If you disable or not configure this policy, the default File Explorer behavior is applied to the user. @@ -127,13 +124,12 @@ Also, see the "Disable Active Desktop" setting in User Configuration\Administrat | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -160,7 +156,7 @@ Also, see the "Disable Active Desktop" setting in User Configuration\Administrat | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -175,7 +171,7 @@ Allows you to have File Explorer display a confirmation dialog whenever a file i - If you enable this setting, a confirmation dialog is displayed when a file is deleted or moved to the Recycle Bin by the user. -- If you disable or do not configure this setting, the default behavior of not displaying a confirmation dialog occurs. +- If you disable or don't configure this setting, the default behavior of not displaying a confirmation dialog occurs. @@ -187,13 +183,12 @@ Allows you to have File Explorer display a confirmation dialog whenever a file i | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -220,7 +215,7 @@ Allows you to have File Explorer display a confirmation dialog whenever a file i | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -237,9 +232,9 @@ Allows you to have File Explorer display a confirmation dialog whenever a file i This policy setting allows you to specify a location where all default Library definition files for users/machines reside. -- If you enable this policy setting, administrators can specify a path where all default Library definition files for users reside. The user will not be allowed to make changes to these Libraries from the UI. On every logon, the policy settings are verified and Libraries for the user are updated or changed according to the path defined. +- If you enable this policy setting, administrators can specify a path where all default Library definition files for users reside. The user won't be allowed to make changes to these Libraries from the UI. On every logon, the policy settings are verified and Libraries for the user are updated or changed according to the path defined. -- If you disable or do not configure this policy setting, no changes are made to the location of the default Library definition files. +- If you disable or don't configure this policy setting, no changes are made to the location of the default Library definition files. @@ -251,13 +246,12 @@ This policy setting allows you to specify a location where all default Library d | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -283,7 +277,7 @@ This policy setting allows you to specify a location where all default Library d | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -312,13 +306,12 @@ This disables access to user-defined properties, and properties stored in NTFS s | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -345,7 +338,7 @@ This disables access to user-defined properties, and properties stored in NTFS s | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -359,16 +352,20 @@ This disables access to user-defined properties, and properties stored in NTFS s This policy setting allows you to turn off Windows Libraries features that need indexed file metadata to function properly. - If you enable this policy, some Windows Libraries features will be turned off to better handle included folders that have been redirected to non-indexed network locations. + Setting this policy will: + * Disable all Arrangement views except for "By Folder" * Disable all Search filter suggestions other than "Date Modified" and "Size" * Disable view of file content snippets in Content mode when search results are returned * Disable ability to stack in the Context menu and Column headers -* Exclude Libraries from the scope of Start search -This policy will not enable users to add unsupported locations to Libraries. +* Exclude Libraries from the scope of Start search. + +This policy won't enable users to add unsupported locations to Libraries. - If you enable this policy, Windows Libraries features that rely on indexed file data will be disabled. -- If you disable or do not configure this policy, all default Windows Libraries features will be enabled. + +- If you disable or don't configure this policy, all default Windows Libraries features will be enabled. @@ -380,13 +377,12 @@ This policy will not enable users to add unsupported locations to Libraries. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -413,7 +409,7 @@ This policy will not enable users to add unsupported locations to Libraries. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -441,13 +437,12 @@ You can specify a known folder using its known folder id or using its canonical | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -474,7 +469,7 @@ You can specify a known folder using its known folder id or using its canonical | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -490,7 +485,7 @@ Disables suggesting recent queries for the Search Box and prevents entries into File Explorer shows suggestion pop-ups as users type into the Search Box. These suggestions are based on their past entries into the Search Box. > [!NOTE] -> If you enable this policy, File Explorer will not show suggestion pop-ups as users type into the Search Box, and it will not store Search Box entries into the registry for future references. If the user types a property, values that match this property will be shown but no data will be saved in the registry or re-shown on subsequent uses of the search box. +> If you enable this policy, File Explorer won't show suggestion pop-ups as users type into the Search Box, and it won't store Search Box entries into the registry for future references. If the user types a property, values that match this property will be shown but no data will be saved in the registry or re-shown on subsequent uses of the search box. @@ -502,13 +497,12 @@ File Explorer shows suggestion pop-ups as users type into the Search Box. These | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -535,7 +529,7 @@ File Explorer shows suggestion pop-ups as users type into the Search Box. These | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -550,7 +544,7 @@ This policy setting determines whether remote paths can be used for file shortcu - If you enable this policy setting, file shortcut icons are allowed to be obtained from remote paths. -- If you disable or do not configure this policy setting, file shortcut icons that use remote paths are prevented from being displayed. +- If you disable or don't configure this policy setting, file shortcut icons that use remote paths are prevented from being displayed. > [!NOTE] > Allowing the use of remote paths in file shortcut icons can expose users' computers to security risks. @@ -565,13 +559,12 @@ This policy setting determines whether remote paths can be used for file shortcu | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -598,7 +591,7 @@ This policy setting determines whether remote paths can be used for file shortcu | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -609,28 +602,27 @@ This policy setting determines whether remote paths can be used for file shortcu -This policy allows you to turn Windows Defender SmartScreen on or off. SmartScreen helps protect PCs by warning users before running potentially malicious programs downloaded from the Internet. This warning is presented as an interstitial dialog shown before running an app that has been downloaded from the Internet and is unrecognized or known to be malicious. No dialog is shown for apps that do not appear to be suspicious. +This policy allows you to turn Windows Defender SmartScreen on or off. SmartScreen helps protect PCs by warning users before running potentially malicious programs downloaded from the Internet. This warning is presented as an interstitial dialog shown before running an app that has been downloaded from the Internet and is unrecognized or known to be malicious. No dialog is shown for apps that don't appear to be suspicious. Some information is sent to Microsoft about files and programs run on PCs with this feature enabled. - If you enable this policy, SmartScreen will be turned on for all users. Its behavior can be controlled by the following options: - Warn and prevent bypass -- Warn +- Warn. -- If you enable this policy with the "Warn and prevent bypass" option, SmartScreen's dialogs will not present the user with the option to disregard the warning and run the app. SmartScreen will continue to show the warning on subsequent attempts to run the app. +- If you enable this policy with the "Warn and prevent bypass" option, SmartScreen's dialogs won't present the user with the option to disregard the warning and run the app. SmartScreen will continue to show the warning on subsequent attempts to run the app. -- If you enable this policy with the "Warn" option, SmartScreen's dialogs will warn the user that the app appears suspicious, but will permit the user to disregard the warning and run the app anyway. SmartScreen will not warn the user again for that app if the user tells SmartScreen to run the app. +- If you enable this policy with the "Warn" option, SmartScreen's dialogs will warn the user that the app appears suspicious, but will permit the user to disregard the warning and run the app anyway. SmartScreen won't warn the user again for that app if the user tells SmartScreen to run the app. -- If you disable this policy, SmartScreen will be turned off for all users. Users will not be warned if they try to run suspicious apps from the Internet. +- If you disable this policy, SmartScreen will be turned off for all users. Users won't be warned if they try to run suspicious apps from the Internet. -- If you do not configure this policy, SmartScreen will be enabled by default, but users may change their settings. +- If you don't configure this policy, SmartScreen will be enabled by default, but users may change their settings. - -For more information, see [Microsoft Defender SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview). +For more information, see [Microsoft Defender SmartScreen](/windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen). @@ -638,13 +630,12 @@ For more information, see [Microsoft Defender SmartScreen](/windows/security/thr | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -671,7 +662,7 @@ For more information, see [Microsoft Defender SmartScreen](/windows/security/thr | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -682,7 +673,7 @@ For more information, see [Microsoft Defender SmartScreen](/windows/security/thr -This setting is designed to ensure that shell extensions can operate on a per-user basis. If you enable this setting, Windows is directed to only run those shell extensions that have either been approved by an administrator or that will not impact other users of the machine. +This setting is designed to ensure that shell extensions can operate on a per-user basis. If you enable this setting, Windows is directed to only run those shell extensions that have either been approved by an administrator or that won't impact other users of the machine. A shell extension only runs if there is an entry in at least one of the following locations in registry. @@ -700,13 +691,12 @@ For shell extensions to run on a per-user basis, there must be an entry at HKEY_ | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -733,7 +723,7 @@ For shell extensions to run on a per-user basis, there must be an entry at HKEY_ | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -751,7 +741,8 @@ For shell extensions to run on a per-user basis, there must be an entry at HKEY_ This policy setting allows you to specify whether the ribbon appears minimized or in full when new File Explorer windows are opened. - If you enable this policy setting, you can set how the ribbon appears the first time users open File Explorer and whenever they open new windows. -- If you disable or do not configure this policy setting, users can choose how the ribbon appears when they open new windows. + +- If you disable or don't configure this policy setting, users can choose how the ribbon appears when they open new windows. @@ -763,13 +754,12 @@ This policy setting allows you to specify whether the ribbon appears minimized o | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -796,7 +786,7 @@ This policy setting allows you to specify whether the ribbon appears minimized o | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -809,9 +799,9 @@ This policy setting allows you to specify whether the ribbon appears minimized o This policy setting allows you to turn off the display of snippets in Content view mode. -- If you enable this policy setting, File Explorer will not display snippets in Content view mode. +- If you enable this policy setting, File Explorer won't display snippets in Content view mode. -- If you disable or do not configure this policy setting, File Explorer shows snippets in Content view mode by default. +- If you disable or don't configure this policy setting, File Explorer shows snippets in Content view mode by default. @@ -823,13 +813,12 @@ This policy setting allows you to turn off the display of snippets in Content vi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -856,7 +845,7 @@ This policy setting allows you to turn off the display of snippets in Content vi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -871,13 +860,13 @@ This policy setting allows you to turn off the display of snippets in Content vi -This policy setting allows you to manage whether a user may preview an item from this zone or display custom thumbnails in the preview pane in File Explorer. While this policy setting usually applies to items returned by OpenSearch queries using Search Connectors (which allow rich searching of remote sources from within the File Explorer), it might affect other items as well that are marked from this zone. For example, some application-specific items such as MAPI (Messaging Application Programming Interface) items that are returned as search results in File Explorer will be affected. MAPI items reside in the Internet zone, so disabling this policy for the Internet zone will prevent the previewing of these items in File Explorer. For the case of custom thumbnails, it is the zone of the thumbnail that is checked, not the zone of item. Typically these are the same but a source is able to define a specific location of a thumbnail that is different than the location of the item. +This policy setting allows you to manage whether a user may preview an item from this zone or display custom thumbnails in the preview pane in File Explorer. While this policy setting usually applies to items returned by OpenSearch queries using Search Connectors (which allow rich searching of remote sources from within the File Explorer), it might affect other items as well that are marked from this zone. For example, some application-specific items such as MAPI (Messaging Application Programming Interface) items that are returned as search results in File Explorer will be affected. MAPI items reside in the Internet zone, so disabling this policy for the Internet zone will prevent the previewing of these items in File Explorer. For the case of custom thumbnails, it's the zone of the thumbnail that's checked, not the zone of item. Typically these are the same but a source is able to define a specific location of a thumbnail that's different than the location of the item. - If you enable this policy setting, users can preview items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. - If you disable this policy setting, users will be prevented from previewing items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. -- If you do not configure this policy setting, users can preview items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. +- If you don't configure this policy setting, users can preview items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. Changes to this setting may not be applied until the user logs off from Windows. @@ -891,13 +880,12 @@ Changes to this setting may not be applied until the user logs off from Windows. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -924,7 +912,7 @@ Changes to this setting may not be applied until the user logs off from Windows. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -939,13 +927,13 @@ Changes to this setting may not be applied until the user logs off from Windows. -This policy setting allows you to manage whether a user may preview an item from this zone or display custom thumbnails in the preview pane in File Explorer. While this policy setting usually applies to items returned by OpenSearch queries using Search Connectors (which allow rich searching of remote sources from within the File Explorer), it might affect other items as well that are marked from this zone. For example, some application-specific items such as MAPI (Messaging Application Programming Interface) items that are returned as search results in File Explorer will be affected. MAPI items reside in the Internet zone, so disabling this policy for the Internet zone will prevent the previewing of these items in File Explorer. For the case of custom thumbnails, it is the zone of the thumbnail that is checked, not the zone of item. Typically these are the same but a source is able to define a specific location of a thumbnail that is different than the location of the item. +This policy setting allows you to manage whether a user may preview an item from this zone or display custom thumbnails in the preview pane in File Explorer. While this policy setting usually applies to items returned by OpenSearch queries using Search Connectors (which allow rich searching of remote sources from within the File Explorer), it might affect other items as well that are marked from this zone. For example, some application-specific items such as MAPI (Messaging Application Programming Interface) items that are returned as search results in File Explorer will be affected. MAPI items reside in the Internet zone, so disabling this policy for the Internet zone will prevent the previewing of these items in File Explorer. For the case of custom thumbnails, it's the zone of the thumbnail that's checked, not the zone of item. Typically these are the same but a source is able to define a specific location of a thumbnail that's different than the location of the item. - If you enable this policy setting, users can preview items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. - If you disable this policy setting, users will be prevented from previewing items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. -- If you do not configure this policy setting, users can preview items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. +- If you don't configure this policy setting, users can preview items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. Changes to this setting may not be applied until the user logs off from Windows. @@ -959,13 +947,12 @@ Changes to this setting may not be applied until the user logs off from Windows. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -992,7 +979,7 @@ Changes to this setting may not be applied until the user logs off from Windows. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1007,13 +994,13 @@ Changes to this setting may not be applied until the user logs off from Windows. -This policy setting allows you to manage whether a user may preview an item from this zone or display custom thumbnails in the preview pane in File Explorer. While this policy setting usually applies to items returned by OpenSearch queries using Search Connectors (which allow rich searching of remote sources from within the File Explorer), it might affect other items as well that are marked from this zone. For example, some application-specific items such as MAPI (Messaging Application Programming Interface) items that are returned as search results in File Explorer will be affected. MAPI items reside in the Internet zone, so disabling this policy for the Internet zone will prevent the previewing of these items in File Explorer. For the case of custom thumbnails, it is the zone of the thumbnail that is checked, not the zone of item. Typically these are the same but a source is able to define a specific location of a thumbnail that is different than the location of the item. +This policy setting allows you to manage whether a user may preview an item from this zone or display custom thumbnails in the preview pane in File Explorer. While this policy setting usually applies to items returned by OpenSearch queries using Search Connectors (which allow rich searching of remote sources from within the File Explorer), it might affect other items as well that are marked from this zone. For example, some application-specific items such as MAPI (Messaging Application Programming Interface) items that are returned as search results in File Explorer will be affected. MAPI items reside in the Internet zone, so disabling this policy for the Internet zone will prevent the previewing of these items in File Explorer. For the case of custom thumbnails, it's the zone of the thumbnail that's checked, not the zone of item. Typically these are the same but a source is able to define a specific location of a thumbnail that's different than the location of the item. - If you enable this policy setting, users can preview items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. - If you disable this policy setting, users will be prevented from previewing items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. -- If you do not configure this policy setting, users can preview items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. +- If you don't configure this policy setting, users can preview items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. Changes to this setting may not be applied until the user logs off from Windows. @@ -1027,13 +1014,12 @@ Changes to this setting may not be applied until the user logs off from Windows. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1060,7 +1046,7 @@ Changes to this setting may not be applied until the user logs off from Windows. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1075,13 +1061,13 @@ Changes to this setting may not be applied until the user logs off from Windows. -This policy setting allows you to manage whether a user may preview an item from this zone or display custom thumbnails in the preview pane in File Explorer. While this policy setting usually applies to items returned by OpenSearch queries using Search Connectors (which allow rich searching of remote sources from within the File Explorer), it might affect other items as well that are marked from this zone. For example, some application-specific items such as MAPI (Messaging Application Programming Interface) items that are returned as search results in File Explorer will be affected. MAPI items reside in the Internet zone, so disabling this policy for the Internet zone will prevent the previewing of these items in File Explorer. For the case of custom thumbnails, it is the zone of the thumbnail that is checked, not the zone of item. Typically these are the same but a source is able to define a specific location of a thumbnail that is different than the location of the item. +This policy setting allows you to manage whether a user may preview an item from this zone or display custom thumbnails in the preview pane in File Explorer. While this policy setting usually applies to items returned by OpenSearch queries using Search Connectors (which allow rich searching of remote sources from within the File Explorer), it might affect other items as well that are marked from this zone. For example, some application-specific items such as MAPI (Messaging Application Programming Interface) items that are returned as search results in File Explorer will be affected. MAPI items reside in the Internet zone, so disabling this policy for the Internet zone will prevent the previewing of these items in File Explorer. For the case of custom thumbnails, it's the zone of the thumbnail that's checked, not the zone of item. Typically these are the same but a source is able to define a specific location of a thumbnail that's different than the location of the item. - If you enable this policy setting, users can preview items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. - If you disable this policy setting, users will be prevented from previewing items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. -- If you do not configure this policy setting, users can preview items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. +- If you don't configure this policy setting, users can preview items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. Changes to this setting may not be applied until the user logs off from Windows. @@ -1095,13 +1081,12 @@ Changes to this setting may not be applied until the user logs off from Windows. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1128,7 +1113,7 @@ Changes to this setting may not be applied until the user logs off from Windows. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1143,13 +1128,13 @@ Changes to this setting may not be applied until the user logs off from Windows. -This policy setting allows you to manage whether a user may preview an item from this zone or display custom thumbnails in the preview pane in File Explorer. While this policy setting usually applies to items returned by OpenSearch queries using Search Connectors (which allow rich searching of remote sources from within the File Explorer), it might affect other items as well that are marked from this zone. For example, some application-specific items such as MAPI (Messaging Application Programming Interface) items that are returned as search results in File Explorer will be affected. MAPI items reside in the Internet zone, so disabling this policy for the Internet zone will prevent the previewing of these items in File Explorer. For the case of custom thumbnails, it is the zone of the thumbnail that is checked, not the zone of item. Typically these are the same but a source is able to define a specific location of a thumbnail that is different than the location of the item. +This policy setting allows you to manage whether a user may preview an item from this zone or display custom thumbnails in the preview pane in File Explorer. While this policy setting usually applies to items returned by OpenSearch queries using Search Connectors (which allow rich searching of remote sources from within the File Explorer), it might affect other items as well that are marked from this zone. For example, some application-specific items such as MAPI (Messaging Application Programming Interface) items that are returned as search results in File Explorer will be affected. MAPI items reside in the Internet zone, so disabling this policy for the Internet zone will prevent the previewing of these items in File Explorer. For the case of custom thumbnails, it's the zone of the thumbnail that's checked, not the zone of item. Typically these are the same but a source is able to define a specific location of a thumbnail that's different than the location of the item. - If you enable this policy setting, users can preview items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. - If you disable this policy setting, users will be prevented from previewing items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. -- If you do not configure this policy setting, users can preview items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. +- If you don't configure this policy setting, users can preview items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. Changes to this setting may not be applied until the user logs off from Windows. @@ -1163,13 +1148,12 @@ Changes to this setting may not be applied until the user logs off from Windows. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1196,7 +1180,7 @@ Changes to this setting may not be applied until the user logs off from Windows. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1211,13 +1195,13 @@ Changes to this setting may not be applied until the user logs off from Windows. -This policy setting allows you to manage whether a user may preview an item from this zone or display custom thumbnails in the preview pane in File Explorer. While this policy setting usually applies to items returned by OpenSearch queries using Search Connectors (which allow rich searching of remote sources from within the File Explorer), it might affect other items as well that are marked from this zone. For example, some application-specific items such as MAPI (Messaging Application Programming Interface) items that are returned as search results in File Explorer will be affected. MAPI items reside in the Internet zone, so disabling this policy for the Internet zone will prevent the previewing of these items in File Explorer. For the case of custom thumbnails, it is the zone of the thumbnail that is checked, not the zone of item. Typically these are the same but a source is able to define a specific location of a thumbnail that is different than the location of the item. +This policy setting allows you to manage whether a user may preview an item from this zone or display custom thumbnails in the preview pane in File Explorer. While this policy setting usually applies to items returned by OpenSearch queries using Search Connectors (which allow rich searching of remote sources from within the File Explorer), it might affect other items as well that are marked from this zone. For example, some application-specific items such as MAPI (Messaging Application Programming Interface) items that are returned as search results in File Explorer will be affected. MAPI items reside in the Internet zone, so disabling this policy for the Internet zone will prevent the previewing of these items in File Explorer. For the case of custom thumbnails, it's the zone of the thumbnail that's checked, not the zone of item. Typically these are the same but a source is able to define a specific location of a thumbnail that's different than the location of the item. - If you enable this policy setting, users can preview items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. - If you disable this policy setting, users will be prevented from previewing items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. -- If you do not configure this policy setting, users can preview items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. +- If you don't configure this policy setting, users can preview items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. Changes to this setting may not be applied until the user logs off from Windows. @@ -1231,13 +1215,12 @@ Changes to this setting may not be applied until the user logs off from Windows. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1264,7 +1247,7 @@ Changes to this setting may not be applied until the user logs off from Windows. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1279,13 +1262,13 @@ Changes to this setting may not be applied until the user logs off from Windows. -This policy setting allows you to manage whether a user may preview an item from this zone or display custom thumbnails in the preview pane in File Explorer. While this policy setting usually applies to items returned by OpenSearch queries using Search Connectors (which allow rich searching of remote sources from within the File Explorer), it might affect other items as well that are marked from this zone. For example, some application-specific items such as MAPI (Messaging Application Programming Interface) items that are returned as search results in File Explorer will be affected. MAPI items reside in the Internet zone, so disabling this policy for the Internet zone will prevent the previewing of these items in File Explorer. For the case of custom thumbnails, it is the zone of the thumbnail that is checked, not the zone of item. Typically these are the same but a source is able to define a specific location of a thumbnail that is different than the location of the item. +This policy setting allows you to manage whether a user may preview an item from this zone or display custom thumbnails in the preview pane in File Explorer. While this policy setting usually applies to items returned by OpenSearch queries using Search Connectors (which allow rich searching of remote sources from within the File Explorer), it might affect other items as well that are marked from this zone. For example, some application-specific items such as MAPI (Messaging Application Programming Interface) items that are returned as search results in File Explorer will be affected. MAPI items reside in the Internet zone, so disabling this policy for the Internet zone will prevent the previewing of these items in File Explorer. For the case of custom thumbnails, it's the zone of the thumbnail that's checked, not the zone of item. Typically these are the same but a source is able to define a specific location of a thumbnail that's different than the location of the item. - If you enable this policy setting, users can preview items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. - If you disable this policy setting, users will be prevented from previewing items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. -- If you do not configure this policy setting, users cannot preview items or get custom thumbnails from OpenSearch query results in this zone using File Explorer. +- If you don't configure this policy setting, users can't preview items or get custom thumbnails from OpenSearch query results in this zone using File Explorer. Changes to this setting may not be applied until the user logs off from Windows. @@ -1299,13 +1282,12 @@ Changes to this setting may not be applied until the user logs off from Windows. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1332,7 +1314,7 @@ Changes to this setting may not be applied until the user logs off from Windows. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1347,13 +1329,13 @@ Changes to this setting may not be applied until the user logs off from Windows. -This policy setting allows you to manage whether a user may preview an item from this zone or display custom thumbnails in the preview pane in File Explorer. While this policy setting usually applies to items returned by OpenSearch queries using Search Connectors (which allow rich searching of remote sources from within the File Explorer), it might affect other items as well that are marked from this zone. For example, some application-specific items such as MAPI (Messaging Application Programming Interface) items that are returned as search results in File Explorer will be affected. MAPI items reside in the Internet zone, so disabling this policy for the Internet zone will prevent the previewing of these items in File Explorer. For the case of custom thumbnails, it is the zone of the thumbnail that is checked, not the zone of item. Typically these are the same but a source is able to define a specific location of a thumbnail that is different than the location of the item. +This policy setting allows you to manage whether a user may preview an item from this zone or display custom thumbnails in the preview pane in File Explorer. While this policy setting usually applies to items returned by OpenSearch queries using Search Connectors (which allow rich searching of remote sources from within the File Explorer), it might affect other items as well that are marked from this zone. For example, some application-specific items such as MAPI (Messaging Application Programming Interface) items that are returned as search results in File Explorer will be affected. MAPI items reside in the Internet zone, so disabling this policy for the Internet zone will prevent the previewing of these items in File Explorer. For the case of custom thumbnails, it's the zone of the thumbnail that's checked, not the zone of item. Typically these are the same but a source is able to define a specific location of a thumbnail that's different than the location of the item. - If you enable this policy setting, users can preview items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. - If you disable this policy setting, users will be prevented from previewing items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. -- If you do not configure this policy setting, users cannot preview items or get custom thumbnails from OpenSearch query results in this zone using File Explorer. +- If you don't configure this policy setting, users can't preview items or get custom thumbnails from OpenSearch query results in this zone using File Explorer. Changes to this setting may not be applied until the user logs off from Windows. @@ -1367,13 +1349,12 @@ Changes to this setting may not be applied until the user logs off from Windows. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1400,7 +1381,7 @@ Changes to this setting may not be applied until the user logs off from Windows. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1415,13 +1396,13 @@ Changes to this setting may not be applied until the user logs off from Windows. -This policy setting allows you to manage whether a user may preview an item from this zone or display custom thumbnails in the preview pane in File Explorer. While this policy setting usually applies to items returned by OpenSearch queries using Search Connectors (which allow rich searching of remote sources from within the File Explorer), it might affect other items as well that are marked from this zone. For example, some application-specific items such as MAPI (Messaging Application Programming Interface) items that are returned as search results in File Explorer will be affected. MAPI items reside in the Internet zone, so disabling this policy for the Internet zone will prevent the previewing of these items in File Explorer. For the case of custom thumbnails, it is the zone of the thumbnail that is checked, not the zone of item. Typically these are the same but a source is able to define a specific location of a thumbnail that is different than the location of the item. +This policy setting allows you to manage whether a user may preview an item from this zone or display custom thumbnails in the preview pane in File Explorer. While this policy setting usually applies to items returned by OpenSearch queries using Search Connectors (which allow rich searching of remote sources from within the File Explorer), it might affect other items as well that are marked from this zone. For example, some application-specific items such as MAPI (Messaging Application Programming Interface) items that are returned as search results in File Explorer will be affected. MAPI items reside in the Internet zone, so disabling this policy for the Internet zone will prevent the previewing of these items in File Explorer. For the case of custom thumbnails, it's the zone of the thumbnail that's checked, not the zone of item. Typically these are the same but a source is able to define a specific location of a thumbnail that's different than the location of the item. - If you enable this policy setting, users can preview items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. - If you disable this policy setting, users will be prevented from previewing items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. -- If you do not configure this policy setting, users can preview items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. +- If you don't configure this policy setting, users can preview items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. Changes to this setting may not be applied until the user logs off from Windows. @@ -1435,13 +1416,12 @@ Changes to this setting may not be applied until the user logs off from Windows. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1468,7 +1448,7 @@ Changes to this setting may not be applied until the user logs off from Windows. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1483,13 +1463,13 @@ Changes to this setting may not be applied until the user logs off from Windows. -This policy setting allows you to manage whether a user may preview an item from this zone or display custom thumbnails in the preview pane in File Explorer. While this policy setting usually applies to items returned by OpenSearch queries using Search Connectors (which allow rich searching of remote sources from within the File Explorer), it might affect other items as well that are marked from this zone. For example, some application-specific items such as MAPI (Messaging Application Programming Interface) items that are returned as search results in File Explorer will be affected. MAPI items reside in the Internet zone, so disabling this policy for the Internet zone will prevent the previewing of these items in File Explorer. For the case of custom thumbnails, it is the zone of the thumbnail that is checked, not the zone of item. Typically these are the same but a source is able to define a specific location of a thumbnail that is different than the location of the item. +This policy setting allows you to manage whether a user may preview an item from this zone or display custom thumbnails in the preview pane in File Explorer. While this policy setting usually applies to items returned by OpenSearch queries using Search Connectors (which allow rich searching of remote sources from within the File Explorer), it might affect other items as well that are marked from this zone. For example, some application-specific items such as MAPI (Messaging Application Programming Interface) items that are returned as search results in File Explorer will be affected. MAPI items reside in the Internet zone, so disabling this policy for the Internet zone will prevent the previewing of these items in File Explorer. For the case of custom thumbnails, it's the zone of the thumbnail that's checked, not the zone of item. Typically these are the same but a source is able to define a specific location of a thumbnail that's different than the location of the item. - If you enable this policy setting, users can preview items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. - If you disable this policy setting, users will be prevented from previewing items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. -- If you do not configure this policy setting, users can preview items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. +- If you don't configure this policy setting, users can preview items and get custom thumbnails from OpenSearch query results in this zone using File Explorer. Changes to this setting may not be applied until the user logs off from Windows. @@ -1503,13 +1483,12 @@ Changes to this setting may not be applied until the user logs off from Windows. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1536,7 +1515,7 @@ Changes to this setting may not be applied until the user logs off from Windows. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1557,7 +1536,7 @@ This policy setting allows you to manage whether OpenSearch queries in this zone - If you disable this policy setting, users are prevented from performing OpenSearch queries in this zone using Search Connectors. -- If you do not configure this policy setting, users can perform OpenSearch queries in this zone using Search Connectors. +- If you don't configure this policy setting, users can perform OpenSearch queries in this zone using Search Connectors. @@ -1569,13 +1548,12 @@ This policy setting allows you to manage whether OpenSearch queries in this zone | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1602,7 +1580,7 @@ This policy setting allows you to manage whether OpenSearch queries in this zone | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1623,7 +1601,7 @@ This policy setting allows you to manage whether OpenSearch queries in this zone - If you disable this policy setting, users are prevented from performing OpenSearch queries in this zone using Search Connectors. -- If you do not configure this policy setting, users can perform OpenSearch queries in this zone using Search Connectors. +- If you don't configure this policy setting, users can perform OpenSearch queries in this zone using Search Connectors. @@ -1635,13 +1613,12 @@ This policy setting allows you to manage whether OpenSearch queries in this zone | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1668,7 +1645,7 @@ This policy setting allows you to manage whether OpenSearch queries in this zone | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1689,7 +1666,7 @@ This policy setting allows you to manage whether OpenSearch queries in this zone - If you disable this policy setting, users are prevented from performing OpenSearch queries in this zone using Search Connectors. -- If you do not configure this policy setting, users can perform OpenSearch queries in this zone using Search Connectors. +- If you don't configure this policy setting, users can perform OpenSearch queries in this zone using Search Connectors. @@ -1701,13 +1678,12 @@ This policy setting allows you to manage whether OpenSearch queries in this zone | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1734,7 +1710,7 @@ This policy setting allows you to manage whether OpenSearch queries in this zone | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1755,7 +1731,7 @@ This policy setting allows you to manage whether OpenSearch queries in this zone - If you disable this policy setting, users are prevented from performing OpenSearch queries in this zone using Search Connectors. -- If you do not configure this policy setting, users can perform OpenSearch queries in this zone using Search Connectors. +- If you don't configure this policy setting, users can perform OpenSearch queries in this zone using Search Connectors. @@ -1767,13 +1743,12 @@ This policy setting allows you to manage whether OpenSearch queries in this zone | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1800,7 +1775,7 @@ This policy setting allows you to manage whether OpenSearch queries in this zone | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1821,7 +1796,7 @@ This policy setting allows you to manage whether OpenSearch queries in this zone - If you disable this policy setting, users are prevented from performing OpenSearch queries in this zone using Search Connectors. -- If you do not configure this policy setting, users can perform OpenSearch queries in this zone using Search Connectors. +- If you don't configure this policy setting, users can perform OpenSearch queries in this zone using Search Connectors. @@ -1833,13 +1808,12 @@ This policy setting allows you to manage whether OpenSearch queries in this zone | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1866,7 +1840,7 @@ This policy setting allows you to manage whether OpenSearch queries in this zone | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1887,7 +1861,7 @@ This policy setting allows you to manage whether OpenSearch queries in this zone - If you disable this policy setting, users are prevented from performing OpenSearch queries in this zone using Search Connectors. -- If you do not configure this policy setting, users can perform OpenSearch queries in this zone using Search Connectors. +- If you don't configure this policy setting, users can perform OpenSearch queries in this zone using Search Connectors. @@ -1899,13 +1873,12 @@ This policy setting allows you to manage whether OpenSearch queries in this zone | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1932,7 +1905,7 @@ This policy setting allows you to manage whether OpenSearch queries in this zone | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1953,7 +1926,7 @@ This policy setting allows you to manage whether OpenSearch queries in this zone - If you disable this policy setting, users are prevented from performing OpenSearch queries in this zone using Search Connectors. -- If you do not configure this policy setting, users cannot perform OpenSearch queries in this zone using Search Connectors. +- If you don't configure this policy setting, users can't perform OpenSearch queries in this zone using Search Connectors. @@ -1965,13 +1938,12 @@ This policy setting allows you to manage whether OpenSearch queries in this zone | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1998,7 +1970,7 @@ This policy setting allows you to manage whether OpenSearch queries in this zone | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2019,7 +1991,7 @@ This policy setting allows you to manage whether OpenSearch queries in this zone - If you disable this policy setting, users are prevented from performing OpenSearch queries in this zone using Search Connectors. -- If you do not configure this policy setting, users cannot perform OpenSearch queries in this zone using Search Connectors. +- If you don't configure this policy setting, users can't perform OpenSearch queries in this zone using Search Connectors. @@ -2031,13 +2003,12 @@ This policy setting allows you to manage whether OpenSearch queries in this zone | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2064,7 +2035,7 @@ This policy setting allows you to manage whether OpenSearch queries in this zone | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2085,7 +2056,7 @@ This policy setting allows you to manage whether OpenSearch queries in this zone - If you disable this policy setting, users are prevented from performing OpenSearch queries in this zone using Search Connectors. -- If you do not configure this policy setting, users can perform OpenSearch queries in this zone using Search Connectors. +- If you don't configure this policy setting, users can perform OpenSearch queries in this zone using Search Connectors. @@ -2097,13 +2068,12 @@ This policy setting allows you to manage whether OpenSearch queries in this zone | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2130,7 +2100,7 @@ This policy setting allows you to manage whether OpenSearch queries in this zone | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2151,7 +2121,7 @@ This policy setting allows you to manage whether OpenSearch queries in this zone - If you disable this policy setting, users are prevented from performing OpenSearch queries in this zone using Search Connectors. -- If you do not configure this policy setting, users can perform OpenSearch queries in this zone using Search Connectors. +- If you don't configure this policy setting, users can perform OpenSearch queries in this zone using Search Connectors. @@ -2163,13 +2133,12 @@ This policy setting allows you to manage whether OpenSearch queries in this zone | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2196,7 +2165,7 @@ This policy setting allows you to manage whether OpenSearch queries in this zone | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2207,13 +2176,13 @@ This policy setting allows you to manage whether OpenSearch queries in this zone -This policy setting determines whether Windows traces shortcuts back to their sources when it cannot find the target on the user's system. +This policy setting determines whether Windows traces shortcuts back to their sources when it can't find the target on the user's system. -Shortcut files typically include an absolute path to the original target file as well as the relative path to the current target file. When the system cannot find the file in the current target path, then, by default, it searches for the target in the original path. If the shortcut has been copied to a different computer, the original path might lead to a network computer, including external resources, such as an Internet server. +Shortcut files typically include an absolute path to the original target file as well as the relative path to the current target file. When the system can't find the file in the current target path, then, by default, it searches for the target in the original path. If the shortcut has been copied to a different computer, the original path might lead to a network computer, including external resources, such as an Internet server. -- If you enable this policy setting, Windows only searches the current target path. It does not search for the original path even when it cannot find the target file in the current target path. +- If you enable this policy setting, Windows only searches the current target path. It doesn't search for the original path even when it can't find the target file in the current target path. -- If you disable or do not configure this policy setting, Windows searches for the original path when it cannot find the target file in the current target path. +- If you disable or don't configure this policy setting, Windows searches for the original path when it can't find the target file in the current target path. @@ -2225,13 +2194,12 @@ Shortcut files typically include an absolute path to the original target file as | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2258,7 +2226,7 @@ Shortcut files typically include an absolute path to the original target file as | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2275,7 +2243,7 @@ The Recent Items menu contains shortcuts to the nonprogram files the user has mo - If you enable this policy setting, the system displays the number of shortcuts specified by the policy setting. -- If you disable or do not configure this policy setting, by default, the system displays shortcuts to the 10 most recently opened documents." +- If you disable or don't configure this policy setting, by default, the system displays shortcuts to the 10 most recently opened documents". @@ -2287,13 +2255,12 @@ The Recent Items menu contains shortcuts to the nonprogram files the user has mo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2319,7 +2286,7 @@ The Recent Items menu contains shortcuts to the nonprogram files the user has mo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2336,12 +2303,12 @@ This policy setting lets you remove new features added in Microsoft Windows 2000 - If you enable this policy setting, the Back button is removed from the standard Open dialog box. -- If you disable or do not configure this policy setting, the Back button is displayed for any standard Open dialog box. +- If you disable or don't configure this policy setting, the Back button is displayed for any standard Open dialog box. To see an example of the standard Open dialog box, start Notepad and, on the File menu, click Open. > [!NOTE] -> In Windows Vista, this policy setting applies only to applications that are using the Windows XP common dialog box style. This policy setting does not apply to the new Windows Vista common dialog box style. Also, third-party applications with Windows 2000 or later certification to are required to adhere to this policy setting. +> In Windows Vista, this policy setting applies only to applications that are using the Windows XP common dialog box style. This policy setting doesn't apply to the new Windows Vista common dialog box style. Also, third-party applications with Windows 2000 or later certification to are required to adhere to this policy setting. @@ -2353,13 +2320,12 @@ To see an example of the standard Open dialog box, start Notepad and, on the Fil | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2386,7 +2352,7 @@ To see an example of the standard Open dialog box, start Notepad and, on the Fil | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2399,9 +2365,9 @@ To see an example of the standard Open dialog box, start Notepad and, on the Fil This policy setting allows you to turn off caching of thumbnail pictures. -- If you enable this policy setting, thumbnail views are not cached. +- If you enable this policy setting, thumbnail views aren't cached. -- If you disable or do not configure this policy setting, thumbnail views are cached. +- If you disable or don't configure this policy setting, thumbnail views are cached. > [!NOTE] > For shared corporate workstations or computers where security is a top concern, you should enable this policy setting to turn off the thumbnail view cache, because the thumbnail cache can be read by everyone. @@ -2416,13 +2382,12 @@ This policy setting allows you to turn off caching of thumbnail pictures. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2449,7 +2414,7 @@ This policy setting allows you to turn off caching of thumbnail pictures. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2464,10 +2429,10 @@ This policy setting allows you to remove CD Burning features. File Explorer allo - If you enable this policy setting, all features in the File Explorer that allow you to use your CD writer are removed. -- If you disable or do not configure this policy setting, users are able to use the File Explorer CD burning features. +- If you disable or don't configure this policy setting, users are able to use the File Explorer CD burning features. > [!NOTE] -> This policy setting does not prevent users from using third-party applications to create or modify CDs using a CD writer. +> This policy setting doesn't prevent users from using third-party applications to create or modify CDs using a CD writer. @@ -2479,13 +2444,12 @@ This policy setting allows you to remove CD Burning features. File Explorer allo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2512,7 +2476,7 @@ This policy setting allows you to remove CD Burning features. File Explorer allo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2525,11 +2489,11 @@ This policy setting allows you to remove CD Burning features. File Explorer allo This policy setting allows you to prevent users from enabling or disabling minor animations in the operating system for the movement of windows, menus, and lists. -- If you enable this policy setting, the "Use transition effects for menus and tooltips" option in Display in Control Panel is disabled, and cannot be toggled by users. +- If you enable this policy setting, the "Use transition effects for menus and tooltips" option in Display in Control Panel is disabled, and can't be toggled by users. Effects, such as animation, are designed to enhance the user's experience but might be confusing or distracting to some users. -- If you disable or do not configure this policy setting, users are allowed to turn on or off these minor system animations using the "Use transition effects for menus and tooltips" option in Display in Control Panel. +- If you disable or don't configure this policy setting, users are allowed to turn on or off these minor system animations using the "Use transition effects for menus and tooltips" option in Display in Control Panel. @@ -2541,13 +2505,12 @@ Effects, such as animation, are designed to enhance the user's experience but mi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2574,7 +2537,7 @@ Effects, such as animation, are designed to enhance the user's experience but mi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2587,7 +2550,7 @@ Effects, such as animation, are designed to enhance the user's experience but mi Disables the "Hide keyboard navigation indicators until I use the ALT key" option in Display in Control Panel. -When this Display Properties option is selected, the underlining that indicates a keyboard shortcut character (hot key) does not appear on menus until you press ALT. +When this Display Properties option is selected, the underlining that indicates a keyboard shortcut character (hot key) doesn't appear on menus until you press ALT. Effects, such as transitory underlines, are designed to enhance the user's experience but might be confusing or distracting to some users. @@ -2601,13 +2564,12 @@ Effects, such as transitory underlines, are designed to enhance the user's exper | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2634,7 +2596,7 @@ Effects, such as transitory underlines, are designed to enhance the user's exper | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2647,11 +2609,11 @@ Effects, such as transitory underlines, are designed to enhance the user's exper This policy setting allows you to remove the DFS tab from File Explorer. -- If you enable this policy setting, the DFS (Distributed File System) tab is removed from File Explorer and from other programs that use the File Explorer browser, such as My Computer. As a result, users cannot use this tab to view or change the properties of the DFS shares available from their computer. +- If you enable this policy setting, the DFS (Distributed File System) tab is removed from File Explorer and from other programs that use the File Explorer browser, such as My Computer. As a result, users can't use this tab to view or change the properties of the DFS shares available from their computer. -This policy setting does not prevent users from using other methods to configure DFS. +This policy setting doesn't prevent users from using other methods to configure DFS. -- If you disable or do not configure this policy setting, the DFS tab is available. +- If you disable or don't configure this policy setting, the DFS tab is available. @@ -2663,13 +2625,12 @@ This policy setting does not prevent users from using other methods to configure | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2696,7 +2657,7 @@ This policy setting does not prevent users from using other methods to configure | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2709,16 +2670,16 @@ This policy setting does not prevent users from using other methods to configure This policy setting allows you to hide these specified drives in My Computer. -This policy setting allows you to remove the icons representing selected hard drives from My Computer and File Explorer. Also, the drive letters representing the selected drives do not appear in the standard Open dialog box. +This policy setting allows you to remove the icons representing selected hard drives from My Computer and File Explorer. Also, the drive letters representing the selected drives don't appear in the standard Open dialog box. - If you enable this policy setting, select a drive or combination of drives in the drop-down list. > [!NOTE] > This policy setting removes the drive icons. Users can still gain access to drive contents by using other methods, such as by typing the path to a directory on the drive in the Map Network Drive dialog box, in the Run dialog box, or in a command window. -Also, this policy setting does not prevent users from using programs to access these drives or their contents. And, it does not prevent users from using the Disk Management snap-in to view and change drive characteristics. +Also, this policy setting doesn't prevent users from using programs to access these drives or their contents. And, it doesn't prevent users from using the Disk Management snap-in to view and change drive characteristics. -- If you disable or do not configure this policy setting, all drives are displayed, or select the "Do not restrict drives" option in the drop-down list. +- If you disable or don't configure this policy setting, all drives are displayed, or select the "Do not restrict drives" option in the drop-down list. Also, see the "Prevent access to drives from My Computer" policy setting. @@ -2732,13 +2693,12 @@ Also, see the "Prevent access to drives from My Computer" policy setting. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2764,7 +2724,7 @@ Also, see the "Prevent access to drives from My Computer" policy setting. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2779,12 +2739,12 @@ Removes all computers outside of the user's workgroup or local domain from lists If you enable this setting, the system removes the Entire Network option and the icons representing networked computers from Network Locations and from the browser associated with the Map Network Drive option. -This setting does not prevent users from viewing or connecting to computers in their workgroup or domain. It also does not prevent users from connecting to remote computers by other commonly used methods, such as by typing the share name in the Run dialog box or the Map Network Drive dialog box. +This setting doesn't prevent users from viewing or connecting to computers in their workgroup or domain. It also doesn't prevent users from connecting to remote computers by other commonly used methods, such as by typing the share name in the Run dialog box or the Map Network Drive dialog box. To remove computers in the user's workgroup or domain from lists of network resources, use the "No Computers Near Me in Network Locations" setting. > [!NOTE] -> It is a requirement for third-party applications with Windows 2000 or later certification to adhere to this setting. +> It's a requirement for third-party applications with Windows 2000 or later certification to adhere to this setting. @@ -2796,13 +2756,12 @@ To remove computers in the user's workgroup or domain from lists of network reso | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2829,7 +2788,7 @@ To remove computers in the user's workgroup or domain from lists of network reso | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2842,7 +2801,7 @@ To remove computers in the user's workgroup or domain from lists of network reso Removes the File menu from My Computer and File Explorer. -This setting does not prevent users from using other methods to perform tasks available on the File menu. +This setting doesn't prevent users from using other methods to perform tasks available on the File menu. @@ -2854,13 +2813,12 @@ This setting does not prevent users from using other methods to perform tasks av | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2887,7 +2845,7 @@ This setting does not prevent users from using other methods to perform tasks av | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2900,7 +2858,7 @@ This setting does not prevent users from using other methods to perform tasks av Removes the list of most recently used files from the Open dialog box. -- If you disable this setting or do not configure it, the "File name" field includes a drop-down list of recently used files. +- If you disable this setting or don't configure it, the "File name" field includes a drop-down list of recently used files. - If you enable this setting, the "File name" field is a simple text box. Users must browse directories to find a file or type a file name in the text box. @@ -2909,7 +2867,7 @@ This setting, and others in this folder, lets you remove new features added in W To see an example of the standard Open dialog box, start Wordpad and, on the File menu, click Open. > [!NOTE] -> In Windows Vista, this policy setting applies only to applications that are using the Windows XP common dialog box style. This policy setting does not apply to the new Windows Vista common dialog box style. It is a requirement for third-party applications with Windows 2000 or later certification to adhere to this setting. +> In Windows Vista, this policy setting applies only to applications that are using the Windows XP common dialog box style. This policy setting doesn't apply to the new Windows Vista common dialog box style. It's a requirement for third-party applications with Windows 2000 or later certification to adhere to this setting. @@ -2921,13 +2879,12 @@ To see an example of the standard Open dialog box, start Wordpad and, on the Fil | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2954,7 +2911,7 @@ To see an example of the standard Open dialog box, start Wordpad and, on the Fil | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2969,9 +2926,9 @@ This policy setting allows you to prevent users from accessing Folder Options th Folder Options allows users to change the way files and folders open, what appears in the navigation pane, and other advanced view settings. -- If you enable this policy setting, users will receive an error message if they tap or click the Options button or choose the Change folder and search options command, and they will not be able to open Folder Options. +- If you enable this policy setting, users will receive an error message if they tap or click the Options button or choose the Change folder and search options command, and they won't be able to open Folder Options. -- If you disable or do not configure this policy setting, users can open Folder Options from the View tab on the ribbon. +- If you disable or don't configure this policy setting, users can open Folder Options from the View tab on the ribbon. @@ -2983,13 +2940,12 @@ Folder Options allows users to change the way files and folders open, what appea | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3016,7 +2972,7 @@ Folder Options allows users to change the way files and folders open, what appea | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3029,7 +2985,7 @@ Folder Options allows users to change the way files and folders open, what appea Removes the Hardware tab. -This setting removes the Hardware tab from Mouse, Keyboard, and Sounds and Audio Devices in Control Panel. It also removes the Hardware tab from the Properties dialog box for all local drives, including hard drives, floppy disk drives, and CD-ROM drives. As a result, users cannot use the Hardware tab to view or change the device list or device properties, or use the Troubleshoot button to resolve problems with the device. +This setting removes the Hardware tab from Mouse, Keyboard, and Sounds and Audio Devices in Control Panel. It also removes the Hardware tab from the Properties dialog box for all local drives, including hard drives, floppy disk drives, and CD-ROM drives. As a result, users can't use the Hardware tab to view or change the device list or device properties, or use the Troubleshoot button to resolve problems with the device. @@ -3041,13 +2997,12 @@ This setting removes the Hardware tab from Mouse, Keyboard, and Sounds and Audio | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3074,7 +3029,7 @@ This setting removes the Hardware tab from Mouse, Keyboard, and Sounds and Audio | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3089,7 +3044,7 @@ Removes the Manage item from the File Explorer context menu. This context menu a The Manage item opens Computer Management (Compmgmt.msc), a console tool that includes many of the primary Windows 2000 administrative tools, such as Event Viewer, Device Manager, and Disk Management. You must be an administrator to use many of the features of these tools. -This setting does not remove the Computer Management item from the Start menu (Start, Programs, Administrative Tools, Computer Management), nor does it prevent users from using other methods to start Computer Management. +This setting doesn't remove the Computer Management item from the Start menu (Start, Programs, Administrative Tools, Computer Management), nor does it prevent users from using other methods to start Computer Management. > [!TIP] > To hide all context menus, use the "Remove File Explorer's default context menu" setting. @@ -3104,13 +3059,12 @@ This setting does not remove the Computer Management item from the Start menu (S | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3137,7 +3091,7 @@ This setting does not remove the Computer Management item from the Start menu (S | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3152,9 +3106,9 @@ This policy setting allows you to remove the Shared Documents folder from My Com When a Windows client is in a workgroup, a Shared Documents icon appears in the File Explorer Web view under "Other Places" and also under "Files Stored on This Computer" in My Computer. Using this policy setting, you can choose not to have these items displayed. -- If you enable this policy setting, the Shared Documents folder is not displayed in the Web view or in My Computer. +- If you enable this policy setting, the Shared Documents folder isn't displayed in the Web view or in My Computer. -- If you disable or do not configure this policy setting, the Shared Documents folder is displayed in Web view and also in My Computer when the client is part of a workgroup. +- If you disable or don't configure this policy setting, the Shared Documents folder is displayed in Web view and also in My Computer when the client is part of a workgroup. > [!NOTE] > The ability to remove the Shared Documents folder via Group Policy is only available on Windows XP Professional. @@ -3169,13 +3123,12 @@ When a Windows client is in a workgroup, a Shared Documents icon appears in the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3202,7 +3155,7 @@ When a Windows client is in a workgroup, a Shared Documents icon appears in the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3217,15 +3170,13 @@ Prevents users from using File Explorer or Network Locations to map or disconnec If you enable this setting, the system removes the Map Network Drive and Disconnect Network Drive commands from the toolbar and Tools menus in File Explorer and Network Locations and from menus that appear when you right-click the File Explorer or Network Locations icons. -This setting does not prevent users from connecting to another computer by typing the name of a shared folder in the Run dialog box. +This setting doesn't prevent users from connecting to another computer by typing the name of a shared folder in the Run dialog box. > [!NOTE] -> - -This setting was documented incorrectly on the Explain tab in Group Policy for Windows 2000. The Explain tab states incorrectly that this setting prevents users from connecting and disconnecting drives. +> This setting was documented incorrectly on the Explain tab in Group Policy for Windows 2000. The Explain tab states incorrectly that this setting prevents users from connecting and disconnecting drives. > [!NOTE] -> It is a requirement for third-party applications with Windows 2000 or later certification to adhere to this setting. +> It's a requirement for third-party applications with Windows 2000 or later certification to adhere to this setting. @@ -3237,13 +3188,12 @@ This setting was documented incorrectly on the Explain tab in Group Policy for W | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3270,7 +3220,7 @@ This setting was documented incorrectly on the Explain tab in Group Policy for W | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3283,7 +3233,7 @@ This setting was documented incorrectly on the Explain tab in Group Policy for W This policy removes the end-user notification for new application associations. These associations are based on file types (e.g. *.txt) or protocols (e.g. http:) -If this group policy is enabled, no notifications will be shown. If the group policy is not configured or disabled, notifications will be shown to the end user if a new application has been installed that can handle the file type or protocol association that was invoked. +If this group policy is enabled, no notifications will be shown. If the group policy isn't configured or disabled, notifications will be shown to the end user if a new application has been installed that can handle the file type or protocol association that was invoked. @@ -3295,13 +3245,12 @@ If this group policy is enabled, no notifications will be shown. If the group po | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3328,7 +3277,7 @@ If this group policy is enabled, no notifications will be shown. If the group po | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3346,7 +3295,7 @@ This setting, and others in this folder, lets you remove new features added in W To see an example of the standard Open dialog box, start Wordpad and, on the File menu, click Open. > [!NOTE] -> In Windows Vista, this policy setting applies only to applications that are using the Windows XP common dialog box style. This policy setting does not apply to the new Windows Vista common dialog box style. It is a requirement for third-party applications with Windows 2000 or later certification to adhere to this setting. +> In Windows Vista, this policy setting applies only to applications that are using the Windows XP common dialog box style. This policy setting doesn't apply to the new Windows Vista common dialog box style. It's a requirement for third-party applications with Windows 2000 or later certification to adhere to this setting. @@ -3358,13 +3307,12 @@ To see an example of the standard Open dialog box, start Wordpad and, on the Fil | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3391,7 +3339,7 @@ To see an example of the standard Open dialog box, start Wordpad and, on the Fil | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3404,9 +3352,9 @@ To see an example of the standard Open dialog box, start Wordpad and, on the Fil When a file or folder is deleted in File Explorer, a copy of the file or folder is placed in the Recycle Bin. Using this setting, you can change this behavior. -- If you enable this setting, files and folders that are deleted using File Explorer will not be placed in the Recycle Bin and will therefore be permanently deleted. +- If you enable this setting, files and folders that are deleted using File Explorer won't be placed in the Recycle Bin and will therefore be permanently deleted. -- If you disable or do not configure this setting, files and folders deleted using File Explorer will be placed in the Recycle Bin. +- If you disable or don't configure this setting, files and folders deleted using File Explorer will be placed in the Recycle Bin. @@ -3418,13 +3366,12 @@ When a file or folder is deleted in File Explorer, a copy of the file or folder | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3451,7 +3398,7 @@ When a file or folder is deleted in File Explorer, a copy of the file or folder | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3464,15 +3411,15 @@ When a file or folder is deleted in File Explorer, a copy of the file or folder Prevents users from submitting alternate logon credentials to install a program. -This setting suppresses the "Install Program As Other User" dialog box for local and network installations. This dialog box, which prompts the current user for the user name and password of an administrator, appears when users who are not administrators try to install programs locally on their computers. This setting allows administrators who have logged on as regular users to install programs without logging off and logging on again using their administrator credentials. +This setting suppresses the "Install Program As Other User" dialog box for local and network installations. This dialog box, which prompts the current user for the user name and password of an administrator, appears when users who aren't administrators try to install programs locally on their computers. This setting allows administrators who have logged-on as regular users to install programs without logging off and logging on again using their administrator credentials. Many programs can be installed only by an administrator. -- If you enable this setting and a user does not have sufficient permissions to install a program, the installation continues with the current user's logon credentials. As a result, the installation might fail, or it might complete but not include all features. Or, it might appear to complete successfully, but the installed program might not operate correctly. +- If you enable this setting and a user doesn't have sufficient permissions to install a program, the installation continues with the current user's logon credentials. As a result, the installation might fail, or it might complete but not include all features. Or, it might appear to complete successfully, but the installed program might not operate correctly. -- If you disable this setting or do not configure it, the "Install Program As Other User" dialog box appears whenever users install programs locally on the computer. +- If you disable this setting or don't configure it, the "Install Program As Other User" dialog box appears whenever users install programs locally on the computer. -By default, users are not prompted for alternate logon credentials when installing programs from a network share. If enabled, this setting overrides the "Request credentials for network installations" setting. +By default, users aren't prompted for alternate logon credentials when installing programs from a network share. If enabled, this setting overrides the "Request credentials for network installations" setting. @@ -3484,13 +3431,12 @@ By default, users are not prompted for alternate logon credentials when installi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3517,7 +3463,7 @@ By default, users are not prompted for alternate logon credentials when installi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3529,11 +3475,11 @@ By default, users are not prompted for alternate logon credentials when installi -- If you enable this policy, the "Internet" "Search again" link will not be shown when the user performs a search in the Explorer window. +- If you enable this policy, the "Internet" "Search again" link won't be shown when the user performs a search in the Explorer window. - If you disable this policy, there will be an "Internet" "Search again" link when the user performs a search in the Explorer window. This button launches a search in the default browser with the search terms. -- If you do not configure this policy (default), there will be an "Internet" link when the user performs a search in the Explorer window. +- If you don't configure this policy (default), there will be an "Internet" link when the user performs a search in the Explorer window. @@ -3545,13 +3491,12 @@ By default, users are not prompted for alternate logon credentials when installi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3578,7 +3523,7 @@ By default, users are not prompted for alternate logon credentials when installi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3591,9 +3536,9 @@ By default, users are not prompted for alternate logon credentials when installi Removes the Security tab from File Explorer. -- If you enable this setting, users opening the Properties dialog box for all file system objects, including folders, files, shortcuts, and drives, will not be able to access the Security tab. As a result, users will be able to neither change the security settings nor view a list of all users that have access to the resource in question. +- If you enable this setting, users opening the Properties dialog box for all file system objects, including folders, files, shortcuts, and drives, won't be able to access the Security tab. As a result, users will be able to neither change the security settings nor view a list of all users that have access to the resource in question. -- If you disable or do not configure this setting, users will be able to access the security tab. +- If you disable or don't configure this setting, users will be able to access the security tab. @@ -3605,13 +3550,12 @@ Removes the Security tab from File Explorer. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3638,7 +3582,7 @@ Removes the Security tab from File Explorer. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3653,11 +3597,11 @@ This policy setting allows you to remove the Search button from the File Explore - If you enable this policy setting, the Search button is removed from the Standard Buttons toolbar that appears in File Explorer and other programs that use the File Explorer window, such as My Computer and Network Locations. -Enabling this policy setting does not remove the Search button or affect any search features of Internet browser windows, such as the Internet Explorer window. +Enabling this policy setting doesn't remove the Search button or affect any search features of Internet browser windows, such as the Internet Explorer window. -- If you disable or do not configure this policy setting, the Search button is available from the File Explorer toolbar. +- If you disable or don't configure this policy setting, the Search button is available from the File Explorer toolbar. -This policy setting does not affect the Search items on the File Explorer context menu or on the Start menu. To remove Search from the Start menu, use the "Remove Search menu from Start menu" policy setting (in User Configuration\Administrative Templates\Start Menu and Taskbar). To hide all context menus, use the "Remove File Explorer's default context menu" policy setting. +This policy setting doesn't affect the Search items on the File Explorer context menu or on the Start menu. To remove Search from the Start menu, use the "Remove Search menu from Start menu" policy setting (in User Configuration\Administrative Templates\Start Menu and Taskbar). To hide all context menus, use the "Remove File Explorer's default context menu" policy setting. @@ -3669,13 +3613,12 @@ This policy setting does not affect the Search items on the File Explorer contex | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3702,7 +3645,7 @@ This policy setting does not affect the Search items on the File Explorer contex | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3720,7 +3663,8 @@ This policy setting does not affect the Search items on the File Explorer contex This policy setting allows you to have file names sorted literally (as in Windows 2000 and earlier) rather than in numerical order. - If you enable this policy setting, File Explorer will sort file names by each digit in a file name (for example, 111 < 22 < 3). -- If you disable or do not configure this policy setting, File Explorer will sort file names by increasing number value (for example, 3 < 22 < 111). + +- If you disable or don't configure this policy setting, File Explorer will sort file names by increasing number value (for example, 3 < 22 < 111). @@ -3732,13 +3676,12 @@ This policy setting allows you to have file names sorted literally (as in Window | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3765,7 +3708,7 @@ This policy setting allows you to have file names sorted literally (as in Window | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3778,7 +3721,7 @@ This policy setting allows you to have file names sorted literally (as in Window Removes shortcut menus from the desktop and File Explorer. Shortcut menus appear when you right-click an item. -If you enable this setting, menus do not appear when you right-click the desktop or when you right-click the items in File Explorer. This setting does not prevent users from using other methods to issue commands available on the shortcut menus. +If you enable this setting, menus don't appear when you right-click the desktop or when you right-click the items in File Explorer. This setting doesn't prevent users from using other methods to issue commands available on the shortcut menus. @@ -3790,13 +3733,12 @@ If you enable this setting, menus do not appear when you right-click the desktop | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3823,7 +3765,7 @@ If you enable this setting, menus do not appear when you right-click the desktop | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3836,14 +3778,14 @@ If you enable this setting, menus do not appear when you right-click the desktop Prevents users from using My Computer to gain access to the content of selected drives. -If you enable this setting, users can browse the directory structure of the selected drives in My Computer or File Explorer, but they cannot open folders and access the contents. Also, they cannot use the Run dialog box or the Map Network Drive dialog box to view the directories on these drives. +If you enable this setting, users can browse the directory structure of the selected drives in My Computer or File Explorer, but they can't open folders and access the contents. Also, they can't use the Run dialog box or the Map Network Drive dialog box to view the directories on these drives. To use this setting, select a drive or combination of drives from the drop-down list. To allow access to all drive directories, disable this setting or select the "Do not restrict drives" option from the drop-down list. > [!NOTE] > The icons representing the specified drives still appear in My Computer, but if users double-click the icons, a message appears explaining that a setting prevents the action. -Also, this setting does not prevent users from using programs to access local and network drives. And, it does not prevent them from using the Disk Management snap-in to view and change drive characteristics. +Also, this setting doesn't prevent users from using programs to access local and network drives. And, it doesn't prevent them from using the Disk Management snap-in to view and change drive characteristics. Also, see the "Hide these specified drives in My Computer" setting. @@ -3857,13 +3799,12 @@ Also, see the "Hide these specified drives in My Computer" setting. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3889,7 +3830,7 @@ Also, see the "Hide these specified drives in My Computer" setting. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3906,7 +3847,7 @@ Keyboards with a Windows key provide users with shortcuts to common shell featur - If you enable this setting, the Windows Key hotkeys are unavailable. -- If you disable or do not configure this setting, the Windows Key hotkeys are available. +- If you disable or don't configure this setting, the Windows Key hotkeys are available. @@ -3918,13 +3859,12 @@ Keyboards with a Windows key provide users with shortcuts to common shell featur | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3951,7 +3891,7 @@ Keyboards with a Windows key provide users with shortcuts to common shell featur | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3966,9 +3906,9 @@ This policy setting allows you to remove computers in the user's workgroup and d - If you enable this policy setting, the system removes the "Computers Near Me" option and the icons representing nearby computers from Network Locations. This policy setting also removes these icons from the Map Network Drive browser. -- If you disable or do not configure this policy setting, computers in the user's workgroup and domain appear in lists of network resources in File Explorer and Network Locations. +- If you disable or don't configure this policy setting, computers in the user's workgroup and domain appear in lists of network resources in File Explorer and Network Locations. -This policy setting does not prevent users from connecting to computers in their workgroup or domain by other commonly used methods, such as typing the share name in the Run dialog box or the Map Network Drive dialog box. +This policy setting doesn't prevent users from connecting to computers in their workgroup or domain by other commonly used methods, such as typing the share name in the Run dialog box or the Map Network Drive dialog box. To remove network computers from lists of network resources, use the "No Entire Network in Network Locations" policy setting. @@ -3982,13 +3922,12 @@ To remove network computers from lists of network resources, use the "No Entire | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4015,7 +3954,7 @@ To remove network computers from lists of network resources, use the "No Entire | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4026,17 +3965,17 @@ To remove network computers from lists of network resources, use the "No Entire -Configures the list of items displayed in the Places Bar in the Windows File/Open dialog. If enable this setting you can specify from 1 to 5 items to be displayed in the Places Bar. +Configures the list of items displayed in the Places Bar in the Windows File/Open dialog. If this setting is enabled, you can specify from 1 to 5 items to be displayed in the Places Bar. The valid items you may display in the Places Bar are: -1) Shortcuts to a local folders -- (ex. C:\Windows) +1) Shortcuts to a local folder -- (ex. C:\Windows) 2) Shortcuts to remote folders -- (\\server\share) -3) FTP folders +3) FTP folders. -4) web folders +4) web folders. 5) Common Shell folders. @@ -4044,10 +3983,10 @@ The list of Common Shell Folders that may be specified: Desktop, Recent Places, Documents, Pictures, Music, Recently Changed, Attachments and Saved Searches. -If you disable or do not configure this setting the default list of items will be displayed in the Places Bar. +If you disable or don't configure this setting the default list of items will be displayed in the Places Bar. > [!NOTE] -> In Windows Vista, this policy setting applies only to applications that are using the Windows XP common dialog box style. This policy setting does not apply to the new Windows Vista common dialog box style. +> In Windows Vista, this policy setting applies only to applications that are using the Windows XP common dialog box style. This policy setting doesn't apply to the new Windows Vista common dialog box style. @@ -4059,13 +3998,12 @@ If you disable or do not configure this setting the default list of items will b | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4091,7 +4029,7 @@ If you disable or do not configure this setting the default list of items will b | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4106,14 +4044,14 @@ Prompts users for alternate logon credentials during network-based installations This setting displays the "Install Program As Other User" dialog box even when a program is being installed from files on a network computer across a local area network connection. -If you disable this setting or do not configure it, this dialog box appears only when users are installing programs from local media. +If you disable this setting or don't configure it, this dialog box appears only when users are installing programs from local media. -The "Install Program as Other User" dialog box prompts the current user for the user name and password of an administrator. This setting allows administrators who have logged on as regular users to install programs without logging off and logging on again using their administrator credentials. +The "Install Program as Other User" dialog box prompts the current user for the user name and password of an administrator. This setting allows administrators who have logged-on as regular users to install programs without logging off and logging on again using their administrator credentials. -If the dialog box does not appear, the installation proceeds with the current user's permissions. If these permissions are not sufficient, the installation might fail, or it might complete but not include all features. Or, it might appear to complete successfully, but the installed program might not operate correctly. +If the dialog box doesn't appear, the installation proceeds with the current user's permissions. If these permissions aren't sufficient, the installation might fail, or it might complete but not include all features. Or, it might appear to complete successfully, but the installed program might not operate correctly. > [!NOTE] -> If it is enabled, the "Do not request alternate credentials" setting takes precedence over this setting. When that setting is enabled, users are not prompted for alternate logon credentials on any installation. +> If it's enabled, the "Do not request alternate credentials" setting takes precedence over this setting. When that setting is enabled, users aren't prompted for alternate logon credentials on any installation. @@ -4125,13 +4063,12 @@ If the dialog box does not appear, the installation proceeds with the current us | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4158,7 +4095,7 @@ If the dialog box does not appear, the installation proceeds with the current us | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4173,7 +4110,7 @@ Limits the percentage of a volume's disk space that can be used to store deleted - If you enable this setting, the user has a maximum amount of disk space that may be used for the Recycle Bin on their workstation. -- If you disable or do not configure this setting, users can change the total amount of disk space used by the Recycle Bin. +- If you disable or don't configure this setting, users can change the total amount of disk space used by the Recycle Bin. > [!NOTE] > This setting is applied to all volumes. @@ -4188,13 +4125,12 @@ Limits the percentage of a volume's disk space that can be used to store deleted | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4220,7 +4156,7 @@ Limits the percentage of a volume's disk space that can be used to store deleted | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4231,13 +4167,13 @@ Limits the percentage of a volume's disk space that can be used to store deleted -This policy setting allows you to configure the amount of functionality that the shell protocol can have. When using the full functionality of this protocol, applications can open folders and launch files. The protected mode reduces the functionality of this protocol allowing applications to only open a limited set of folders. Applications are not able to open files with this protocol when it is in the protected mode. It is recommended to leave this protocol in the protected mode to increase the security of Windows. +This policy setting allows you to configure the amount of functionality that the shell protocol can have. When using the full functionality of this protocol, applications can open folders and launch files. The protected mode reduces the functionality of this protocol allowing applications to only open a limited set of folders. Applications aren't able to open files with this protocol when it's in the protected mode. It's recommended to leave this protocol in the protected mode to increase the security of Windows. - If you enable this policy setting the protocol is fully enabled, allowing the opening of folders and files. - If you disable this policy setting the protocol is in the protected mode, allowing applications to only open a limited set of folders. -- If you do not configure this policy setting the protocol is in the protected mode, allowing applications to only open a limited set of folders. +- If you don't configure this policy setting the protocol is in the protected mode, allowing applications to only open a limited set of folders. @@ -4249,13 +4185,12 @@ This policy setting allows you to configure the amount of functionality that the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4282,7 +4217,7 @@ This policy setting allows you to configure the amount of functionality that the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4293,13 +4228,13 @@ This policy setting allows you to configure the amount of functionality that the -This policy setting allows you to configure the amount of functionality that the shell protocol can have. When using the full functionality of this protocol, applications can open folders and launch files. The protected mode reduces the functionality of this protocol allowing applications to only open a limited set of folders. Applications are not able to open files with this protocol when it is in the protected mode. It is recommended to leave this protocol in the protected mode to increase the security of Windows. +This policy setting allows you to configure the amount of functionality that the shell protocol can have. When using the full functionality of this protocol, applications can open folders and launch files. The protected mode reduces the functionality of this protocol allowing applications to only open a limited set of folders. Applications aren't able to open files with this protocol when it's in the protected mode. It's recommended to leave this protocol in the protected mode to increase the security of Windows. - If you enable this policy setting the protocol is fully enabled, allowing the opening of folders and files. - If you disable this policy setting the protocol is in the protected mode, allowing applications to only open a limited set of folders. -- If you do not configure this policy setting the protocol is in the protected mode, allowing applications to only open a limited set of folders. +- If you don't configure this policy setting the protocol is in the protected mode, allowing applications to only open a limited set of folders. @@ -4311,13 +4246,12 @@ This policy setting allows you to configure the amount of functionality that the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4344,7 +4278,7 @@ This policy setting allows you to configure the amount of functionality that the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4357,11 +4291,11 @@ This policy setting allows you to configure the amount of functionality that the Shows or hides hibernate from the power options menu. -- If you enable this policy setting, the hibernate option will be shown in the Power Options menu (as long as it is supported by the machine's hardware). +- If you enable this policy setting, the hibernate option will be shown in the Power Options menu (as long as it's supported by the machine's hardware). - If you disable this policy setting, the hibernate option will never be shown in the Power Options menu. -- If you do not configure this policy setting, users will be able to choose whether they want hibernate to show through the Power Options Control Panel. +- If you don't configure this policy setting, users will be able to choose whether they want hibernate to show through the Power Options Control Panel. @@ -4373,13 +4307,12 @@ Shows or hides hibernate from the power options menu. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4406,7 +4339,7 @@ Shows or hides hibernate from the power options menu. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4419,11 +4352,11 @@ Shows or hides hibernate from the power options menu. Shows or hides sleep from the power options menu. -- If you enable this policy setting, the sleep option will be shown in the Power Options menu (as long as it is supported by the machine's hardware). +- If you enable this policy setting, the sleep option will be shown in the Power Options menu (as long as it's supported by the machine's hardware). - If you disable this policy setting, the sleep option will never be shown in the Power Options menu. -- If you do not configure this policy setting, users will be able to choose whether they want sleep to show through the Power Options Control Panel. +- If you don't configure this policy setting, users will be able to choose whether they want sleep to show through the Power Options Control Panel. @@ -4435,13 +4368,12 @@ Shows or hides sleep from the power options menu. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4468,7 +4400,7 @@ Shows or hides sleep from the power options menu. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4483,11 +4415,11 @@ This policy setting allows up to five Libraries or Search Connectors to be pinne You can add up to five additional links to the "Search again" links at the bottom of results returned in File Explorer after a search is executed. These links will be shared between Internet search sites and Search Connectors/Libraries. Search Connector/Library links take precedence over Internet search links. -The first several links will also be pinned to the Start menu. A total of four links can be included on the Start menu. The "See more results" link will be pinned first by default, unless it is disabled via Group Policy. The "Search the Internet" link is pinned second, if it is pinned via Group Policy (though this link is disabled by default). If a custom Internet search link is pinned using the "Custom Internet search provider" Group Policy, this link will be pinned third on the Start menu. The remaining link(s) will be shared between pinned Search Connectors/Libraries and pinned Internet/intranet search links. Search Connector/Library links take precedence over Internet/intranet search links. +The first several links will also be pinned to the Start menu. A total of four links can be included on the Start menu. The "See more results" link will be pinned first by default, unless it's disabled via Group Policy. The "Search the Internet" link is pinned second, if it's pinned via Group Policy (though this link is disabled by default). If a custom Internet search link is pinned using the "Custom Internet search provider" Group Policy, this link will be pinned third on the Start menu. The remaining link(s) will be shared between pinned Search Connectors/Libraries and pinned Internet/intranet search links. Search Connector/Library links take precedence over Internet/intranet search links. - If you enable this policy setting, the specified Libraries or Search Connectors will appear in the "Search again" links and the Start menu links. -- If you disable or do not configure this policy setting, no Libraries or Search Connectors will appear in the "Search again" links or the Start menu links. +- If you disable or don't configure this policy setting, no Libraries or Search Connectors will appear in the "Search again" links or the Start menu links. @@ -4499,13 +4431,12 @@ The first several links will also be pinned to the Start menu. A total of four l | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4532,7 +4463,7 @@ The first several links will also be pinned to the Start menu. A total of four l | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4547,11 +4478,11 @@ This policy setting allows you to add Internet or intranet sites to the "Search You can add up to five additional links to the "Search again" links at the bottom of results returned in File Explorer after a search is executed. These links will be shared between Internet search sites and Search Connectors/Libraries. Search Connector/Library links take precedence over Internet search links. -The first several links will also be pinned to the Start menu. A total of four links can be pinned on the Start menu. The "See more results" link will be pinned first by default, unless it is disabled via Group Policy. The "Search the Internet" link is pinned second, if it is pinned via Group Policy (though this link is disabled by default). If a custom Internet search link is pinned using the "Custom Internet search provider" Group Policy, this link will be pinned third on the Start menu. The remaining link(s) will be shared between pinned Internet/intranet links and pinned Search Connectors/Libraries. Search Connector/Library links take precedence over Internet/intranet search links. +The first several links will also be pinned to the Start menu. A total of four links can be pinned on the Start menu. The "See more results" link will be pinned first by default, unless it's disabled via Group Policy. The "Search the Internet" link is pinned second, if it's pinned via Group Policy (though this link is disabled by default). If a custom Internet search link is pinned using the "Custom Internet search provider" Group Policy, this link will be pinned third on the Start menu. The remaining link(s) will be shared between pinned Internet/intranet links and pinned Search Connectors/Libraries. Search Connector/Library links take precedence over Internet/intranet search links. - If you enable this policy setting, the specified Internet sites will appear in the "Search again" links and the Start menu links. -- If you disable or do not configure this policy setting, no custom Internet search sites will be added to the "Search again" links or the Start menu links. +- If you disable or don't configure this policy setting, no custom Internet search sites will be added to the "Search again" links or the Start menu links. @@ -4563,13 +4494,12 @@ The first several links will also be pinned to the Start menu. A total of four l | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-windowsmediadrm.md b/windows/client-management/mdm/policy-csp-admx-windowsmediadrm.md index 66dc23c872..0c6b7d6c45 100644 --- a/windows/client-management/mdm/policy-csp-admx-windowsmediadrm.md +++ b/windows/client-management/mdm/policy-csp-admx-windowsmediadrm.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_WindowsMediaDRM Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_WindowsMediaDRM -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -46,7 +43,7 @@ Prevents Windows Media Digital Rights Management (DRM) from accessing the Intern When enabled, Windows Media DRM is prevented from accessing the Internet (or intranet) for license acquisition and security upgrades. -When this policy is enabled, programs are not able to acquire licenses for secure content, upgrade Windows Media DRM security components, or restore backed up content licenses. Secure content that is already licensed to the local computer will continue to play. Users are also able to protect music that they copy from a CD and play this protected content on their computer, since the license is generated locally in this scenario. +When this policy is enabled, programs aren't able to acquire licenses for secure content, upgrade Windows Media DRM security components, or restore backed up content licenses. Secure content that's already licensed to the local computer will continue to play. Users are also able to protect music that they copy from a CD and play this protected content on their computer, since the license is generated locally in this scenario. When this policy is either disabled or not configured, Windows Media DRM functions normally and will connect to the Internet (or intranet) to acquire licenses, download security upgrades, and perform license restoration. @@ -60,13 +57,12 @@ When this policy is either disabled or not configured, Windows Media DRM functio | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-windowsmediaplayer.md b/windows/client-management/mdm/policy-csp-admx-windowsmediaplayer.md index 7644cbac0e..87267407d6 100644 --- a/windows/client-management/mdm/policy-csp-admx-windowsmediaplayer.md +++ b/windows/client-management/mdm/policy-csp-admx-windowsmediaplayer.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_WindowsMediaPlayer Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_WindowsMediaPlayer -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -47,18 +44,20 @@ This policy setting allows you to specify the HTTP proxy settings for Windows Me - If you enable this policy setting, select one of the following proxy types: - Autodetect: the proxy settings are automatically detected. + - Custom: unique proxy settings are used. + - Use browser proxy settings: browser's proxy settings are used. If the Custom proxy type is selected, the rest of the options on the Setting tab must be specified because no default settings are used for the proxy. The options are ignored if Autodetect or Browser is selected. -The Configure button on the Network tab in the Player is not available for the HTTP protocol and the proxy cannot be configured. If the "Hide network tab" policy setting is also enabled, the entire Network tab is hidden. +The Configure button on the Network tab in the Player isn't available for the HTTP protocol and the proxy can't be configured. If the "Hide network tab" policy setting is also enabled, the entire Network tab is hidden. -This policy is ignored if the "Streaming media protocols" policy setting is enabled and HTTP is not selected. +This policy is ignored if the "Streaming media protocols" policy setting is enabled and HTTP isn't selected. -- If you disable this policy setting, the HTTP proxy server cannot be used and the user cannot configure the HTTP proxy. +- If you disable this policy setting, the HTTP proxy server can't be used and the user can't configure the HTTP proxy. -- If you do not configure this policy setting, users can configure the HTTP proxy settings. +- If you don't configure this policy setting, users can configure the HTTP proxy settings. @@ -70,13 +69,12 @@ This policy is ignored if the "Streaming media protocols" policy setting is enab | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -103,7 +101,7 @@ This policy is ignored if the "Streaming media protocols" policy setting is enab | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -119,17 +117,18 @@ This policy setting allows you to specify the MMS proxy settings for Windows Med - If you enable this policy setting, select one of the following proxy types: - Autodetect: the proxy settings are automatically detected. + - Custom: unique proxy settings are used. If the Custom proxy type is selected, the rest of the options on the Setting tab must be specified; otherwise, the default settings are used. The options are ignored if Autodetect is selected. -The Configure button on the Network tab in the Player is not available and the protocol cannot be configured. If the "Hide network tab" policy setting is also enabled, the entire Network tab is hidden. +The Configure button on the Network tab in the Player isn't available and the protocol can't be configured. If the "Hide network tab" policy setting is also enabled, the entire Network tab is hidden. -This policy setting is ignored if the "Streaming media protocols" policy setting is enabled and Multicast is not selected. +This policy setting is ignored if the "Streaming media protocols" policy setting is enabled and Multicast isn't selected. -- If you disable this policy setting, the MMS proxy server cannot be used and users cannot configure the MMS proxy settings. +- If you disable this policy setting, the MMS proxy server can't be used and users can't configure the MMS proxy settings. -- If you do not configure this policy setting, users can configure the MMS proxy settings. +- If you don't configure this policy setting, users can configure the MMS proxy settings. @@ -141,13 +140,12 @@ This policy setting is ignored if the "Streaming media protocols" policy setting | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -174,7 +172,7 @@ This policy setting is ignored if the "Streaming media protocols" policy setting | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -190,15 +188,16 @@ This policy setting allows you to specify the RTSP proxy settings for Windows Me - If you enable this policy setting, select one of the following proxy types: - Autodetect: the proxy settings are automatically detected. + - Custom: unique proxy settings are used. If the Custom proxy type is selected, the rest of the options on the Setting tab must be specified; otherwise, the default settings are used. The options are ignored if Autodetect is selected. -The Configure button on the Network tab in the Player is not available and the protocol cannot be configured. If the "Hide network tab" policy setting is also enabled, the entire Network tab is hidden. +The Configure button on the Network tab in the Player isn't available and the protocol can't be configured. If the "Hide network tab" policy setting is also enabled, the entire Network tab is hidden. -- If you disable this policy setting, the RTSP proxy server cannot be used and users cannot change the RTSP proxy settings. +- If you disable this policy setting, the RTSP proxy server can't be used and users can't change the RTSP proxy settings. -- If you do not configure this policy setting, users can configure the RTSP proxy settings. +- If you don't configure this policy setting, users can configure the RTSP proxy settings. @@ -210,13 +209,12 @@ The Configure button on the Network tab in the Player is not available and the p | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -243,7 +241,7 @@ The Configure button on the Network tab in the Player is not available and the p | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -254,13 +252,13 @@ The Configure button on the Network tab in the Player is not available and the p -This policy setting allows you to turn off do not show first use dialog boxes. +This policy setting allows you to turn off don't show first use dialog boxes. - If you enable this policy setting, the Privacy Options and Installation Options dialog boxes are prevented from being displayed the first time a user starts Windows Media Player. This policy setting prevents the dialog boxes which allow users to select privacy, file types, and other desktop options from being displayed when the Player is first started. Some of the options can be configured by using other Windows Media Player group policies. -- If you disable or do not configure this policy setting, the dialog boxes are displayed when the user starts the Player for the first time. +- If you disable or don't configure this policy setting, the dialog boxes are displayed when the user starts the Player for the first time. @@ -272,13 +270,12 @@ This policy setting prevents the dialog boxes which allow users to select privac | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -305,7 +302,7 @@ This policy setting prevents the dialog boxes which allow users to select privac | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -320,7 +317,7 @@ This policy setting allows you to hide the Network tab. - If you enable this policy setting, the Network tab in Windows Media Player is hidden. The default network settings are used unless the user has previously defined network settings for the Player. -- If you disable or do not configure this policy setting, the Network tab appears and users can use it to configure network settings. +- If you disable or don't configure this policy setting, the Network tab appears and users can use it to configure network settings. @@ -332,13 +329,12 @@ This policy setting allows you to hide the Network tab. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -365,7 +361,7 @@ This policy setting allows you to hide the Network tab. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -378,11 +374,11 @@ This policy setting allows you to hide the Network tab. This policy setting allows you to prevent the anchor window from being displayed when Windows Media Player is in skin mode. -- If you enable this policy setting, the anchor window is hidden when the Player is in skin mode. In addition, the option on the Player tab in the Player that enables users to choose whether the anchor window displays is not available. +- If you enable this policy setting, the anchor window is hidden when the Player is in skin mode. In addition, the option on the Player tab in the Player that enables users to choose whether the anchor window displays isn't available. -- If you disable or do not configure this policy setting, users can show or hide the anchor window when the Player is in skin mode by using the Player tab in the Player. +- If you disable or don't configure this policy setting, users can show or hide the anchor window when the Player is in skin mode by using the Player tab in the Player. -- If you do not configure this policy setting, and the "Set and lock skin" policy setting is enabled, some options in the anchor window are not available. +- If you don't configure this policy setting, and the "Set and lock skin" policy setting is enabled, some options in the anchor window aren't available. @@ -394,13 +390,12 @@ This policy setting allows you to prevent the anchor window from being displayed | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -427,7 +422,7 @@ This policy setting allows you to prevent the anchor window from being displayed | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -440,11 +435,11 @@ This policy setting allows you to prevent the anchor window from being displayed Prevents the anchor window from being displayed when Windows Media Player is in skin mode. -This policy hides the anchor window when the Player is in skin mode. In addition, the option on the Player tab in the Player that enables users to choose whether the anchor window displays is not available. +This policy hides the anchor window when the Player is in skin mode. In addition, the option on the Player tab in the Player that enables users to choose whether the anchor window displays isn't available. -When this policy is not configured or disabled, users can show or hide the anchor window when the Player is in skin mode by using the Player tab in the Player. +When this policy isn't configured or disabled, users can show or hide the anchor window when the Player is in skin mode by using the Player tab in the Player. -When this policy is not configured and the Set and Lock Skin policy is enabled, some options in the anchor window are not available. +When this policy isn't configured and the Set and Lock Skin policy is enabled, some options in the anchor window aren't available. @@ -456,13 +451,12 @@ When this policy is not configured and the Set and Lock Skin policy is enabled, | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -489,7 +483,7 @@ When this policy is not configured and the Set and Lock Skin policy is enabled, | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -502,11 +496,11 @@ When this policy is not configured and the Set and Lock Skin policy is enabled, This policy setting allows you to prevent video smoothing from occurring. -- If you enable this policy setting, video smoothing is prevented, which can improve video playback on computers with limited resources. In addition, the Use Video Smoothing check box in the Video Acceleration Settings dialog box in the Player is cleared and is not available. +- If you enable this policy setting, video smoothing is prevented, which can improve video playback on computers with limited resources. In addition, the Use Video Smoothing check box in the Video Acceleration Settings dialog box in the Player is cleared and isn't available. -- If you disable this policy setting, video smoothing occurs if necessary, and the Use Video Smoothing check box is selected and is not available. +- If you disable this policy setting, video smoothing occurs if necessary, and the Use Video Smoothing check box is selected and isn't available. -- If you do not configure this policy setting, video smoothing occurs if necessary. Users can change the setting for the Use Video Smoothing check box. +- If you don't configure this policy setting, video smoothing occurs if necessary. Users can change the setting for the Use Video Smoothing check box. Video smoothing is available only on the Windows XP Home Edition and Windows XP Professional operating systems. @@ -520,13 +514,12 @@ Video smoothing is available only on the Windows XP Home Edition and Windows XP | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -553,7 +546,7 @@ Video smoothing is available only on the Windows XP Home Edition and Windows XP | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -566,11 +559,11 @@ Video smoothing is available only on the Windows XP Home Edition and Windows XP This policy setting allows a screen saver to interrupt playback. -- If you enable this policy setting, a screen saver is displayed during playback of digital media according to the options selected on the Screen Saver tab in the Display Properties dialog box in Control Panel. The Allow screen saver during playback check box on the Player tab in the Player is selected and is not available. +- If you enable this policy setting, a screen saver is displayed during playback of digital media according to the options selected on the Screen Saver tab in the Display Properties dialog box in Control Panel. The Allow screen saver during playback check box on the Player tab in the Player is selected and isn't available. -- If you disable this policy setting, a screen saver does not interrupt playback even if users have selected a screen saver. The Allow screen saver during playback check box is cleared and is not available. +- If you disable this policy setting, a screen saver doesn't interrupt playback even if users have selected a screen saver. The Allow screen saver during playback check box is cleared and isn't available. -- If you do not configure this policy setting, users can change the setting for the Allow screen saver during playback check box. +- If you don't configure this policy setting, users can change the setting for the Allow screen saver during playback check box. @@ -582,13 +575,12 @@ This policy setting allows a screen saver to interrupt playback. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -615,7 +607,7 @@ This policy setting allows a screen saver to interrupt playback. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -632,7 +624,7 @@ This policy setting allows you to hide the Privacy tab in Windows Media Player. The default privacy settings are used for the options on the Privacy tab unless the user changed the settings previously. -- If you disable or do not configure this policy setting, the Privacy tab is not hidden, and users can configure any privacy settings not configured by other polices. +- If you disable or don't configure this policy setting, the Privacy tab isn't hidden, and users can configure any privacy settings not configured by other polices. @@ -644,13 +636,12 @@ The default privacy settings are used for the options on the Privacy tab unless | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -677,7 +668,7 @@ The default privacy settings are used for the options on the Privacy tab unless | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -692,7 +683,7 @@ This policy setting allows you to hide the Security tab in Windows Media Player. - If you enable this policy setting, the default security settings for the options on the Security tab are used unless the user changed the settings previously. Users can still change security and zone settings by using Internet Explorer unless these settings have been hidden or disabled by Internet Explorer policies. -- If you disable or do not configure this policy setting, users can configure the security settings on the Security tab. +- If you disable or don't configure this policy setting, users can configure the security settings on the Security tab. @@ -704,13 +695,12 @@ This policy setting allows you to hide the Security tab in Windows Media Player. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -737,7 +727,7 @@ This policy setting allows you to hide the Security tab in Windows Media Player. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -750,14 +740,15 @@ This policy setting allows you to hide the Security tab in Windows Media Player. This policy setting allows you to specify whether network buffering uses the default or a specified number of seconds. -- If you enable this policy setting, select one of the following options to specify the number of seconds streaming media is buffered before it is played. +- If you enable this policy setting, select one of the following options to specify the number of seconds streaming media is buffered before it's played. - Custom: the number of seconds, up to 60, that streaming media is buffered. -- Default: default network buffering is used and the number of seconds that is specified is ignored. -The "Use default buffering" and "Buffer" options on the Performance tab in the Player are not available. +- Default: default network buffering is used and the number of seconds that's specified is ignored. -- If you disable or do not configure this policy setting, users can change the buffering options on the Performance tab. +The "Use default buffering" and "Buffer" options on the Performance tab in the Player aren't available. + +- If you disable or don't configure this policy setting, users can change the buffering options on the Performance tab. @@ -769,13 +760,12 @@ The "Use default buffering" and "Buffer" options on the Performance tab in the P | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -802,7 +792,7 @@ The "Use default buffering" and "Buffer" options on the Performance tab in the P | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -815,11 +805,11 @@ The "Use default buffering" and "Buffer" options on the Performance tab in the P This policy setting allows you to prevent Windows Media Player from downloading codecs. -- If you enable this policy setting, the Player is prevented from automatically downloading codecs to your computer. In addition, the Download codecs automatically check box on the Player tab in the Player is not available. +- If you enable this policy setting, the Player is prevented from automatically downloading codecs to your computer. In addition, the Download codecs automatically check box on the Player tab in the Player isn't available. -- If you disable this policy setting, codecs are automatically downloaded and the Download codecs automatically check box is not available. +- If you disable this policy setting, codecs are automatically downloaded and the Download codecs automatically check box isn't available. -- If you do not configure this policy setting, users can change the setting for the Download codecs automatically check box. +- If you don't configure this policy setting, users can change the setting for the Download codecs automatically check box. @@ -831,13 +821,12 @@ This policy setting allows you to prevent Windows Media Player from downloading | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -864,7 +853,7 @@ This policy setting allows you to prevent Windows Media Player from downloading | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -877,9 +866,9 @@ This policy setting allows you to prevent Windows Media Player from downloading This policy setting allows you to prevent media information for CDs and DVDs from being retrieved from the Internet. -- If you enable this policy setting, the Player is prevented from automatically obtaining media information from the Internet for CDs and DVDs played by users. In addition, the Retrieve media information for CDs and DVDs from the Internet check box on the Privacy Options tab in the first use dialog box and on the Privacy tab in the Player are not selected and are not available. +- If you enable this policy setting, the Player is prevented from automatically obtaining media information from the Internet for CDs and DVDs played by users. In addition, the Retrieve media information for CDs and DVDs from the Internet check box on the Privacy Options tab in the first use dialog box and on the Privacy tab in the Player aren't selected and aren't available. -- If you disable or do not configure this policy setting, users can change the setting of the Retrieve media information for CDs and DVDs from the Internet check box. +- If you disable or don't configure this policy setting, users can change the setting of the Retrieve media information for CDs and DVDs from the Internet check box. @@ -891,13 +880,12 @@ This policy setting allows you to prevent media information for CDs and DVDs fro | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -924,7 +912,7 @@ This policy setting allows you to prevent media information for CDs and DVDs fro | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -939,7 +927,7 @@ This policy setting allows you to prevent media sharing from Windows Media Playe - If you enable this policy setting, any user on this computer is prevented from sharing digital media content from Windows Media Player with other computers and devices that are on the same network. Media sharing is disabled from Windows Media Player or from programs that depend on the Player's media sharing feature. -- If you disable or do not configure this policy setting, anyone using Windows Media Player can turn media sharing on or off. +- If you disable or don't configure this policy setting, anyone using Windows Media Player can turn media sharing on or off. @@ -951,13 +939,12 @@ This policy setting allows you to prevent media sharing from Windows Media Playe | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -984,7 +971,7 @@ This policy setting allows you to prevent media sharing from Windows Media Playe | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -997,9 +984,9 @@ This policy setting allows you to prevent media sharing from Windows Media Playe This policy setting allows you to prevent media information for music files from being retrieved from the Internet. -- If you enable this policy setting, the Player is prevented from automatically obtaining media information for music files such as Windows Media Audio (WMA) and MP3 files from the Internet. In addition, the Update my music files (WMA and MP3 files) by retrieving missing media information from the Internet check box in the first use dialog box and on the Privacy and Media Library tabs in the Player are not selected and are not available. +- If you enable this policy setting, the Player is prevented from automatically obtaining media information for music files such as Windows Media Audio (WMA) and MP3 files from the Internet. In addition, the Update my music files (WMA and MP3 files) by retrieving missing media information from the Internet check box in the first use dialog box and on the Privacy and Media Library tabs in the Player aren't selected and aren't available. -- If you disable or do not configure this policy setting, users can change the setting of the Update my music files (WMA and MP3 files) by retrieving missing media information from the Internet check box. +- If you disable or don't configure this policy setting, users can change the setting of the Update my music files (WMA and MP3 files) by retrieving missing media information from the Internet check box. @@ -1011,13 +998,12 @@ This policy setting allows you to prevent media information for music files from | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1044,7 +1030,7 @@ This policy setting allows you to prevent media information for music files from | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1057,9 +1043,9 @@ This policy setting allows you to prevent media information for music files from This policy setting allows you to prevent a shortcut for the Player from being added to the Quick Launch bar. -- If you enable this policy setting, the user cannot add the shortcut for the Player to the Quick Launch bar. +- If you enable this policy setting, the user can't add the shortcut for the Player to the Quick Launch bar. -- If you disable or do not configure this policy setting, the user can choose whether to add the shortcut for the Player to the Quick Launch bar. +- If you disable or don't configure this policy setting, the user can choose whether to add the shortcut for the Player to the Quick Launch bar. @@ -1071,13 +1057,12 @@ This policy setting allows you to prevent a shortcut for the Player from being a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1104,7 +1089,7 @@ This policy setting allows you to prevent a shortcut for the Player from being a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1117,9 +1102,9 @@ This policy setting allows you to prevent a shortcut for the Player from being a This policy setting allows you to prevent radio station presets from being retrieved from the Internet. -- If you enable this policy setting, the Player is prevented from automatically retrieving radio station presets from the Internet and displaying them in Media Library. In addition, presets that exist before the policy is configured are not be updated, and presets a user adds are not be displayed. +- If you enable this policy setting, the Player is prevented from automatically retrieving radio station presets from the Internet and displaying them in Media Library. In addition, presets that exist before the policy is configured aren't be updated, and presets a user adds aren't be displayed. -- If you disable or do not configure this policy setting, the Player automatically retrieves radio station presets from the Internet. +- If you disable or don't configure this policy setting, the Player automatically retrieves radio station presets from the Internet. @@ -1131,13 +1116,12 @@ This policy setting allows you to prevent radio station presets from being retri | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1164,7 +1148,7 @@ This policy setting allows you to prevent radio station presets from being retri | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1177,9 +1161,9 @@ This policy setting allows you to prevent radio station presets from being retri This policy setting allows you to prevent a shortcut icon for the Player from being added to the user's desktop. -- If you enable this policy setting, users cannot add the Player shortcut icon to their desktops. +- If you enable this policy setting, users can't add the Player shortcut icon to their desktops. -- If you disable or do not configure this policy setting, users can choose whether to add the Player shortcut icon to their desktops. +- If you disable or don't configure this policy setting, users can choose whether to add the Player shortcut icon to their desktops. @@ -1191,13 +1175,12 @@ This policy setting allows you to prevent a shortcut icon for the Player from be | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1224,7 +1207,7 @@ This policy setting allows you to prevent a shortcut icon for the Player from be | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1239,11 +1222,11 @@ This policy setting allows you to set and lock Windows Media Player in skin mode - If you enable this policy setting, the Player displays only in skin mode using the skin specified in the Skin box on the Setting tab. -You must use the complete file name for the skin (for example, skin_name.wmz), and the skin must be installed in the %programfiles%\Windows Media Player\Skins Folder on a user's computer. If the skin is not installed on a user's computer, or if the Skin box is blank, the Player opens by using the Corporate skin. The only way to specify the Corporate skin is to leave the Skin box blank. +You must use the complete file name for the skin (for example, skin_name.wmz), and the skin must be installed in the %programfiles%\Windows Media Player\Skins Folder on a user's computer. If the skin isn't installed on a user's computer, or if the Skin box is blank, the Player opens by using the Corporate skin. The only way to specify the Corporate skin is to leave the Skin box blank. -A user has access only to the Player features that are available with the specified skin. Users cannot switch the Player to full mode and cannot choose a different skin. +A user has access only to the Player features that are available with the specified skin. Users can't switch the Player to full mode and can't choose a different skin. -- If you disable or do not configure this policy setting, users can display the Player in full or skin mode and have access to all available features of the Player. +- If you disable or don't configure this policy setting, users can display the Player in full or skin mode and have access to all available features of the Player. @@ -1255,13 +1238,12 @@ A user has access only to the Player features that are available with the specif | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1288,7 +1270,7 @@ A user has access only to the Player features that are available with the specif | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1301,13 +1283,13 @@ A user has access only to the Player features that are available with the specif This policy setting allows you to specify that Windows Media Player can attempt to use selected protocols when receiving streaming media from a server running Windows Media Services. -- If you enable this policy setting, the protocols that are selected on the Network tab of the Player are used to receive a stream initiated through an MMS or RTSP URL from a Windows Media server. If the RSTP/UDP check box is selected, a user can specify UDP ports in the Use ports check box. If the user does not specify UDP ports, the Player uses default ports when using the UDP protocol. This policy setting also specifies that multicast streams can be received if the "Allow the Player to receive multicast streams" check box on the Network tab is selected. +- If you enable this policy setting, the protocols that are selected on the Network tab of the Player are used to receive a stream initiated through an MMS or RTSP URL from a Windows Media server. If the RSTP/UDP check box is selected, a user can specify UDP ports in the Use ports check box. If the user doesn't specify UDP ports, the Player uses default ports when using the UDP protocol. This policy setting also specifies that multicast streams can be received if the "Allow the Player to receive multicast streams" check box on the Network tab is selected. -- If you enable this policy setting, the administrator must also specify the protocols that are available to users on the Network tab. If the administrator does not specify any protocols, the Player cannot access an MMS or RTSP URL from a Windows Media server. If the "Hide network tab" policy setting is enabled, the entire Network tab is hidden. +- If you enable this policy setting, the administrator must also specify the protocols that are available to users on the Network tab. If the administrator doesn't specify any protocols, the Player can't access an MMS or RTSP URL from a Windows Media server. If the "Hide network tab" policy setting is enabled, the entire Network tab is hidden. -- If you do not configure this policy setting, users can select the protocols to use on the Network tab. +- If you don't configure this policy setting, users can select the protocols to use on the Network tab. -- If you disable this policy setting, the Protocols for MMS URLs and Multicast streams areas of the Network tab are not available and the Player cannot receive an MMS or RTSP stream from a Windows Media server. +- If you disable this policy setting, the Protocols for MMS URLs and Multicast streams areas of the Network tab aren't available and the Player can't receive an MMS or RTSP stream from a Windows Media server. @@ -1319,13 +1301,12 @@ This policy setting allows you to specify that Windows Media Player can attempt | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-windowsremotemanagement.md b/windows/client-management/mdm/policy-csp-admx-windowsremotemanagement.md index 92e853efe1..462ba24fcb 100644 --- a/windows/client-management/mdm/policy-csp-admx-windowsremotemanagement.md +++ b/windows/client-management/mdm/policy-csp-admx-windowsremotemanagement.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_WindowsRemoteManagement Area in Policy CS author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_WindowsRemoteManagement -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,9 +41,9 @@ ms.topic: reference This policy setting allows you to manage whether the Windows Remote Management (WinRM) service accepts Kerberos credentials over the network. -- If you enable this policy setting, the WinRM service does not accept Kerberos credentials over the network. +- If you enable this policy setting, the WinRM service doesn't accept Kerberos credentials over the network. -- If you disable or do not configure this policy setting, the WinRM service accepts Kerberos authentication from a remote client. +- If you disable or don't configure this policy setting, the WinRM service accepts Kerberos authentication from a remote client. @@ -58,13 +55,12 @@ This policy setting allows you to manage whether the Windows Remote Management ( | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -91,7 +87,7 @@ This policy setting allows you to manage whether the Windows Remote Management ( | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -104,9 +100,9 @@ This policy setting allows you to manage whether the Windows Remote Management ( This policy setting allows you to manage whether the Windows Remote Management (WinRM) client uses Kerberos authentication directly. -- If you enable this policy setting, the Windows Remote Management (WinRM) client does not use Kerberos authentication directly. Kerberos can still be used if the WinRM client is using the Negotiate authentication and Kerberos is selected. +- If you enable this policy setting, the Windows Remote Management (WinRM) client doesn't use Kerberos authentication directly. Kerberos can still be used if the WinRM client is using the Negotiate authentication and Kerberos is selected. -- If you disable or do not configure this policy setting, the WinRM client uses the Kerberos authentication directly. +- If you disable or don't configure this policy setting, the WinRM client uses the Kerberos authentication directly. @@ -118,13 +114,12 @@ This policy setting allows you to manage whether the Windows Remote Management ( | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-windowsstore.md b/windows/client-management/mdm/policy-csp-admx-windowsstore.md index 2187c471b8..0303ddaecd 100644 --- a/windows/client-management/mdm/policy-csp-admx-windowsstore.md +++ b/windows/client-management/mdm/policy-csp-admx-windowsstore.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_WindowsStore Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_WindowsStore -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -60,13 +57,12 @@ Enables or disables the automatic download of app updates on PCs running Windows | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -93,7 +89,7 @@ Enables or disables the automatic download of app updates on PCs running Windows | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -106,9 +102,9 @@ Enables or disables the automatic download of app updates on PCs running Windows Enables or disables the Store offer to update to the latest version of Windows. -- If you enable this setting, the Store application will not offer updates to the latest version of Windows. +- If you enable this setting, the Store application won't offer updates to the latest version of Windows. -- If you disable or do not configure this setting the Store application will offer updates to the latest version of Windows. +- If you disable or don't configure this setting the Store application will offer updates to the latest version of Windows. @@ -120,13 +116,12 @@ Enables or disables the Store offer to update to the latest version of Windows. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -153,7 +148,7 @@ Enables or disables the Store offer to update to the latest version of Windows. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -166,9 +161,9 @@ Enables or disables the Store offer to update to the latest version of Windows. Enables or disables the Store offer to update to the latest version of Windows. -- If you enable this setting, the Store application will not offer updates to the latest version of Windows. +- If you enable this setting, the Store application won't offer updates to the latest version of Windows. -- If you disable or do not configure this setting the Store application will offer updates to the latest version of Windows. +- If you disable or don't configure this setting the Store application will offer updates to the latest version of Windows. @@ -180,13 +175,12 @@ Enables or disables the Store offer to update to the latest version of Windows. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -213,7 +207,7 @@ Enables or disables the Store offer to update to the latest version of Windows. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -240,13 +234,12 @@ Denies or allows access to the Store application. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -273,7 +266,7 @@ Denies or allows access to the Store application. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -300,13 +293,12 @@ Denies or allows access to the Store application. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-wininit.md b/windows/client-management/mdm/policy-csp-admx-wininit.md index 0e91181420..88222e9dd9 100644 --- a/windows/client-management/mdm/policy-csp-admx-wininit.md +++ b/windows/client-management/mdm/policy-csp-admx-wininit.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_WinInit Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_WinInit -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,9 +41,9 @@ ms.topic: reference This policy setting controls the legacy remote shutdown interface (named pipe). The named pipe remote shutdown interface is needed in order to shutdown this system from a remote Windows XP or Windows Server 2003 system. -- If you enable this policy setting, the system does not create the named pipe remote shutdown interface. +- If you enable this policy setting, the system doesn't create the named pipe remote shutdown interface. -- If you disable or do not configure this policy setting, the system creates the named pipe remote shutdown interface. +- If you disable or don't configure this policy setting, the system creates the named pipe remote shutdown interface. @@ -58,13 +55,12 @@ This policy setting controls the legacy remote shutdown interface (named pipe). | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -91,7 +87,7 @@ This policy setting controls the legacy remote shutdown interface (named pipe). | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -106,7 +102,7 @@ This policy setting controls the use of fast startup. - If you enable this policy setting, the system requires hibernate to be enabled. -- If you disable or do not configure this policy setting, the local setting is used. +- If you disable or don't configure this policy setting, the local setting is used. @@ -118,13 +114,12 @@ This policy setting controls the use of fast startup. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -151,7 +146,7 @@ This policy setting controls the use of fast startup. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -166,7 +161,7 @@ This policy setting configures the number of minutes the system waits for the hu - If you enable this policy setting, the system waits for the hung logon sessions for the number of minutes specified. -- If you disable or do not configure this policy setting, the default timeout value is 3 minutes for workstations and 15 minutes for servers. +- If you disable or don't configure this policy setting, the default timeout value is 3 minutes for workstations and 15 minutes for servers. @@ -178,13 +173,12 @@ This policy setting configures the number of minutes the system waits for the hu | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-winlogon.md b/windows/client-management/mdm/policy-csp-admx-winlogon.md index 3f211bcf84..c53065c78d 100644 --- a/windows/client-management/mdm/policy-csp-admx-winlogon.md +++ b/windows/client-management/mdm/policy-csp-admx-winlogon.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_WinLogon Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_WinLogon -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -48,9 +45,9 @@ The Explorer program (%windir%\explorer.exe) creates the familiar Windows interf - If you enable this setting, the system starts the interface you specify instead of Explorer.exe. -To use this setting, copy your interface program to a network share or to your system drive. Then, enable this setting, and type the name of the interface program, including the file name extension, in the Shell name text box. If the interface program file is not located in a folder specified in the Path environment variable for your system, enter the fully qualified path to the file. +To use this setting, copy your interface program to a network share or to your system drive. Then, enable this setting, and type the name of the interface program, including the file name extension, in the Shell name text box. If the interface program file isn't located in a folder specified in the Path environment variable for your system, enter the fully qualified path to the file. -- If you disable this setting or do not configure it, the setting is ignored and the system displays the Explorer interface. +- If you disable this setting or don't configure it, the setting is ignored and the system displays the Explorer interface. > [!TIP] > To find the folders indicated by the Path environment variable, click System Properties in Control Panel, click the Advanced tab, click the Environment Variables button, and then, in the System variables box, click Path. @@ -65,13 +62,12 @@ To use this setting, copy your interface program to a network share or to your s | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -97,7 +93,7 @@ To use this setting, copy your interface program to a network share or to your s | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -112,9 +108,9 @@ This policy setting controls whether or not the system displays information abou For local user accounts and domain user accounts in domains of at least a Windows Server 2008 functional level, if you enable this setting, a message appears after the user logs on that displays the date and time of the last successful logon by that user, the date and time of the last unsuccessful logon attempted with that user name, and the number of unsuccessful logons since the last successful logon by that user. This message must be acknowledged by the user before the user is presented with the Microsoft Windows desktop. -For domain user accounts in Windows Server 2003, Windows 2000 native, or Windows 2000 mixed functional level domains, if you enable this setting, a warning message will appear that Windows could not retrieve the information and the user will not be able to log on. Therefore, you should not enable this policy setting if the domain is not at the Windows Server 2008 domain functional level. +For domain user accounts in Windows Server 2003, Windows 2000 native, or Windows 2000 mixed functional level domains, if you enable this setting, a warning message will appear that Windows couldn't retrieve the information and the user won't be able to log on. Therefore, you shouldn't enable this policy setting if the domain isn't at the Windows Server 2008 domain functional level. -- If you disable or do not configure this setting, messages about the previous logon or logon failures are not displayed. +If you disable or don't configure this setting, messages about the previous logon or logon failures aren't displayed. @@ -126,13 +122,12 @@ For domain user accounts in Windows Server 2003, Windows 2000 native, or Windows | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -159,7 +154,7 @@ For domain user accounts in Windows Server 2003, Windows 2000 native, or Windows | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -170,11 +165,11 @@ For domain user accounts in Windows Server 2003, Windows 2000 native, or Windows -This policy controls whether the logged on user should be notified when his logon hours are about to expire. By default, a user is notified before logon hours expire, if actions have been set to occur when the logon hours expire. +This policy controls whether the logged-on user should be notified when his logon hours are about to expire. By default, a user is notified before logon hours expire, if actions have been set to occur when the logon hours expire. -- If you enable this setting, warnings are not displayed to the user before the logon hours expire. +- If you enable this setting, warnings aren't displayed to the user before the logon hours expire. -- If you disable or do not configure this setting, users receive warnings before the logon hours expire, if actions have been set to occur when the logon hours expire. +- If you disable or don't configure this setting, users receive warnings before the logon hours expire, if actions have been set to occur when the logon hours expire. > [!NOTE] > If you configure this setting, you might want to examine and appropriately configure the "Set action to take when logon hours expire" setting. If "Set action to take when logon hours expire" is disabled or not configured, the "Remove logon hours expiration warnings" setting will have no effect, and users receive no warnings about logon hour expiration. @@ -189,13 +184,12 @@ This policy controls whether the logged on user should be notified when his logo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -222,7 +216,7 @@ This policy controls whether the logged on user should be notified when his logo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -233,15 +227,15 @@ This policy controls whether the logged on user should be notified when his logo -This policy controls which action will be taken when the logon hours expire for the logged on user. The actions include lock the workstation, disconnect the user, or log the user off completely. +This policy controls which action will be taken when the logon hours expire for the logged-on user. The actions include lock the workstation, disconnect the user, or log the user off completely. -If you choose to lock or disconnect a session, the user cannot unlock the session or reconnect except during permitted logon hours. +If you choose to lock or disconnect a session, the user can't unlock the session or reconnect except during permitted logon hours. -If you choose to log off a user, the user cannot log on again except during permitted logon hours. If you choose to log off a user, the user might lose unsaved data. +If you choose to log off a user, the user can't log on again except during permitted logon hours. If you choose to log off a user, the user might lose unsaved data. - If you enable this setting, the system will perform the action you specify when the user's logon hours expire. -- If you disable or do not configure this setting, the system takes no action when the user's logon hours expire. The user can continue the existing session, but cannot log on to a new session. +- If you disable or don't configure this setting, the system takes no action when the user's logon hours expire. The user can continue the existing session, but can't log on to a new session. > [!NOTE] > If you configure this setting, you might want to examine and appropriately configure the "Remove logon hours expiration warnings" setting. @@ -256,13 +250,12 @@ If you choose to log off a user, the user cannot log on again except during perm | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -288,7 +281,7 @@ If you choose to log off a user, the user cannot log on again except during perm | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -303,7 +296,7 @@ If you choose to log off a user, the user cannot log on again except during perm -This policy controls whether the logged on user should be notified if the logon server could not be contacted during logon and he has been logged on using previously stored account information. +This policy controls whether the logged-on user should be notified if the logon server couldn't be contacted during logon and he has been logged-on using previously stored account information. If enabled, a notification popup will be displayed to the user when the user logs on with cached credentials. @@ -319,13 +312,12 @@ If disabled or not configured, no popup will be displayed to the user. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -352,7 +344,7 @@ If disabled or not configured, no popup will be displayed to the user. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -367,12 +359,15 @@ This policy setting controls whether or not software can simulate the Secure Att - If you enable this policy setting, you have one of four options: -If you set this policy setting to "None," user mode software cannot simulate the SAS. +If you set this policy setting to "None," user mode software can't simulate the SAS. + If you set this policy setting to "Services," services can simulate the SAS. + If you set this policy setting to "Ease of Access applications," Ease of Access applications can simulate the SAS. + If you set this policy setting to "Services and Ease of Access applications," both services and Ease of Access applications can simulate the SAS. -- If you disable or do not configure this setting, only Ease of Access applications running on the secure desktop can simulate the SAS. +- If you disable or don't configure this setting, only Ease of Access applications running on the secure desktop can simulate the SAS. @@ -384,13 +379,12 @@ If you set this policy setting to "Services and Ease of Access applications," bo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-winsrv.md b/windows/client-management/mdm/policy-csp-admx-winsrv.md index e4b1d5df39..84f8a86271 100644 --- a/windows/client-management/mdm/policy-csp-admx-winsrv.md +++ b/windows/client-management/mdm/policy-csp-admx-winsrv.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_Winsrv Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_Winsrv -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,9 +41,9 @@ ms.topic: reference This policy setting specifies whether Windows will allow console applications and GUI applications without visible top-level windows to block or cancel shutdown. By default, such applications are automatically terminated if they attempt to cancel shutdown or block it indefinitely. -- If you enable this setting, console applications or GUI applications without visible top-level windows that block or cancel shutdown will not be automatically terminated during shutdown. +- If you enable this setting, console applications or GUI applications without visible top-level windows that block or cancel shutdown won't be automatically terminated during shutdown. -- If you disable or do not configure this setting, these applications will be automatically terminated during shutdown, helping to ensure that Windows can shut down faster and more smoothly. +- If you disable or don't configure this setting, these applications will be automatically terminated during shutdown, helping to ensure that Windows can shut down faster and more smoothly. @@ -61,13 +58,12 @@ This policy setting specifies whether Windows will allow console applications an | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-wlansvc.md b/windows/client-management/mdm/policy-csp-admx-wlansvc.md index 5dcf6b4493..51b01f6e05 100644 --- a/windows/client-management/mdm/policy-csp-admx-wlansvc.md +++ b/windows/client-management/mdm/policy-csp-admx-wlansvc.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_wlansvc Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_wlansvc -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -48,11 +45,11 @@ This policy setting configures the cost of Wireless LAN (WLAN) connections on th - Unrestricted: Use of this connection is unlimited and not restricted by usage charges and capacity constraints. -- Fixed: Use of this connection is not restricted by usage charges and capacity constraints up to a certain data limit. +- Fixed: Use of this connection isn't restricted by usage charges and capacity constraints up to a certain data limit. - Variable: This connection is costed on a per byte basis. -- If this policy setting is disabled or is not configured, the cost of Wireless LAN connections is Unrestricted by default. +- If this policy setting is disabled or isn't configured, the cost of Wireless LAN connections is Unrestricted by default. @@ -64,13 +61,12 @@ This policy setting configures the cost of Wireless LAN (WLAN) connections on th | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -96,7 +92,7 @@ This policy setting configures the cost of Wireless LAN (WLAN) connections on th | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -111,7 +107,7 @@ This policy applies to Wireless Display connections. This policy means that the Conversely it means that Push Button is NOT allowed. -- If this policy setting is disabled or is not configured, by default Push Button pairing is allowed (but not necessarily preferred). +- If this policy setting is disabled or isn't configured, by default Push Button pairing is allowed (but not necessarily preferred). @@ -123,13 +119,12 @@ Conversely it means that Push Button is NOT allowed. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -156,7 +151,7 @@ Conversely it means that Push Button is NOT allowed. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -171,7 +166,7 @@ This policy applies to Wireless Display connections. This policy changes the pre When enabled, it makes the connections to prefer a PIN for pairing to Wireless Display devices over the Push Button pairing method. -- If this policy setting is disabled or is not configured, by default Push Button pairing is preferred (if allowed by other policies). +- If this policy setting is disabled or isn't configured, by default Push Button pairing is preferred (if allowed by other policies). @@ -183,13 +178,12 @@ When enabled, it makes the connections to prefer a PIN for pairing to Wireless D | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-wordwheel.md b/windows/client-management/mdm/policy-csp-admx-wordwheel.md index 47c1744461..b4bf212607 100644 --- a/windows/client-management/mdm/policy-csp-admx-wordwheel.md +++ b/windows/client-management/mdm/policy-csp-admx-wordwheel.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_WordWheel Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_WordWheel -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -58,13 +55,12 @@ Set up the menu name and URL for the custom Internet search provider. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-workfoldersclient.md b/windows/client-management/mdm/policy-csp-admx-workfoldersclient.md index 1d2efeeadc..c0b857187f 100644 --- a/windows/client-management/mdm/policy-csp-admx-workfoldersclient.md +++ b/windows/client-management/mdm/policy-csp-admx-workfoldersclient.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_WorkFoldersClient Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_WorkFoldersClient -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,9 +41,9 @@ ms.topic: reference This policy setting specifies whether Work Folders should be set up automatically for all users of the affected computer. -- If you enable this policy setting, Work Folders will be set up automatically for all users of the affected computer. This prevents users from choosing not to use Work Folders on the computer; it also prevents them from manually specifying the local folder in which Work Folders stores files. Work Folders will use the settings specified in the "Specify Work Folders settings" policy setting in User Configuration\Administrative Templates\Windows Components\WorkFolders. If the "Specify Work Folders settings" policy setting does not apply to a user, Work Folders is not automatically set up. +- If you enable this policy setting, Work Folders will be set up automatically for all users of the affected computer. This prevents users from choosing not to use Work Folders on the computer; it also prevents them from manually specifying the local folder in which Work Folders stores files. Work Folders will use the settings specified in the "Specify Work Folders settings" policy setting in User Configuration\Administrative Templates\Windows Components\WorkFolders. If the "Specify Work Folders settings" policy setting doesn't apply to a user, Work Folders isn't automatically set up. -- If you disable or do not configure this policy setting, Work Folders uses the "Force automatic setup" option of the "Specify Work Folders settings" policy setting to determine whether to automatically set up Work Folders for a given user. +- If you disable or don't configure this policy setting, Work Folders uses the "Force automatic setup" option of the "Specify Work Folders settings" policy setting to determine whether to automatically set up Work Folders for a given user. @@ -58,13 +55,12 @@ This policy setting specifies whether Work Folders should be set up automaticall | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -91,7 +87,7 @@ This policy setting specifies whether Work Folders should be set up automaticall | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -114,13 +110,12 @@ This policy specifies whether Work Folders should use Token Broker for interacti | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -147,7 +142,7 @@ This policy specifies whether Work Folders should use Token Broker for interacti | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -161,6 +156,7 @@ This policy specifies whether Work Folders should use Token Broker for interacti This policy setting specifies the Work Folders server for affected users, as well as whether or not users are allowed to change settings when setting up Work Folders on a domain-joined computer. - If you enable this policy setting, affected users receive Work Folders settings when they sign in to a domain-joined PC. + - If this policy setting is disabled or not configured, no Work Folders settings are specified for the affected users, though users can manually set up Work Folders by using the Work Folders Control Panel item. The "Work Folders URL" can specify either the URL used by the organization for Work Folders discovery, or the specific URL of the file server that stores the affected users' data. @@ -173,10 +169,12 @@ The "Work Folders Local Path" specifies the local folder used on the client mach The "On-demand file access preference" option controls whether to enable on-demand file access. When enabled, the user controls which files in Work Folders are available offline on a given PC. The rest of the files in Work Folders are always visible and don't take up any space on the PC, but the user must be connected to the Internet to access them. - If you enable this policy setting, on-demand file access is enabled. -- If you disable this policy setting, on-demand file access is disabled, and enough storage space to store all the user's files is required on each of their PCs. -If you specify User choice or do not configure this policy setting, the user decides whether to enable on-demand file access. However, if the Force automatic setup policy setting is enabled, Work Folders is set up automatically with on-demand file access enabled. -The "Force automatic setup" option specifies that Work Folders should be set up automatically without prompting users. This prevents users from choosing not to use Work Folders on the computer; it also prevents them from manually specifying the local folder in which Work Folders stores files. By default, Work Folders is stored in the "%USERPROFILE%\Work Folders" folder. If this option is not specified, users must use the Work Folders Control Panel item on their computers to set up Work Folders. +- If you disable this policy setting, on-demand file access is disabled, and enough storage space to store all the user's files is required on each of their PCs. + +If you specify User choice or don't configure this policy setting, the user decides whether to enable on-demand file access. However, if the Force automatic setup policy setting is enabled, Work Folders is set up automatically with on-demand file access enabled. + +The "Force automatic setup" option specifies that Work Folders should be set up automatically without prompting users. This prevents users from choosing not to use Work Folders on the computer; it also prevents them from manually specifying the local folder in which Work Folders stores files. By default, Work Folders is stored in the "%USERPROFILE%\Work Folders" folder. If this option isn't specified, users must use the Work Folders Control Panel item on their computers to set up Work Folders. @@ -188,13 +186,12 @@ The "Force automatic setup" option specifies that Work Folders should be set up | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-admx-wpn.md b/windows/client-management/mdm/policy-csp-admx-wpn.md index e141fc1da3..e9f61c9ac5 100644 --- a/windows/client-management/mdm/policy-csp-admx-wpn.md +++ b/windows/client-management/mdm/policy-csp-admx-wpn.md @@ -4,7 +4,7 @@ description: Learn more about the ADMX_WPN Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ADMX_WPN -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -44,11 +41,11 @@ ms.topic: reference This policy setting blocks voice and video calls during Quiet Hours. -- If you enable this policy setting, voice and video calls will be blocked during the designated Quiet Hours time window each day, and users will not be able to customize any other Quiet Hours settings. +- If you enable this policy setting, voice and video calls will be blocked during the designated Quiet Hours time window each day, and users won't be able to customize any other Quiet Hours settings. -- If you disable this policy setting, voice and video calls will be allowed during Quiet Hours, and users will not be able to customize this or any other Quiet Hours settings. +- If you disable this policy setting, voice and video calls will be allowed during Quiet Hours, and users won't be able to customize this or any other Quiet Hours settings. -- If you do not configure this policy setting, voice and video calls will be allowed during Quiet Hours by default. Adminstrators and users will be able to modify this setting. +- If you don't configure this policy setting, voice and video calls will be allowed during Quiet Hours by default. Adminstrators and users will be able to modify this setting. @@ -60,13 +57,12 @@ This policy setting blocks voice and video calls during Quiet Hours. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -93,7 +89,7 @@ This policy setting blocks voice and video calls during Quiet Hours. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -106,9 +102,9 @@ This policy setting blocks voice and video calls during Quiet Hours. This policy setting turns off toast notifications on the lock screen. -- If you enable this policy setting, applications will not be able to raise toast notifications on the lock screen. +- If you enable this policy setting, applications won't be able to raise toast notifications on the lock screen. -- If you disable or do not configure this policy setting, toast notifications on the lock screen are enabled and can be turned off by the administrator or user. +- If you disable or don't configure this policy setting, toast notifications on the lock screen are enabled and can be turned off by the administrator or user. No reboots or service restarts are required for this policy setting to take effect. @@ -122,13 +118,12 @@ No reboots or service restarts are required for this policy setting to take effe | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -155,7 +150,7 @@ No reboots or service restarts are required for this policy setting to take effe | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -168,11 +163,11 @@ No reboots or service restarts are required for this policy setting to take effe This policy setting turns off Quiet Hours functionality. -- If you enable this policy setting, toast notifications will not be suppressed and some background tasks will not be deferred during the designated Quiet Hours time window each day. +- If you enable this policy setting, toast notifications won't be suppressed and some background tasks won't be deferred during the designated Quiet Hours time window each day. -- If you disable this policy setting, toast notifications will be suppressed and some background task deferred during the designated Quiet Hours time window. Users will not be able to change this or any other Quiet Hours settings. +- If you disable this policy setting, toast notifications will be suppressed and some background task deferred during the designated Quiet Hours time window. Users won't be able to change this or any other Quiet Hours settings. -- If you do not configure this policy setting, Quiet Hours are enabled by default but can be turned off or by the administrator or user. +- If you don't configure this policy setting, Quiet Hours are enabled by default but can be turned off or by the administrator or user. @@ -184,13 +179,12 @@ This policy setting turns off Quiet Hours functionality. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -217,7 +211,7 @@ This policy setting turns off Quiet Hours functionality. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -234,13 +228,13 @@ This policy setting turns off Quiet Hours functionality. This policy setting turns off toast notifications for applications. -- If you enable this policy setting, applications will not be able to raise toast notifications. +- If you enable this policy setting, applications won't be able to raise toast notifications. -**Note** that this policy does not affect taskbar notification balloons. +Note that this policy doesn't affect taskbar notification balloons. -**Note** that Windows system features are not affected by this policy. You must enable/disable system features individually to stop their ability to raise toast notifications. +Note that Windows system features aren't affected by this policy. You must enable/disable system features individually to stop their ability to raise toast notifications. -- If you disable or do not configure this policy setting, toast notifications are enabled and can be turned off by the administrator or user. +- If you disable or don't configure this policy setting, toast notifications are enabled and can be turned off by the administrator or user. No reboots or service restarts are required for this policy setting to take effect. @@ -254,13 +248,12 @@ No reboots or service restarts are required for this policy setting to take effe | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -287,7 +280,7 @@ No reboots or service restarts are required for this policy setting to take effe | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -300,11 +293,11 @@ No reboots or service restarts are required for this policy setting to take effe This policy setting specifies the number of minutes after midnight (local time) that Quiet Hours is to begin each day. -- If you enable this policy setting, the specified time will be used, and users will not be able to customize any Quiet Hours settings. +- If you enable this policy setting, the specified time will be used, and users won't be able to customize any Quiet Hours settings. -- If you disable this policy setting, a default value will be used, and users will not be able to change it or any other Quiet Hours setting. +- If you disable this policy setting, a default value will be used, and users won't be able to change it or any other Quiet Hours setting. -- If you do not configure this policy setting, a default value will be used, which administrators and users will be able to modify. +- If you don't configure this policy setting, a default value will be used, which administrators and users will be able to modify. @@ -316,13 +309,12 @@ This policy setting specifies the number of minutes after midnight (local time) | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -348,7 +340,7 @@ This policy setting specifies the number of minutes after midnight (local time) | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -361,11 +353,11 @@ This policy setting specifies the number of minutes after midnight (local time) This policy setting specifies the number of minutes after midnight (local time) that Quiet Hours is to end each day. -- If you enable this policy setting, the specified time will be used, and users will not be able to customize any Quiet Hours settings. +- If you enable this policy setting, the specified time will be used, and users won't be able to customize any Quiet Hours settings. -- If you disable this policy setting, a default value will be used, and users will not be able to change it or any other Quiet Hours setting. +- If you disable this policy setting, a default value will be used, and users won't be able to change it or any other Quiet Hours setting. -- If you do not configure this policy setting, a default value will be used, which administrators and users will be able to modify. +- If you don't configure this policy setting, a default value will be used, which administrators and users will be able to modify. @@ -377,13 +369,12 @@ This policy setting specifies the number of minutes after midnight (local time) | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-applicationdefaults.md b/windows/client-management/mdm/policy-csp-applicationdefaults.md index dfa18c48f2..3b93d81859 100644 --- a/windows/client-management/mdm/policy-csp-applicationdefaults.md +++ b/windows/client-management/mdm/policy-csp-applicationdefaults.md @@ -4,7 +4,7 @@ description: Learn more about the ApplicationDefaults Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -40,13 +40,14 @@ ms.topic: reference This policy specifies the path to a file (e.g. either stored locally or on a network location) that contains file type and protocol default application associations. This file can be created using the DISM tool. For example: -Dism.exe /Online /Export-DefaultAppAssociations:C:\AppAssoc.txt + +Dism.exe /Online /Export-DefaultAppAssociations:C:\AppAssoc.txt. For more information, refer to the DISM documentation on TechNet. If this group policy is enabled and the client machine is domain-joined, the file will be processed and default associations will be applied at logon time. -If the group policy is not configured, disabled, or the client machine is not domain-joined, no default associations will be applied at logon time. +If the group policy isn't configured, disabled, or the client machine isn't domain-joined, no default associations will be applied at logon time. If the policy is enabled, disabled, or not configured, users will still be able to override default file type and protocol associations. @@ -60,7 +61,7 @@ If the policy is enabled, disabled, or not configured, users will still be able | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -141,7 +142,7 @@ Here's the SyncML example: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -158,7 +159,7 @@ Enabling this policy setting enables web-to-app linking so that apps can be laun Disabling this policy disables web-to-app linking and http(s) URIs will be opened in the default browser instead of launching the associated app. -If you do not configure this policy setting, the default behavior depends on the Windows edition. Changes to this policy take effect on reboot. +If you don't configure this policy setting, the default behavior depends on the Windows edition. Changes to this policy take effect on reboot. @@ -170,7 +171,7 @@ If you do not configure this policy setting, the default behavior depends on the | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | diff --git a/windows/client-management/mdm/policy-csp-applicationmanagement.md b/windows/client-management/mdm/policy-csp-applicationmanagement.md index 6cd0b742ae..9286bcdf16 100644 --- a/windows/client-management/mdm/policy-csp-applicationmanagement.md +++ b/windows/client-management/mdm/policy-csp-applicationmanagement.md @@ -4,7 +4,7 @@ description: Learn more about the ApplicationManagement Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -41,7 +41,7 @@ This policy setting allows you to manage the installation of trusted line-of-bus - If you enable this policy setting, you can install any LOB or developer-signed Windows Store app (which must be signed with a certificate chain that can be successfully validated by the local computer). -- If you disable or do not configure this policy setting, you cannot install LOB or developer-signed Windows Store apps. +- If you disable or don't configure this policy setting, you can't install LOB or developer-signed Windows Store apps. @@ -53,7 +53,7 @@ This policy setting allows you to manage the installation of trusted line-of-bus | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 65535 | @@ -94,7 +94,7 @@ This policy setting allows you to manage the installation of trusted line-of-bus | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -117,7 +117,7 @@ Specifies whether automatic update of apps from Microsoft Store are allowed. Mos | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 2 | @@ -158,7 +158,7 @@ Specifies whether automatic update of apps from Microsoft Store are allowed. Mos | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -173,9 +173,9 @@ This policy setting controls whether the system can archive infrequently used ap - If you enable this policy setting, then the system will periodically check for and archive infrequently used apps. -- If you disable this policy setting, then the system will not archive any apps. +- If you disable this policy setting, then the system won't archive any apps. -- If you do not configure this policy setting (default), then the system will follow default behavior, which is to periodically check for and archive infrequently used apps, and the user will be able to configure this setting themselves. +- If you don't configure this policy setting (default), then the system will follow default behavior, which is to periodically check for and archive infrequently used apps, and the user will be able to configure this setting themselves. @@ -187,7 +187,7 @@ This policy setting controls whether the system can archive infrequently used ap | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 65535 | @@ -228,7 +228,7 @@ This policy setting controls whether the system can archive infrequently used ap | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -243,7 +243,7 @@ Allows or denies development of Microsoft Store applications and installing them - If you enable this setting and enable the "Allow all trusted apps to install" Group Policy, you can develop Microsoft Store apps and install them directly from an IDE. -- If you disable or do not configure this setting, you cannot develop Microsoft Store apps or install them directly from an IDE. +- If you disable or don't configure this setting, you can't develop Microsoft Store apps or install them directly from an IDE. @@ -255,7 +255,7 @@ Allows or denies development of Microsoft Store applications and installing them | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 65535 | @@ -296,7 +296,7 @@ Allows or denies development of Microsoft Store applications and installing them | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -309,7 +309,8 @@ Allows or denies development of Microsoft Store applications and installing them Windows Game Recording and Broadcasting. -This setting enables or disables the Windows Game Recording and Broadcasting features. If you disable this setting, Windows Game Recording will not be allowed. +This setting enables or disables the Windows Game Recording and Broadcasting features. If you disable this setting, Windows Game Recording won't be allowed. + If the setting is enabled or not configured, then Recording and Broadcasting (streaming) will be allowed. @@ -324,7 +325,7 @@ If the setting is enabled or not configured, then Recording and Broadcasting (st | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -364,7 +365,7 @@ If the setting is enabled or not configured, then Recording and Broadcasting (st | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -391,7 +392,7 @@ Manages a Windows app's ability to share data between users who have installed t | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -434,7 +435,7 @@ Manages a Windows app's ability to share data between users who have installed t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -457,7 +458,7 @@ This policy is deprecated. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -486,7 +487,7 @@ This policy is deprecated. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -509,7 +510,7 @@ This policy is deprecated. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -525,7 +526,7 @@ This policy is deprecated. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -540,7 +541,7 @@ Manages non-Administrator users' ability to install Windows app packages. - If you enable this policy, non-Administrators will be unable to initiate installation of Windows app packages. Administrators who wish to install an app will need to do so from an Administrator context (for example, an Administrator PowerShell window). All users will still be able to install Windows app packages via the Microsoft Store, if permitted by other policies. -- If you disable or do not configure this policy, all users will be able to initiate installation of Windows app packages. +- If you disable or don't configure this policy, all users will be able to initiate installation of Windows app packages. @@ -552,7 +553,7 @@ Manages non-Administrator users' ability to install Windows app packages. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -563,7 +564,7 @@ Manages non-Administrator users' ability to install Windows app packages. | Value | Description | |:--|:--| | 0 (Default) | Disabled. All users will be able to initiate installation of Windows app packages. | -| 1 | Enabled. Non-administrator users will not be able to initiate installation of Windows app packages. | +| 1 | Enabled. Non-administrator users won't be able to initiate installation of Windows app packages. | @@ -592,7 +593,7 @@ Manages non-Administrator users' ability to install Windows app packages. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -603,7 +604,7 @@ Manages non-Administrator users' ability to install Windows app packages. -Disable turns off the launch of all apps from the Microsoft Store that came pre-installed or were downloaded. Apps will not be updated. Your Store will also be disabled. Enable turns all of it back on. This setting applies only to Enterprise and Education editions of Windows. +Disable turns off the launch of all apps from the Microsoft Store that came pre-installed or were downloaded. Apps won't be updated. Your Store will also be disabled. Enable turns all of it back on. This setting applies only to Enterprise and Education editions of Windows. @@ -615,7 +616,7 @@ Disable turns off the launch of all apps from the Microsoft Store that came pre- | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -655,7 +656,7 @@ Disable turns off the launch of all apps from the Microsoft Store that came pre- | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -682,7 +683,7 @@ This policy allows the IT admin to specify a list of applications that users can | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -708,7 +709,7 @@ For this policy to work, the Windows apps need to declare in their manifest that | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -723,7 +724,7 @@ This policy setting permits users to change installation options that typically - If you enable this policy setting, some of the security features of Windows Installer are bypassed. It permits installations to complete that otherwise would be halted due to a security violation. -- If you disable or do not configure this policy setting, the security features of Windows Installer prevent users from changing installation options typically reserved for system administrators, such as specifying the directory to which files are installed. +- If you disable or don't configure this policy setting, the security features of Windows Installer prevent users from changing installation options typically reserved for system administrators, such as specifying the directory to which files are installed. If Windows Installer detects that an installation package has permitted the user to change a protected option, it stops the installation and displays a message. These security features operate only when the installation program is running in a privileged security context in which it has access to directories denied to the user. @@ -739,7 +740,7 @@ This policy setting is designed for less restrictive environments. It can be use | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -779,7 +780,7 @@ This policy setting is designed for less restrictive environments. It can be use | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -798,13 +799,13 @@ This policy setting directs Windows Installer to use elevated permissions when i - If you enable this policy setting, privileges are extended to all programs. These privileges are usually reserved for programs that have been assigned to the user (offered on the desktop), assigned to the computer (installed automatically), or made available in Add or Remove Programs in Control Panel. This profile setting lets users install programs that require access to directories that the user might not have permission to view or change, including directories on highly restricted computers. -- If you disable or do not configure this policy setting, the system applies the current user's permissions when it installs programs that a system administrator does not distribute or offer. +- If you disable or don't configure this policy setting, the system applies the current user's permissions when it installs programs that a system administrator doesn't distribute or offer. > [!NOTE] > This policy setting appears both in the Computer Configuration and User Configuration folders. To make this policy setting effective, you must enable it in both folders. > [!CAUTION] -> Skilled users can take advantage of the permissions this policy setting grants to change their privileges and gain permanent access to restricted files and folders. **Note** that the User Configuration version of this policy setting is not guaranteed to be secure. +> Skilled users can take advantage of the permissions this policy setting grants to change their privileges and gain permanent access to restricted files and folders. Note that the User Configuration version of this policy setting isn't guaranteed to be secure. @@ -816,7 +817,7 @@ This policy setting directs Windows Installer to use elevated permissions when i | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -856,7 +857,7 @@ This policy setting directs Windows Installer to use elevated permissions when i | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -873,7 +874,7 @@ This policy setting directs Windows Installer to use elevated permissions when i Denies access to the retail catalog in the Microsoft Store, but displays the private store. -- If you enable this setting, users will not be able to view the retail catalog in the Microsoft Store, but they will be able to view apps in the private store. +- If you enable this setting, users won't be able to view the retail catalog in the Microsoft Store, but they will be able to view apps in the private store. - If you disable or don't configure this setting, users can access the retail catalog in the Microsoft Store. @@ -887,7 +888,7 @@ Denies access to the retail catalog in the Microsoft Store, but displays the pri | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -927,7 +928,7 @@ Denies access to the retail catalog in the Microsoft Store, but displays the pri | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -942,7 +943,7 @@ Prevent users' app data from moving to another location when an app is moved or - If you enable this setting, all users' app data will stay on the system volume, regardless of where the app is installed. -- If you disable or do not configure this setting, then when an app is moved to a different volume, the users' app data will also move to this volume. +- If you disable or don't configure this setting, then when an app is moved to a different volume, the users' app data will also move to this volume. @@ -954,7 +955,7 @@ Prevent users' app data from moving to another location when an app is moved or | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -994,7 +995,7 @@ Prevent users' app data from moving to another location when an app is moved or | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1007,9 +1008,9 @@ Prevent users' app data from moving to another location when an app is moved or This policy setting allows you to manage installing Windows apps on additional volumes such as secondary partitions, USB drives, or SD cards. -- If you enable this setting, you can't move or install Windows apps on volumes that are not the system volume. +- If you enable this setting, you can't move or install Windows apps on volumes that aren't the system volume. -- If you disable or do not configure this setting, you can move or install Windows apps on other volumes. +- If you disable or don't configure this setting, you can move or install Windows apps on other volumes. @@ -1021,7 +1022,7 @@ This policy setting allows you to manage installing Windows apps on additional v | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1061,7 +1062,7 @@ This policy setting allows you to manage installing Windows apps on additional v | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -1084,7 +1085,7 @@ To ensure apps are up-to-date, this policy allows the admins to set a recurring | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | diff --git a/windows/client-management/mdm/policy-csp-appruntime.md b/windows/client-management/mdm/policy-csp-appruntime.md index 2f7dee3b3c..cc82ff6965 100644 --- a/windows/client-management/mdm/policy-csp-appruntime.md +++ b/windows/client-management/mdm/policy-csp-appruntime.md @@ -4,7 +4,7 @@ description: Learn more about the AppRuntime Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - AppRuntime -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -46,7 +43,7 @@ This policy setting lets you control whether Microsoft accounts are optional for - If you enable this policy setting, Windows Store apps that typically require a Microsoft account to sign in will allow users to sign in with an enterprise account instead. -- If you disable or do not configure this policy setting, users will need to sign in with a Microsoft account. +- If you disable or don't configure this policy setting, users will need to sign in with a Microsoft account. @@ -58,13 +55,12 @@ This policy setting lets you control whether Microsoft accounts are optional for | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-appvirtualization.md b/windows/client-management/mdm/policy-csp-appvirtualization.md index 8163149bf4..273303fe89 100644 --- a/windows/client-management/mdm/policy-csp-appvirtualization.md +++ b/windows/client-management/mdm/policy-csp-appvirtualization.md @@ -4,7 +4,7 @@ description: Learn more about the AppVirtualization Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - AppVirtualization -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -54,13 +51,12 @@ This policy setting allows you to enable or disable Microsoft Application Virtua | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -87,7 +83,7 @@ This policy setting allows you to enable or disable Microsoft Application Virtua | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -110,13 +106,12 @@ Enables Dynamic Virtualization of supported shell extensions, browser helper obj | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -143,7 +138,7 @@ Enables Dynamic Virtualization of supported shell extensions, browser helper obj | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -166,13 +161,12 @@ Enables automatic cleanup of appv packages that were added after Windows10 anniv | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -199,7 +193,7 @@ Enables automatic cleanup of appv packages that were added after Windows10 anniv | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -222,13 +216,12 @@ Enables scripts defined in the package manifest of configuration files that shou | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -255,7 +248,7 @@ Enables scripts defined in the package manifest of configuration files that shou | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -278,13 +271,12 @@ Enables a UX to display to the user when a publishing refresh is performed on th | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -311,7 +303,7 @@ Enables a UX to display to the user when a publishing refresh is performed on th | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -330,9 +322,9 @@ Delay reporting for the random minutes: The maximum minutes of random delay on t Repeat reporting for every (days): The periodical interval in days for sending the reporting data. -Data Cache Limit: This value specifies the maximum size in megabytes (MB) of the XML cache for storing reporting information. The default value is 20 MB. The size applies to the cache in memory. When the limit is reached, the log file will roll over. When a new record is to be added (bottom of the list), one or more of the oldest records (top of the list) will be deleted to make room. A warning will be logged to the Client log and the event log the first time this occurs, and will not be logged again until after the cache has been successfully cleared on transmission and the log has filled up again. +Data Cache Limit: This value specifies the maximum size in megabytes (MB) of the XML cache for storing reporting information. The default value is 20 MB. The size applies to the cache in memory. When the limit's reached, the log file will roll over. When a new record is to be added (bottom of the list), one or more of the oldest records (top of the list) will be deleted to make room. A warning will be logged to the Client log and the event log the first time this occurs, and won't be logged again until after the cache has been successfully cleared on transmission and the log has filled up again. -Data Block Size: This value specifies the maximum size in bytes to transmit to the server at once on a reporting upload, to avoid permanent transmission failures when the log has reached a significant size. The default value is 65536. When transmitting report data to the server, one block at a time of application records that is less than or equal to the block size in bytes of XML data will be removed from the cache and sent to the server. Each block will have the general Client data and global package list data prepended, and these will not factor into the block size calculations; the potential exists for an extremely large package list to result in transmission failures over low bandwidth or unreliable connections. +Data Block Size: This value specifies the maximum size in bytes to transmit to the server at once on a reporting upload, to avoid permanent transmission failures when the log has reached a significant size. The default value is 65536. When transmitting report data to the server, one block at a time of application records that's less than or equal to the block size in bytes of XML data will be removed from the cache and sent to the server. Each block will have the general Client data and global package list data prepended, and these won't factor into the block size calculations; the potential exists for an extremely large package list to result in transmission failures over low bandwidth or unreliable connections. @@ -344,13 +336,12 @@ Data Block Size: This value specifies the maximum size in bytes to transmit to t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -377,7 +368,7 @@ Data Block Size: This value specifies the maximum size in bytes to transmit to t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -388,7 +379,7 @@ Data Block Size: This value specifies the maximum size in bytes to transmit to t -Specifies the file paths relative to %userprofile% that do not roam with a user's profile. Example usage: /FILEEXCLUSIONLIST='desktop;my pictures'. +Specifies the file paths relative to %userprofile% that don't roam with a user's profile. Example usage: /FILEEXCLUSIONLIST='desktop;my pictures'. @@ -400,13 +391,12 @@ Specifies the file paths relative to %userprofile% that do not roam with a user' | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -432,7 +422,7 @@ Specifies the file paths relative to %userprofile% that do not roam with a user' | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -443,7 +433,7 @@ Specifies the file paths relative to %userprofile% that do not roam with a user' -Specifies the registry paths that do not roam with a user profile. Example usage: /REGISTRYEXCLUSIONLIST=software\classes;software\clients. +Specifies the registry paths that don't roam with a user profile. Example usage: /REGISTRYEXCLUSIONLIST=software\classes;software\clients. @@ -455,13 +445,12 @@ Specifies the registry paths that do not roam with a user profile. Example usage | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -487,7 +476,7 @@ Specifies the registry paths that do not roam with a user profile. Example usage | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -510,13 +499,12 @@ Specifies how new packages should be loaded automatically by App-V on a specific | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -542,7 +530,7 @@ Specifies how new packages should be loaded automatically by App-V on a specific | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -565,13 +553,12 @@ Migration mode allows the App-V client to modify shortcuts and FTA's for package | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -598,7 +585,7 @@ Migration mode allows the App-V client to modify shortcuts and FTA's for package | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -609,7 +596,7 @@ Migration mode allows the App-V client to modify shortcuts and FTA's for package -Specifies the location where symbolic links are created to the current version of a per-user published package. Shortcuts, file type associations, etc. are created pointing to this path. If empty, symbolic links are not used during publishing. Example: %localappdata%\Microsoft\AppV\Client\Integration. +Specifies the location where symbolic links are created to the current version of a per-user published package. Shortcuts, file type associations, etc. are created pointing to this path. If empty, symbolic links aren't used during publishing. Example: %localappdata%\Microsoft\AppV\Client\Integration. @@ -621,13 +608,12 @@ Specifies the location where symbolic links are created to the current version o | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -653,7 +639,7 @@ Specifies the location where symbolic links are created to the current version o | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -664,7 +650,7 @@ Specifies the location where symbolic links are created to the current version o -Specifies the location where symbolic links are created to the current version of a globally published package. Shortcuts, file type associations, etc. are created pointing to this path. If empty, symbolic links are not used during publishing. Example: %allusersprofile%\Microsoft\AppV\Client\Integration. +Specifies the location where symbolic links are created to the current version of a globally published package. Shortcuts, file type associations, etc. are created pointing to this path. If empty, symbolic links aren't used during publishing. Example: %allusersprofile%\Microsoft\AppV\Client\Integration. @@ -676,13 +662,12 @@ Specifies the location where symbolic links are created to the current version o | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -708,7 +693,7 @@ Specifies the location where symbolic links are created to the current version o | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -749,13 +734,12 @@ User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, D | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -781,7 +765,7 @@ User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, D | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -822,13 +806,12 @@ User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, D | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -854,7 +837,7 @@ User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, D | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -895,13 +878,12 @@ User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, D | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -927,7 +909,7 @@ User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, D | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -968,13 +950,12 @@ User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, D | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1000,7 +981,7 @@ User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, D | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1041,13 +1022,12 @@ User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, D | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1073,7 +1053,7 @@ User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, D | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1096,13 +1076,12 @@ Specifies the path to a valid certificate in the certificate store. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1128,7 +1107,7 @@ Specifies the path to a valid certificate in the certificate store. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1151,13 +1130,12 @@ This setting controls whether virtualized applications are launched on Windows 8 | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1184,7 +1162,7 @@ This setting controls whether virtualized applications are launched on Windows 8 | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1207,13 +1185,12 @@ Specifies the CLSID for a compatible implementation of the IAppvPackageLocationP | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1239,7 +1216,7 @@ Specifies the CLSID for a compatible implementation of the IAppvPackageLocationP | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1262,13 +1239,12 @@ Specifies directory where all new applications and updates will be installed. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1294,7 +1270,7 @@ Specifies directory where all new applications and updates will be installed. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1317,13 +1293,12 @@ Overrides source location for downloading package content. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1349,7 +1324,7 @@ Overrides source location for downloading package content. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1372,13 +1347,12 @@ Specifies the number of seconds between attempts to reestablish a dropped sessio | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1404,7 +1378,7 @@ Specifies the number of seconds between attempts to reestablish a dropped sessio | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1427,13 +1401,12 @@ Specifies the number of times to retry a dropped session. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1459,7 +1432,7 @@ Specifies the number of times to retry a dropped session. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1482,13 +1455,12 @@ Specifies that streamed package contents will be not be saved to the local hard | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1515,7 +1487,7 @@ Specifies that streamed package contents will be not be saved to the local hard | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1526,7 +1498,7 @@ Specifies that streamed package contents will be not be saved to the local hard -If enabled, the App-V client will support BrancheCache compatible HTTP streaming. If BranchCache support is not desired, this should be disabled. The client can then apply HTTP optimizations which are incompatible with BranchCache. +If enabled, the App-V client will support BrancheCache compatible HTTP streaming. If BranchCache support isn't desired, this should be disabled. The client can then apply HTTP optimizations which are incompatible with BranchCache. @@ -1538,13 +1510,12 @@ If enabled, the App-V client will support BrancheCache compatible HTTP streaming | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1571,7 +1542,7 @@ If enabled, the App-V client will support BrancheCache compatible HTTP streaming | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1594,13 +1565,12 @@ Verifies Server certificate revocation status before streaming using HTTPS. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1627,7 +1597,7 @@ Verifies Server certificate revocation status before streaming using HTTPS. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1650,13 +1620,12 @@ Specifies a list of process paths (may contain wildcards) which are candidates f | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-attachmentmanager.md b/windows/client-management/mdm/policy-csp-attachmentmanager.md index c8e649f195..0a4a89d068 100644 --- a/windows/client-management/mdm/policy-csp-attachmentmanager.md +++ b/windows/client-management/mdm/policy-csp-attachmentmanager.md @@ -4,7 +4,7 @@ description: Learn more about the AttachmentManager Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - AttachmentManager -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -42,13 +39,13 @@ ms.topic: reference -This policy setting allows you to manage whether Windows marks file attachments with information about their zone of origin (such as restricted, Internet, intranet, local). This requires NTFS in order to function correctly, and will fail without notice on FAT32. By not preserving the zone information, Windows cannot make proper risk assessments. +This policy setting allows you to manage whether Windows marks file attachments with information about their zone of origin (such as restricted, Internet, intranet, local). This requires NTFS in order to function correctly, and will fail without notice on FAT32. By not preserving the zone information, Windows can't make proper risk assessments. -- If you enable this policy setting, Windows does not mark file attachments with their zone information. +- If you enable this policy setting, Windows doesn't mark file attachments with their zone information. - If you disable this policy setting, Windows marks file attachments with their zone information. -- If you do not configure this policy setting, Windows marks file attachments with their zone information. +- If you don't configure this policy setting, Windows marks file attachments with their zone information. @@ -60,13 +57,12 @@ This policy setting allows you to manage whether Windows marks file attachments | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -93,7 +89,7 @@ This policy setting allows you to manage whether Windows marks file attachments | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -110,7 +106,7 @@ This policy setting allows you to manage whether users can manually remove the z - If you disable this policy setting, Windows shows the check box and Unblock button. -- If you do not configure this policy setting, Windows hides the check box and Unblock button. +- If you don't configure this policy setting, Windows hides the check box and Unblock button. @@ -122,13 +118,12 @@ This policy setting allows you to manage whether users can manually remove the z | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -155,7 +150,7 @@ This policy setting allows you to manage whether users can manually remove the z | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -170,9 +165,9 @@ This policy setting allows you to manage the behavior for notifying registered a - If you enable this policy setting, Windows tells the registered antivirus program to scan the file when a user opens a file attachment. If the antivirus program fails, the attachment is blocked from being opened. -- If you disable this policy setting, Windows does not call the registered antivirus programs when file attachments are opened. +- If you disable this policy setting, Windows doesn't call the registered antivirus programs when file attachments are opened. -- If you do not configure this policy setting, Windows does not call the registered antivirus programs when file attachments are opened. +- If you don't configure this policy setting, Windows doesn't call the registered antivirus programs when file attachments are opened. @@ -184,13 +179,12 @@ This policy setting allows you to manage the behavior for notifying registered a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-audit.md b/windows/client-management/mdm/policy-csp-audit.md index 19a5889d94..2cad1d5a95 100644 --- a/windows/client-management/mdm/policy-csp-audit.md +++ b/windows/client-management/mdm/policy-csp-audit.md @@ -4,7 +4,7 @@ description: Learn more about the Audit Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 04/26/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -37,7 +37,7 @@ ms.topic: reference -This policy setting allows you to audit events generated by validation tests on user account logon credentials. Events in this subcategory occur only on the computer that is authoritative for those credentials. For domain accounts, the domain controller is authoritative. For local accounts, the local computer is authoritative. +This policy setting allows you to audit events generated by validation tests on user account logon credentials. Events in this subcategory occur only on the computer that's authoritative for those credentials. For domain accounts, the domain controller is authoritative. For local accounts, the local computer is authoritative. @@ -50,7 +50,7 @@ Volume: High on domain controllers. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -87,7 +87,7 @@ Volume: High on domain controllers. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -99,8 +99,10 @@ Volume: High on domain controllers. This policy setting allows you to audit events generated by Kerberos authentication ticket-granting ticket (TGT) requests. + - If you configure this policy setting, an audit event is generated after a Kerberos authentication TGT request. Success audits record successful requests and Failure audits record unsuccessful requests. -- If you do not configure this policy setting, no audit event is generated after a Kerberos authentication TGT request. + +- If you don't configure this policy setting, no audit event is generated after a Kerberos authentication TGT request. @@ -113,7 +115,7 @@ Volume: High on Kerberos Key Distribution Center servers. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -150,7 +152,7 @@ Volume: High on Kerberos Key Distribution Center servers. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -162,8 +164,10 @@ Volume: High on Kerberos Key Distribution Center servers. This policy setting allows you to audit events generated by Kerberos authentication ticket-granting ticket (TGT) requests submitted for user accounts. + - If you configure this policy setting, an audit event is generated after a Kerberos authentication TGT is requested for a user account. Success audits record successful requests and Failure audits record unsuccessful requests. -- If you do not configure this policy setting, no audit event is generated after a Kerberos authentication TGT is request for a user account. + +- If you don't configure this policy setting, no audit event is generated after a Kerberos authentication TGT is request for a user account. @@ -176,7 +180,7 @@ Volume: Low. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -213,7 +217,7 @@ Volume: Low. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -224,7 +228,7 @@ Volume: Low. -This policy setting allows you to audit events generated by responses to credential requests submitted for a user account logon that are not credential validation or Kerberos tickets. Currently, there are no events in this subcategory. +This policy setting allows you to audit events generated by responses to credential requests submitted for a user account logon that aren't credential validation or Kerberos tickets. Currently, there are no events in this subcategory. @@ -236,7 +240,7 @@ This policy setting allows you to audit events generated by responses to credent | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -273,7 +277,7 @@ This policy setting allows you to audit events generated by responses to credent | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -284,7 +288,7 @@ This policy setting allows you to audit events generated by responses to credent -This policy setting allows you to audit events generated by a failed attempt to log on to an account that is locked out. If you configure this policy setting, an audit event is generated when an account cannot log on to a computer because the account is locked out. Success audits record successful attempts and Failure audits record unsuccessful attempts. Logon events are essential for understanding user activity and to detect potential attacks. +This policy setting allows you to audit events generated by a failed attempt to log on to an account that's locked out. If you configure this policy setting, an audit event is generated when an account can't log on to a computer because the account is locked out. Success audits record successful attempts and Failure audits record unsuccessful attempts. Logon events are essential for understanding user activity and to detect potential attacks. @@ -297,7 +301,7 @@ Volume: Low. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -334,7 +338,7 @@ Volume: Low. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -345,7 +349,7 @@ Volume: Low. -This policy allows you to audit the group membership information in the user's logon token. Events in this subcategory are generated on the computer on which a logon session is created. For an interactive logon, the security audit event is generated on the computer that the user logged on to. For a network logon, such as accessing a shared folder on the network, the security audit event is generated on the computer hosting the resource. When this setting is configured, one or more security audit events are generated for each successful logon. You must also enable the Audit Logon setting under Advanced Audit Policy Configuration\System Audit Policies\Logon/Logoff. Multiple events are generated if the group membership information cannot fit in a single security audit event. +This policy allows you to audit the group membership information in the user's logon token. Events in this subcategory are generated on the computer on which a logon session is created. For an interactive logon, the security audit event is generated on the computer that the user logged-on to. For a network logon, such as accessing a shared folder on the network, the security audit event is generated on the computer hosting the resource. When this setting is configured, one or more security audit events are generated for each successful logon. You must also enable the Audit Logon setting under Advanced Audit Policy Configuration\System Audit Policies\Logon/Logoff. Multiple events are generated if the group membership information can't fit in a single security audit event. @@ -358,7 +362,7 @@ Volume: Low on a client computer. Medium on a domain controller or a network ser | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -395,7 +399,7 @@ Volume: Low on a client computer. Medium on a domain controller or a network ser | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -407,8 +411,10 @@ Volume: Low on a client computer. Medium on a domain controller or a network ser This policy setting allows you to audit events generated by Internet Key Exchange protocol (IKE) and Authenticated Internet Protocol (AuthIP) during Extended Mode negotiations. + - If you configure this policy setting, an audit event is generated during an IPsec Extended Mode negotiation. Success audits record successful attempts and Failure audits record unsuccessful attempts. -- If you do not configure this policy setting, no audit event is generated during an IPsec Extended Mode negotiation. + +- If you don't configure this policy setting, no audit event is generated during an IPsec Extended Mode negotiation. @@ -421,7 +427,7 @@ Volume: High. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -458,7 +464,7 @@ Volume: High. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -470,8 +476,10 @@ Volume: High. This policy setting allows you to audit events generated by Internet Key Exchange protocol (IKE) and Authenticated Internet Protocol (AuthIP) during Main Mode negotiations. + - If you configure this policy setting, an audit event is generated during an IPsec Main Mode negotiation. Success audits record successful attempts and Failure audits record unsuccessful attempts. -- If you do not configure this policy setting, no audit event is generated during an IPsec Main Mode negotiation. + +- If you don't configure this policy setting, no audit event is generated during an IPsec Main Mode negotiation. @@ -484,7 +492,7 @@ Volume: High. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -521,7 +529,7 @@ Volume: High. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -532,9 +540,7 @@ Volume: High. -This policy setting allows you to audit events generated by Internet Key Exchange protocol (IKE) and Authenticated Internet Protocol (AuthIP) during Quick Mode negotiations. -- If you configure this policy setting, an audit event is generated during an IPsec Quick Mode negotiation. Success audits record successful attempts and Failure audits record unsuccessful attempts. -- If you do not configure this policy setting, no audit event is generated during an IPsec Quick Mode negotiation. +This policy setting allows you to audit events generated by Internet Key Exchange protocol (IKE) and Authenticated Internet Protocol (AuthIP) during Quick Mode negotiations. If you configure this policy setting, an audit event is generated during an IPsec Quick Mode negotiation. Success audits record successful attempts and Failure audits record unsuccessful attempts. If you don't configure this policy setting, no audit event is generated during an IPsec Quick Mode negotiation. @@ -547,7 +553,7 @@ Volume: High. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -584,7 +590,7 @@ Volume: High. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -595,9 +601,11 @@ Volume: High. -This policy setting allows you to audit events generated by the closing of a logon session. These events occur on the computer that was accessed. For an interactive logoff the security audit event is generated on the computer that the user account logged on to. +This policy setting allows you to audit events generated by the closing of a logon session. These events occur on the computer that was accessed. For an interactive logoff the security audit event is generated on the computer that the user account logged-on to. + - If you configure this policy setting, an audit event is generated when a logon session is closed. Success audits record successful attempts to close sessions and Failure audits record unsuccessful attempts to close sessions. -- If you do not configure this policy setting, no audit event is generated when a logon session is closed. + +- If you don't configure this policy setting, no audit event is generated when a logon session is closed. @@ -610,7 +618,7 @@ Volume: Low. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -647,7 +655,7 @@ Volume: Low. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -658,7 +666,7 @@ Volume: Low. -This policy setting allows you to audit events generated by user account logon attempts on the computer. Events in this subcategory are related to the creation of logon sessions and occur on the computer which was accessed. For an interactive logon, the security audit event is generated on the computer that the user account logged on to. For a network logon, such as accessing a shared folder on the network, the security audit event is generated on the computer hosting the resource. The following events are included: Successful logon attempts. Failed logon attempts. Logon attempts using explicit credentials. This event is generated when a process attempts to log on an account by explicitly specifying that account's credentials. This most commonly occurs in batch logon configurations, such as scheduled tasks or when using the RUNAS command. Security identifiers (SIDs) were filtered and not allowed to log on. +This policy setting allows you to audit events generated by user account logon attempts on the computer. Events in this subcategory are related to the creation of logon sessions and occur on the computer which was accessed. For an interactive logon, the security audit event is generated on the computer that the user account logged-on to. For a network logon, such as accessing a shared folder on the network, the security audit event is generated on the computer hosting the resource. The following events are included: Successful logon attempts. Failed logon attempts. Logon attempts using explicit credentials. This event is generated when a process attempts to log on an account by explicitly specifying that account's credentials. This most commonly occurs in batch logon configurations, such as scheduled tasks or when using the RUNAS command. Security identifiers (SIDs) were filtered and not allowed to log on. @@ -671,7 +679,7 @@ Volume: Low on a client computer. Medium on a domain controller or a network ser | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -708,7 +716,7 @@ Volume: Low on a client computer. Medium on a domain controller or a network ser | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -720,8 +728,10 @@ Volume: Low on a client computer. Medium on a domain controller or a network ser This policy setting allows you to audit events generated by RADIUS (IAS) and Network Access Protection (NAP) user access requests. These requests can be Grant, Deny, Discard, Quarantine, Lock, and Unlock. + - If you configure this policy setting, an audit event is generated for each IAS and NAP user access request. Success audits record successful user access requests and Failure audits record unsuccessful attempts. -- If you do not configure this policy settings, IAS and NAP user access requests are not audited. + +- If you don't configure this policy settings, IAS and NAP user access requests aren't audited. @@ -734,7 +744,7 @@ Volume: Medium or High on NPS and IAS server. No volume on other computers. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 3 | @@ -771,7 +781,7 @@ Volume: Medium or High on NPS and IAS server. No volume on other computers. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -782,7 +792,7 @@ Volume: Medium or High on NPS and IAS server. No volume on other computers. -This policy setting allows you to audit other logon/logoff-related events that are not covered in the "Logon/Logoff" policy setting such as the following: Terminal Services session disconnections. New Terminal Services sessions. Locking and unlocking a workstation. Invoking a screen saver. Dismissal of a screen saver. Detection of a Kerberos replay attack, in which a Kerberos request was received twice with identical information. This condition could be caused by network misconfiguration. Access to a wireless network granted to a user or computer account. Access to a wired 802.1x network granted to a user or computer account. +This policy setting allows you to audit other logon/logoff-related events that aren't covered in the "Logon/Logoff" policy setting such as the following: Terminal Services session disconnections. New Terminal Services sessions. Locking and unlocking a workstation. Invoking a screen saver. Dismissal of a screen saver. Detection of a Kerberos replay attack, in which a Kerberos request was received twice with identical information. This condition could be caused by network misconfiguration. Access to a wireless network granted to a user or computer account. Access to a wired 802.1x network granted to a user or computer account. @@ -795,7 +805,7 @@ Volume: Low. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -832,7 +842,7 @@ Volume: Low. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -843,7 +853,7 @@ Volume: Low. -This policy setting allows you to audit events generated by special logons such as the following : The use of a special logon, which is a logon that has administrator-equivalent privileges and can be used to elevate a process to a higher level. A logon by a member of a Special Group. Special Groups enable you to audit events generated when a member of a certain group has logged on to your network. You can configure a list of group security identifiers (SIDs) in the registry. If any of those SIDs are added to a token during logon and the subcategory is enabled, an event is logged. For more information about this feature, see [article 947223 in the Microsoft Knowledge Base](https://go.microsoft.com/fwlink/?LinkId=121697). +This policy setting allows you to audit events generated by special logons such as the following: The use of a special logon, which is a logon that has administrator-equivalent privileges and can be used to elevate a process to a higher level. A logon by a member of a Special Group. Special Groups enable you to audit events generated when a member of a certain group has logged-on to your network. You can configure a list of group security identifiers (SIDs) in the registry. If any of those SIDs are added to a token during logon and the subcategory is enabled, an event is logged. For more information about this feature, see [article 947223 in the Microsoft Knowledge Base](https://go.microsoft.com/fwlink/?LinkId=121697). @@ -856,7 +866,7 @@ Volume: Low. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -893,7 +903,7 @@ Volume: Low. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -904,7 +914,7 @@ Volume: Low. -This policy allows you to audit user and device claims information in the user's logon token. Events in this subcategory are generated on the computer on which a logon session is created. For an interactive logon, the security audit event is generated on the computer that the user logged on to. For a network logon, such as accessing a shared folder on the network, the security audit event is generated on the computer hosting the resource. User claims are added to a logon token when claims are included with a user's account attributes in Active Directory. Device claims are added to the logon token when claims are included with a device's computer account attributes in Active Directory. In addition, compound identity must be enabled for the domain and on the computer where the user logged on. When this setting is configured, one or more security audit events are generated for each successful logon. You must also enable the Audit Logon setting under Advanced Audit Policy Configuration\System Audit Policies\Logon/Logoff. Multiple events are generated if the user and device claims information cannot fit in a single security audit event. +This policy allows you to audit user and device claims information in the user's logon token. Events in this subcategory are generated on the computer on which a logon session is created. For an interactive logon, the security audit event is generated on the computer that the user logged-on to. For a network logon, such as accessing a shared folder on the network, the security audit event is generated on the computer hosting the resource. User claims are added to a logon token when claims are included with a user's account attributes in Active Directory. Device claims are added to the logon token when claims are included with a device's computer account attributes in Active Directory. In addition, compound identity must be enabled for the domain and on the computer where the user logged on. When this setting is configured, one or more security audit events are generated for each successful logon. You must also enable the Audit Logon setting under Advanced Audit Policy Configuration\System Audit Policies\Logon/Logoff. Multiple events are generated if the user and device claims information can't fit in a single security audit event. @@ -917,7 +927,7 @@ Volume: Low on a client computer. Medium on a domain controller or a network ser | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -954,7 +964,7 @@ Volume: Low on a client computer. Medium on a domain controller or a network ser | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -966,8 +976,10 @@ Volume: Low on a client computer. Medium on a domain controller or a network ser This policy setting allows you to audit events generated by changes to application groups such as the following: Application group is created, changed, or deleted. Member is added or removed from an application group. + - If you configure this policy setting, an audit event is generated when an attempt to change an application group is made. Success audits record successful attempts and Failure audits record unsuccessful attempts. -- If you do not configure this policy setting, no audit event is generated when an application group changes. + +- If you don't configure this policy setting, no audit event is generated when an application group changes. @@ -980,7 +992,7 @@ Volume: Low. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1017,7 +1029,7 @@ Volume: Low. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -1029,8 +1041,10 @@ Volume: Low. This policy setting allows you to audit events generated by changes to computer accounts such as when a computer account is created, changed, or deleted. + - If you configure this policy setting, an audit event is generated when an attempt to change a computer account is made. Success audits record successful attempts and Failure audits record unsuccessful attempts. -- If you do not configure this policy setting, no audit event is generated when a computer account changes. + +- If you don't configure this policy setting, no audit event is generated when a computer account changes. @@ -1043,7 +1057,7 @@ Volume: Low. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1080,7 +1094,7 @@ Volume: Low. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -1092,8 +1106,10 @@ Volume: Low. This policy setting allows you to audit events generated by changes to distribution groups such as the following: Distribution group is created, changed, or deleted. Member is added or removed from a distribution group. Distribution group type is changed. + - If you configure this policy setting, an audit event is generated when an attempt to change a distribution group is made. Success audits record successful attempts and Failure audits record unsuccessful attempts. -- If you do not configure this policy setting, no audit event is generated when a distribution group changes. + +- If you don't configure this policy setting, no audit event is generated when a distribution group changes. > [!NOTE] > Events in this subcategory are logged only on domain controllers. @@ -1109,7 +1125,7 @@ Volume: Low. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1146,7 +1162,7 @@ Volume: Low. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -1157,7 +1173,7 @@ Volume: Low. -This policy setting allows you to audit events generated by other user account changes that are not covered in this category, such as the following: The password hash of a user account was accessed. This typically happens during an Active Directory Management Tool password migration. The Password Policy Checking API was called. Calls to this function can be part of an attack when a malicious application tests the policy to reduce the number of attempts during a password dictionary attack. Changes to the Default Domain Group Policy under the following Group Policy paths: Computer Configuration\Windows Settings\Security Settings\Account Policies\Password Policy Computer Configuration\Windows Settings\Security Settings\Account Policies\Account Lockout Policy. +This policy setting allows you to audit events generated by other user account changes that aren't covered in this category, such as the following: The password hash of a user account was accessed. This typically happens during an Active Directory Management Tool password migration. The Password Policy Checking API was called. Calls to this function can be part of an attack when a malicious application tests the policy to reduce the number of attempts during a password dictionary attack. Changes to the Default Domain Group Policy under the following Group Policy paths: Computer Configuration\Windows Settings\Security Settings\Account Policies\Password Policy Computer Configuration\Windows Settings\Security Settings\Account Policies\Account Lockout Policy. @@ -1170,7 +1186,7 @@ Volume: Low. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1207,7 +1223,7 @@ Volume: Low. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -1219,8 +1235,10 @@ Volume: Low. This policy setting allows you to audit events generated by changes to security groups such as the following: Security group is created, changed, or deleted. Member is added or removed from a security group. Group type is changed. + - If you configure this policy setting, an audit event is generated when an attempt to change a security group is made. Success audits record successful attempts and Failure audits record unsuccessful attempts. -- If you do not configure this policy setting, no audit event is generated when a security group changes. + +- If you don't configure this policy setting, no audit event is generated when a security group changes. @@ -1233,7 +1251,7 @@ Volume: Low. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1270,7 +1288,7 @@ Volume: Low. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -1282,8 +1300,10 @@ Volume: Low. This policy setting allows you to audit changes to user accounts. Events include the following: A user account is created, changed, deleted; renamed, disabled, enabled, locked out, or unlocked. A user account's password is set or changed. A security identifier (SID) is added to the SID History of a user account. The Directory Services Restore Mode password is configured. Permissions on administrative user accounts are changed. Credential Manager credentials are backed up or restored. + - If you configure this policy setting, an audit event is generated when an attempt to change a user account is made. Success audits record successful attempts and Failure audits record unsuccessful attempts. -- If you do not configure this policy setting, no audit event is generated when a user account changes. + +- If you don't configure this policy setting, no audit event is generated when a user account changes. @@ -1296,7 +1316,7 @@ Volume: Low. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1333,7 +1353,7 @@ Volume: Low. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -1345,8 +1365,10 @@ Volume: Low. This policy setting allows you to audit events generated when encryption or decryption requests are made to the Data Protection application interface (DPAPI). DPAPI is used to protect secret information such as stored password and key information. For more information about DPAPI, see [How to Use Data Protection](/dotnet/standard/security/how-to-use-data-protection). + - If you configure this policy setting, an audit event is generated when an encryption or decryption request is made to DPAPI. Success audits record successful requests and Failure audits record unsuccessful requests. -- If you do not configure this policy setting, no audit event is generated when an encryption or decryption request is made to DPAPI. + +- If you don't configure this policy setting, no audit event is generated when an encryption or decryption request is made to DPAPI. @@ -1359,7 +1381,7 @@ Volume: Low. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1396,7 +1418,7 @@ Volume: Low. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -1408,8 +1430,10 @@ Volume: Low. This policy setting allows you to audit when plug and play detects an external device. + - If you configure this policy setting, an audit event is generated whenever plug and play detects an external device. Only Success audits are recorded for this category. -- If you do not configure this policy setting, no audit event is generated when an external device is detected by plug and play. + +- If you don't configure this policy setting, no audit event is generated when an external device is detected by plug and play. @@ -1422,7 +1446,7 @@ Volume: Low. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1459,7 +1483,7 @@ Volume: Low. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -1471,8 +1495,10 @@ Volume: Low. This policy setting allows you to audit events generated when a process is created or starts. The name of the application or user that created the process is also audited. + - If you configure this policy setting, an audit event is generated when a process is created. Success audits record successful attempts and Failure audits record unsuccessful attempts. -- If you do not configure this policy setting, no audit event is generated when a process is created. + +- If you don't configure this policy setting, no audit event is generated when a process is created. @@ -1485,7 +1511,7 @@ Volume: Depends on how the computer is used. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1522,7 +1548,7 @@ Volume: Depends on how the computer is used. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -1534,8 +1560,10 @@ Volume: Depends on how the computer is used. This policy setting allows you to audit events generated when a process ends. + - If you configure this policy setting, an audit event is generated when a process ends. Success audits record successful attempts and Failure audits record unsuccessful attempts. -- If you do not configure this policy setting, no audit event is generated when a process ends. + +- If you don't configure this policy setting, no audit event is generated when a process ends. @@ -1548,7 +1576,7 @@ Volume: Depends on how the computer is used. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1585,7 +1613,7 @@ Volume: Depends on how the computer is used. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -1597,8 +1625,10 @@ Volume: Depends on how the computer is used. This policy setting allows you to audit inbound remote procedure call (RPC) connections. + - If you configure this policy setting, an audit event is generated when a remote RPC connection is attempted. Success audits record successful attempts and Failure audits record unsuccessful attempts. -- If you do not configure this policy setting, no audit event is generated when a remote RPC connection is attempted. + +- If you don't configure this policy setting, no audit event is generated when a remote RPC connection is attempted. @@ -1611,7 +1641,7 @@ Volume: High on RPC servers. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1648,7 +1678,7 @@ Volume: High on RPC servers. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -1672,7 +1702,7 @@ Volume: High. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1709,7 +1739,7 @@ Volume: High. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -1733,7 +1763,7 @@ Volume: High. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1770,7 +1800,7 @@ Volume: High. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -1794,7 +1824,7 @@ Volume: High on domain controllers. None on client computers. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1831,7 +1861,7 @@ Volume: High on domain controllers. None on client computers. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -1845,9 +1875,11 @@ Volume: High on domain controllers. None on client computers. This policy setting allows you to audit events generated by changes to objects in Active Directory Domain Services (AD DS). Events are logged when an object is created, deleted, modified, moved, or undeleted. When possible, events logged in this subcategory indicate the old and new values of the object's properties. Events in this subcategory are logged only on domain controllers, and only objects in AD DS with a matching system access control list (SACL) are logged. > [!NOTE] -> Actions on some objects and properties do not cause audit events to be generated due to settings on the object class in the schema. +> Actions on some objects and properties don't cause audit events to be generated due to settings on the object class in the schema. + - If you configure this policy setting, an audit event is generated when an attempt to change an object in AD DS is made. Success audits record successful attempts, however unsuccessful attempts are NOT recorded. -- If you do not configure this policy setting, no audit event is generated when an attempt to change an object in AD DS object is made. + +- If you don't configure this policy setting, no audit event is generated when an attempt to change an object in AD DS object is made. @@ -1860,7 +1892,7 @@ Volume: High on domain controllers only. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1897,7 +1929,7 @@ Volume: High on domain controllers only. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -1909,8 +1941,10 @@ Volume: High on domain controllers only. This policy setting allows you to audit replication between two Active Directory Domain Services (AD DS) domain controllers. + - If you configure this policy setting, an audit event is generated during AD DS replication. Success audits record successful replication and Failure audits record unsuccessful replication. -- If you do not configure this policy setting, no audit event is generated during AD DS replication. + +- If you don't configure this policy setting, no audit event is generated during AD DS replication. @@ -1923,7 +1957,7 @@ Volume: Medium on domain controllers. None on client computers. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1960,7 +1994,7 @@ Volume: Medium on domain controllers. None on client computers. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -1984,7 +2018,7 @@ Volume: Depends on the applications that are generating them. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2021,7 +2055,7 @@ Volume: Depends on the applications that are generating them. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -2032,7 +2066,7 @@ Volume: Depends on the applications that are generating them. -This policy setting allows you to audit access requests where the permission granted or denied by a proposed policy differs from the current central access policy on an object. If you configure this policy setting, an audit event is generated each time a user accesses an object and the permission granted by the current central access policy on the object differs from that granted by the proposed policy. The resulting audit event will be generated as follows: 1) Success audits, when configured, records access attempts when the current central access policy grants access but the proposed policy denies access. 2) Failure audits when configured records access attempts when: a) The current central access policy does not grant access but the proposed policy grants access. b) A principal requests the maximum access rights they are allowed and the access rights granted by the current central access policy are different than the access rights granted by the proposed policy. Volume: Potentially high on a file server when the proposed policy differs significantly from the current central access policy. +This policy setting allows you to audit access requests where the permission granted or denied by a proposed policy differs from the current central access policy on an object. If you configure this policy setting, an audit event is generated each time a user accesses an object and the permission granted by the current central access policy on the object differs from that granted by the proposed policy. The resulting audit event will be generated as follows: 1) Success audits, when configured, records access attempts when the current central access policy grants access but the proposed policy denies access. 2) Failure audits when configured records access attempts when: a) The current central access policy doesn't grant access but the proposed policy grants access. b) A principal requests the maximum access rights they're allowed and the access rights granted by the current central access policy are different than the access rights granted by the proposed policy. Volume: Potentially high on a file server when the proposed policy differs significantly from the current central access policy. @@ -2045,7 +2079,7 @@ Volume: Potentially high on a file server when the proposed policy differs signi | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2082,7 +2116,7 @@ Volume: Potentially high on a file server when the proposed policy differs signi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -2106,7 +2140,7 @@ Volume: Medium or Low on computers running Active Directory Certificate Services | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2143,7 +2177,7 @@ Volume: Medium or Low on computers running Active Directory Certificate Services | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -2155,6 +2189,7 @@ Volume: Medium or Low on computers running Active Directory Certificate Services This policy setting allows you to audit attempts to access files and folders on a shared folder. The Detailed File Share setting logs an event every time a file or folder is accessed, whereas the File Share setting only records one event for any connection established between a client and file share. Detailed File Share audit events include detailed information about the permissions or other criteria used to grant or deny access. + - If you configure this policy setting, an audit event is generated when an attempt is made to access a file or folder on a share. The administrator can specify whether to audit only successes, only failures, or both successes and failures. > [!NOTE] @@ -2173,7 +2208,7 @@ Volume: High on a file server or domain controller because of SYSVOL network acc | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2210,7 +2245,7 @@ Volume: High on a file server or domain controller because of SYSVOL network acc | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -2222,7 +2257,9 @@ Volume: High on a file server or domain controller because of SYSVOL network acc This policy setting allows you to audit attempts to access a shared folder. + - If you configure this policy setting, an audit event is generated when an attempt is made to access a shared folder. + - If this policy setting is defined, the administrator can specify whether to audit only successes, only failures, or both successes and failures. > [!NOTE] @@ -2241,7 +2278,7 @@ Volume: High on a file server or domain controller because of SYSVOL network acc | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2278,7 +2315,7 @@ Volume: High on a file server or domain controller because of SYSVOL network acc | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -2290,8 +2327,10 @@ Volume: High on a file server or domain controller because of SYSVOL network acc This policy setting allows you to audit user attempts to access file system objects. A security audit event is generated only for objects that have system access control lists (SACL) specified, and only if the type of access requested, such as Write, Read, or Modify and the account making the request match the settings in the SACL. For more information about enabling object access auditing, see< https://go.microsoft.com/fwlink/?LinkId=122083>. + - If you configure this policy setting, an audit event is generated each time an account accesses a file system object with a matching SACL. Success audits record successful attempts and Failure audits record unsuccessful attempts. -- If you do not configure this policy setting, no audit event is generated when an account accesses a file system object with a matching SACL. + +- If you don't configure this policy setting, no audit event is generated when an account accesses a file system object with a matching SACL. > [!NOTE] > You can set a SACL on a file system object using the Security tab in that object's Properties dialog box. @@ -2307,7 +2346,7 @@ Volume: Depends on how the file system SACLs are configured. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2344,7 +2383,7 @@ Volume: Depends on how the file system SACLs are configured. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -2356,8 +2395,10 @@ Volume: Depends on how the file system SACLs are configured. This policy setting allows you to audit connections that are allowed or blocked by the Windows Filtering Platform (WFP). The following events are included: The Windows Firewall Service blocks an application from accepting incoming connections on the network. The WFP allows a connection. The WFP blocks a connection. The WFP permits a bind to a local port. The WFP blocks a bind to a local port. The WFP allows a connection. The WFP blocks a connection. The WFP permits an application or service to listen on a port for incoming connections. The WFP blocks an application or service to listen on a port for incoming connections. + - If you configure this policy setting, an audit event is generated when connections are allowed or blocked by the WFP. Success audits record events generated when connections are allowed and Failure audits record events generated when connections are blocked. -- If you do not configure this policy setting, no audit event is generated when connected are allowed or blocked by the WFP. + +- If you don't configure this policy setting, no audit event is generated when connected are allowed or blocked by the WFP. @@ -2370,7 +2411,7 @@ Volume: High. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2407,7 +2448,7 @@ Volume: High. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -2431,7 +2472,7 @@ Volume: High. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2468,7 +2509,7 @@ Volume: High. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -2480,11 +2521,13 @@ Volume: High. This policy setting allows you to audit events generated when a handle to an object is opened or closed. Only objects with a matching system access control list (SACL) generate security audit events. + - If you configure this policy setting, an audit event is generated when a handle is manipulated. Success audits record successful attempts and Failure audits record unsuccessful attempts. -- If you do not configure this policy setting, no audit event is generated when a handle is manipulated. + +- If you don't configure this policy setting, no audit event is generated when a handle is manipulated. > [!NOTE] -> Events in this subcategory generate events only for object types where the corresponding Object Access subcategory is enabled. For example, if File system object access is enabled, handle manipulation security audit events are generated. If Registry object access is not enabled, handle manipulation security audit events will not be generated. +> Events in this subcategory generate events only for object types where the corresponding Object Access subcategory is enabled. For example, if File system object access is enabled, handle manipulation security audit events are generated. If Registry object access isn't enabled, handle manipulation security audit events won't be generated. @@ -2497,7 +2540,7 @@ Volume: Depends on how SACLs are configured. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2534,7 +2577,7 @@ Volume: Depends on how SACLs are configured. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -2561,7 +2604,7 @@ Volume: High if auditing access of global system objects is enabled. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2598,7 +2641,7 @@ Volume: High if auditing access of global system objects is enabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -2622,7 +2665,7 @@ Volume: Low. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2659,7 +2702,7 @@ Volume: Low. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -2671,8 +2714,10 @@ Volume: Low. This policy setting allows you to audit attempts to access registry objects. A security audit event is generated only for objects that have system access control lists (SACLs) specified, and only if the type of access requested, such as Read, Write, or Modify, and the account making the request match the settings in the SACL. + - If you configure this policy setting, an audit event is generated each time an account accesses a registry object with a matching SACL. Success audits record successful attempts and Failure audits record unsuccessful attempts. -- If you do not configure this policy setting, no audit event is generated when an account accesses a registry object with a matching SACL. + +- If you don't configure this policy setting, no audit event is generated when an account accesses a registry object with a matching SACL. > [!NOTE] > You can set a SACL on a registry object using the Permissions dialog box. @@ -2688,7 +2733,7 @@ Volume: Depends on how registry SACLs are configured. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2725,7 +2770,7 @@ Volume: Depends on how registry SACLs are configured. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -2737,8 +2782,10 @@ Volume: Depends on how registry SACLs are configured. This policy setting allows you to audit user attempts to access file system objects on a removable storage device. A security audit event is generated only for all objects for all types of access requested. + - If you configure this policy setting, an audit event is generated each time an account accesses a file system object on a removable storage. Success audits record successful attempts and Failure audits record unsuccessful attempts. -- If you do not configure this policy setting, no audit event is generated when an account accesses a file system object on a removable storage. + +- If you don't configure this policy setting, no audit event is generated when an account accesses a file system object on a removable storage. @@ -2750,7 +2797,7 @@ This policy setting allows you to audit user attempts to access file system obje | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2787,7 +2834,7 @@ This policy setting allows you to audit user attempts to access file system obje | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -2798,12 +2845,14 @@ This policy setting allows you to audit user attempts to access file system obje -This policy setting allows you to audit events generated by attempts to access to Security Accounts Manager (SAM) objects. SAM objects include the following: SAM_ALIAS -- A local group. SAM_GROUP -- A group that is not a local group. SAM_USER - A user account. SAM_DOMAIN - A domain. SAM_SERVER - A computer account. +This policy setting allows you to audit events generated by attempts to access to Security Accounts Manager (SAM) objects. SAM objects include the following: SAM_ALIAS -- A local group. SAM_GROUP -- A group that isn't a local group. SAM_USER - A user account. SAM_DOMAIN - A domain. SAM_SERVER - A computer account. + - If you configure this policy setting, an audit event is generated when an attempt to access a kernel object is made. Success audits record successful attempts and Failure audits record unsuccessful attempts. -- If you do not configure this policy setting, no audit event is generated when an attempt to access a kernel object is made. + +- If you don't configure this policy setting, no audit event is generated when an attempt to access a kernel object is made. > [!NOTE] -> Only the System Access Control List (SACL) for SAM_SERVER can be modified. Volume: High on domain controllers. +> Only the System Access Control List (SACL) for SAM_SERVER can be modified. Volume: High on domain controllers. @@ -2816,7 +2865,7 @@ Volume: High on domain controllers. For more information about reducing the numb | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2853,7 +2902,7 @@ Volume: High on domain controllers. For more information about reducing the numb | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -2865,11 +2914,13 @@ Volume: High on domain controllers. For more information about reducing the numb This policy setting allows you to audit events generated by changes to the authentication policy such as the following: Creation of forest and domain trusts. Modification of forest and domain trusts. Removal of forest and domain trusts. Changes to Kerberos policy under Computer Configuration\Windows Settings\Security Settings\Account Policies\Kerberos Policy. Granting of any of the following user rights to a user or group: Access This Computer From the Network. Allow Logon Locally. Allow Logon Through Terminal Services. Logon as a Batch Job. Logon a Service. Namespace collision. For example, when a new trust has the same name as an existing namespace name. + - If you configure this policy setting, an audit event is generated when an attempt to change the authentication policy is made. Success audits record successful attempts and Failure audits record unsuccessful attempts. -- If you do not configure this policy setting, no audit event is generated when the authentication policy is changed. + +- If you don't configure this policy setting, no audit event is generated when the authentication policy is changed. > [!NOTE] -> The security audit event is logged when the group policy is applied. It does not occur at the time when the settings are modified. +> The security audit event is logged when the group policy is applied. It doesn't occur at the time when the settings are modified. @@ -2882,7 +2933,7 @@ Volume: Low. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -2919,7 +2970,7 @@ Volume: Low. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -2930,9 +2981,11 @@ Volume: Low. -This policy setting allows you to audit events generated by changes to the authorization policy such as the following: Assignment of user rights (privileges), such as SeCreateTokenPrivilege, that are not audited through the "Authentication Policy Change" subcategory. Removal of user rights (privileges), such as SeCreateTokenPrivilege, that are not audited through the "Authentication Policy Change" subcategory. Changes in the Encrypted File System (EFS) policy. Changes to the Resource attributes of an object. Changes to the Central Access Policy (CAP) applied to an object. +This policy setting allows you to audit events generated by changes to the authorization policy such as the following: Assignment of user rights (privileges), such as SeCreateTokenPrivilege, that aren't audited through the "Authentication Policy Change" subcategory. Removal of user rights (privileges), such as SeCreateTokenPrivilege, that aren't audited through the "Authentication Policy Change" subcategory. Changes in the Encrypted File System (EFS) policy. Changes to the Resource attributes of an object. Changes to the Central Access Policy (CAP) applied to an object. + - If you configure this policy setting, an audit event is generated when an attempt to change the authorization policy is made. Success audits record successful attempts and Failure audits record unsuccessful attempts. -- If you do not configure this policy setting, no audit event is generated when the authorization policy changes. + +- If you don't configure this policy setting, no audit event is generated when the authorization policy changes. @@ -2945,7 +2998,7 @@ Volume: Low. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2982,7 +3035,7 @@ Volume: Low. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -2994,8 +3047,10 @@ Volume: Low. This policy setting allows you to audit events generated by changes to the Windows Filtering Platform (WFP) such as the following: IPsec services status. Changes to IPsec policy settings. Changes to Windows Firewall policy settings. Changes to WFP providers and engine. + - If you configure this policy setting, an audit event is generated when a change to the WFP is attempted. Success audits record successful attempts and Failure audits record unsuccessful attempts. -- If you do not configure this policy setting, no audit event is generated when a change occurs to the WFP. + +- If you don't configure this policy setting, no audit event is generated when a change occurs to the WFP. @@ -3008,7 +3063,7 @@ Volume: Low. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -3045,7 +3100,7 @@ Volume: Low. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -3057,8 +3112,10 @@ Volume: Low. This policy setting allows you to audit events generated by changes in policy rules used by the Microsoft Protection Service (MPSSVC). This service is used by Windows Firewall. Events include the following: Reporting of active policies when Windows Firewall service starts. Changes to Windows Firewall rules. Changes to Windows Firewall exception list. Changes to Windows Firewall settings. Rules ignored or not applied by Windows Firewall Service. Changes to Windows Firewall Group Policy settings. + - If you configure this policy setting, an audit event is generated by attempts to change policy rules used by the MPSSVC. Success audits record successful attempts and Failure audits record unsuccessful attempts. -- If you do not configure this policy setting, no audit event is generated by changes in policy rules used by the MPSSVC. + +- If you don't configure this policy setting, no audit event is generated by changes in policy rules used by the MPSSVC. @@ -3071,7 +3128,7 @@ Volume: Low. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -3108,7 +3165,7 @@ Volume: Low. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -3119,7 +3176,7 @@ Volume: Low. -This policy setting allows you to audit events generated by other security policy changes that are not audited in the policy change category, such as the following: Trusted Platform Module (TPM) configuration changes. Kernel-mode cryptographic self tests. Cryptographic provider operations. Cryptographic context operations or modifications. Applied Central Access Policies (CAPs) changes. Boot Configuration Data (BCD) modifications. +This policy setting allows you to audit events generated by other security policy changes that aren't audited in the policy change category, such as the following: Trusted Platform Module (TPM) configuration changes. Kernel-mode cryptographic self tests. Cryptographic provider operations. Cryptographic context operations or modifications. Applied Central Access Policies (CAPs) changes. Boot Configuration Data (BCD) modifications. @@ -3132,7 +3189,7 @@ Volume: Low. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -3169,7 +3226,7 @@ Volume: Low. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -3196,7 +3253,7 @@ Volume: Low. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -3233,7 +3290,7 @@ Volume: Low. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -3246,8 +3303,10 @@ Volume: Low. This policy setting allows you to audit events generated by the use of non-sensitive privileges (user rights). The following privileges are non-sensitive: Access Credential Manager as a trusted caller. Access this computer from the network. Add workstations to domain. Adjust memory quotas for a process. Allow log on locally. Allow log on through Terminal Services. Bypass traverse checking. Change the system time. Create a pagefile. Create global objects. Create permanent shared objects. Create symbolic links. Deny access this computer from the network. Deny log on as a batch job. Deny log on as a service. Deny log on locally. Deny log on through Terminal Services. Force shutdown from a remote system. Increase a process working set. Increase scheduling priority. Lock pages in memory. Log on as a batch job. Log on as a service. Modify an object label. Perform volume maintenance tasks. Profile single process. Profile system performance. Remove computer from docking station. Shut down the system. Synchronize directory service data. + - If you configure this policy setting, an audit event is generated when a non-sensitive privilege is called. Success audits record successful calls and Failure audits record unsuccessful calls. -- If you do not configure this policy setting, no audit event is generated when a non-sensitive privilege is called. + +- If you don't configure this policy setting, no audit event is generated when a non-sensitive privilege is called. @@ -3260,7 +3319,7 @@ Volume: Very High. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -3297,7 +3356,7 @@ Volume: Very High. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -3320,7 +3379,7 @@ Not used. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -3357,7 +3416,7 @@ Not used. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -3369,8 +3428,10 @@ Not used. This policy setting allows you to audit events generated when sensitive privileges (user rights) are used such as the following: A privileged service is called. One of the following privileges are called: Act as part of the operating system. Back up files and directories. Create a token object. Debug programs. Enable computer and user accounts to be trusted for delegation. Generate security audits. Impersonate a client after authentication. Load and unload device drivers. Manage auditing and security log. Modify firmware environment values. Replace a process-level token. Restore files and directories. Take ownership of files or other objects. + - If you configure this policy setting, an audit event is generated when sensitive privilege requests are made. Success audits record successful requests and Failure audits record unsuccessful requests. -- If you do not configure this policy setting, no audit event is generated when sensitive privilege requests are made. + +- If you don't configure this policy setting, no audit event is generated when sensitive privilege requests are made. @@ -3383,7 +3444,7 @@ Volume: High. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -3420,7 +3481,7 @@ Volume: High. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -3431,9 +3492,11 @@ Volume: High. -This policy setting allows you to audit events generated by the IPsec filter driver such as the following: Startup and shutdown of the IPsec services. Network packets dropped due to integrity check failure. Network packets dropped due to replay check failure. Network packets dropped due to being in plaintext. Network packets received with incorrect Security Parameter Index (SPI). This may indicate that either the network card is not working correctly or the driver needs to be updated. Inability to process IPsec filters. +This policy setting allows you to audit events generated by the IPsec filter driver such as the following: Startup and shutdown of the IPsec services. Network packets dropped due to integrity check failure. Network packets dropped due to replay check failure. Network packets dropped due to being in plaintext. Network packets received with incorrect Security Parameter Index (SPI). This may indicate that either the network card isn't working correctly or the driver needs to be updated. Inability to process IPsec filters. + - If you configure this policy setting, an audit event is generated on an IPsec filter driver operation. Success audits record successful attempts and Failure audits record unsuccessful attempts. -- If you do not configure this policy setting, no audit event is generated on an IPSec filter driver operation. + +- If you don't configure this policy setting, no audit event is generated on an IPSec filter driver operation. @@ -3446,7 +3509,7 @@ Volume: Low. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -3483,7 +3546,7 @@ Volume: Low. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -3507,7 +3570,7 @@ Volume: Low. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 3 | @@ -3544,7 +3607,7 @@ Volume: Low. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -3568,7 +3631,7 @@ Volume: Low. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -3605,7 +3668,7 @@ Volume: Low. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -3616,9 +3679,11 @@ Volume: Low. -This policy setting allows you to audit events related to security system extensions or services such as the following: A security system extension, such as an authentication, notification, or security package is loaded and is registered with the Local Security Authority (LSA). It is used to authenticate logon attempts, submit logon requests, and any account or password changes. Examples of security system extensions are Kerberos and NTLM. A service is installed and registered with the Service Control Manager. The audit log contains information about the service name, binary, type, start type, and service account. +This policy setting allows you to audit events related to security system extensions or services such as the following: A security system extension, such as an authentication, notification, or security package is loaded and is registered with the Local Security Authority (LSA). It's used to authenticate logon attempts, submit logon requests, and any account or password changes. Examples of security system extensions are Kerberos and NTLM. A service is installed and registered with the Service Control Manager. The audit log contains information about the service name, binary, type, start type, and service account. + - If you configure this policy setting, an audit event is generated when an attempt is made to load a security system extension. Success audits record successful attempts and Failure audits record unsuccessful attempts. -- If you do not configure this policy setting, no audit event is generated when an attempt is made to load a security system extension. + +- If you don't configure this policy setting, no audit event is generated when an attempt is made to load a security system extension. @@ -3631,7 +3696,7 @@ Volume: Low. Security system extension events are generated more often on a doma | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -3668,7 +3733,7 @@ Volume: Low. Security system extension events are generated more often on a doma | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1039] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.774] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.329] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1039] and later
    ✅ Windows 10, version 1809 [10.0.17763.774] and later
    ✅ Windows 10, version 1903 [10.0.18362.329] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -3679,7 +3744,7 @@ Volume: Low. Security system extension events are generated more often on a doma -This policy setting allows you to audit events that violate the integrity of the security subsystem, such as the following: Events that could not be written to the event log because of a problem with the auditing system. A process that uses a local procedure call (LPC) port that is not valid in an attempt to impersonate a client by replying, reading, or writing to or from a client address space. The detection of a Remote Procedure Call (RPC) that compromises system integrity. The detection of a hash value of an executable file that is not valid as determined by Code Integrity. Cryptographic operations that compromise system integrity. +This policy setting allows you to audit events that violate the integrity of the security subsystem, such as the following: Events that couldn't be written to the event log because of a problem with the auditing system. A process that uses a local procedure call (LPC) port that isn't valid in an attempt to impersonate a client by replying, reading, or writing to or from a client address space. The detection of a Remote Procedure Call (RPC) that compromises system integrity. The detection of a hash value of an executable file that isn't valid as determined by Code Integrity. Cryptographic operations that compromise system integrity. @@ -3692,7 +3757,7 @@ Volume: Low. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 3 | diff --git a/windows/client-management/mdm/policy-csp-authentication.md b/windows/client-management/mdm/policy-csp-authentication.md index 3fa1f38453..f89819c7ab 100644 --- a/windows/client-management/mdm/policy-csp-authentication.md +++ b/windows/client-management/mdm/policy-csp-authentication.md @@ -4,7 +4,7 @@ description: Learn more about the Authentication Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,8 +16,7 @@ ms.topic: reference # Policy CSP - Authentication -> [!IMPORTANT] -> This CSP contains preview policies that are under development and only applicable for [Windows Insider Preview builds](/windows-insider/). These policies are subject to change and may have dependencies on other features or services in preview. +[!INCLUDE [Windows Insider tip](includes/mdm-insider-csp-note.md)] @@ -29,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -54,7 +53,7 @@ This policy allows the Azure Active Directory (Azure AD) tenant administrator to | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -80,7 +79,7 @@ This policy allows the Azure Active Directory (Azure AD) tenant administrator to | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -103,7 +102,7 @@ Allows an EAP cert-based authentication for a single sign on (SSO) to access int | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -129,7 +128,7 @@ Allows an EAP cert-based authentication for a single sign on (SSO) to access int | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -152,7 +151,7 @@ Allows EAP Fast Reconnect from being attempted for EAP Method TLS. Most restrict | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -178,7 +177,7 @@ Allows EAP Fast Reconnect from being attempted for EAP Method TLS. Most restrict | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -191,9 +190,9 @@ Allows EAP Fast Reconnect from being attempted for EAP Method TLS. Most restrict This policy allows users to use a companion device, such as a phone, fitness band, or IoT device, to sign on to a desktop computer running Windows 10. The companion device provides a second factor of authentication with Windows Hello. -- If you enable or do not configure this policy setting, users can authenticate to Windows Hello using a companion device. +- If you enable or don't configure this policy setting, users can authenticate to Windows Hello using a companion device. -- If you disable this policy, users cannot use a companion device to authenticate with Windows Hello. +- If you disable this policy, users can't use a companion device to authenticate with Windows Hello. @@ -205,7 +204,7 @@ This policy allows users to use a companion device, such as a phone, fitness ban | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -245,7 +244,7 @@ This policy allows users to use a companion device, such as a phone, fitness ban | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -271,7 +270,7 @@ Specifies a list of domains that are allowed to access the webcam in Web Sign-in | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -294,7 +293,7 @@ Your organization federates to "Contoso IDP" and your web sign-in portal at `sig | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.2145] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.2145] and later | @@ -325,7 +324,7 @@ This policy specifies the list of domains that users can access in certain authe | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -348,7 +347,7 @@ Your organization's PIN reset or web sign-in authentication flow is expected to | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -376,7 +375,7 @@ This policy is intended for use on Shared PCs to enable a quick first sign-in ex | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -388,7 +387,7 @@ This policy is intended for use on Shared PCs to enable a quick first sign-in ex |:--|:--| | 0 (Default) | The feature defaults to the existing SKU and device capabilities. | | 1 | Enabled. Auto-connect new non-admin Azure AD accounts to pre-configured candidate local accounts. | -| 2 | Disabled. Do not auto-connect new non-admin Azure AD accounts to pre-configured local accounts. | +| 2 | Disabled. Don't auto-connect new non-admin Azure AD accounts to pre-configured local accounts. | @@ -403,7 +402,7 @@ This policy is intended for use on Shared PCs to enable a quick first sign-in ex | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -426,7 +425,7 @@ Specifies whether connected users on AADJ devices receive a Passwordless experie | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -438,7 +437,7 @@ Specifies whether connected users on AADJ devices receive a Passwordless experie |:--|:--| | 0 (Default) | The feature defaults to the existing edition and device capabilities. | | 1 | Enabled. The Passwordless experience will be enabled on Windows. | -| 2 | Disabled. The Passwordless experience will not be enabled on Windows. | +| 2 | Disabled. The Passwordless experience won't be enabled on Windows. | @@ -453,7 +452,7 @@ Specifies whether connected users on AADJ devices receive a Passwordless experie | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -484,7 +483,7 @@ Specifies whether web-based sign-in is allowed for signing in to Windows. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -496,7 +495,7 @@ Specifies whether web-based sign-in is allowed for signing in to Windows. |:--|:--| | 0 (Default) | The feature defaults to the existing SKU and device capabilities. | | 1 | Enabled. Web Sign-in will be enabled for signing in to Windows. | -| 2 | Disabled. Web Sign-in will not be enabled for signing in to Windows. | +| 2 | Disabled. Web Sign-in won't be enabled for signing in to Windows. | @@ -511,7 +510,7 @@ Specifies whether web-based sign-in is allowed for signing in to Windows. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -534,7 +533,7 @@ Specifies the preferred domain among available domains in the AAD tenant. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | diff --git a/windows/client-management/mdm/policy-csp-autoplay.md b/windows/client-management/mdm/policy-csp-autoplay.md index 2cd4bd68ad..b5b2859f9f 100644 --- a/windows/client-management/mdm/policy-csp-autoplay.md +++ b/windows/client-management/mdm/policy-csp-autoplay.md @@ -4,7 +4,7 @@ description: Learn more about the Autoplay Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - Autoplay -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -48,9 +45,9 @@ ms.topic: reference This policy setting disallows AutoPlay for MTP devices like cameras or phones. -- If you enable this policy setting, AutoPlay is not allowed for MTP devices like cameras or phones. +- If you enable this policy setting, AutoPlay isn't allowed for MTP devices like cameras or phones. -- If you disable or do not configure this policy setting, AutoPlay is enabled for non-volume devices. +- If you disable or don't configure this policy setting, AutoPlay is enabled for non-volume devices. @@ -62,13 +59,12 @@ This policy setting disallows AutoPlay for MTP devices like cameras or phones. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -95,7 +91,7 @@ This policy setting disallows AutoPlay for MTP devices like cameras or phones. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -120,8 +116,7 @@ This creates a major security concern as code may be executed without user's kno - If you enable this policy setting, an Administrator can change the default Windows Vista or later behavior for autorun to: -a) Completely disable autorun commands, or -b) Revert back to pre-Windows Vista behavior of automatically executing the autorun command. +a) Completely disable autorun commands, or b) Revert back to pre-Windows Vista behavior of automatically executing the autorun command. - If you disable or not configure this policy setting, Windows Vista or later will prompt the user whether autorun command is to be run. @@ -135,13 +130,12 @@ b) Revert back to pre-Windows Vista behavior of automatically executing the auto | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -167,7 +161,7 @@ b) Revert back to pre-Windows Vista behavior of automatically executing the auto | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -192,9 +186,9 @@ Starting with Windows XP SP2, Autoplay is enabled for removable drives as well, - If you enable this policy setting, Autoplay is disabled on CD-ROM and removable media drives, or disabled on all drives. -This policy setting disables Autoplay on additional types of drives. You cannot use this setting to enable Autoplay on drives on which it is disabled by default. +This policy setting disables Autoplay on additional types of drives. You can't use this setting to enable Autoplay on drives on which it's disabled by default. -- If you disable or do not configure this policy setting, AutoPlay is enabled. +- If you disable or don't configure this policy setting, AutoPlay is enabled. > [!NOTE] > This policy setting appears in both the Computer Configuration and User Configuration folders. If the policy settings conflict, the policy setting in Computer Configuration takes precedence over the policy setting in User Configuration. @@ -209,13 +203,12 @@ This policy setting disables Autoplay on additional types of drives. You cannot | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-bitlocker.md b/windows/client-management/mdm/policy-csp-bitlocker.md index 21bab7bc1e..25e1f03451 100644 --- a/windows/client-management/mdm/policy-csp-bitlocker.md +++ b/windows/client-management/mdm/policy-csp-bitlocker.md @@ -4,7 +4,7 @@ description: Learn more about the Bitlocker Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -28,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -57,7 +57,7 @@ The following list shows the supported values: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-4294967295]` | | Default Value | 6 | diff --git a/windows/client-management/mdm/policy-csp-bits.md b/windows/client-management/mdm/policy-csp-bits.md index a51ea4a85a..f9002b94a5 100644 --- a/windows/client-management/mdm/policy-csp-bits.md +++ b/windows/client-management/mdm/policy-csp-bits.md @@ -4,7 +4,7 @@ description: Learn more about the BITS Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -37,16 +37,16 @@ ms.topic: reference -This policy setting limits the network bandwidth that Background Intelligent Transfer Service (BITS) uses for background transfers. (This policy setting does not affect foreground transfers.) +This policy setting limits the network bandwidth that Background Intelligent Transfer Service (BITS) uses for background transfers. (This policy setting doesn't affect foreground transfers). You can specify a limit to use during a specific time interval and at all other times. For example, limit the use of network bandwidth to 10 Kbps from 8:00 A. M. to 5:00 P. M., and use all available unused bandwidth the rest of the day's hours. - If you enable this policy setting, BITS will limit its bandwidth usage to the specified values. You can specify the limit in kilobits per second (Kbps). If you specify a value less than 2 kilobits, BITS will continue to use approximately 2 kilobits. To prevent BITS transfers from occurring, specify a limit of 0. -- If you disable or do not configure this policy setting, BITS uses all available unused bandwidth. +- If you disable or don't configure this policy setting, BITS uses all available unused bandwidth. > [!NOTE] -> You should base the limit on the speed of the network link, not the computer's network interface card (NIC). This policy setting does not affect Peercaching transfers between peer computers (it does affect transfers from the origin server); the "Limit the maximum network bandwidth used for Peercaching" policy setting should be used for that purpose. +> You should base the limit on the speed of the network link, not the computer's network interface card (NIC). This policy setting doesn't affect Peercaching transfers between peer computers (it does affect transfers from the origin server); the "Limit the maximum network bandwidth used for Peercaching" policy setting should be used for that purpose. Consider using this setting to prevent BITS transfers from competing for network bandwidth when the client computer has a fast network card (10Mbs), but is connected to the network via a slow link (56Kbs). @@ -60,7 +60,7 @@ Consider using this setting to prevent BITS transfers from competing for network | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-23]` | | Default Value | 17 | @@ -92,7 +92,7 @@ Consider using this setting to prevent BITS transfers from competing for network | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -103,16 +103,16 @@ Consider using this setting to prevent BITS transfers from competing for network -This policy setting limits the network bandwidth that Background Intelligent Transfer Service (BITS) uses for background transfers. (This policy setting does not affect foreground transfers.) +This policy setting limits the network bandwidth that Background Intelligent Transfer Service (BITS) uses for background transfers. (This policy setting doesn't affect foreground transfers). You can specify a limit to use during a specific time interval and at all other times. For example, limit the use of network bandwidth to 10 Kbps from 8:00 A. M. to 5:00 P. M., and use all available unused bandwidth the rest of the day's hours. - If you enable this policy setting, BITS will limit its bandwidth usage to the specified values. You can specify the limit in kilobits per second (Kbps). If you specify a value less than 2 kilobits, BITS will continue to use approximately 2 kilobits. To prevent BITS transfers from occurring, specify a limit of 0. -- If you disable or do not configure this policy setting, BITS uses all available unused bandwidth. +- If you disable or don't configure this policy setting, BITS uses all available unused bandwidth. > [!NOTE] -> You should base the limit on the speed of the network link, not the computer's network interface card (NIC). This policy setting does not affect Peercaching transfers between peer computers (it does affect transfers from the origin server); the "Limit the maximum network bandwidth used for Peercaching" policy setting should be used for that purpose. +> You should base the limit on the speed of the network link, not the computer's network interface card (NIC). This policy setting doesn't affect Peercaching transfers between peer computers (it does affect transfers from the origin server); the "Limit the maximum network bandwidth used for Peercaching" policy setting should be used for that purpose. Consider using this setting to prevent BITS transfers from competing for network bandwidth when the client computer has a fast network card (10Mbs), but is connected to the network via a slow link (56Kbs). @@ -126,7 +126,7 @@ Consider using this setting to prevent BITS transfers from competing for network | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-23]` | | Default Value | 8 | @@ -158,7 +158,7 @@ Consider using this setting to prevent BITS transfers from competing for network | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -169,16 +169,16 @@ Consider using this setting to prevent BITS transfers from competing for network -This policy setting limits the network bandwidth that Background Intelligent Transfer Service (BITS) uses for background transfers. (This policy setting does not affect foreground transfers.) +This policy setting limits the network bandwidth that Background Intelligent Transfer Service (BITS) uses for background transfers. (This policy setting doesn't affect foreground transfers). You can specify a limit to use during a specific time interval and at all other times. For example, limit the use of network bandwidth to 10 Kbps from 8:00 A. M. to 5:00 P. M., and use all available unused bandwidth the rest of the day's hours. - If you enable this policy setting, BITS will limit its bandwidth usage to the specified values. You can specify the limit in kilobits per second (Kbps). If you specify a value less than 2 kilobits, BITS will continue to use approximately 2 kilobits. To prevent BITS transfers from occurring, specify a limit of 0. -- If you disable or do not configure this policy setting, BITS uses all available unused bandwidth. +- If you disable or don't configure this policy setting, BITS uses all available unused bandwidth. > [!NOTE] -> You should base the limit on the speed of the network link, not the computer's network interface card (NIC). This policy setting does not affect Peercaching transfers between peer computers (it does affect transfers from the origin server); the "Limit the maximum network bandwidth used for Peercaching" policy setting should be used for that purpose. +> You should base the limit on the speed of the network link, not the computer's network interface card (NIC). This policy setting doesn't affect Peercaching transfers between peer computers (it does affect transfers from the origin server); the "Limit the maximum network bandwidth used for Peercaching" policy setting should be used for that purpose. Consider using this setting to prevent BITS transfers from competing for network bandwidth when the client computer has a fast network card (10Mbs), but is connected to the network via a slow link (56Kbs). @@ -192,7 +192,7 @@ Consider using this setting to prevent BITS transfers from competing for network | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-4294967200]` | | Default Value | 1000 | @@ -224,7 +224,7 @@ Consider using this setting to prevent BITS transfers from competing for network | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -237,23 +237,31 @@ Consider using this setting to prevent BITS transfers from competing for network This policy setting defines the default behavior that the Background Intelligent Transfer Service (BITS) uses for background transfers when the system is connected to a costed network (3G, etc.). Download behavior policies further limit the network usage of background transfers. -If you enable this policy setting, you can define a default download policy for each BITS job priority. This setting does not override a download policy explicitly configured by the application that created the BITS job, but does apply to jobs that are created by specifying only a priority. +If you enable this policy setting, you can define a default download policy for each BITS job priority. This setting doesn't override a download policy explicitly configured by the application that created the BITS job, but does apply to jobs that are created by specifying only a priority. For example, you can specify that background jobs are by default to transfer only when on uncosted network connections, but foreground jobs should proceed only when not roaming. The values that can be assigned are: - - Always transfer - - Transfer unless roaming - - Transfer unless surcharge applies (when not roaming or overcap) - - Transfer unless nearing limit (when not roaming or nearing cap) - - Transfer only if unconstrained - - Custom--allows you to specify a bitmask, in which the bits describe cost states allowed or disallowed for this priority: (bits described here) + +- Always transfer +- Transfer unless roaming +- Transfer unless surcharge applies (when not roaming or overcap) +- Transfer unless nearing limit (when not roaming or nearing cap) +- Transfer only if unconstrained +- Custom--allows you to specify a bitmask, in which the bits describe cost states allowed or disallowed for this priority: (bits described here) 0x1 - The cost is unknown or the connection is unlimited and is considered to be unrestricted of usage charges and capacity constraints. + 0x2 - The usage of this connection is unrestricted up to a certain data limit 0x4 - The usage of this connection is unrestricted up to a certain data limit and plan usage is less than 80 percent of the limit. + 0x8 - Usage of this connection is unrestricted up to a certain data limit and plan usage is between 80 percent and 100 percent of the limit. + 0x10 - Usage of this connection is unrestricted up to a certain data limit, which has been exceeded. Surcharge applied or unknown. + 0x20 - Usage of this connection is unrestricted up to a certain data limit, which has been exceeded. No surcharge applies, but speeds are likely reduced. + 0x40 - The connection is costed on a per-byte basis. + 0x80 - The connection is roaming. + 0x80000000 - Ignore congestion. @@ -266,7 +274,7 @@ For example, you can specify that background jobs are by default to transfer onl | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -309,7 +317,7 @@ For example, you can specify that background jobs are by default to transfer onl | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -322,23 +330,31 @@ For example, you can specify that background jobs are by default to transfer onl This policy setting defines the default behavior that the Background Intelligent Transfer Service (BITS) uses for background transfers when the system is connected to a costed network (3G, etc.). Download behavior policies further limit the network usage of background transfers. -If you enable this policy setting, you can define a default download policy for each BITS job priority. This setting does not override a download policy explicitly configured by the application that created the BITS job, but does apply to jobs that are created by specifying only a priority. +If you enable this policy setting, you can define a default download policy for each BITS job priority. This setting doesn't override a download policy explicitly configured by the application that created the BITS job, but does apply to jobs that are created by specifying only a priority. For example, you can specify that background jobs are by default to transfer only when on uncosted network connections, but foreground jobs should proceed only when not roaming. The values that can be assigned are: - - Always transfer - - Transfer unless roaming - - Transfer unless surcharge applies (when not roaming or overcap) - - Transfer unless nearing limit (when not roaming or nearing cap) - - Transfer only if unconstrained - - Custom--allows you to specify a bitmask, in which the bits describe cost states allowed or disallowed for this priority: (bits described here) + +- Always transfer +- Transfer unless roaming +- Transfer unless surcharge applies (when not roaming or overcap) +- Transfer unless nearing limit (when not roaming or nearing cap) +- Transfer only if unconstrained +- Custom--allows you to specify a bitmask, in which the bits describe cost states allowed or disallowed for this priority: (bits described here) 0x1 - The cost is unknown or the connection is unlimited and is considered to be unrestricted of usage charges and capacity constraints. + 0x2 - The usage of this connection is unrestricted up to a certain data limit 0x4 - The usage of this connection is unrestricted up to a certain data limit and plan usage is less than 80 percent of the limit. + 0x8 - Usage of this connection is unrestricted up to a certain data limit and plan usage is between 80 percent and 100 percent of the limit. + 0x10 - Usage of this connection is unrestricted up to a certain data limit, which has been exceeded. Surcharge applied or unknown. + 0x20 - Usage of this connection is unrestricted up to a certain data limit, which has been exceeded. No surcharge applies, but speeds are likely reduced. + 0x40 - The connection is costed on a per-byte basis. + 0x80 - The connection is roaming. + 0x80000000 - Ignore congestion. @@ -351,7 +367,7 @@ For example, you can specify that background jobs are by default to transfer onl | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -394,7 +410,7 @@ For example, you can specify that background jobs are by default to transfer onl | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -411,11 +427,12 @@ This policy setting specifies the number of days a pending BITS job can remain i > Any property changes to the job or any successful download action will reset this timeout. Consider increasing the timeout value if computers tend to stay offline for a long period of time and still have pending jobs. + Consider decreasing this value if you are concerned about orphaned jobs occupying disk space. - If you enable this policy setting, you can configure the inactive job timeout to specified number of days. -- If you disable or do not configure this policy setting, the default value of 90 (days) will be used for the inactive job timeout. +- If you disable or don't configure this policy setting, the default value of 90 (days) will be used for the inactive job timeout. @@ -427,7 +444,7 @@ Consider decreasing this value if you are concerned about orphaned jobs occupyin | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[1-999]` | | Default Value | 90 | diff --git a/windows/client-management/mdm/policy-csp-bluetooth.md b/windows/client-management/mdm/policy-csp-bluetooth.md index d3031acbca..fdfb7dee5d 100644 --- a/windows/client-management/mdm/policy-csp-bluetooth.md +++ b/windows/client-management/mdm/policy-csp-bluetooth.md @@ -4,7 +4,7 @@ description: Learn more about the Bluetooth Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -37,7 +37,7 @@ ms.topic: reference -Specifies whether the device can send out Bluetooth advertisements. If this is not set or it is deleted, the default value of 1 (Allow) is used. Most restricted value is 0. +Specifies whether the device can send out Bluetooth advertisements. If this isn't set or it's deleted, the default value of 1 (Allow) is used. Most restricted value is 0. @@ -49,7 +49,7 @@ Specifies whether the device can send out Bluetooth advertisements. If this is n | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -59,7 +59,7 @@ Specifies whether the device can send out Bluetooth advertisements. If this is n | Value | Description | |:--|:--| -| 0 | Not allowed. When set to 0, the device will not send out advertisements. To verify, use any Bluetooth LE app and enable it to do advertising. Then, verify that the advertisement is not received by the peripheral. | +| 0 | Not allowed. When set to 0, the device won't send out advertisements. To verify, use any Bluetooth LE app and enable it to do advertising. Then, verify that the advertisement isn't received by the peripheral. | | 1 (Default) | Allowed. When set to 1, the device will send out advertisements. To verify, use any Bluetooth LE app and enable it to do advertising. Then, verify that the advertisement is received by the peripheral. | @@ -75,7 +75,7 @@ Specifies whether the device can send out Bluetooth advertisements. If this is n | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -86,7 +86,7 @@ Specifies whether the device can send out Bluetooth advertisements. If this is n -Specifies whether other Bluetooth-enabled devices can discover the device. If this is not set or it is deleted, the default value of 1 (Allow) is used. Most restricted value is 0. +Specifies whether other Bluetooth-enabled devices can discover the device. If this isn't set or it's deleted, the default value of 1 (Allow) is used. Most restricted value is 0. @@ -98,7 +98,7 @@ Specifies whether other Bluetooth-enabled devices can discover the device. If th | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -108,7 +108,7 @@ Specifies whether other Bluetooth-enabled devices can discover the device. If th | Value | Description | |:--|:--| -| 0 | Not allowed. When set to 0, other devices will not be able to detect the device. To verify, open the Bluetooth control panel on the device. Then, go to another Bluetooth-enabled device, open the Bluetooth control panel, and verify that you cannot see the name of the device. | +| 0 | Not allowed. When set to 0, other devices won't be able to detect the device. To verify, open the Bluetooth control panel on the device. Then, go to another Bluetooth-enabled device, open the Bluetooth control panel, and verify that you can't see the name of the device. | | 1 (Default) | Allowed. When set to 1, other devices will be able to detect the device. To verify, open the Bluetooth control panel on the device. Then, go to another Bluetooth-enabled device, open the Bluetooth control panel and verify that you can discover it. | @@ -124,7 +124,7 @@ Specifies whether other Bluetooth-enabled devices can discover the device. If th | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -147,7 +147,7 @@ Specifies whether to allow specific bundled Bluetooth peripherals to automatical | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -173,7 +173,7 @@ Specifies whether to allow specific bundled Bluetooth peripherals to automatical | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -196,7 +196,7 @@ This policy allows the IT admin to block users on these managed devices from usi | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -222,7 +222,7 @@ This policy allows the IT admin to block users on these managed devices from usi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -233,7 +233,7 @@ This policy allows the IT admin to block users on these managed devices from usi -Sets the local Bluetooth device name. If this is set, the value that it is set to will be used as the Bluetooth device name. To verify the policy is set, open the Bluetooth control panel on the device. Then, go to another Bluetooth-enabled device, open the Bluetooth control panel, and verify that the value that was specified. If this policy is not set or it is deleted, the default local radio name is used. +Sets the local Bluetooth device name. If this is set, the value that it's set to will be used as the Bluetooth device name. To verify the policy is set, open the Bluetooth control panel on the device. Then, go to another Bluetooth-enabled device, open the Bluetooth control panel, and verify that the value that was specified. If this policy isn't set or it's deleted, the default local radio name is used. @@ -245,7 +245,7 @@ Sets the local Bluetooth device name. If this is set, the value that it is set t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -261,7 +261,7 @@ Sets the local Bluetooth device name. If this is set, the value that it is set t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -284,7 +284,7 @@ Set a list of allowable services and profiles. String hex formatted array of Blu | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -301,7 +301,7 @@ Set a list of allowable services and profiles. String hex formatted array of Blu | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -324,7 +324,7 @@ There are multiple levels of encryption strength when pairing Bluetooth devices. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[1-16]` | | Default Value | 0 | diff --git a/windows/client-management/mdm/policy-csp-browser.md b/windows/client-management/mdm/policy-csp-browser.md index 821501520e..8baca30d66 100644 --- a/windows/client-management/mdm/policy-csp-browser.md +++ b/windows/client-management/mdm/policy-csp-browser.md @@ -4,7 +4,7 @@ description: Learn more about the Browser Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/27/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -28,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -62,7 +62,7 @@ This policy setting lets you decide whether the Address bar drop-down functional | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -102,7 +102,7 @@ This policy setting lets you decide whether the Address bar drop-down functional | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -135,7 +135,7 @@ This policy setting lets you decide whether employees can use Autofill to automa | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -185,7 +185,7 @@ To verify AllowAutofill is set to 0 (not allowed): | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ✅ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -212,7 +212,7 @@ This policy is deprecated. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -238,7 +238,7 @@ This policy is deprecated. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -265,7 +265,7 @@ This policy setting lets you decide whether Microsoft Edge can automatically upd | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -291,7 +291,7 @@ This policy setting lets you decide whether Microsoft Edge can automatically upd | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -309,8 +309,11 @@ This policy setting lets you decide whether Microsoft Edge can automatically upd This setting lets you configure how to work with cookies. - If you enable this setting, you must also decide whether to: + Allow all cookies (default): Allows all cookies from all websites. + Block all cookies: Blocks all cookies from all websites. + Block only 3rd-party cookies: Blocks only cookies from 3rd-party websites. - If you disable or don't configure this setting, all cookies are allowed from all sites. @@ -325,7 +328,7 @@ Block only 3rd-party cookies: Blocks only cookies from 3rd-party websites. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 2 | @@ -373,7 +376,7 @@ To verify AllowCookies is set to 0 (not allowed): | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -404,7 +407,7 @@ This policy setting lets you decide whether F12 Developer Tools are available on | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -444,7 +447,7 @@ This policy setting lets you decide whether F12 Developer Tools are available on | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -477,7 +480,7 @@ This policy setting lets you decide whether employees can send Do Not Track requ | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -524,7 +527,7 @@ To verify AllowDoNotTrack is set to 0 (not allowed): | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -555,7 +558,7 @@ This setting lets you decide whether employees can load extensions in Microsoft | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -595,7 +598,7 @@ This setting lets you decide whether employees can load extensions in Microsoft | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -626,7 +629,7 @@ This setting lets you decide whether employees can run Adobe Flash in Microsoft | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -666,7 +669,7 @@ This setting lets you decide whether employees can run Adobe Flash in Microsoft | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -695,7 +698,7 @@ Sites get onto the auto-allowed list based on user feedback, specifically by how | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -735,7 +738,7 @@ Sites get onto the auto-allowed list based on user feedback, specifically by how | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -766,7 +769,7 @@ If disabled, full-screen mode is unavailable for use in Microsoft Edge. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -806,7 +809,7 @@ If disabled, full-screen mode is unavailable for use in Microsoft Edge. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -837,7 +840,7 @@ This policy setting lets you decide whether employees can browse using InPrivate | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -877,7 +880,7 @@ This policy setting lets you decide whether employees can browse using InPrivate | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -908,7 +911,7 @@ This policy setting lets you decide whether to use the Microsoft Compatibility L | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -948,7 +951,7 @@ This policy setting lets you decide whether to use the Microsoft Compatibility L | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -981,7 +984,7 @@ This policy setting lets you decide whether employees can save their passwords l | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1026,7 +1029,7 @@ To verify AllowPasswordManager is set to 0 (not allowed): | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1059,7 +1062,7 @@ This policy setting lets you decide whether to turn on Pop-up Blocker. By defaul | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1104,7 +1107,7 @@ To verify AllowPopups is set to 0 (not allowed): | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -1135,7 +1138,7 @@ If you prevent pre-launch, Microsoft Edge won't pre-launch during Windows sign i | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1174,7 +1177,7 @@ If you prevent pre-launch, Microsoft Edge won't pre-launch during Windows sign i | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -1193,7 +1196,7 @@ With this policy, you can restrict whether printing web content in Microsoft Edg If enabled, printing is allowed. -If disabled, printing is not allowed. +If disabled, printing isn't allowed. @@ -1205,7 +1208,7 @@ If disabled, printing is not allowed. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1245,7 +1248,7 @@ If disabled, printing is not allowed. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -1264,7 +1267,7 @@ Microsoft Edge saves your user's browsing history, which is made up of info abou If enabled or not configured, the browsing history is saved and visible in the History pane. -If disabled, the browsing history stops saving and is not visible in the History pane. If browsing history exists before this policy was disabled, the previous browsing history remains visible in the History pane. This policy, when disabled, does not stop roaming of existing history or history coming from other roamed devices. +If disabled, the browsing history stops saving and isn't visible in the History pane. If browsing history exists before this policy was disabled, the previous browsing history remains visible in the History pane. This policy, when disabled, doesn't stop roaming of existing history or history coming from other roamed devices. @@ -1276,7 +1279,7 @@ If disabled, the browsing history stops saving and is not visible in the History | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1316,7 +1319,7 @@ If disabled, the browsing history stops saving and is not visible in the History | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1332,9 +1335,11 @@ If disabled, the browsing history stops saving and is not visible in the History This policy setting lets you decide whether users can change their search engine. + - If you disable this setting, users can't add new search engines or change the default used in the address bar. -**Important** +Important. + This setting can only be used with domain-joined or MDM-enrolled devices. For more info, see the Microsoft browser extension policy (aka.ms/browserpolicy). - If you enable or don't configure this policy, users can add new search engines and change the default used in the address bar from within Microsoft Edge Settings. @@ -1351,7 +1356,7 @@ This setting can only be used with domain-joined or MDM-enrolled devices. For mo | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1391,7 +1396,7 @@ This setting can only be used with domain-joined or MDM-enrolled devices. For mo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1424,7 +1429,7 @@ This policy setting lets you decide whether search suggestions appear in the Add | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1464,7 +1469,7 @@ This policy setting lets you decide whether search suggestions appear in the Add | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -1483,15 +1488,17 @@ Sideloading installs and runs unverified extensions in Microsoft Edge. With this If enabled or not configured, sideloading of unverified extensions in Microsoft Edge is allowed. -If disabled, sideloading of unverified extensions in Microsoft Edge is not allowed. Extensions can be installed only through Microsoft store (including a store for business), enterprise storefront (such as Company Portal) or PowerShell (using Add-AppxPackage). When disabled, this policy does not prevent sideloading of extensions using Add-AppxPackage via PowerShell. To prevent this, in Group Policy Editor, enable Allows development of Windows Store apps and installing them from an integrated development environment (IDE), which is located at: +If disabled, sideloading of unverified extensions in Microsoft Edge isn't allowed. Extensions can be installed only through Microsoft store (including a store for business), enterprise storefront (such as Company Portal) or PowerShell (using Add-AppxPackage). When disabled, this policy doesn't prevent sideloading of extensions using Add-AppxPackage via PowerShell. To prevent this, in Group Policy Editor, enable Allows development of Windows Store apps and installing them from an integrated development environment (IDE), which is located at: -Computer Configuration > Administrative Templates > Windows Components > App Package Deployment +Computer Configuration > Administrative Templates > Windows Components > App Package Deployment. Supported versions: Microsoft Edge on Windows 10, version 1809 -Default setting: Disabled or not configured +Default setting: Disabled or not configured. + Related policies: - - Allows development of Windows Store apps and installing them from an integrated development environment (IDE) - - Allow all trusted apps to install + +- Allows development of Windows Store apps and installing them from an integrated development environment (IDE) +- Allow all trusted apps to install @@ -1503,7 +1510,7 @@ Related policies: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1513,7 +1520,7 @@ Related policies: | Value | Description | |:--|:--| -| 0 | Prevented/Not allowed. Disabling does not prevent sideloading of extensions using Add-AppxPackage via Powershell. To prevent this, set the ApplicationManagement/AllowDeveloperUnlock policy to 1 (enabled). | +| 0 | Prevented/Not allowed. Disabling doesn't prevent sideloading of extensions using Add-AppxPackage via Powershell. To prevent this, set the ApplicationManagement/AllowDeveloperUnlock policy to 1 (enabled). | | 1 (Default) | Allowed. | @@ -1543,7 +1550,7 @@ Related policies: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1576,7 +1583,7 @@ This policy setting lets you configure whether to turn on Windows Defender Smart | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1586,7 +1593,7 @@ This policy setting lets you configure whether to turn on Windows Defender Smart | Value | Description | |:--|:--| -| 0 | Turned off. Do not protect users from potential threats and prevent users from turning it on. | +| 0 | Turned off. Don't protect users from potential threats and prevent users from turning it on. | | 1 (Default) | Turned on. Protect users from potential threats and prevent users from turning it off. | @@ -1621,7 +1628,7 @@ To verify AllowSmartScreen is set to 0 (not allowed): | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -1652,7 +1659,7 @@ If you prevent preloading, Microsoft Edge won't load the Start or New Tab page d | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1691,7 +1698,7 @@ If you prevent preloading, Microsoft Edge won't load the Start or New Tab page d | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -1724,7 +1731,7 @@ This policy setting lets you configure what appears when Microsoft Edge opens a | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1764,7 +1771,7 @@ This policy setting lets you configure what appears when Microsoft Edge opens a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1795,7 +1802,7 @@ This policy setting helps you to decide whether to make the Books tab visible, r | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1835,7 +1842,7 @@ This policy setting helps you to decide whether to make the Books tab visible, r | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1852,7 +1859,7 @@ This policy setting helps you to decide whether to make the Books tab visible, r This policy setting allows the automatic clearing of browsing data when Microsoft Edge closes. -- If you enable this policy setting, clearing browsing history on exit is turned on. +- If you enable this policy setting, clearing browsing history on exit's turned on. - If you disable or don't configure this policy setting, it can be turned on and configured by the employee in the Clear browsing data options under Settings. @@ -1866,7 +1873,7 @@ This policy setting allows the automatic clearing of browsing data when Microsof | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1913,7 +1920,7 @@ To verify whether browsing data is cleared on exit (ClearBrowsingDataOnExit is s | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1930,14 +1937,15 @@ To verify whether browsing data is cleared on exit (ClearBrowsingDataOnExit is s This policy setting lets you add up to 5 additional search engines, which can't be removed by your employees, but can be made a personal default engine. This setting doesn't set the default search engine. For that, you must use the "Set default search engine" setting. -**Important** +Important. + This setting can only be used with domain-joined or MDM-enrolled devices. For more info, see the Microsoft browser extension policy (aka.ms/browserpolicy). - If you enable this setting, you can add up to 5 additional search engines. For each additional engine, you must also add a link to your OpenSearch XML file, including at least the short name and https: URL of the search engine. For more info about creating the OpenSearch XML file, see the Understanding OpenSearch Standards (https://msdn.microsoft.com/library/dd163546.aspx) topic. Use this format to specify the link(s) you wish to add: `` `` - If you disable this setting, any added search engines are removed from your employee's devices. -- If you don't configure this setting, the search engine list is set to what is specified in App settings. +- If you don't configure this setting, the search engine list is set to what's specified in App settings. @@ -1949,7 +1957,7 @@ This setting can only be used with domain-joined or MDM-enrolled devices. For mo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1979,7 +1987,7 @@ This setting can only be used with domain-joined or MDM-enrolled devices. For mo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -1994,7 +2002,7 @@ This setting can only be used with domain-joined or MDM-enrolled devices. For mo -The favorites bar shows your user's links to sites they have added to it. With this policy, you can specify whether to set the favorites bar to always be visible or hidden on any page. +The favorites bar shows your user's links to sites they've added to it. With this policy, you can specify whether to set the favorites bar to always be visible or hidden on any page. If enabled, favorites bar is always visible on any page, and the favorites bar toggle in Settings sets to On, but disabled preventing your users from making changes. An error message also shows at the top of the Settings pane indicating that your organization manages some settings. The show bar/hide bar option is hidden from the context menu. @@ -2012,7 +2020,7 @@ If not configured, the favorites bar is hidden but is visible on the Start and N | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2052,7 +2060,7 @@ If not configured, the favorites bar is hidden but is visible on the Start and N | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -2074,15 +2082,21 @@ By default, this policy is disabled or not configured and clicking the home butt When enabled, the home button is locked down preventing your users from making changes in Microsoft Edge's UI settings. To let your users change the Microsoft Edge UI settings, enable the Unlock Home Button policy. If Enabled AND: - - Show home button & set to Start page is selected, clicking the home button loads the Start page. - - Show home button & set to New tab page is selected, clicking the home button loads a New tab page. - - Show home button & set a specific page is selected, clicking the home button loads the URL specified in the Set Home Button URL policy. - - Hide home button is selected, the home button is hidden in Microsoft Edge. -Default setting: Disabled or not configured +- Show home button & set to Start page is selected, clicking the home button loads the Start page. + +- Show home button & set to New tab page is selected, clicking the home button loads a New tab page. + +- Show home button & set a specific page is selected, clicking the home button loads the URL specified in the Set Home Button URL policy. + +- Hide home button is selected, the home button is hidden in Microsoft Edge. + +Default setting: Disabled or not configured. + Related policies: - - Set Home Button URL - - Unlock Home Button. + +- Set Home Button URL +- Unlock Home Button. @@ -2094,7 +2108,7 @@ Related policies: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2138,7 +2152,7 @@ Related policies: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -2158,11 +2172,16 @@ Configure how Microsoft Edge behaves when it's running in kiosk mode with assign You need to configure Microsoft Edge in assigned access for this policy to take effect; otherwise, these settings are ignored. To learn more about assigned access and kiosk configuration, see "Configure kiosk and shared devices running Windows desktop editions" (https://aka.ms/E489vw). If enabled and set to 0 (Default or not configured): - - If it's a single app, it runs InPrivate full screen for digital signage or interactive displays. - - If it's one of many apps, Microsoft Edge runs as normal. + +- If it's a single app, it runs InPrivate full screen for digital signage or interactive displays. + +- If it's one of many apps, Microsoft Edge runs as normal. + If enabled and set to 1: - - If it's a single app, it runs a limited multi-tab version of InPrivate and is the only app available for public browsing. Users can't minimize, close, or open windows or customize Microsoft Edge, but can clear browsing data and downloads and restart by clicking "End session." You can configure Microsoft Edge to restart after a period of inactivity by using the "Configure kiosk reset after idle timeout" policy. - - If it's one of many apps, it runs in a limited multi-tab version of InPrivate for public browsing with other apps. Users can minimize, close, and open multiple InPrivate windows, but they can't customize Microsoft Edge. + +- If it's a single app, it runs a limited multi-tab version of InPrivate and is the only app available for public browsing. Users can't minimize, close, or open windows or customize Microsoft Edge, but can clear browsing data and downloads and restart by clicking "End session". You can configure Microsoft Edge to restart after a period of inactivity by using the "Configure kiosk reset after idle timeout" policy. + +- If it's one of many apps, it runs in a limited multi-tab version of InPrivate for public browsing with other apps. Users can minimize, close, and open multiple InPrivate windows, but they can't customize Microsoft Edge. @@ -2174,7 +2193,7 @@ If enabled and set to 1: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2213,7 +2232,7 @@ If enabled and set to 1: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -2232,11 +2251,11 @@ You can configure Microsoft Edge to reset to the configured start experience aft If enabled, you can set the idle time in minutes (0-1440). You must set the Configure kiosk mode policy to 1 and configure Microsoft Edge in assigned access as a single app for this policy to work. Once the idle time meets the time specified, a confirmation message prompts the user to continue, and if no user action, Microsoft Edge resets after 30 seconds. -If you set this policy to 0, Microsoft Edge does not use an idle timer. +If you set this policy to 0, Microsoft Edge doesn't use an idle timer. If disabled or not configured, the default value is 5 minutes. -If you do not configure Microsoft Edge in assigned access, then this policy does not take effect. +If you don't configure Microsoft Edge in assigned access, then this policy doesn't take effect. @@ -2248,7 +2267,7 @@ If you do not configure Microsoft Edge in assigned access, then this policy does | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-1440]` | | Default Value | 5 | @@ -2280,7 +2299,7 @@ If you do not configure Microsoft Edge in assigned access, then this policy does | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -2298,10 +2317,14 @@ If you do not configure Microsoft Edge in assigned access, then this policy does You can configure Microsoft Edge to lock down the Start page, preventing users from changing or customizing it. If enabled, you can choose one of the following options: - - Start page: the Start page loads ignoring the Configure Start Pages policy. - - New tab page: the New tab page loads ignoring the Configure Start Pages policy. - - Previous pages: all tabs the user had open when Microsoft Edge last closed loads ignoring the Configure Start Pages policy. - - A specific page or pages: the URL(s) specified with Configure Start Pages policy load(s). If selected, you must specify at least one URL in Configure Start Pages; otherwise, this policy is ignored. + +- Start page: the Start page loads ignoring the Configure Start Pages policy. + +- New tab page: the New tab page loads ignoring the Configure Start Pages policy. + +- Previous pages: all tabs the user had open when Microsoft Edge last closed loads ignoring the Configure Start Pages policy. + +- A specific page or pages: the URL(s) specified with Configure Start Pages policy load(s). If selected, you must specify at least one URL in Configure Start Pages; otherwise, this policy is ignored. When enabled, and you want to make changes, you must first set the Disable Lockdown of Start Pages to not configured, make the changes to the Configure Open Microsoft Edge With policy, and then enable the Disable Lockdown of Start Pages policy. @@ -2309,6 +2332,7 @@ If disabled or not configured, and you enable the Disable Lockdown of Start Page Default setting: A specific page or pages (default) Related policies: + -Disable Lockdown of Start Pages -Configure Start Pages. @@ -2322,7 +2346,7 @@ Related policies: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 3 | @@ -2369,7 +2393,7 @@ Related policies: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -2384,7 +2408,7 @@ Related policies: -You can configure Microsoft Edge to send intranet history only, internet history only, or both to Desktop Analytics for enterprise devices with a configured Commercial ID. If disabled or not configured, Microsoft Edge does not send browsing history data to Desktop Analytics. +You can configure Microsoft Edge to send intranet history only, internet history only, or both to Desktop Analytics for enterprise devices with a configured Commercial ID. If disabled or not configured, Microsoft Edge doesn't send browsing history data to Desktop Analytics. Supported versions: Microsoft Edge on Windows 10, version 1809 Default setting: Disabled or not configured (no data collected or sent) @@ -2399,7 +2423,7 @@ Default setting: Disabled or not configured (no data collected or sent) | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2441,7 +2465,7 @@ Default setting: Disabled or not configured (no data collected or sent) | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -2456,14 +2480,16 @@ Default setting: Disabled or not configured (no data collected or sent) -You can configure Microsoft Edge to disable the lockdown of Start pages allowing users to change or customize their start pages. To do this, you must also enable the Configure Start Pages or Configure Open Microsoft With policy. When enabled, all configured start pages are editable. Any Start page configured using the Configure Start pages policy is not locked down allowing users to edit their Start pages. +You can configure Microsoft Edge to disable the lockdown of Start pages allowing users to change or customize their start pages. To do this, you must also enable the Configure Start Pages or Configure Open Microsoft With policy. When enabled, all configured start pages are editable. Any Start page configured using the Configure Start pages policy isn't locked down allowing users to edit their Start pages. -If disabled or not configured, the Start pages configured in the Configure Start Pages policy cannot be changed and remain locked down. +If disabled or not configured, the Start pages configured in the Configure Start Pages policy can't be changed and remain locked down. + +Supported devices: Domain-joined or MDM-enrolled. -Supported devices: Domain-joined or MDM-enrolled Related policy: - - Configure Start Pages - - Configure Open Microsoft Edge With. + +- Configure Start Pages +- Configure Open Microsoft Edge With. @@ -2480,7 +2506,7 @@ Related policy: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2519,7 +2545,7 @@ Related policy: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -2550,7 +2576,7 @@ This policy setting lets you decide how much data to send to Microsoft about the | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2590,7 +2616,7 @@ This policy setting lets you decide how much data to send to Microsoft about the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -2621,7 +2647,7 @@ This policy setting lets you configure whether to use Enterprise Mode and the En | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2651,7 +2677,7 @@ This policy setting lets you configure whether to use Enterprise Mode and the En | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -2678,7 +2704,7 @@ Important. Discontinued in Windows 10, version 1511. Use the Browser/EnterpriseM | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2694,7 +2720,7 @@ Important. Discontinued in Windows 10, version 1511. Use the Browser/EnterpriseM | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -2721,7 +2747,7 @@ Configure first run URL. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Dependency [Browser_FirstRunURL_DependencyGroup] | Dependency Type: `DependsOn`
    Dependency URI: `Device/Vendor/MSFT/Policy/Config/Browser/PreventFirstRunPage`
    Dependency Allowed Value: `[0]`
    Dependency Allowed Value Type: `Range`
    | @@ -2738,7 +2764,7 @@ Configure first run URL. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -2753,7 +2779,7 @@ Configure first run URL. -When you enable the Configure Open Microsoft Edge With policy, you can configure one or more Start pages. When you enable this policy, users are not allowed to make changes to their Start pages. +When you enable the Configure Open Microsoft Edge With policy, you can configure one or more Start pages. When you enable this policy, users aren't allowed to make changes to their Start pages. If enabled, you must include URLs to the pages, separating multiple pages using angle brackets in the following format: @@ -2762,15 +2788,19 @@ If enabled, you must include URLs to the pages, separating multiple pages using If disabled or not configured, the webpages specified in App settings loads as the default Start pages. Version 1703 or later: -If you do not want to send traffic to Microsoft, enable this policy and use the `` value, which honors domain- and non-domain-joined devices, when it is the only configured URL. + +If you don't want to send traffic to Microsoft, enable this policy and use the `` value, which honors domain- and non-domain-joined devices, when it's the only configured URL. Version 1809: + If enabled, and you select either Start page, New Tab page, or previous page in the Configure Open Microsoft Edge With policy, Microsoft Edge ignores the Configure Start Pages policy. If not configured or you set the Configure Open Microsoft Edge With policy to a specific page or pages, Microsoft Edge uses the Configure Start Pages policy. -Supported devices: Domain-joined or MDM-enrolled +Supported devices: Domain-joined or MDM-enrolled. + Related policy: - - Configure Open Microsoft Edge With - - Disable Lockdown of Start Pages. + +- Configure Open Microsoft Edge With +- Disable Lockdown of Start Pages. @@ -2782,7 +2812,7 @@ Related policy: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2812,7 +2842,7 @@ Related policy: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2831,7 +2861,8 @@ This policy setting lets you decide whether employees can add, import, sort, or - If you enable this setting, employees won't be able to add, import, or change anything in the Favorites list. Also as part of this, Save a Favorite, Import settings, and the context menu items (such as, Create a new folder) are all turned off. -**Important** +Important. + Don't enable both this setting and the Keep favorites in sync between Internet Explorer and Microsoft Edge setting. Enabling both settings stops employees from syncing their favorites between Internet Explorer and Microsoft Edge. - If you disable or don't configure this setting (default), employees can add, import and make changes to the Favorites list. @@ -2846,7 +2877,7 @@ Don't enable both this setting and the Keep favorites in sync between Internet E | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2886,7 +2917,7 @@ Don't enable both this setting and the Keep favorites in sync between Internet E | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -2917,7 +2948,7 @@ This policy setting lets you decide whether employees can access the about:flags | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2957,7 +2988,7 @@ This policy setting lets you decide whether employees can access the about:flags | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -2974,7 +3005,7 @@ This policy setting lets you decide whether employees can access the about:flags Web security certificates are used to ensure a site your users go to is legitimate, and in some circumstances encrypts the data. With this policy, you can specify whether to prevent users from bypassing the security warning to sites that have SSL errors. -If enabled, overriding certificate errors are not allowed. +If enabled, overriding certificate errors aren't allowed. If disabled or not configured, overriding certificate errors are allowed. @@ -2988,7 +3019,7 @@ If disabled or not configured, overriding certificate errors are allowed. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -3028,7 +3059,7 @@ If disabled or not configured, overriding certificate errors are allowed. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -3059,7 +3090,7 @@ This policy setting lets you decide whether employees see Microsoft's First Run | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -3099,7 +3130,7 @@ This policy setting lets you decide whether employees see Microsoft's First Run | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -3130,7 +3161,7 @@ This policy lets you decide whether Microsoft Edge can gather Live Tile metadata | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -3170,7 +3201,7 @@ This policy lets you decide whether Microsoft Edge can gather Live Tile metadata | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3187,7 +3218,7 @@ This policy lets you decide whether Microsoft Edge can gather Live Tile metadata This policy setting lets you decide whether employees can override the Windows Defender SmartScreen warnings about potentially malicious websites. -- If you enable this setting, employees can't ignore Windows Defender SmartScreen warnings and they are blocked from continuing to the site. +- If you enable this setting, employees can't ignore Windows Defender SmartScreen warnings and they're blocked from continuing to the site. - If you disable or don't configure this setting, employees can ignore Windows Defender SmartScreen warnings and continue to the site. @@ -3201,7 +3232,7 @@ This policy setting lets you decide whether employees can override the Windows D | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -3241,7 +3272,7 @@ This policy setting lets you decide whether employees can override the Windows D | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3258,7 +3289,7 @@ This policy setting lets you decide whether employees can override the Windows D This policy setting lets you decide whether employees can override the Windows Defender SmartScreen warnings about downloading unverified files. -- If you enable this setting, employees can't ignore Windows Defender SmartScreen warnings and they are blocked from downloading the unverified files. +- If you enable this setting, employees can't ignore Windows Defender SmartScreen warnings and they're blocked from downloading the unverified files. - If you disable or don't configure this setting, employees can ignore Windows Defender SmartScreen warnings and continue the download process. @@ -3272,7 +3303,7 @@ This policy setting lets you decide whether employees can override the Windows D | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -3312,7 +3343,7 @@ This policy setting lets you decide whether employees can override the Windows D | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -3351,7 +3382,7 @@ Related Documents: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -3382,7 +3413,7 @@ Related Documents: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3413,7 +3444,7 @@ This policy setting lets you decide whether an employee's LocalHost IP address s | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -3453,7 +3484,7 @@ This policy setting lets you decide whether an employee's LocalHost IP address s | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -3468,11 +3499,12 @@ This policy setting lets you decide whether an employee's LocalHost IP address s -This policy setting allows you to configure a default set of favorites, which will appear for employees. Employees cannot modify, sort, move, export or delete these provisioned favorites. +This policy setting allows you to configure a default set of favorites, which will appear for employees. Employees can't modify, sort, move, export or delete these provisioned favorites. - If you enable this setting, you can set favorite URL's and favorite folders to appear on top of users' favorites list (either in the Hub or Favorites Bar). The user favorites will appear after these provisioned favorites. -**Important** +Important. + Don't enable both this setting and the Keep favorites in sync between Internet Explorer and Microsoft Edge setting. Enabling both settings stops employees from syncing their favorites between Internet Explorer and Microsoft Edge. - If you disable or don't configure this setting, employees will see the favorites they set in the Hub and Favorites Bar. @@ -3487,7 +3519,7 @@ Don't enable both this setting and the Keep favorites in sync between Internet E | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -3498,7 +3530,7 @@ Don't enable both this setting and the Keep favorites in sync between Internet E |:--|:--| | Name | ConfiguredFavorites | | Friendly Name | Provision Favorites | -| Element Name | Specify the URL which points to the file that has all the data for provisioning favorites (in html format). You can export a set of favorites from Microsoft Edge and use that html file for provisioning user machines.

    URL can be specified as

    1. HTTP location: https://localhost:8080/URLs.html
    2. Local network: \\network\shares\URLs.html
    3. Local file: file:///c:\\Users\\``\\Documents\\URLs.html or C:\\Users\\``\\Documents\\URLs.html. | +| Element Name | Specify the URL which points to the file that has all the data for provisioning favorites (in html format). You can export a set of favorites from Microsoft Edge and use that html file for provisioning user machines.

    URL can be specified as.

    1. HTTP location: https://localhost:8080/URLs.html
    2. Local network: \\network\shares\URLs.html.

    3. Local file: file:///c:\\Users\\``\\Documents\\URLs.html or C:\\Users\\``\\Documents\\URLs.html. | | Location | Computer and User Configuration | | Path | Windows Components > Microsoft Edge | | Registry Key Name | Software\Policies\Microsoft\MicrosoftEdge\Favorites | @@ -3524,7 +3556,7 @@ To define a default list of favorites: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -3555,7 +3587,7 @@ This policy setting lets you decide whether your intranet sites should all open | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -3595,7 +3627,7 @@ This policy setting lets you decide whether your intranet sites should all open | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -3612,14 +3644,16 @@ This policy setting lets you decide whether your intranet sites should all open This policy setting lets you configure the default search engine for your employees. Your employees can change the default search engine at any time. -**Important** +Important. + This setting can only be used with domain-joined or MDM-enrolled devices. For more info, see the Microsoft browser extension policy (aka.ms/browserpolicy). - If you enable this setting, you can choose a default search engine for your employees. - If this setting is enabled, you must also add the default engine to the "Set default search engine" setting, by adding a link to your OpenSearch XML file, including at least the short name and https: URL of the search engine. For more info about creating the OpenSearch XML file, see the Understanding OpenSearch Standards (https://msdn.microsoft.com/library/dd163546.aspx) topic. Use this format to specify the link you wish to add: `` -**Note** +Note. + If you'd like your employees to use the default Microsoft Edge settings for each market, you can set the string to EDGEDEFAULT. If you'd like your employees to use Microsoft Bing as the default search engine, you can set the string to EDGEBING. Employees can change the default search engine at any time, unless you disable the "Allow search engine customization" setting, which restricts any changes. @@ -3638,7 +3672,7 @@ Employees can change the default search engine at any time, unless you disable t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -3668,7 +3702,7 @@ Employees can change the default search engine at any time, unless you disable t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -3687,7 +3721,8 @@ The home button can be configured to load a custom URL when your user clicks the If enabled, or configured, and the Configure Home Button policy is enabled, and the Show home button & set a specific page is selected, a custom URL loads when your user clicks the home button. -Default setting: Blank or not configured +Default setting: Blank or not configured. + Related policy: Configure Home Button. @@ -3700,7 +3735,7 @@ Related policy: Configure Home Button. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -3730,7 +3765,7 @@ Related policy: Configure Home Button. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -3751,7 +3786,8 @@ If enabled, you can set the default New Tab page URL. If disabled or not configured, the default Microsoft Edge new tab page is used. -Default setting: Disabled or not configured +Default setting: Disabled or not configured. + Related policy: Allow web content on New Tab page. @@ -3764,7 +3800,7 @@ Related policy: Allow web content on New Tab page. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -3794,7 +3830,7 @@ Related policy: Allow web content on New Tab page. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -3815,8 +3851,10 @@ If enabled, the notification appears on a new page. If you want users to continu If disabled or not configured, the default app behavior occurs and no additional page displays. -Default setting: Disabled or not configured +Default setting: Disabled or not configured. + Related policies: + -Configure the Enterprise Mode Site List -Send all intranet sites to Internet Explorer 11. @@ -3830,7 +3868,7 @@ Related policies: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -3871,7 +3909,7 @@ Related policies: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -3902,7 +3940,7 @@ This setting lets you decide whether people can sync their favorites between Int | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -3950,7 +3988,7 @@ To verify that favorites are in synchronized between Internet Explorer and Micro | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -3971,8 +4009,10 @@ If enabled, the UI settings for the home button are enabled allowing your users If disabled or not configured, the UI settings for the home button are disabled preventing your users from making changes. -Default setting: Disabled or not configured +Default setting: Disabled or not configured. + Related policy: + -Configure Home Button -Set Home Button URL. @@ -3986,7 +4026,7 @@ Related policy: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -4026,7 +4066,7 @@ Related policy: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -4057,7 +4097,7 @@ This policy setting lets you decide whether Microsoft Edge stores books from the | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | diff --git a/windows/client-management/mdm/policy-csp-camera.md b/windows/client-management/mdm/policy-csp-camera.md index 6b88a97e01..8de9d8b270 100644 --- a/windows/client-management/mdm/policy-csp-camera.md +++ b/windows/client-management/mdm/policy-csp-camera.md @@ -4,7 +4,7 @@ description: Learn more about the Camera Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -39,7 +39,7 @@ ms.topic: reference This policy setting allow the use of Camera devices on the machine. -- If you enable or do not configure this policy setting, Camera devices will be enabled. +- If you enable or don't configure this policy setting, Camera devices will be enabled. - If you disable this property setting, Camera devices will be disabled. @@ -53,7 +53,7 @@ This policy setting allow the use of Camera devices on the machine. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | diff --git a/windows/client-management/mdm/policy-csp-cellular.md b/windows/client-management/mdm/policy-csp-cellular.md index aee369d5ea..02503b881b 100644 --- a/windows/client-management/mdm/policy-csp-cellular.md +++ b/windows/client-management/mdm/policy-csp-cellular.md @@ -4,7 +4,7 @@ description: Learn more about the Cellular Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - Cellular -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -48,11 +45,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access cellular data by using Settings > Network - Internet > Cellular on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access cellular data and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access cellular data and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access cellular data and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access cellular data and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access cellular data by using Settings > Network - Internet > Cellular on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access cellular data by using Settings > Network - Internet > Cellular on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -77,7 +74,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -118,7 +115,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -135,11 +132,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access cellular data by using Settings > Network - Internet > Cellular on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access cellular data and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access cellular data and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access cellular data and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access cellular data and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access cellular data by using Settings > Network - Internet > Cellular on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access cellular data by using Settings > Network - Internet > Cellular on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -153,7 +150,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -183,7 +180,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -200,11 +197,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access cellular data by using Settings > Network - Internet > Cellular on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access cellular data and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access cellular data and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access cellular data and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access cellular data and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access cellular data by using Settings > Network - Internet > Cellular on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access cellular data by using Settings > Network - Internet > Cellular on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -218,7 +215,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -248,7 +245,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -265,11 +262,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access cellular data by using Settings > Network - Internet > Cellular on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access cellular data and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access cellular data and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access cellular data and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access cellular data and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access cellular data by using Settings > Network - Internet > Cellular on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access cellular data by using Settings > Network - Internet > Cellular on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -283,7 +280,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -313,7 +310,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -327,7 +324,8 @@ If an app is open when this Group Policy object is applied on a device, employee This policy setting configures the visibility of the link to the per-application cellular access control page in the cellular setting UX. - If this policy setting is enabled, a drop-down list box presenting possible values will be active. Select "Hide" or "Show" to hide or show the link to the per-application cellular access control page. -- If this policy setting is disabled or is not configured, the link to the per-application cellular access control page is showed by default. + +- If this policy setting is disabled or isn't configured, the link to the per-application cellular access control page is showed by default. @@ -339,13 +337,12 @@ This policy setting configures the visibility of the link to the per-application | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-clouddesktop.md b/windows/client-management/mdm/policy-csp-clouddesktop.md index 5bee8f32ce..0eecfa5c99 100644 --- a/windows/client-management/mdm/policy-csp-clouddesktop.md +++ b/windows/client-management/mdm/policy-csp-clouddesktop.md @@ -4,7 +4,7 @@ description: Learn more about the CloudDesktop Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,8 +16,7 @@ ms.topic: reference # Policy CSP - CloudDesktop -> [!IMPORTANT] -> This CSP contains preview policies that are under development and only applicable for [Windows Insider Preview builds](/windows-insider/). These policies are subject to change and may have dependencies on other features or services in preview. +[!INCLUDE [Windows Insider tip](includes/mdm-insider-csp-note.md)] @@ -29,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows Insider Preview | @@ -40,7 +39,7 @@ ms.topic: reference -This policy allows the user to configure the boot to cloud mode. Boot to Cloud mode enables users to seamlessly sign-in to a Cloud PC that is provisioned for them by an IT Admin. For using boot to cloud mode, users need to install and configure a Cloud Provider application (eg: Win365) on their PC and need to have a Cloud PC provisioned to them. For successful use of this policy, OverrideShellProgram policy needs to be configured as well. This policy supports the below options: 1. Not Configured: Machine will not trigger the Cloud PC connection automatically. 2. Enable Boot to Cloud Desktop: Users who have a Cloud PC provisioned will get connected seamlessly to the Cloud PC as they finish sign-in operation. +This policy allows the user to configure the boot to cloud mode. Boot to Cloud mode enables users to seamlessly sign-in to a Cloud PC that's provisioned for them by an IT Admin. For using boot to cloud mode, users need to install and configure a Cloud Provider application (eg: Win365) on their PC and need to have a Cloud PC provisioned to them. For successful use of this policy, OverrideShellProgram policy needs to be configured as well. This policy supports the below options: 1. Not Configured: Machine won't trigger the Cloud PC connection automatically. 2. Enable Boot to Cloud Desktop: Users who have a Cloud PC provisioned will get connected seamlessly to the Cloud PC as they finish sign-in operation. @@ -52,7 +51,7 @@ This policy allows the user to configure the boot to cloud mode. Boot to Cloud m | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | diff --git a/windows/client-management/mdm/policy-csp-connectivity.md b/windows/client-management/mdm/policy-csp-connectivity.md index 8bc1fb0fda..0ba1dc7cfe 100644 --- a/windows/client-management/mdm/policy-csp-connectivity.md +++ b/windows/client-management/mdm/policy-csp-connectivity.md @@ -4,7 +4,7 @@ description: Learn more about the Connectivity Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - Connectivity -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -45,7 +42,7 @@ ms.topic: reference Allows the user to enable Bluetooth or restrict access. > [!NOTE] -> This value is not supported in Windows Phone 8. 1 MDM and EAS, Windows 10 for desktop, or Windows 10 Mobile. If this is not set or it is deleted, the default value of 2 (Allow) is used. Most restricted value is 0. +> This value isn't supported in Windows Phone 8. 1 MDM and EAS, Windows 10 for desktop, or Windows 10 Mobile. If this isn't set or it's deleted, the default value of 2 (Allow) is used. Most restricted value is 0. @@ -57,7 +54,7 @@ Allows the user to enable Bluetooth or restrict access. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 2 | @@ -67,7 +64,7 @@ Allows the user to enable Bluetooth or restrict access. | Value | Description | |:--|:--| -| 0 | Disallow Bluetooth. If this is set to 0, the radio in the Bluetooth control panel will be grayed out and the user will not be able to turn Bluetooth on. | +| 0 | Disallow Bluetooth. If this is set to 0, the radio in the Bluetooth control panel will be grayed out and the user won't be able to turn Bluetooth on. | | 1 | Reserved. If this is set to 1, the radio in the Bluetooth control panel will be functional and the user will be able to turn Bluetooth on. | | 2 (Default) | Allow Bluetooth. If this is set to 2, the radio in the Bluetooth control panel will be functional and the user will be able to turn Bluetooth on. | @@ -84,7 +81,7 @@ Allows the user to enable Bluetooth or restrict access. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -95,7 +92,7 @@ Allows the user to enable Bluetooth or restrict access. -Allows the cellular data channel on the device. Device reboot is not required to enforce the policy. +Allows the cellular data channel on the device. Device reboot isn't required to enforce the policy. @@ -107,7 +104,7 @@ Allows the cellular data channel on the device. Device reboot is not required to | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -117,9 +114,9 @@ Allows the cellular data channel on the device. Device reboot is not required to | Value | Description | |:--|:--| -| 0 | Do not allow the cellular data channel. The user cannot turn it on. This value is not supported in Windows 10, version 1511. | +| 0 | Don't allow the cellular data channel. The user can't turn it on. This value isn't supported in Windows 10, version 1511. | | 1 (Default) | Allow the cellular data channel. The user can turn it off. | -| 2 | Allow the cellular data channel. The user cannot turn it off. | +| 2 | Allow the cellular data channel. The user can't turn it off. | @@ -134,7 +131,7 @@ Allows the cellular data channel on the device. Device reboot is not required to | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -149,7 +146,7 @@ This policy setting prevents clients from connecting to Mobile Broadband network - If this policy setting is enabled, all automatic and manual connection attempts to roaming provider networks are blocked until the client registers with the home provider network. -- If this policy setting is not configured or is disabled, clients are allowed to connect to roaming provider Mobile Broadband networks. +- If this policy setting isn't configured or is disabled, clients are allowed to connect to roaming provider Mobile Broadband networks. @@ -161,7 +158,7 @@ This policy setting prevents clients from connecting to Mobile Broadband network | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -171,9 +168,9 @@ This policy setting prevents clients from connecting to Mobile Broadband network | Value | Description | |:--|:--| -| 0 | Do not allow cellular data roaming. The user cannot turn it on. This value is not supported in Windows 10, version 1511. | +| 0 | Don't allow cellular data roaming. The user can't turn it on. This value isn't supported in Windows 10, version 1511. | | 1 (Default) | Allow cellular data roaming. | -| 2 | Allow cellular data roaming on. The user cannot turn it off. | +| 2 | Allow cellular data roaming on. The user can't turn it off. | @@ -209,7 +206,7 @@ To validate, the enterprise can confirm by observing the roaming enable switch i | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -234,7 +231,7 @@ To validate, the enterprise can confirm by observing the roaming enable switch i | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -263,7 +260,7 @@ To validate, the enterprise can confirm by observing the roaming enable switch i | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -286,7 +283,7 @@ This policy is deprecated. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -312,7 +309,7 @@ This policy is deprecated. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -327,9 +324,9 @@ This policy allows IT admins to turn off the ability to Link a Phone with a PC t - If you enable this policy setting, the Windows device will be able to enroll in Phone-PC linking functionality and participate in Continue on PC experiences. -- If you disable this policy setting, the Windows device is not allowed to be linked to Phones, will remove itself from the device list of any linked Phones, and cannot participate in Continue on PC experiences. +- If you disable this policy setting, the Windows device isn't allowed to be linked to Phones, will remove itself from the device list of any linked Phones, and can't participate in Continue on PC experiences. -- If you do not configure this policy setting, the default behavior depends on the Windows edition. Changes to this policy take effect on reboot. +- If you don't configure this policy setting, the default behavior depends on the Windows edition. Changes to this policy take effect on reboot. @@ -341,7 +338,7 @@ This policy allows IT admins to turn off the ability to Link a Phone with a PC t | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -351,7 +348,7 @@ This policy allows IT admins to turn off the ability to Link a Phone with a PC t | Value | Description | |:--|:--| -| 0 | Do not link. | +| 0 | Don't link. | | 1 (Default) | Allow phone-PC linking. | @@ -386,7 +383,7 @@ Device that has previously opt-in to MMX will also stop showing on the device li | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -399,7 +396,7 @@ Device that has previously opt-in to MMX will also stop showing on the device li > [!NOTE] -> Currently, this policy is supported only in HoloLens 2, HoloLens (1st gen) Commercial Suite, and HoloLens (1st gen) Development Edition. Enables USB connection between the device and a computer to sync files with the device or to use developer tools to deploy or debug applications. Changing this policy does not affect USB charging. Both Media Transfer Protocol (MTP) and IP over USB are disabled when this policy is enforced. Most restricted value is 0. +> Currently, this policy is supported only in HoloLens 2, HoloLens (1st gen) Commercial Suite, and HoloLens (1st gen) Development Edition. Enables USB connection between the device and a computer to sync files with the device or to use developer tools to deploy or debug applications. Changing this policy doesn't affect USB charging. Both Media Transfer Protocol (MTP) and IP over USB are disabled when this policy is enforced. Most restricted value is 0. @@ -411,7 +408,7 @@ Device that has previously opt-in to MMX will also stop showing on the device li | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -437,7 +434,7 @@ Device that has previously opt-in to MMX will also stop showing on the device li | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -460,7 +457,7 @@ Specifies what type of underlying connections VPN is allowed to use. Most restri | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -470,7 +467,7 @@ Specifies what type of underlying connections VPN is allowed to use. Most restri | Value | Description | |:--|:--| -| 0 | VPN is not allowed over cellular. | +| 0 | VPN isn't allowed over cellular. | | 1 (Default) | VPN can use any connection, including cellular. | @@ -486,7 +483,7 @@ Specifies what type of underlying connections VPN is allowed to use. Most restri | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -509,7 +506,7 @@ Prevents the device from connecting to VPN when the device roams over cellular n | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -535,7 +532,7 @@ Prevents the device from connecting to VPN when the device roams over cellular n | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -551,11 +548,11 @@ This policy setting specifies whether to allow printing over HTTP from this clie Printing over HTTP allows a client to print to printers on the intranet as well as the Internet. > [!NOTE] -> This policy setting affects the client side of Internet printing only. It does not prevent this computer from acting as an Internet Printing server and making its shared printers available via HTTP. +> This policy setting affects the client side of Internet printing only. It doesn't prevent this computer from acting as an Internet Printing server and making its shared printers available via HTTP. - If you enable this policy setting, it prevents this client from printing to Internet printers over HTTP. -- If you disable or do not configure this policy setting, users can choose to print to Internet printers over HTTP. +- If you disable or don't configure this policy setting, users can choose to print to Internet printers over HTTP. Also, see the "Web-based printing" policy setting in Computer Configuration/Administrative Templates/Printers. @@ -569,13 +566,12 @@ Also, see the "Web-based printing" policy setting in Computer Configuration/Admi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -602,7 +598,7 @@ Also, see the "Web-based printing" policy setting in Computer Configuration/Admi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -618,11 +614,11 @@ This policy setting specifies whether to allow this client to download print dri To set up HTTP printing, non-inbox drivers need to be downloaded over HTTP. > [!NOTE] -> This policy setting does not prevent the client from printing to printers on the Intranet or the Internet over HTTP. It only prohibits downloading drivers that are not already installed locally. +> This policy setting doesn't prevent the client from printing to printers on the Intranet or the Internet over HTTP. It only prohibits downloading drivers that aren't already installed locally. -- If you enable this policy setting, print drivers cannot be downloaded over HTTP. +- If you enable this policy setting, print drivers can't be downloaded over HTTP. -- If you disable or do not configure this policy setting, users can download print drivers over HTTP. +- If you disable or don't configure this policy setting, users can download print drivers over HTTP. @@ -634,13 +630,12 @@ To set up HTTP printing, non-inbox drivers need to be downloaded over HTTP. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -667,7 +662,7 @@ To set up HTTP printing, non-inbox drivers need to be downloaded over HTTP. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -682,9 +677,9 @@ This policy setting specifies whether Windows should download a list of provider These wizards allow users to select from a list of companies that provide services such as online storage and photographic printing. By default, Windows displays providers downloaded from a Windows website in addition to providers specified in the registry. -- If you enable this policy setting, Windows does not download providers, and only the service providers that are cached in the local registry are displayed. +- If you enable this policy setting, Windows doesn't download providers, and only the service providers that are cached in the local registry are displayed. -- If you disable or do not configure this policy setting, a list of providers are downloaded when the user uses the web publishing or online ordering wizards. +- If you disable or don't configure this policy setting, a list of providers are downloaded when the user uses the web publishing or online ordering wizards. See the documentation for the web publishing and online ordering wizards for more information, including details on specifying service providers in the registry. @@ -698,13 +693,12 @@ See the documentation for the web publishing and online ordering wizards for mor | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -731,7 +725,7 @@ See the documentation for the web publishing and online ordering wizards for mor | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -746,9 +740,9 @@ This policy setting turns off the active tests performed by the Windows Network As part of determining the connectivity level, NCSI performs one of two active tests: downloading a page from a dedicated Web server or making a DNS request for a dedicated address. -- If you enable this policy setting, NCSI does not run either of the two active tests. This may reduce the ability of NCSI, and of other components that use NCSI, to determine Internet access. +- If you enable this policy setting, NCSI doesn't run either of the two active tests. This may reduce the ability of NCSI, and of other components that use NCSI, to determine Internet access. -- If you disable or do not configure this policy setting, NCSI runs one of the two active tests. +- If you disable or don't configure this policy setting, NCSI runs one of the two active tests. @@ -760,7 +754,7 @@ As part of determining the connectivity level, NCSI performs one of two active t | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -800,7 +794,7 @@ As part of determining the connectivity level, NCSI performs one of two active t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -826,13 +820,12 @@ For more information, see [MS15-011: Vulnerability in Group Policy could allow r | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -858,7 +851,7 @@ For more information, see [MS15-011: Vulnerability in Group Policy could allow r | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -872,11 +865,11 @@ For more information, see [MS15-011: Vulnerability in Group Policy could allow r Determines whether a user can install and configure the Network Bridge. > [!IMPORTANT] -> This settings is location aware. It only applies when a computer is connected to the same DNS domain network it was connected to when the setting was refreshed on that computer. If a computer is connected to a DNS domain network other than the one it was connected to when the setting was refreshed, this setting does not apply. +> This settings is location aware. It only applies when a computer is connected to the same DNS domain network it was connected to when the setting was refreshed on that computer. If a computer is connected to a DNS domain network other than the one it was connected to when the setting was refreshed, this setting doesn't apply. The Network Bridge allows users to create a layer 2 MAC bridge, enabling them to connect two or more network segements together. This connection appears in the Network Connections folder. -If you disable this setting or do not configure it, the user will be able to create and modify the configuration of a Network Bridge. Enabling this setting does not remove an existing Network Bridge from the user's computer. +If you disable this setting or don't configure it, the user will be able to create and modify the configuration of a Network Bridge. Enabling this setting doesn't remove an existing Network Bridge from the user's computer. @@ -888,13 +881,12 @@ If you disable this setting or do not configure it, the user will be able to cre | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-controlpolicyconflict.md b/windows/client-management/mdm/policy-csp-controlpolicyconflict.md index 4d9b9ad115..6c618bf585 100644 --- a/windows/client-management/mdm/policy-csp-controlpolicyconflict.md +++ b/windows/client-management/mdm/policy-csp-controlpolicyconflict.md @@ -4,7 +4,7 @@ description: Learn more about the ControlPolicyConflict Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -37,7 +37,7 @@ ms.topic: reference -If set to 1 then any MDM policy that is set that has an equivalent GP policy will result in GP service blocking the setting of the policy by GP MMC. Setting the value to 0 (zero) or deleting the policy will remove the GP policy blocks restore the saved GP policies. +If set to 1 then any MDM policy that's set that has an equivalent GP policy will result in GP service blocking the setting of the policy by GP MMC. Setting the value to 0 (zero) or deleting the policy will remove the GP policy blocks restore the saved GP policies. @@ -74,7 +74,7 @@ The MDM Diagnostic report shows the applied configurations states of a device in | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | diff --git a/windows/client-management/mdm/policy-csp-credentialproviders.md b/windows/client-management/mdm/policy-csp-credentialproviders.md index 395755ed2e..6d56c65fbe 100644 --- a/windows/client-management/mdm/policy-csp-credentialproviders.md +++ b/windows/client-management/mdm/policy-csp-credentialproviders.md @@ -4,7 +4,7 @@ description: Learn more about the CredentialProviders Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - CredentialProviders -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -63,13 +60,12 @@ To configure Windows Hello for Business, use the Administrative Template policie | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -96,7 +92,7 @@ To configure Windows Hello for Business, use the Administrative Template policie | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -113,7 +109,7 @@ This policy setting allows you to control whether a domain user can sign in usin - If you disable or don't configure this policy setting, a domain user can set up and use a picture password. -**Note** that the user's domain password will be cached in the system vault when using this feature. +Note that the user's domain password will be cached in the system vault when using this feature. @@ -125,13 +121,12 @@ This policy setting allows you to control whether a domain user can sign in usin | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -158,7 +153,7 @@ This policy setting allows you to control whether a domain user can sign in usin | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -169,7 +164,7 @@ This policy setting allows you to control whether a domain user can sign in usin -Boolean policy to disable the visibility of the credential provider that triggers the PC refresh on a device. This policy does not actually trigger the refresh. The admin user is required to authenticate to trigger the refresh on the target device. The Autopilot Reset feature allows admin to reset devices to a known good managed state while preserving the management enrollment. After the Autopilot Reset is triggered the devices are for ready for use by information workers or students. +Boolean policy to disable the visibility of the credential provider that triggers the PC refresh on a device. This policy doesn't actually trigger the refresh. The admin user is required to authenticate to trigger the refresh on the target device. The Autopilot Reset feature allows admin to reset devices to a known good managed state while preserving the management enrollment. After the Autopilot Reset is triggered the devices are for ready for use by information workers or students. @@ -181,7 +176,7 @@ Boolean policy to disable the visibility of the credential provider that trigger | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | diff --git a/windows/client-management/mdm/policy-csp-credentialsdelegation.md b/windows/client-management/mdm/policy-csp-credentialsdelegation.md index 36ad871eab..878f0f2aef 100644 --- a/windows/client-management/mdm/policy-csp-credentialsdelegation.md +++ b/windows/client-management/mdm/policy-csp-credentialsdelegation.md @@ -4,7 +4,7 @@ description: Learn more about the CredentialsDelegation Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - CredentialsDelegation -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -42,13 +39,13 @@ ms.topic: reference -Remote host allows delegation of non-exportable credentials +Remote host allows delegation of non-exportable credentials. When using credential delegation, devices provide an exportable version of credentials to the remote host. This exposes users to the risk of credential theft from attackers on the remote host. - If you enable this policy setting, the host supports Restricted Admin or Remote Credential Guard mode. -- If you disable or do not configure this policy setting, Restricted Administration and Remote Credential Guard mode are not supported. User will always need to pass their credentials to the host. +- If you disable or don't configure this policy setting, Restricted Administration and Remote Credential Guard mode aren't supported. User will always need to pass their credentials to the host. @@ -60,13 +57,12 @@ When using credential delegation, devices provide an exportable version of crede | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-credentialsui.md b/windows/client-management/mdm/policy-csp-credentialsui.md index 060389719e..5cc00c3b0a 100644 --- a/windows/client-management/mdm/policy-csp-credentialsui.md +++ b/windows/client-management/mdm/policy-csp-credentialsui.md @@ -4,7 +4,7 @@ description: Learn more about the CredentialsUI Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - CredentialsUI -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -48,9 +45,9 @@ ms.topic: reference This policy setting allows you to configure the display of the password reveal button in password entry user experiences. -- If you enable this policy setting, the password reveal button will not be displayed after a user types a password in the password entry text box. +- If you enable this policy setting, the password reveal button won't be displayed after a user types a password in the password entry text box. -- If you disable or do not configure this policy setting, the password reveal button will be displayed after a user types a password in the password entry text box. +- If you disable or don't configure this policy setting, the password reveal button will be displayed after a user types a password in the password entry text box. By default, the password reveal button is displayed after a user types a password in the password entry text box. To display the password, click the password reveal button. @@ -66,13 +63,12 @@ The policy applies to all Windows components and applications that use the Windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -99,7 +95,7 @@ The policy applies to all Windows components and applications that use the Windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -110,7 +106,7 @@ The policy applies to all Windows components and applications that use the Windo -This policy setting controls whether administrator accounts are displayed when a user attempts to elevate a running application. By default, administrator accounts are not displayed when the user attempts to elevate a running application. +This policy setting controls whether administrator accounts are displayed when a user attempts to elevate a running application. By default, administrator accounts aren't displayed when the user attempts to elevate a running application. - If you enable this policy setting, all local administrator accounts on the PC will be displayed so the user can choose one and enter the correct password. @@ -126,13 +122,12 @@ This policy setting controls whether administrator accounts are displayed when a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-cryptography.md b/windows/client-management/mdm/policy-csp-cryptography.md index 53aabcf9bf..841ae0f1bd 100644 --- a/windows/client-management/mdm/policy-csp-cryptography.md +++ b/windows/client-management/mdm/policy-csp-cryptography.md @@ -4,7 +4,7 @@ description: Learn more about the Cryptography Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -49,7 +49,7 @@ Allows or disallows the Federal Information Processing Standard (FIPS) policy. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -84,7 +84,7 @@ Allows or disallows the Federal Information Processing Standard (FIPS) policy. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -107,7 +107,7 @@ Lists the Cryptographic Cipher Algorithms allowed for SSL connections. Format is | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | diff --git a/windows/client-management/mdm/policy-csp-dataprotection.md b/windows/client-management/mdm/policy-csp-dataprotection.md index fb84b5f3b7..eacbfd0997 100644 --- a/windows/client-management/mdm/policy-csp-dataprotection.md +++ b/windows/client-management/mdm/policy-csp-dataprotection.md @@ -4,7 +4,7 @@ description: Learn more about the DataProtection Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -49,7 +49,7 @@ This policy setting allows you to block direct memory access (DMA) for all hot p | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -75,7 +75,7 @@ This policy setting allows you to block direct memory access (DMA) for all hot p | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -86,10 +86,10 @@ This policy setting allows you to block direct memory access (DMA) for all hot p -Important. This policy may change in a future release. It may be used for testing purposes, but should not be used in a production environment at this time. Setting used by Windows 8. 1 Selective Wipe. +Important. This policy may change in a future release. It may be used for testing purposes, but shouldn't be used in a production environment at this time. Setting used by Windows 8. 1 Selective Wipe. > [!NOTE] -> This policy is not recommended for use in Windows 10. +> This policy isn't recommended for use in Windows 10. @@ -101,7 +101,7 @@ Important. This policy may change in a future release. It may be used for testin | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | diff --git a/windows/client-management/mdm/policy-csp-datausage.md b/windows/client-management/mdm/policy-csp-datausage.md index f01d83375c..141857534d 100644 --- a/windows/client-management/mdm/policy-csp-datausage.md +++ b/windows/client-management/mdm/policy-csp-datausage.md @@ -4,7 +4,7 @@ description: Learn more about the DataUsage Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - DataUsage -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -48,11 +45,11 @@ This policy setting configures the cost of 3G connections on the local machine. - Unrestricted: Use of this connection is unlimited and not restricted by usage charges and capacity constraints. -- Fixed: Use of this connection is not restricted by usage charges and capacity constraints up to a certain data limit. +- Fixed: Use of this connection isn't restricted by usage charges and capacity constraints up to a certain data limit. - Variable: This connection is costed on a per byte basis. -- If this policy setting is disabled or is not configured, the cost of 3G connections is Fixed by default. +- If this policy setting is disabled or isn't configured, the cost of 3G connections is Fixed by default. @@ -66,13 +63,12 @@ This policy setting configures the cost of 3G connections on the local machine. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -98,7 +94,7 @@ This policy setting configures the cost of 3G connections on the local machine. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -115,11 +111,11 @@ This policy setting configures the cost of 4G connections on the local machine. - Unrestricted: Use of this connection is unlimited and not restricted by usage charges and capacity constraints. -- Fixed: Use of this connection is not restricted by usage charges and capacity constraints up to a certain data limit. +- Fixed: Use of this connection isn't restricted by usage charges and capacity constraints up to a certain data limit. - Variable: This connection is costed on a per byte basis. -- If this policy setting is disabled or is not configured, the cost of 4G connections is Fixed by default. +- If this policy setting is disabled or isn't configured, the cost of 4G connections is Fixed by default. @@ -131,13 +127,12 @@ This policy setting configures the cost of 4G connections on the local machine. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-defender.md b/windows/client-management/mdm/policy-csp-defender.md index 8643e7282a..43cdc9a4ee 100644 --- a/windows/client-management/mdm/policy-csp-defender.md +++ b/windows/client-management/mdm/policy-csp-defender.md @@ -4,7 +4,7 @@ description: Learn more about the Defender Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 04/26/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -39,13 +39,15 @@ ms.topic: reference This policy setting allows you to configure scans for malicious software and unwanted software in archive files such as . ZIP or . CAB files. -- If you enable or do not configure this setting, archive files will be scanned. +- If you enable or don't configure this setting, archive files will be scanned. -- If you disable this setting, archive files will not be scanned. However, archives are always scanned during directed scans. +- If you disable this setting, archive files won't be scanned. However, archives are always scanned during directed scans. +> [!NOTE] +> Changes to this setting are not applied when [tamper protection][TAMPER-1] is enabled. @@ -53,7 +55,7 @@ This policy setting allows you to configure scans for malicious software and unw | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -93,7 +95,7 @@ This policy setting allows you to configure scans for malicious software and unw | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -106,13 +108,15 @@ This policy setting allows you to configure scans for malicious software and unw This policy setting allows you to configure behavior monitoring. -- If you enable or do not configure this setting, behavior monitoring will be enabled. +- If you enable or don't configure this setting, behavior monitoring will be enabled. - If you disable this setting, behavior monitoring will be disabled. +> [!NOTE] +> Changes to this setting are not applied when [tamper protection][TAMPER-1] is enabled. @@ -120,7 +124,7 @@ This policy setting allows you to configure behavior monitoring. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -160,7 +164,7 @@ This policy setting allows you to configure behavior monitoring. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -173,26 +177,28 @@ This policy setting allows you to configure behavior monitoring. This policy setting allows you to join Microsoft MAPS. Microsoft MAPS is the online community that helps you choose how to respond to potential threats. The community also helps stop the spread of new malicious software infections. -You can choose to send basic or additional information about detected software. Additional information helps Microsoft create new security intelligence and help it to protect your computer. This information can include things like location of detected items on your computer if harmful software was removed. The information will be automatically collected and sent. In some instances, personal information might unintentionally be sent to Microsoft. However, Microsoft will not use this information to identify you or contact you. +You can choose to send basic or additional information about detected software. Additional information helps Microsoft create new security intelligence and help it to protect your computer. This information can include things like location of detected items on your computer if harmful software was removed. The information will be automatically collected and sent. In some instances, personal information might unintentionally be sent to Microsoft. However, Microsoft won't use this information to identify you or contact you. Possible options are: + (0x0) Disabled (default) -(0x1) Basic membership -(0x2) Advanced membership +(0x1) Basic membership (0x2) Advanced membership. Basic membership will send basic information to Microsoft about software that has been detected, including where the software came from, the actions that you apply or that are applied automatically, and whether the actions were successful. Advanced membership, in addition to basic information, will send more information to Microsoft about malicious software, spyware, and potentially unwanted software, including the location of the software, file names, how the software operates, and how it has impacted your computer. -- If you enable this setting, you will join Microsoft MAPS with the membership specified. +- If you enable this setting, you'll join Microsoft MAPS with the membership specified. -- If you disable or do not configure this setting, you will not join Microsoft MAPS. +- If you disable or don't configure this setting, you won't join Microsoft MAPS. In Windows 10, Basic membership is no longer available, so setting the value to 1 or 2 enrolls the device into Advanced membership. +> [!NOTE] +> Changes to this setting are not applied when [tamper protection][TAMPER-1] is enabled. @@ -200,7 +206,7 @@ In Windows 10, Basic membership is no longer available, so setting the value to | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -240,7 +246,7 @@ In Windows 10, Basic membership is no longer available, so setting the value to | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -251,11 +257,11 @@ In Windows 10, Basic membership is no longer available, so setting the value to -This policy setting allows you to configure e-mail scanning. When e-mail scanning is enabled, the engine will parse the mailbox and mail files, according to their specific format, in order to analyze the mail bodies and attachments. Several e-mail formats are currently supported, for example: pst (Outlook), dbx, mbx, mime (Outlook Express), binhex (Mac). Email scanning is not supported on modern email clients. +This policy setting allows you to configure e-mail scanning. When e-mail scanning is enabled, the engine will parse the mailbox and mail files, according to their specific format, in order to analyze the mail bodies and attachments. Several e-mail formats are currently supported, for example: pst (Outlook), dbx, mbx, mime (Outlook Express), binhex (Mac). Email scanning isn't supported on modern email clients. - If you enable this setting, e-mail scanning will be enabled. -- If you disable or do not configure this setting, e-mail scanning will be disabled. +- If you disable or don't configure this setting, e-mail scanning will be disabled. @@ -267,7 +273,7 @@ This policy setting allows you to configure e-mail scanning. When e-mail scannin | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -307,7 +313,7 @@ This policy setting allows you to configure e-mail scanning. When e-mail scannin | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -322,7 +328,7 @@ This policy setting allows you to configure scanning mapped network drives. - If you enable this setting, mapped network drives will be scanned. -- If you disable or do not configure this setting, mapped network drives will not be scanned. +- If you disable or don't configure this setting, mapped network drives won't be scanned. @@ -334,7 +340,7 @@ This policy setting allows you to configure scanning mapped network drives. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -374,7 +380,7 @@ This policy setting allows you to configure scanning mapped network drives. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -389,7 +395,7 @@ This policy setting allows you to manage whether or not to scan for malicious so - If you enable this setting, removable drives will be scanned during any type of scan. -- If you disable or do not configure this setting, removable drives will not be scanned during a full scan. Removable drives may still be scanned during quick scan and custom scan. +- If you disable or don't configure this setting, removable drives won't be scanned during a full scan. Removable drives may still be scanned during quick scan and custom scan. @@ -401,7 +407,7 @@ This policy setting allows you to manage whether or not to scan for malicious so | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -441,7 +447,7 @@ This policy setting allows you to manage whether or not to scan for malicious so | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -457,6 +463,8 @@ Allows or disallows Windows Defender Intrusion Prevention functionality. +> [!NOTE] +> Changes to this setting are not applied when [tamper protection][TAMPER-1] is enabled. @@ -464,7 +472,7 @@ Allows or disallows Windows Defender Intrusion Prevention functionality. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -490,7 +498,7 @@ Allows or disallows Windows Defender Intrusion Prevention functionality. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -503,13 +511,15 @@ Allows or disallows Windows Defender Intrusion Prevention functionality. This policy setting allows you to configure scanning for all downloaded files and attachments. -- If you enable or do not configure this setting, scanning for all downloaded files and attachments will be enabled. +- If you enable or don't configure this setting, scanning for all downloaded files and attachments will be enabled. - If you disable this setting, scanning for all downloaded files and attachments will be disabled. +> [!NOTE] +> Changes to this setting are not applied when [tamper protection][TAMPER-1] is enabled. @@ -517,7 +527,7 @@ This policy setting allows you to configure scanning for all downloaded files an | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -557,7 +567,7 @@ This policy setting allows you to configure scanning for all downloaded files an | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -570,13 +580,15 @@ This policy setting allows you to configure scanning for all downloaded files an This policy setting allows you to configure monitoring for file and program activity. -- If you enable or do not configure this setting, monitoring for file and program activity will be enabled. +- If you enable or don't configure this setting, monitoring for file and program activity will be enabled. - If you disable this setting, monitoring for file and program activity will be disabled. +> [!NOTE] +> Changes to this setting are not applied when [tamper protection][TAMPER-1] is enabled. @@ -584,7 +596,7 @@ This policy setting allows you to configure monitoring for file and program acti | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -624,7 +636,7 @@ This policy setting allows you to configure monitoring for file and program acti | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -640,6 +652,8 @@ Allows or disallows Windows Defender Realtime Monitoring functionality. +> [!NOTE] +> Changes to this setting are not applied when [tamper protection][TAMPER-1] is enabled. @@ -647,7 +661,7 @@ Allows or disallows Windows Defender Realtime Monitoring functionality. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -687,7 +701,7 @@ Allows or disallows Windows Defender Realtime Monitoring functionality. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -713,7 +727,7 @@ This policy setting allows you to configure real-time scanning for files that ar | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -753,7 +767,7 @@ This policy setting allows you to configure real-time scanning for files that ar | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -769,6 +783,8 @@ Allows or disallows Windows Defender Script Scanning functionality. +> [!NOTE] +> Changes to this setting are not applied when [tamper protection][TAMPER-1] is enabled. @@ -776,7 +792,7 @@ Allows or disallows Windows Defender Script Scanning functionality. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -802,7 +818,7 @@ Allows or disallows Windows Defender Script Scanning functionality. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -814,6 +830,7 @@ Allows or disallows Windows Defender Script Scanning functionality. This policy setting allows you to configure whether or not to display AM UI to the users. + If you enable this setting AM UI won't be available to users. @@ -826,7 +843,7 @@ If you enable this setting AM UI won't be available to users. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -866,7 +883,7 @@ If you enable this setting AM UI won't be available to users. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -880,15 +897,20 @@ If you enable this setting AM UI won't be available to users. Exclude files and paths from Attack Surface Reduction (ASR) rules. Enabled: + Specify the folders or files and resources that should be excluded from ASR rules in the Options section. + Enter each rule on a new line as a name-value pair: - - Name column: Enter a folder path or a fully qualified resource name. For example, "C:\Windows" will exclude all files in that directory. "C:\Windows\App.exe" will exclude only that specific file in that specific folder - - Value column: Enter "0" for each item + +- Name column: Enter a folder path or a fully qualified resource name. For example, "C:\Windows" will exclude all files in that directory. "C:\Windows\App.exe" will exclude only that specific file in that specific folder +- Value column: Enter "0" for each item. Disabled: + No exclusions will be applied to the ASR rules. Not configured: + Same as Disabled. You can configure ASR rules in the Configure Attack Surface Reduction rules GP setting. @@ -903,7 +925,7 @@ You can configure ASR rules in the Configure Attack Surface Reduction rules GP s | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `|`) | @@ -934,7 +956,7 @@ You can configure ASR rules in the Configure Attack Surface Reduction rules GP s | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -948,28 +970,34 @@ You can configure ASR rules in the Configure Attack Surface Reduction rules GP s Set the state for each Attack Surface Reduction (ASR) rule. After enabling this setting, you can set each rule to the following in the Options section: - - Block: the rule will be applied - - Audit Mode: if the rule would normally cause an event, then it will be recorded (although the rule will not actually be applied) - - Off: the rule will not be applied - - Not Configured: the rule is enabled with default values - - Warn: the rule will be applied and the end-user will have the option to bypass the block + +- Block: the rule will be applied +- Audit Mode: if the rule would normally cause an event, then it will be recorded (although the rule won't actually be applied) +- Off: the rule won't be applied +- Not Configured: the rule is enabled with default values +- Warn: the rule will be applied and the end-user will have the option to bypass the block. Unless the ASR rule is disabled, a subsample of audit events are collected for ASR rules with the value of not configured. Enabled: + Specify the state for each ASR rule under the Options section for this setting. + Enter each rule on a new line as a name-value pair: - - Name column: Enter a valid ASR rule ID - - Value column: Enter the status ID that relates to state you want to specify for the associated rule + +- Name column: Enter a valid ASR rule ID +- Value column: Enter the status ID that relates to state you want to specify for the associated rule. The following status IDs are permitted under the value column: - - 1 (Block) - - 0 (Off) - - 2 (Audit) - - 5 (Not Configured) - - 6 (Warn) + +- 1 (Block) +- 0 (Off) +- 2 (Audit) +- 5 (Not Configured) +- 6 (Warn) Example: + xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx 0 xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx @@ -978,9 +1006,11 @@ xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx 2 Disabled: + No ASR rules will be configured. Not configured: + Same as Disabled. You can exclude folders or files in the "Exclude files and paths from Attack Surface Reduction Rules" GP setting. @@ -995,7 +1025,7 @@ You can exclude folders or files in the "Exclude files and paths from Attack Sur | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1025,7 +1055,7 @@ You can exclude folders or files in the "Exclude files and paths from Attack Sur | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1038,9 +1068,9 @@ You can exclude folders or files in the "Exclude files and paths from Attack Sur This policy setting allows you to configure the maximum percentage CPU utilization permitted during a scan. Valid values for this setting are a percentage represented by the integers 5 to 100. A value of 0 indicates that there should be no throttling of CPU utilization. The default value is 50. -- If you enable this setting, CPU utilization will not exceed the percentage specified. +- If you enable this setting, CPU utilization won't exceed the percentage specified. -- If you disable or do not configure this setting, CPU utilization will not exceed the default value. +- If you disable or don't configure this setting, CPU utilization won't exceed the default value. @@ -1052,7 +1082,7 @@ This policy setting allows you to configure the maximum percentage CPU utilizati | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-100]` | | Default Value | 50 | @@ -1084,7 +1114,7 @@ This policy setting allows you to configure the maximum percentage CPU utilizati | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -1101,7 +1131,7 @@ This setting applies to scheduled scans, but it has no effect on scans initiated - If you enable this setting, a check for new security intelligence will occur before running a scan. -- If you disable this setting or do not configure this setting, the scan will start using the existing security intelligence. +- If you disable this setting or don't configure this setting, the scan will start using the existing security intelligence. @@ -1113,7 +1143,7 @@ This setting applies to scheduled scans, but it has no effect on scans initiated | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1152,7 +1182,7 @@ This setting applies to scheduled scans, but it has no effect on scans initiated | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1173,9 +1203,8 @@ For more information about specific values that are supported, see the Microsoft > This feature requires the "Join Microsoft MAPS" setting enabled in order to function. Possible options are: -(0x0) Default Microsoft Defender Antivirus blocking level -(0x1) Moderate Microsoft Defender Antivirus blocking level, delivers verdict only for high confidence detections -(0x2) High blocking level - aggressively block unknowns while optimizing client performance (greater chance of false positives) + +(0x0) Default Microsoft Defender Antivirus blocking level (0x1) Moderate Microsoft Defender Antivirus blocking level, delivers verdict only for high confidence detections (0x2) High blocking level - aggressively block unknowns while optimizing client performance (greater chance of false positives) (0x4) High+ blocking level - aggressively block unknowns and apply additional protection measures (may impact client performance) (0x6) Zero tolerance blocking level - block all unknown executables. @@ -1189,7 +1218,7 @@ Possible options are: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1231,7 +1260,7 @@ Possible options are: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1261,7 +1290,7 @@ For example, if the desired timeout is 60 seconds, specify 50 seconds in this se | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-50]` | | Default Value | 0 | @@ -1293,7 +1322,7 @@ For example, if the desired timeout is 60 seconds, specify 50 seconds in this se | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1311,12 +1340,15 @@ These applications are allowed to modify or delete files in controlled folder ac Microsoft Defender Antivirus automatically determines which applications should be trusted. You can configure this setting to add additional applications. Enabled: + Specify additional allowed applications in the Options section.. Disabled: + No additional applications will be added to the trusted list. Not configured: + Same as Disabled. You can enable controlled folder access in the Configure controlled folder access GP setting. @@ -1333,7 +1365,7 @@ Default system folders are automatically guarded, but you can add folders in the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `|`) | @@ -1364,7 +1396,7 @@ Default system folders are automatically guarded, but you can add folders in the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1377,18 +1409,22 @@ Default system folders are automatically guarded, but you can add folders in the Specify additional folders that should be guarded by the Controlled folder access feature. -Files in these folders cannot be modified or deleted by untrusted applications. +Files in these folders can't be modified or deleted by untrusted applications. Default system folders are automatically protected. You can configure this setting to add additional folders. + The list of default system folders that are protected is shown in Windows Security. Enabled: + Specify additional folders that should be protected in the Options section. Disabled: + No additional folders will be protected. Not configured: + Same as Disabled. You can enable controlled folder access in the Configure controlled folder access GP setting. @@ -1405,7 +1441,7 @@ Microsoft Defender Antivirus automatically determines which applications can be | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `|`) | @@ -1436,7 +1472,7 @@ Microsoft Defender Antivirus automatically determines which applications can be | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1451,7 +1487,7 @@ This policy setting defines the number of days items should be kept in the Quara - If you enable this setting, items will be removed from the Quarantine folder after the number of days specified. -- If you disable or do not configure this setting, items will be kept in the quarantine folder indefinitely and will not be automatically removed. +- If you disable or don't configure this setting, items will be kept in the quarantine folder indefinitely and won't be automatically removed. @@ -1463,7 +1499,7 @@ This policy setting defines the number of days items should be kept in the Quara | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-90]` | | Default Value | 0 | @@ -1495,7 +1531,7 @@ This policy setting defines the number of days items should be kept in the Quara | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -1506,11 +1542,11 @@ This policy setting defines the number of days items should be kept in the Quara -This policy setting allows you to configure catch-up scans for scheduled full scans. A catch-up scan is a scan that is initiated because a regularly scheduled scan was missed. Usually these scheduled scans are missed because the computer was turned off at the scheduled time. +This policy setting allows you to configure catch-up scans for scheduled full scans. A catch-up scan is a scan that's initiated because a regularly scheduled scan was missed. Usually these scheduled scans are missed because the computer was turned off at the scheduled time. - If you enable this setting, catch-up scans for scheduled full scans will be turned on. If a computer is offline for two consecutive scheduled scans, a catch-up scan is started the next time someone logs on to the computer. If there is no scheduled scan configured, there will be no catch-up scan run. -- If you disable or do not configure this setting, catch-up scans for scheduled full scans will be turned off. +- If you disable or don't configure this setting, catch-up scans for scheduled full scans will be turned off. @@ -1522,7 +1558,7 @@ This policy setting allows you to configure catch-up scans for scheduled full sc | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1561,7 +1597,7 @@ This policy setting allows you to configure catch-up scans for scheduled full sc | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -1572,11 +1608,11 @@ This policy setting allows you to configure catch-up scans for scheduled full sc -This policy setting allows you to configure catch-up scans for scheduled quick scans. A catch-up scan is a scan that is initiated because a regularly scheduled scan was missed. Usually these scheduled scans are missed because the computer was turned off at the scheduled time. +This policy setting allows you to configure catch-up scans for scheduled quick scans. A catch-up scan is a scan that's initiated because a regularly scheduled scan was missed. Usually these scheduled scans are missed because the computer was turned off at the scheduled time. - If you enable this setting, catch-up scans for scheduled quick scans will be turned on. If a computer is offline for two consecutive scheduled scans, a catch-up scan is started the next time someone logs on to the computer. If there is no scheduled scan configured, there will be no catch-up scan run. -- If you disable or do not configure this setting, catch-up scans for scheduled quick scans will be turned off. +- If you disable or don't configure this setting, catch-up scans for scheduled quick scans will be turned off. @@ -1588,7 +1624,7 @@ This policy setting allows you to configure catch-up scans for scheduled quick s | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1627,7 +1663,7 @@ This policy setting allows you to configure catch-up scans for scheduled quick s | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1639,49 +1675,70 @@ This policy setting allows you to configure catch-up scans for scheduled quick s Enable or disable controlled folder access for untrusted applications. You can choose to block, audit, or allow attempts by untrusted apps to: - - Modify or delete files in protected folders, such as the Documents folder - - Write to disk sectors + +- Modify or delete files in protected folders, such as the Documents folder +- Write to disk sectors. You can also choose to only block or audit writes to disk sectors while still allowing the modification or deletion of files in protected folders. Microsoft Defender Antivirus automatically determines which applications can be trusted. You can add additional trusted applications in the Configure allowed applications GP setting. + Default system folders are automatically protected, but you can add folders in the Configure protected folders GP setting. Block: + The following will be blocked: - - Attempts by untrusted apps to modify or delete files in protected folders - - Attempts by untrusted apps to write to disk sectors + +- Attempts by untrusted apps to modify or delete files in protected folders +- Attempts by untrusted apps to write to disk sectors. + The Windows event log will record these blocks under Applications and Services Logs > Microsoft > Windows > Windows Defender > Operational > ID 1123. Disabled: -The following will not be blocked and will be allowed to run: - - Attempts by untrusted apps to modify or delete files in protected folders - - Attempts by untrusted apps to write to disk sectors -These attempts will not be recorded in the Windows event log. + +The following won't be blocked and will be allowed to run: + +- Attempts by untrusted apps to modify or delete files in protected folders +- Attempts by untrusted apps to write to disk sectors. + +These attempts won't be recorded in the Windows event log. Audit Mode: -The following will not be blocked and will be allowed to run: - - Attempts by untrusted apps to modify or delete files in protected folders - - Attempts by untrusted apps to write to disk sectors + +The following won't be blocked and will be allowed to run: + +- Attempts by untrusted apps to modify or delete files in protected folders +- Attempts by untrusted apps to write to disk sectors. + The Windows event log will record these attempts under Applications and Services Logs > Microsoft > Windows > Windows Defender > Operational > ID 1124. Block disk modification only: + The following will be blocked: - - Attempts by untrusted apps to write to disk sectors + +- Attempts by untrusted apps to write to disk sectors. + The Windows event log will record these attempts under Applications and Services Logs > Microsoft > Windows > Windows Defender > Operational > ID 1123. -The following will not be blocked and will be allowed to run: - - Attempts by untrusted apps to modify or delete files in protected folders -These attempts will not be recorded in the Windows event log. +The following won't be blocked and will be allowed to run: + +- Attempts by untrusted apps to modify or delete files in protected folders. + +These attempts won't be recorded in the Windows event log. Audit disk modification only: -The following will not be blocked and will be allowed to run: - - Attempts by untrusted apps to write to disk sectors - - Attempts by untrusted apps to modify or delete files in protected folders + +The following won't be blocked and will be allowed to run: + +- Attempts by untrusted apps to write to disk sectors +- Attempts by untrusted apps to modify or delete files in protected folders. + Only attempts to write to protected disk sectors will be recorded in the Windows event log (under Applications and Services Logs > Microsoft > Windows > Windows Defender > Operational > ID 1124). -Attempts to modify or delete files in protected folders will not be recorded. + +Attempts to modify or delete files in protected folders won't be recorded. Not configured: + Same as Disabled. @@ -1694,7 +1751,7 @@ Same as Disabled. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1735,7 +1792,7 @@ Same as Disabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -1750,7 +1807,7 @@ This policy setting allows you to enable or disable low CPU priority for schedul - If you enable this setting, low CPU priority will be used during scheduled scans. -- If you disable or do not configure this setting, not changes will be made to CPU priority for scheduled scans. +- If you disable or don't configure this setting, not changes will be made to CPU priority for scheduled scans. @@ -1762,7 +1819,7 @@ This policy setting allows you to enable or disable low CPU priority for schedul | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1801,7 +1858,7 @@ This policy setting allows you to enable or disable low CPU priority for schedul | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1815,14 +1872,18 @@ This policy setting allows you to enable or disable low CPU priority for schedul Enable or disable Microsoft Defender Exploit Guard network protection to prevent employees from using any application to access dangerous domains that may host phishing scams, exploit-hosting sites, and other malicious content on the Internet. Enabled: + Specify the mode in the Options section: --Block: Users and applications will not be able to access dangerous domains --Audit Mode: Users and applications can connect to dangerous domains, however if this feature would have blocked access if it were set to Block, then a record of the event will be in the event logs. + +-Block: Users and applications won't be able to access dangerous domains +-Audit Mode: Users and applications can connect to dangerous domains, however if this feature would've blocked access if it were set to Block, then a record of the event will be in the event logs. Disabled: -Users and applications will not be blocked from connecting to dangerous domains. + +Users and applications won't be blocked from connecting to dangerous domains. Not configured: + Same as Disabled. @@ -1835,7 +1896,7 @@ Same as Disabled. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1875,7 +1936,7 @@ Same as Disabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1891,6 +1952,8 @@ Allows an administrator to specify a list of file type extensions to ignore duri +> [!NOTE] +> To prevent unauthorized changes to exclusions, apply tamper protection. Tamper protection for exclusions only works when [certain conditions][TAMPER-2] are met. @@ -1898,7 +1961,7 @@ Allows an administrator to specify a list of file type extensions to ignore duri | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `|`) | @@ -1929,7 +1992,7 @@ Allows an administrator to specify a list of file type extensions to ignore duri | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1945,6 +2008,8 @@ Allows an administrator to specify a list of directory paths to ignore during a +> [!NOTE] +> To prevent unauthorized changes to exclusions, apply tamper protection. Tamper protection for exclusions only works when [certain conditions][TAMPER-2] are met. @@ -1952,7 +2017,7 @@ Allows an administrator to specify a list of directory paths to ignore during a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `|`) | @@ -1983,7 +2048,7 @@ Allows an administrator to specify a list of directory paths to ignore during a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1997,11 +2062,13 @@ Allows an administrator to specify a list of directory paths to ignore during a Allows an administrator to specify a list of files opened by processes to ignore during a scan. > [!IMPORTANT] -> The process itself is not excluded from the scan, but can be by using the Defender/ExcludedPaths policy to exclude its path. Each file type must be separated by a |. For example, C:\Example. exe|C:\Example1.exe. +> The process itself isn't excluded from the scan, but can be by using the Defender/ExcludedPaths policy to exclude its path. Each file type must be separated by a |. For example, C:\Example. exe|C:\Example1.exe. +> [!NOTE] +> To prevent unauthorized changes to exclusions, apply tamper protection. Tamper protection for exclusions only works when [certain conditions][TAMPER-2] are met. @@ -2009,7 +2076,7 @@ Allows an administrator to specify a list of files opened by processes to ignore | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `|`) | @@ -2040,7 +2107,7 @@ Allows an administrator to specify a list of files opened by processes to ignore | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -2054,14 +2121,19 @@ Allows an administrator to specify a list of files opened by processes to ignore Enable or disable detection for potentially unwanted applications. You can choose to block, audit, or allow when potentially unwanted software is being downloaded or attempts to install itself on your computer. Enabled: + Specify the mode in the Options section: + -Block: Potentially unwanted software will be blocked. --Audit Mode: Potentially unwanted software will not be blocked, however if this feature would have blocked access if it were set to Block, then a record of the event will be in the event logs. + +-Audit Mode: Potentially unwanted software won't be blocked, however if this feature would've blocked access if it were set to Block, then a record of the event will be in the event logs. Disabled: -Potentially unwanted software will not be blocked. + +Potentially unwanted software won't be blocked. Not configured: + Same as Disabled. @@ -2074,7 +2146,7 @@ Same as Disabled. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2084,9 +2156,9 @@ Same as Disabled. | Value | Description | |:--|:--| -| 0 (Default) | PUA Protection off. Windows Defender will not protect against potentially unwanted applications. | +| 0 (Default) | PUA Protection off. Windows Defender won't protect against potentially unwanted applications. | | 1 | PUA Protection on. Detected items are blocked. They will show in history along with other threats. | -| 2 | Audit mode. Windows Defender will detect potentially unwanted applications, but take no action. You can review information about the applications Windows Defender would have taken action against by searching for events created by Windows Defender in the Event Viewer. | +| 2 | Audit mode. Windows Defender will detect potentially unwanted applications, but take no action. You can review information about the applications Windows Defender would've taken action against by searching for events created by Windows Defender in the Event Viewer. | @@ -2114,7 +2186,7 @@ Same as Disabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -2125,20 +2197,21 @@ Same as Disabled. -This policy setting allows you to configure monitoring for incoming and outgoing files, without having to turn off monitoring entirely. It is recommended for use on servers where there is a lot of incoming and outgoing file activity but for performance reasons need to have scanning disabled for a particular scan direction. The appropriate configuration should be evaluated based on the server role. +This policy setting allows you to configure monitoring for incoming and outgoing files, without having to turn off monitoring entirely. It's recommended for use on servers where there is a lot of incoming and outgoing file activity but for performance reasons need to have scanning disabled for a particular scan direction. The appropriate configuration should be evaluated based on the server role. -**Note** that this configuration is only honored for NTFS volumes. For any other file system type, full monitoring of file and program activity will be present on those volumes. +Note that this configuration is only honored for NTFS volumes. For any other file system type, full monitoring of file and program activity will be present on those volumes. The options for this setting are mutually exclusive: + 0 = Scan incoming and outgoing files (default) 1 = Scan incoming files only -2 = Scan outgoing files only +2 = Scan outgoing files only. -Any other value, or if the value does not exist, resolves to the default (0). +Any other value, or if the value doesn't exist, resolves to the default (0). - If you enable this setting, the specified type of monitoring will be enabled. -- If you disable or do not configure this setting, monitoring for incoming and outgoing files will be enabled. +- If you disable or don't configure this setting, monitoring for incoming and outgoing files will be enabled. @@ -2150,7 +2223,7 @@ Any other value, or if the value does not exist, resolves to the default (0). | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2191,7 +2264,7 @@ Any other value, or if the value does not exist, resolves to the default (0). | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -2203,12 +2276,13 @@ Any other value, or if the value does not exist, resolves to the default (0). This policy setting allows you to specify the scan type to use during a scheduled scan. Scan type options are: + 1 = Quick Scan (default) -2 = Full Scan +2 = Full Scan. - If you enable this setting, the scan type will be set to the specified value. -- If you disable or do not configure this setting, the default scan type will be used. +- If you disable or don't configure this setting, the default scan type will be used. @@ -2220,7 +2294,7 @@ This policy setting allows you to specify the scan type to use during a schedule | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -2260,7 +2334,7 @@ This policy setting allows you to specify the scan type to use during a schedule | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -2275,7 +2349,7 @@ This policy setting allows you to specify the time of day at which to perform a - If you enable this setting, a daily quick scan will run at the time of day specified. -- If you disable or do not configure this setting, daily quick scan controlled by this config will not be run. +- If you disable or don't configure this setting, daily quick scan controlled by this config won't be run. @@ -2287,7 +2361,7 @@ This policy setting allows you to specify the time of day at which to perform a | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-1380]` | | Default Value | 120 | @@ -2319,7 +2393,7 @@ This policy setting allows you to specify the time of day at which to perform a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -2333,19 +2407,12 @@ This policy setting allows you to specify the time of day at which to perform a This policy setting allows you to specify the day of the week on which to perform a scheduled scan. The scan can also be configured to run every day or to never run at all. This setting can be configured with the following ordinal number values: -(0x0) Every Day -(0x1) Sunday -(0x2) Monday -(0x3) Tuesday -(0x4) Wednesday -(0x5) Thursday -(0x6) Friday -(0x7) Saturday -(0x8) Never (default) + +(0x0) Every Day (0x1) Sunday (0x2) Monday (0x3) Tuesday (0x4) Wednesday (0x5) Thursday (0x6) Friday (0x7) Saturday (0x8) Never (default) - If you enable this setting, a scheduled scan will run at the frequency specified. -- If you disable or do not configure this setting, a scheduled scan will run at a default frequency. +- If you disable or don't configure this setting, a scheduled scan will run at a default frequency. @@ -2357,7 +2424,7 @@ This setting can be configured with the following ordinal number values: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2404,7 +2471,7 @@ This setting can be configured with the following ordinal number values: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -2419,7 +2486,7 @@ This policy setting allows you to specify the time of day at which to perform a - If you enable this setting, a scheduled scan will run at the time of day specified. -- If you disable or do not configure this setting, a scheduled scan will run at a default time. +- If you disable or don't configure this setting, a scheduled scan will run at a default time. @@ -2431,7 +2498,7 @@ This policy setting allows you to specify the time of day at which to perform a | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-1380]` | | Default Value | 120 | @@ -2463,7 +2530,7 @@ This policy setting allows you to specify the time of day at which to perform a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -2476,7 +2543,7 @@ This policy setting allows you to specify the time of day at which to perform a This policy setting allows you to define the security intelligence location for VDI-configured computers. -If you disable or do not configure this setting, security intelligence will be referred from the default local source. +If you disable or don't configure this setting, security intelligence will be referred from the default local source. @@ -2488,7 +2555,7 @@ If you disable or do not configure this setting, security intelligence will be r | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2518,7 +2585,7 @@ If you disable or do not configure this setting, security intelligence will be r | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -2529,13 +2596,13 @@ If you disable or do not configure this setting, security intelligence will be r -This policy setting allows you to define the order in which different security intelligence update sources should be contacted. The value of this setting should be entered as a pipe-separated string enumerating the security intelligence update sources in order. Possible values are: "InternalDefinitionUpdateServer", "MicrosoftUpdateServer", "MMPC", and "FileShares" +This policy setting allows you to define the order in which different security intelligence update sources should be contacted. The value of this setting should be entered as a pipe-separated string enumerating the security intelligence update sources in order. Possible values are: "InternalDefinitionUpdateServer", "MicrosoftUpdateServer", "MMPC", and "FileShares". For Example: `{ InternalDefinitionUpdateServer | MicrosoftUpdateServer | MMPC }` -- If you enable this setting, security intelligence update sources will be contacted in the order specified. Once security intelligence updates have been successfully downloaded from one specified source, the remaining sources in the list will not be contacted. +- If you enable this setting, security intelligence update sources will be contacted in the order specified. Once security intelligence updates have been successfully downloaded from one specified source, the remaining sources in the list won't be contacted. -- If you disable or do not configure this setting, security intelligence update sources will be contacted in a default order. +- If you disable or don't configure this setting, security intelligence update sources will be contacted in a default order. @@ -2547,7 +2614,7 @@ For Example: `{ InternalDefinitionUpdateServer | MicrosoftUpdateServer | MMPC }` | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `|`) | @@ -2578,7 +2645,7 @@ For Example: `{ InternalDefinitionUpdateServer | MicrosoftUpdateServer | MMPC }` | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -2589,11 +2656,11 @@ For Example: `{ InternalDefinitionUpdateServer | MicrosoftUpdateServer | MMPC }` -This policy setting allows you to configure UNC file share sources for downloading security intelligence updates. Sources will be contacted in the order specified. The value of this setting should be entered as a pipe-separated string enumerating the security intelligence update sources. For example: "{\\unc1 | \\unc2 }". The list is empty by default. +This policy setting allows you to configure UNC file share sources for downloading security intelligence updates. Sources will be contacted in the order specified. The value of this setting should be entered as a pipe-separated string enumerating the security intelligence update sources. For example: "`{\\unc1 | \\unc2 }`". The list is empty by default. -- If you enable this setting, the specified sources will be contacted for security intelligence updates. Once security intelligence updates have been successfully downloaded from one specified source, the remaining sources in the list will not be contacted. +- If you enable this setting, the specified sources will be contacted for security intelligence updates. Once security intelligence updates have been successfully downloaded from one specified source, the remaining sources in the list won't be contacted. -- If you disable or do not configure this setting, the list will remain empty by default and no sources will be contacted. +- If you disable or don't configure this setting, the list will remain empty by default and no sources will be contacted. @@ -2605,7 +2672,7 @@ This policy setting allows you to configure UNC file share sources for downloadi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `|`) | @@ -2636,7 +2703,7 @@ This policy setting allows you to configure UNC file share sources for downloadi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -2651,7 +2718,7 @@ This policy setting allows you to specify an interval at which to check for secu - If you enable this setting, checks for security intelligence updates will occur at the interval specified. -- If you disable or do not configure this setting, checks for security intelligence updates will occur at the default interval. +- If you disable or don't configure this setting, checks for security intelligence updates will occur at the default interval. @@ -2663,7 +2730,7 @@ This policy setting allows you to specify an interval at which to check for secu | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-24]` | | Default Value | 8 | @@ -2695,7 +2762,7 @@ This policy setting allows you to specify an interval at which to check for secu | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -2709,10 +2776,8 @@ This policy setting allows you to specify an interval at which to check for secu This policy setting configures behavior of samples submission when opt-in for MAPS telemetry is set. Possible options are: -(0x0) Always prompt -(0x1) Send safe samples automatically -(0x2) Never send -(0x3) Send all samples automatically. + +(0x0) Always prompt (0x1) Send safe samples automatically (0x2) Never send (0x3) Send all samples automatically. @@ -2724,7 +2789,7 @@ Possible options are: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -2766,7 +2831,7 @@ Possible options are: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -2780,12 +2845,14 @@ Possible options are: This policy setting allows you to customize which automatic remediation action will be taken for each threat alert level. Threat alert levels should be added under the Options for this setting. Each entry must be listed as a name value pair. The name defines a threat alert level. The value contains the action ID for the remediation action that should be taken. Valid threat alert levels are: + 1 = Low 2 = Medium 4 = High -5 = Severe +5 = Severe. Valid remediation action values are: + 2 = Quarantine 3 = Remove 6 = Ignore. @@ -2793,6 +2860,8 @@ Valid remediation action values are: +> [!NOTE] +> Changes to this setting are not applied when [tamper protection][TAMPER-1] is enabled. @@ -2800,7 +2869,7 @@ Valid remediation action values are: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2811,7 +2880,7 @@ Valid remediation action values are: |:--|:--| | Name | Threats_ThreatSeverityDefaultAction | | Friendly Name | Specify threat alert levels at which default action should not be taken when detected | -| Element Name | Specify threat alert levels at which default action should not be taken when detected. | +| Element Name | Specify threat alert levels at which default action shouldn't be taken when detected. | | Location | Computer Configuration | | Path | Windows Components > Microsoft Defender Antivirus > Threats | | Registry Key Name | Software\Policies\Microsoft\Windows Defender\Threats | @@ -2826,6 +2895,9 @@ Valid remediation action values are: + +[TAMPER-1]: /microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection +[TAMPER-2]: /microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection#what-about-exclusions diff --git a/windows/client-management/mdm/policy-csp-deliveryoptimization.md b/windows/client-management/mdm/policy-csp-deliveryoptimization.md index 0a0eeb6f78..d38b2f6b8f 100644 --- a/windows/client-management/mdm/policy-csp-deliveryoptimization.md +++ b/windows/client-management/mdm/policy-csp-deliveryoptimization.md @@ -4,7 +4,7 @@ description: Learn more about the DeliveryOptimization Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - DeliveryOptimization -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -58,7 +55,7 @@ The value 0 (zero) means "unlimited" cache; Delivery Optimization will clear the | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-4294967295]` | | Default Value | 0 | @@ -90,7 +87,7 @@ The value 0 (zero) means "unlimited" cache; Delivery Optimization will clear the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -113,7 +110,7 @@ Specifies whether the device is allowed to participate in Peer Caching while con | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -153,7 +150,7 @@ Specifies whether the device is allowed to participate in Peer Caching while con | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -180,7 +177,7 @@ One or more values can be added as either fully qualified domain names (FQDN) or | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `,`) | @@ -211,7 +208,7 @@ One or more values can be added as either fully qualified domain names (FQDN) or | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -232,7 +229,7 @@ Options available are: 2 = DHCP Option 235 Force. -If this policy is not configured, the client will attempt to automatically find a cache server using DNS-SD. If set to 0, the client will not use DNS-SD to automatically find a cache server. If set to 1 or 2, the client will query DHCP Option ID 235 and use the returned value as the Cache Server Hostname. Option 2 overrides the Cache Server Hostname policy, if configured. +If this policy isn't configured, the client will attempt to automatically find a cache server using DNS-SD. If set to 0, the client won't use DNS-SD to automatically find a cache server. If set to 1 or 2, the client will query DHCP Option ID 235 and use the returned value as the Cache Server Hostname. Option 2 overrides the Cache Server Hostname policy, if configured. @@ -246,7 +243,7 @@ If this policy is not configured, the client will attempt to automatically find | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-4294967295]` | | Default Value | 0 | @@ -278,7 +275,7 @@ If this policy is not configured, the client will attempt to automatically find | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -289,11 +286,11 @@ If this policy is not configured, the client will attempt to automatically find -This policy allows you to delay the use of an HTTP source in a background download that is allowed to use P2P. +This policy allows you to delay the use of an HTTP source in a background download that's allowed to use P2P. -After the max delay has reached, the download will resume using HTTP, either downloading the entire payload or complementing the bytes that could not be downloaded from Peers. +After the max delay has reached, the download will resume using HTTP, either downloading the entire payload or complementing the bytes that couldn't be downloaded from Peers. -**Note** that a download that is waiting for peer sources, will appear to be stuck for the end user. +Note that a download that's waiting for peer sources, will appear to be stuck for the end user. The recommended value is 1 hour (3600). @@ -307,7 +304,7 @@ The recommended value is 1 hour (3600). | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-4294967295]` | | Default Value | 0 | @@ -339,7 +336,7 @@ The recommended value is 1 hour (3600). | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -350,7 +347,7 @@ The recommended value is 1 hour (3600). -Specifies the time in seconds to delay the fallback from Cache Server to the HTTP source for a background content download. **Note** that the DODelayBackgroundDownloadFromHttp policy takes precedence over this policy to allow downloads from peers first. +Specifies the time in seconds to delay the fallback from Cache Server to the HTTP source for a background content download. Note that the DODelayBackgroundDownloadFromHttp policy takes precedence over this policy to allow downloads from peers first. @@ -362,7 +359,7 @@ Specifies the time in seconds to delay the fallback from Cache Server to the HTT | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-2592000]` | | Default Value | 0 | @@ -394,7 +391,7 @@ Specifies the time in seconds to delay the fallback from Cache Server to the HTT | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -405,7 +402,7 @@ Specifies the time in seconds to delay the fallback from Cache Server to the HTT -Specifies the time in seconds to delay the fallback from Cache Server to the HTTP source for foreground content download. **Note** that the DODelayForegroundDownloadFromHttp policy takes precedence over this policy to allow downloads from peers first. +Specifies the time in seconds to delay the fallback from Cache Server to the HTTP source for foreground content download. Note that the DODelayForegroundDownloadFromHttp policy takes precedence over this policy to allow downloads from peers first. @@ -417,7 +414,7 @@ Specifies the time in seconds to delay the fallback from Cache Server to the HTT | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-2592000]` | | Default Value | 0 | @@ -449,7 +446,7 @@ Specifies the time in seconds to delay the fallback from Cache Server to the HTT | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -460,11 +457,11 @@ Specifies the time in seconds to delay the fallback from Cache Server to the HTT -This policy allows you to delay the use of an HTTP source in a foreground (interactive) download that is allowed to use P2P. +This policy allows you to delay the use of an HTTP source in a foreground (interactive) download that's allowed to use P2P. -After the max delay has reached, the download will resume using HTTP, either downloading the entire payload or complementing the bytes that could not be downloaded from Peers. +After the max delay has reached, the download will resume using HTTP, either downloading the entire payload or complementing the bytes that couldn't be downloaded from Peers. -**Note** that a download that is waiting for peer sources, will appear to be stuck for the end user. +Note that a download that's waiting for peer sources, will appear to be stuck for the end user. The recommended value is 1 minute (60). @@ -478,7 +475,7 @@ The recommended value is 1 minute (60). | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-4294967295]` | | Default Value | 0 | @@ -510,7 +507,7 @@ The recommended value is 1 minute (60). | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -533,7 +530,7 @@ Disallow downloads from Microsoft Connected Cache servers when the device connec | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -569,7 +566,7 @@ Disallow downloads from Microsoft Connected Cache servers when the device connec | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -594,7 +591,7 @@ Specifies the download method that Delivery Optimization can use in downloads of | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -608,8 +605,8 @@ Specifies the download method that Delivery Optimization can use in downloads of | 1 | HTTP blended with peering behind the same NAT. | | 2 | When this option is selected, peering will cross NATs. To create a custom group use Group ID in combination with Mode 2. | | 3 | HTTP blended with Internet peering. | -| 99 | Simple download mode with no peering. Delivery Optimization downloads using HTTP only and does not attempt to contact the Delivery Optimization cloud services. Added in Windows 10, version 1607. | -| 100 | Bypass mode. Windows 10: Do not use Delivery Optimization and use BITS instead. Windows 11: Deprecated, use Simple mode instead. | +| 99 | Simple download mode with no peering. Delivery Optimization downloads using HTTP only and doesn't attempt to contact the Delivery Optimization cloud services. Added in Windows 10, version 1607. | +| 100 | Bypass mode. Windows 10: Don't use Delivery Optimization and use BITS instead. Windows 11: Deprecated, use Simple mode instead. | @@ -638,7 +635,7 @@ Specifies the download method that Delivery Optimization can use in downloads of | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -651,9 +648,9 @@ Specifies the download method that Delivery Optimization can use in downloads of Group ID must be set as a GUID. This Policy specifies an arbitrary group ID that the device belongs to. -Use this if you need to create a single group for Local Network Peering for branches that are on different domains or are not on the same LAN. +Use this if you need to create a single group for Local Network Peering for branches that are on different domains or aren't on the same LAN. -**Note** this is a best effort optimization and should not be relied on for an authentication of identity. +Note this is a best effort optimization and shouldn't be relied on for an authentication of identity. @@ -665,7 +662,7 @@ Use this if you need to create a single group for Local Network Peering for bran | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -695,7 +692,7 @@ Use this if you need to create a single group for Local Network Peering for bran | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -720,7 +717,7 @@ Set this policy to restrict peer selection to a specific source. Available optio | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -764,7 +761,7 @@ Set this policy to restrict peer selection to a specific source. Available optio | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -789,7 +786,7 @@ The default value 0 (zero) means that Delivery Optimization dynamically adjusts | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-4294967295]` | | Default Value | 0 | @@ -821,7 +818,7 @@ The default value 0 (zero) means that Delivery Optimization dynamically adjusts | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -832,7 +829,7 @@ The default value 0 (zero) means that Delivery Optimization dynamically adjusts -Specifies the maximum time in seconds that each file is held in the Delivery Optimization cache after downloading successfully. The value 0 (zero) means unlimited; Delivery Optimization will hold the files in the cache longer and make the files available for uploads to other devices, as long as the cache size has not exceeded. The value 0 is new in Windows 10, version 1607. The default value is 604800 seconds (7 days). +Specifies the maximum time in seconds that each file is held in the Delivery Optimization cache after downloading successfully. The value 0 (zero) means unlimited; Delivery Optimization will hold the files in the cache longer and make the files available for uploads to other devices, as long as the cache size hasn't exceeded. The value 0 is new in Windows 10, version 1607. The default value is 604800 seconds (7 days). @@ -844,7 +841,7 @@ Specifies the maximum time in seconds that each file is held in the Delivery Opt | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-4294967295]` | | Default Value | 0 | @@ -876,7 +873,7 @@ Specifies the maximum time in seconds that each file is held in the Delivery Opt | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -899,7 +896,7 @@ Specifies the maximum cache size that Delivery Optimization can utilize, as a pe | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[1-100]` | | Default Value | 0 | @@ -931,7 +928,7 @@ Specifies the maximum cache size that Delivery Optimization can utilize, as a pe | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -956,7 +953,7 @@ The default value 0 (zero) means that Delivery Optimization dynamically adjusts | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-4294967295]` | | Default Value | 0 | @@ -988,7 +985,7 @@ The default value 0 (zero) means that Delivery Optimization dynamically adjusts | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1011,7 +1008,7 @@ Specifies the minimum download QoS (Quality of Service or speed) in KiloBytes/se | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[1-4294967295]` | | Default Value | 0 | @@ -1043,7 +1040,7 @@ Specifies the minimum download QoS (Quality of Service or speed) in KiloBytes/se | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1070,7 +1067,7 @@ The value 0 means "not-limited"; The cloud service set default value will be use | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-100]` | | Default Value | 0 | @@ -1102,7 +1099,7 @@ The value 0 means "not-limited"; The cloud service set default value will be use | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1130,7 +1127,7 @@ Recommended values: 64 GB to 256 GB. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[1-100000]` | | Default Value | 0 | @@ -1162,7 +1159,7 @@ Recommended values: 64 GB to 256 GB. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1185,7 +1182,7 @@ Specifies the minimum content file size in MB enabled to use Peer Caching. Recom | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[1-100000]` | | Default Value | 0 | @@ -1217,7 +1214,7 @@ Specifies the minimum content file size in MB enabled to use Peer Caching. Recom | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1240,7 +1237,7 @@ Specifies the minimum RAM size in GB required to use Peer Caching. For example, | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[1-100000]` | | Default Value | 0 | @@ -1272,7 +1269,7 @@ Specifies the minimum RAM size in GB required to use Peer Caching. For example, | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1297,7 +1294,7 @@ By default, %SystemDrive% is used to store the cache. The drive location can be | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1327,7 +1324,7 @@ By default, %SystemDrive% is used to store the cache. The drive location can be | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1338,7 +1335,7 @@ By default, %SystemDrive% is used to store the cache. The drive location can be -Specifies the maximum total bytes in GB that Delivery Optimization is allowed to upload to Internet peers in each calendar month. The value 0 (zero) means unlimited; No monthly upload limit is applied if 0 is set. The default value is 5120 (5 TB). +Specifies the maximum total bytes in GB that Delivery Optimization is allowed to upload to Internet peers in each calendar month. The value 0 (zero) means unlimited; No monthly upload limit's applied if 0 is set. The default value is 5120 (5 TB). @@ -1350,7 +1347,7 @@ Specifies the maximum total bytes in GB that Delivery Optimization is allowed to | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-4294967295]` | | Default Value | 0 | @@ -1382,7 +1379,7 @@ Specifies the maximum total bytes in GB that Delivery Optimization is allowed to | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1409,7 +1406,7 @@ Downloads from LAN peers won't be throttled even when this policy is set. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-100]` | | Default Value | 0 | @@ -1441,7 +1438,7 @@ Downloads from LAN peers won't be throttled even when this policy is set. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1466,7 +1463,7 @@ The default value 0 (zero) means that Delivery Optimization dynamically adjusts | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-100]` | | Default Value | 0 | @@ -1498,7 +1495,7 @@ The default value 0 (zero) means that Delivery Optimization dynamically adjusts | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1512,8 +1509,11 @@ The default value 0 (zero) means that Delivery Optimization dynamically adjusts Set this policy to restrict peer selection via selected option. Options available are: + 0 = NAT. + 1 = Subnet mask. + 2 = Local discovery (DNS-SD). The default value has changed from 0 (no restriction) to 1 (restrict to the subnet). @@ -1533,7 +1533,7 @@ In Windows 11 the 'Local Peer Discovery' option was introduced to restrict peer | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1574,7 +1574,7 @@ In Windows 11 the 'Local Peer Discovery' option was introduced to restrict peer | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1597,13 +1597,12 @@ Specifies the maximum background download bandwidth that Delivery Optimization u | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1629,7 +1628,7 @@ Specifies the maximum background download bandwidth that Delivery Optimization u | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1657,13 +1656,12 @@ This policy allows an IT Admin to define the following details: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1689,7 +1687,7 @@ This policy allows an IT Admin to define the following details: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1712,7 +1710,7 @@ This policy allows you to set one or more keywords used to recognize VPN connect | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `,`) | diff --git a/windows/client-management/mdm/policy-csp-desktop.md b/windows/client-management/mdm/policy-csp-desktop.md index e0eeb748b5..82a49e6530 100644 --- a/windows/client-management/mdm/policy-csp-desktop.md +++ b/windows/client-management/mdm/policy-csp-desktop.md @@ -4,7 +4,7 @@ description: Learn more about the Desktop Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - Desktop -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -58,13 +55,12 @@ If you enable this setting, users are unable to type a new location in the Targe | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-desktopappinstaller.md b/windows/client-management/mdm/policy-csp-desktopappinstaller.md index c2e602fd7a..8167513c1a 100644 --- a/windows/client-management/mdm/policy-csp-desktopappinstaller.md +++ b/windows/client-management/mdm/policy-csp-desktopappinstaller.md @@ -4,7 +4,7 @@ description: Learn more about the DesktopAppInstaller Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - DesktopAppInstaller -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -44,9 +41,9 @@ ms.topic: reference This policy controls additional sources provided by the enterprise IT administrator. -- If you do not configure this policy, no additional sources will be configured for the [Windows Package Manager](/windows/package-manager/). +- If you don't configure this policy, no additional sources will be configured for the [Windows Package Manager](/windows/package-manager/). -- If you enable this policy, the additional sources will be added to the [Windows Package Manager](/windows/package-manager/) and cannot be removed. The representation for each additional source can be obtained from installed sources using '[winget source export](/windows/package-manager/winget)'. +- If you enable this policy, the additional sources will be added to the [Windows Package Manager](/windows/package-manager/) and can't be removed. The representation for each additional source can be obtained from installed sources using '[winget source export](/windows/package-manager/winget)'. - If you disable this policy, no additional sources can be configured for the [Windows Package Manager](/windows/package-manager/). @@ -60,13 +57,12 @@ This policy controls additional sources provided by the enterprise IT administra | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -93,7 +89,7 @@ This policy controls additional sources provided by the enterprise IT administra | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -106,7 +102,7 @@ This policy controls additional sources provided by the enterprise IT administra This policy controls additional sources allowed by the enterprise IT administrator. -- If you do not configure this policy, users will be able to add or remove additional sources other than those configured by policy. +- If you don't configure this policy, users will be able to add or remove additional sources other than those configured by policy. - If you enable this policy, only the sources specified can be added or removed from the [Windows Package Manager](/windows/package-manager/). The representation for each allowed source can be obtained from installed sources using '[winget source export](/windows/package-manager/winget)'. @@ -122,13 +118,12 @@ This policy controls additional sources allowed by the enterprise IT administrat | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -155,7 +150,7 @@ This policy controls additional sources allowed by the enterprise IT administrat | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -168,9 +163,9 @@ This policy controls additional sources allowed by the enterprise IT administrat This policy controls whether the [Windows Package Manager](/windows/package-manager/) can be used by users. -- If you enable or do not configure this setting, users will be able to use the [Windows Package Manager](/windows/package-manager/). +- If you enable or don't configure this setting, users will be able to use the [Windows Package Manager](/windows/package-manager/). -- If you disable this setting, users will not be able to use the [Windows Package Manager](/windows/package-manager/). +- If you disable this setting, users won't be able to use the [Windows Package Manager](/windows/package-manager/). @@ -183,13 +178,12 @@ Users will still be able to execute the *winget* command. The default help will | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -216,7 +210,7 @@ Users will still be able to execute the *winget* command. The default help will | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -238,14 +232,13 @@ Users will still be able to execute the *winget* command. The default help will | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -267,7 +260,7 @@ Users will still be able to execute the *winget* command. The default help will | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -280,11 +273,11 @@ Users will still be able to execute the *winget* command. The default help will This policy controls the default source included with the [Windows Package Manager](/windows/package-manager/). -- If you do not configure this setting, the default source for the [Windows Package Manager](/windows/package-manager/) will be available and can be removed. +- If you don't configure this setting, the default source for the [Windows Package Manager](/windows/package-manager/) will be available and can be removed. -- If you enable this setting, the default source for the [Windows Package Manager](/windows/package-manager/) will be available and cannot be removed. +- If you enable this setting, the default source for the [Windows Package Manager](/windows/package-manager/) will be available and can't be removed. -- If you disable this setting the default source for the [Windows Package Manager](/windows/package-manager/) will not be available. +- If you disable this setting the default source for the [Windows Package Manager](/windows/package-manager/) won't be available. @@ -296,13 +289,12 @@ This policy controls the default source included with the [Windows Package Manag | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -329,7 +321,7 @@ This policy controls the default source included with the [Windows Package Manag | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -342,9 +334,9 @@ This policy controls the default source included with the [Windows Package Manag This policy controls whether users can enable experimental features in the [Windows Package Manager](/windows/package-manager/). -- If you enable or do not configure this setting, users will be able to enable experimental features for the [Windows Package Manager](/windows/package-manager/). +- If you enable or don't configure this setting, users will be able to enable experimental features for the [Windows Package Manager](/windows/package-manager/). -- If you disable this setting, users will not be able to enable experimental features for the [Windows Package Manager](/windows/package-manager/). +- If you disable this setting, users won't be able to enable experimental features for the [Windows Package Manager](/windows/package-manager/). @@ -357,13 +349,12 @@ Experimental features are used during Windows Package Manager development cycle | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -390,7 +381,7 @@ Experimental features are used during Windows Package Manager development cycle | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -403,9 +394,9 @@ Experimental features are used during Windows Package Manager development cycle This policy controls whether or not the [Windows Package Manager](/windows/package-manager/) can be configured to enable the ability override the SHA256 security validation in settings. -- If you enable or do not configure this policy, users will be able to enable the ability override the SHA256 security validation in the [Windows Package Manager](/windows/package-manager/) settings. +- If you enable or don't configure this policy, users will be able to enable the ability override the SHA256 security validation in the [Windows Package Manager](/windows/package-manager/) settings. -- If you disable this policy, users will not be able to enable the ability override the SHA256 security validation in the [Windows Package Manager](/windows/package-manager/) settings. +- If you disable this policy, users won't be able to enable the ability override the SHA256 security validation in the [Windows Package Manager](/windows/package-manager/) settings. @@ -417,13 +408,12 @@ This policy controls whether or not the [Windows Package Manager](/windows/packa | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -450,7 +440,7 @@ This policy controls whether or not the [Windows Package Manager](/windows/packa | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -472,14 +462,13 @@ This policy controls whether or not the [Windows Package Manager](/windows/packa | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -501,7 +490,7 @@ This policy controls whether or not the [Windows Package Manager](/windows/packa | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -514,9 +503,9 @@ This policy controls whether or not the [Windows Package Manager](/windows/packa This policy controls whether users can install packages with local manifest files. -- If you enable or do not configure this setting, users will be able to install packages with local manifests using the [Windows Package Manager](/windows/package-manager/). +- If you enable or don't configure this setting, users will be able to install packages with local manifests using the [Windows Package Manager](/windows/package-manager/). -- If you disable this setting, users will not be able to install packages with local manifests using the [Windows Package Manager](/windows/package-manager/). +- If you disable this setting, users won't be able to install packages with local manifests using the [Windows Package Manager](/windows/package-manager/). @@ -528,13 +517,12 @@ This policy controls whether users can install packages with local manifest file | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -561,7 +549,7 @@ This policy controls whether users can install packages with local manifest file | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -574,11 +562,11 @@ This policy controls whether users can install packages with local manifest file This policy controls the Microsoft Store source included with the [Windows Package Manager](/windows/package-manager/). -- If you do not configure this setting, the Microsoft Store source for the Windows Package manager will be available and can be removed. +- If you don't configure this setting, the Microsoft Store source for the Windows Package manager will be available and can be removed. -- If you enable this setting, the Microsoft Store source for the [Windows Package Manager](/windows/package-manager/) will be available and cannot be removed. +- If you enable this setting, the Microsoft Store source for the [Windows Package Manager](/windows/package-manager/) will be available and can't be removed. -- If you disable this setting the Microsoft Store source for the [Windows Package Manager](/windows/package-manager/) will not be available. +- If you disable this setting the Microsoft Store source for the [Windows Package Manager](/windows/package-manager/) won't be available. @@ -590,13 +578,12 @@ This policy controls the Microsoft Store source included with the [Windows Packa | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -623,7 +610,7 @@ This policy controls the Microsoft Store source included with the [Windows Packa | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -634,11 +621,11 @@ This policy controls the Microsoft Store source included with the [Windows Packa -This policy controls whether users can install packages from a website that is using the ms-appinstaller protocol. +This policy controls whether users can install packages from a website that's using the ms-appinstaller protocol. -- If you enable or do not configure this setting, users will be able to install packages from websites that use this protocol. +- If you enable or don't configure this setting, users will be able to install packages from websites that use this protocol. -- If you disable this setting, users will not be able to install packages from websites that use this protocol. +- If you disable this setting, users won't be able to install packages from websites that use this protocol. @@ -650,13 +637,12 @@ This policy controls whether users can install packages from a website that is u | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -683,7 +669,7 @@ This policy controls whether users can install packages from a website that is u | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -696,9 +682,9 @@ This policy controls whether users can install packages from a website that is u This policy controls whether users can change their settings. -- If you enable or do not configure this setting, users will be able to change settings for the [Windows Package Manager](/windows/package-manager/). +- If you enable or don't configure this setting, users will be able to change settings for the [Windows Package Manager](/windows/package-manager/). -- If you disable this setting, users will not be able to change settings for the [Windows Package Manager](/windows/package-manager/). +- If you disable this setting, users won't be able to change settings for the [Windows Package Manager](/windows/package-manager/). @@ -711,13 +697,12 @@ The settings are stored inside of a .json file on the user’s system. It may be | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -744,7 +729,7 @@ The settings are stored inside of a .json file on the user’s system. It may be | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -757,7 +742,7 @@ The settings are stored inside of a .json file on the user’s system. It may be This policy controls the auto update interval for package-based sources. -- If you disable or do not configure this setting, the default interval or the value specified in settings will be used by the [Windows Package Manager](/windows/package-manager/). +- If you disable or don't configure this setting, the default interval or the value specified in settings will be used by the [Windows Package Manager](/windows/package-manager/). - If you enable this setting, the number of minutes specified will be used by the [Windows Package Manager](/windows/package-manager/). @@ -772,13 +757,12 @@ The default source for Windows Package Manager is configured such that an index | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-deviceguard.md b/windows/client-management/mdm/policy-csp-deviceguard.md index ba41b0ac29..5f50a586ab 100644 --- a/windows/client-management/mdm/policy-csp-deviceguard.md +++ b/windows/client-management/mdm/policy-csp-deviceguard.md @@ -4,7 +4,7 @@ description: Learn more about the DeviceGuard Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -50,7 +50,7 @@ For more information about System Guard, see [Introducing Windows Defender Syste | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -91,7 +91,7 @@ For more information about System Guard, see [Introducing Windows Defender Syste | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -114,7 +114,7 @@ Turns On Virtualization Based Security(VBS) | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -154,7 +154,7 @@ Turns On Virtualization Based Security(VBS) | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -177,7 +177,7 @@ Credential Guard Configuration: 0 - Turns off CredentialGuard remotely if config | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -218,7 +218,7 @@ Credential Guard Configuration: 0 - Turns off CredentialGuard remotely if config | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -242,7 +242,7 @@ This setting lets users turn on Credential Guard with virtualization-based secur | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | diff --git a/windows/client-management/mdm/policy-csp-devicehealthmonitoring.md b/windows/client-management/mdm/policy-csp-devicehealthmonitoring.md index cd689bed30..d895e28ed0 100644 --- a/windows/client-management/mdm/policy-csp-devicehealthmonitoring.md +++ b/windows/client-management/mdm/policy-csp-devicehealthmonitoring.md @@ -4,7 +4,7 @@ description: Learn more about the DeviceHealthMonitoring Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -50,7 +50,7 @@ DeviceHealthMonitoring is an opt-in health monitoring connection between the dev | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -76,7 +76,7 @@ DeviceHealthMonitoring is an opt-in health monitoring connection between the dev | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -87,7 +87,7 @@ DeviceHealthMonitoring is an opt-in health monitoring connection between the dev -If the device is not opted-in to the DeviceHealthMonitoring service via the AllowDeviceHealthMonitoring then this policy has no meaning. For devices which are opted in, the value of this policy modifies which types of events are monitored. +If the device isn't opted-in to the DeviceHealthMonitoring service via the AllowDeviceHealthMonitoring then this policy has no meaning. For devices which are opted in, the value of this policy modifies which types of events are monitored. @@ -100,7 +100,7 @@ This policy is applicable only if the [AllowDeviceHealthMonitoring](#allowdevice | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Dependency [DeviceHealthMonitoring_ConfigDeviceHealthMonitoringScope_DependencyGroup] | Dependency Type: `DependsOn`
    Dependency URI: `Device/Vendor/MSFT/Policy/Config/DeviceHealthMonitoring/AllowDeviceHealthMonitoring`
    Dependency Allowed Value: `[1]`
    Dependency Allowed Value Type: `Range`
    | @@ -117,7 +117,7 @@ This policy is applicable only if the [AllowDeviceHealthMonitoring](#allowdevice | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -128,7 +128,7 @@ This policy is applicable only if the [AllowDeviceHealthMonitoring](#allowdevice -If the device is not opted-in to the DeviceHealthMonitoring service via the AllowDeviceHealthMonitoring then this policy has no meaning. For devices which are opted in, the value of this policy modifies which service instance to which events are to be uploaded. +If the device isn't opted-in to the DeviceHealthMonitoring service via the AllowDeviceHealthMonitoring then this policy has no meaning. For devices which are opted in, the value of this policy modifies which service instance to which events are to be uploaded. @@ -140,7 +140,7 @@ If the device is not opted-in to the DeviceHealthMonitoring service via the Allo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Dependency [DeviceHealthMonitoring_ConfigDeviceHealthMonitoringServiceInstance_DependencyGroup] | Dependency Type: `DependsOn`
    Dependency URI: `Device/Vendor/MSFT/Policy/Config/DeviceHealthMonitoring/AllowDeviceHealthMonitoring`
    Dependency Allowed Value: `[1]`
    Dependency Allowed Value Type: `Range`
    | @@ -157,7 +157,7 @@ If the device is not opted-in to the DeviceHealthMonitoring service via the Allo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -168,7 +168,7 @@ If the device is not opted-in to the DeviceHealthMonitoring service via the Allo -If the device is not opted-in to the DeviceHealthMonitoring service via the AllowDeviceHealthMonitoring then this policy has no meaning. For devices which are opted in, the value of this policy modifies which destinations are in-scope for monitored events to be uploaded. +If the device isn't opted-in to the DeviceHealthMonitoring service via the AllowDeviceHealthMonitoring then this policy has no meaning. For devices which are opted in, the value of this policy modifies which destinations are in-scope for monitored events to be uploaded. @@ -186,7 +186,7 @@ Configure this policy manually only when explicitly instructed to do so by a Mic | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Dependency [DeviceHealthMonitoring_ConfigDeviceHealthMonitoringUploadDestination_DependencyGroup] | Dependency Type: `DependsOn`
    Dependency URI: `Device/Vendor/MSFT/Policy/Config/DeviceHealthMonitoring/AllowDeviceHealthMonitoring`
    Dependency Allowed Value: `[1]`
    Dependency Allowed Value Type: `Range`
    | diff --git a/windows/client-management/mdm/policy-csp-deviceinstallation.md b/windows/client-management/mdm/policy-csp-deviceinstallation.md index c86a89adff..54c24ec458 100644 --- a/windows/client-management/mdm/policy-csp-deviceinstallation.md +++ b/windows/client-management/mdm/policy-csp-deviceinstallation.md @@ -4,7 +4,7 @@ description: Learn more about the DeviceInstallation Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 04/26/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - DeviceInstallation -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -45,18 +42,20 @@ ms.topic: reference This policy setting allows you to specify a list of Plug and Play hardware IDs and compatible IDs for devices that Windows is allowed to install. This policy setting is intended to be used only when the "Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria" policy setting is enabled, however it may also be used with the "Prevent installation of devices not described by other policy settings" policy setting for legacy policy definitions. When this policy setting is enabled together with the "Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria" policy setting, Windows is allowed to install or update any device whose Plug and Play hardware ID or compatible ID appears in the list you create, unless another policy setting at the same or higher layer in the hierarchy specifically prevents that installation, such as the following policy settings: - - Prevent installation of devices that match these device IDs - - Prevent installation of devices that match any of these device instance IDs -If the "Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria" policy setting is not enabled with this policy setting, then any other policy settings specifically preventing installation will take precedence. + +- Prevent installation of devices that match these device IDs +- Prevent installation of devices that match any of these device instance IDs. + +If the "Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria" policy setting isn't enabled with this policy setting, then any other policy settings specifically preventing installation will take precedence. > [!NOTE] -> The "Prevent installation of devices not described by other policy settings" policy setting has been replaced by the "Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria" policy setting for supported target Windows 10 versions. It is recommended that you use the "Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria" policy setting when possible. +> The "Prevent installation of devices not described by other policy settings" policy setting has been replaced by the "Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria" policy setting for supported target Windows 10 versions. It's recommended that you use the "Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria" policy setting when possible. Alternatively, if this policy setting is enabled together with the "Prevent installation of devices not described by other policy settings" policy setting, Windows is allowed to install or update any device whose Plug and Play hardware ID or compatible ID appears in the list you create, unless another policy setting specifically prevents that installation (for example, the "Prevent installation of devices that match any of these device IDs" policy setting, the "Prevent installation of devices for these device classes" policy setting, the "Prevent installation of devices that match any of these device instance IDs" policy setting, or the "Prevent installation of removable devices" policy setting). - If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server. -- If you disable or do not configure this policy setting, and no other policy setting describes the device, the "Prevent installation of devices not described by other policy settings" policy setting determines whether the device can be installed. +- If you disable or don't configure this policy setting, and no other policy setting describes the device, the "Prevent installation of devices not described by other policy settings" policy setting determines whether the device can be installed. @@ -69,13 +68,12 @@ Peripherals can be specified by their [hardware identity](/windows-hardware/driv | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -133,7 +131,7 @@ To verify that the policy is applied, check C:\windows\INF\setupapi.dev.log and | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -147,17 +145,19 @@ To verify that the policy is applied, check C:\windows\INF\setupapi.dev.log and This policy setting allows you to specify a list of Plug and Play device instance IDs for devices that Windows is allowed to install. This policy setting is intended to be used only when the "Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria" policy setting is enabled, however it may also be used with the "Prevent installation of devices not described by other policy settings" policy setting for legacy policy definitions. When this policy setting is enabled together with the "Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria" policy setting, Windows is allowed to install or update any device whose Plug and Play device instance ID appears in the list you create, unless another policy setting at the same or higher layer in the hierarchy specifically prevents that installation, such as the following policy settings: - - Prevent installation of devices that match any of these device instance IDs -If the "Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria" policy setting is not enabled with this policy setting, then any other policy settings specifically preventing installation will take precedence. + +- Prevent installation of devices that match any of these device instance IDs. + +If the "Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria" policy setting isn't enabled with this policy setting, then any other policy settings specifically preventing installation will take precedence. > [!NOTE] -> The "Prevent installation of devices not described by other policy settings" policy setting has been replaced by the "Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria" policy setting for supported target Windows 10 versions. It is recommended that you use the "Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria" policy setting when possible. +> The "Prevent installation of devices not described by other policy settings" policy setting has been replaced by the "Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria" policy setting for supported target Windows 10 versions. It's recommended that you use the "Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria" policy setting when possible. Alternatively, if this policy setting is enabled together with the "Prevent installation of devices not described by other policy settings" policy setting, Windows is allowed to install or update any device whose Plug and Play device instance ID appears in the list you create, unless another policy setting specifically prevents that installation (for example, the "Prevent installation of devices that match any of these device IDs" policy setting, the "Prevent installation of devices for these device classes" policy setting, the "Prevent installation of devices that match any of these device instance IDs" policy setting, or the "Prevent installation of removable devices" policy setting). - If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server. -- If you disable or do not configure this policy setting, and no other policy setting describes the device, the "Prevent installation of devices not described by other policy settings" policy setting determines whether the device can be installed. +- If you disable or don't configure this policy setting, and no other policy setting describes the device, the "Prevent installation of devices not described by other policy settings" policy setting determines whether the device can be installed. @@ -170,13 +170,12 @@ Peripherals can be specified by their [device instance ID](/windows-hardware/dri | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -236,7 +235,7 @@ To verify the policy is applied, check C:\windows\INF\setupapi.dev.log and see i | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -250,19 +249,21 @@ To verify the policy is applied, check C:\windows\INF\setupapi.dev.log and see i This policy setting allows you to specify a list of device setup class globally unique identifiers (GUIDs) for driver packages that Windows is allowed to install. This policy setting is intended to be used only when the "Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria" policy setting is enabled, however it may also be used with the "Prevent installation of devices not described by other policy settings" policy setting for legacy policy definitions. When this policy setting is enabled together with the "Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria" policy setting, Windows is allowed to install or update driver packages whose device setup class GUIDs appear in the list you create, unless another policy setting at the same or higher layer in the hierarchy specifically prevents that installation, such as the following policy settings: - - Prevent installation of devices for these device classes - - Prevent installation of devices that match these device IDs - - Prevent installation of devices that match any of these device instance IDs -If the "Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria" policy setting is not enabled with this policy setting, then any other policy settings specifically preventing installation will take precedence. + +- Prevent installation of devices for these device classes +- Prevent installation of devices that match these device IDs +- Prevent installation of devices that match any of these device instance IDs. + +If the "Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria" policy setting isn't enabled with this policy setting, then any other policy settings specifically preventing installation will take precedence. > [!NOTE] -> The "Prevent installation of devices not described by other policy settings" policy setting has been replaced by the "Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria" policy setting for supported target Windows 10 versions. It is recommended that you use the "Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria" policy setting when possible. +> The "Prevent installation of devices not described by other policy settings" policy setting has been replaced by the "Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria" policy setting for supported target Windows 10 versions. It's recommended that you use the "Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria" policy setting when possible. Alternatively, if this policy setting is enabled together with the "Prevent installation of devices not described by other policy settings" policy setting, Windows is allowed to install or update driver packages whose device setup class GUIDs appear in the list you create, unless another policy setting specifically prevents installation (for example, the "Prevent installation of devices that match these device IDs" policy setting, the "Prevent installation of devices for these device classes" policy setting, the "Prevent installation of devices that match any of these device instance IDs" policy setting, or the "Prevent installation of removable devices" policy setting). - If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server. -- If you disable or do not configure this policy setting, and no other policy setting describes the device, the "Prevent installation of devices not described by other policy settings" policy setting determines whether the device can be installed. +- If you disable or don't configure this policy setting, and no other policy setting describes the device, the "Prevent installation of devices not described by other policy settings" policy setting determines whether the device can be installed. @@ -275,13 +276,12 @@ Peripherals can be specified by their [hardware identity](/windows-hardware/driv | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -347,7 +347,7 @@ To verify that the policy is applied, check C:\windows\INF\setupapi.dev.log and | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20348.256] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.2145] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.1714] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1151] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20348.256] and later
    ✅ Windows 10, version 1809 [10.0.17763.2145] and later
    ✅ Windows 10, version 1903 [10.0.18362.1714] and later
    ✅ Windows 10, version 2004 [10.0.19041.1151] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -360,31 +360,31 @@ To verify that the policy is applied, check C:\windows\INF\setupapi.dev.log and This policy setting will change the evaluation order in which Allow and Prevent policy settings are applied when more than one install policy setting is applicable for a given device. Enable this policy setting to ensure that overlapping device match criteria is applied based on an established hierarchy where more specific match criteria supersedes less specific match criteria. The hierarchical order of evaluation for policy settings that specify device match criteria is as follows: -Device instance IDs > Device IDs > Device setup class > Removable devices +Device instance IDs > Device IDs > Device setup class > Removable devices. -Device instance IDs +Device instance IDs. 1. Prevent installation of devices using drivers that match these device instance IDs -2. Allow installation of devices using drivers that match these device instance IDs +2. Allow installation of devices using drivers that match these device instance IDs. -Device IDs +Device IDs. 3. Prevent installation of devices using drivers that match these device IDs -4. Allow installation of devices using drivers that match these device IDs +4. Allow installation of devices using drivers that match these device IDs. -Device setup class +Device setup class. 5. Prevent installation of devices using drivers that match these device setup classes -6. Allow installation of devices using drivers that match these device setup classes +6. Allow installation of devices using drivers that match these device setup classes. -Removable devices +Removable devices. -7. Prevent installation of removable devices +7. Prevent installation of removable devices. > [!NOTE] > This policy setting provides more granular control than the "Prevent installation of devices not described by other policy settings" policy setting. If these conflicting policy settings are enabled at the same time, the "Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria" policy setting will be enabled and the other policy setting will be ignored. -If you disable or do not configure this policy setting, the default evaluation is used. By default, all "Prevent installation..." policy settings have precedence over any other policy setting that allows Windows to install a device. +If you disable or don't configure this policy setting, the default evaluation is used. By default, all "Prevent installation..". policy settings have precedence over any other policy setting that allows Windows to install a device. @@ -396,13 +396,12 @@ If you disable or do not configure this policy setting, the default evaluation i | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -464,7 +463,7 @@ You can also change the evaluation order of device installation policy settings | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -477,9 +476,9 @@ You can also change the evaluation order of device installation policy settings This policy setting allows you to prevent Windows from retrieving device metadata from the Internet. -- If you enable this policy setting, Windows does not retrieve device metadata for installed devices from the Internet. This policy setting overrides the setting in the Device Installation Settings dialog box (Control Panel > System and Security > System > Advanced System Settings > Hardware tab). +- If you enable this policy setting, Windows doesn't retrieve device metadata for installed devices from the Internet. This policy setting overrides the setting in the Device Installation Settings dialog box (Control Panel > System and Security > System > Advanced System Settings > Hardware tab). -- If you disable or do not configure this policy setting, the setting in the Device Installation Settings dialog box controls whether Windows retrieves device metadata from the Internet. +- If you disable or don't configure this policy setting, the setting in the Device Installation Settings dialog box controls whether Windows retrieves device metadata from the Internet. @@ -491,13 +490,12 @@ This policy setting allows you to prevent Windows from retrieving device metadat | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -524,7 +522,7 @@ This policy setting allows you to prevent Windows from retrieving device metadat | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -535,14 +533,14 @@ This policy setting allows you to prevent Windows from retrieving device metadat -This policy setting allows you to prevent the installation of devices that are not specifically described by any other policy setting. +This policy setting allows you to prevent the installation of devices that aren't specifically described by any other policy setting. > [!NOTE] -> This policy setting has been replaced by the "Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria" policy setting to provide more granular control. It is recommended that you use the "Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria" policy setting instead of this policy setting. +> This policy setting has been replaced by the "Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria" policy setting to provide more granular control. It's recommended that you use the "Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria" policy setting instead of this policy setting. -- If you enable this policy setting, Windows is prevented from installing or updating the driver package for any device that is not described by either the "Allow installation of devices that match any of these device IDs", the "Allow installation of devices for these device classes", or the "Allow installation of devices that match any of these device instance IDs" policy setting. +- If you enable this policy setting, Windows is prevented from installing or updating the driver package for any device that isn't described by either the "Allow installation of devices that match any of these device IDs", the "Allow installation of devices for these device classes", or the "Allow installation of devices that match any of these device instance IDs" policy setting. -- If you disable or do not configure this policy setting, Windows is allowed to install or update the driver package for any device that is not described by the "Prevent installation of devices that match any of these device IDs", "Prevent installation of devices for these device classes" policy setting, "Prevent installation of devices that match any of these device instance IDs", or "Prevent installation of removable devices" policy setting. +- If you disable or don't configure this policy setting, Windows is allowed to install or update the driver package for any device that isn't described by the "Prevent installation of devices that match any of these device IDs", "Prevent installation of devices for these device classes" policy setting, "Prevent installation of devices that match any of these device instance IDs", or "Prevent installation of removable devices" policy setting. @@ -554,13 +552,12 @@ This policy setting allows you to prevent the installation of devices that are n | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -624,7 +621,7 @@ You can also block installation by using a custom profile in Intune. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -644,7 +641,7 @@ This policy setting allows you to specify a list of Plug and Play hardware IDs a - If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server. -- If you disable or do not configure this policy setting, devices can be installed and updated as allowed or prevented by other policy settings. +- If you disable or don't configure this policy setting, devices can be installed and updated as allowed or prevented by other policy settings. @@ -657,13 +654,12 @@ Peripherals can be specified by their [hardware identity](/windows-hardware/driv | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -729,7 +725,7 @@ For example, this custom profile blocks installation and usage of USB devices wi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -746,7 +742,7 @@ This policy setting allows you to specify a list of Plug and Play device instanc - If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server. -- If you disable or do not configure this policy setting, devices can be installed and updated as allowed or prevented by other policy settings. +- If you disable or don't configure this policy setting, devices can be installed and updated as allowed or prevented by other policy settings. @@ -759,13 +755,12 @@ Peripherals can be specified by their [device instance ID](/windows-hardware/dri | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -841,7 +836,7 @@ To prevent installation of devices with matching device instance IDs by using cu | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -861,7 +856,7 @@ This policy setting allows you to specify a list of device setup class globally - If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server. -- If you disable or do not configure this policy setting, Windows can install and update devices as allowed or prevented by other policy settings. +- If you disable or don't configure this policy setting, Windows can install and update devices as allowed or prevented by other policy settings. @@ -874,13 +869,12 @@ Peripherals can be specified by their [hardware identity](/windows-hardware/driv | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-devicelock.md b/windows/client-management/mdm/policy-csp-devicelock.md index 80e5d67f50..c2c0ede75a 100644 --- a/windows/client-management/mdm/policy-csp-devicelock.md +++ b/windows/client-management/mdm/policy-csp-devicelock.md @@ -4,7 +4,7 @@ description: Learn more about the DeviceLock Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 05/01/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,13 +16,9 @@ ms.topic: reference # Policy CSP - DeviceLock -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] -> [!IMPORTANT] -> This CSP contains preview policies that are under development and only applicable for [Windows Insider Preview builds](/windows-insider/). These policies are subject to change and may have dependencies on other features or services in preview. +[!INCLUDE [Windows Insider tip](includes/mdm-insider-csp-note.md)] @@ -36,7 +32,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -47,7 +43,7 @@ ms.topic: reference -Account lockout threshold - This security setting determines the number of failed logon attempts that causes a user account to be locked out. A locked-out account cannot be used until it is reset by an administrator or until the lockout duration for the account has expired. You can set a value between 0 and 999 failed logon attempts. If you set the value to 0, the account will never be locked out. Failed password attempts against workstations or member servers that have been locked using either CTRL+ALT+DELETE or password-protected screen savers count as failed logon attempts. Default: 0 Account lockout duration - This security setting determines the number of minutes a locked-out account remains locked out before automatically becoming unlocked. The available range is from 0 minutes through 99,999 minutes. If you set the account lockout duration to 0, the account will be locked out until an administrator explicitly unlocks it. If an account lockout threshold is defined, the account lockout duration must be greater than or equal to the reset time. Default: None, because this policy setting only has meaning when an Account lockout threshold is specified. Reset account lockout counter after - This security setting determines the number of minutes that must elapse after a failed logon attempt before the failed logon attempt counter is reset to 0 bad logon attempts. The available range is 1 minute to 99,999 minutes. If an account lockout threshold is defined, this reset time must be less than or equal to the Account lockout duration. Default: None, because this policy setting only has meaning when an Account lockout threshold is specified. +Account lockout threshold - This security setting determines the number of failed logon attempts that causes a user account to be locked out. A locked-out account can't be used until it's reset by an administrator or until the lockout duration for the account has expired. You can set a value between 0 and 999 failed logon attempts. If you set the value to 0, the account will never be locked out. Failed password attempts against workstations or member servers that have been locked using either CTRL+ALT+DELETE or password-protected screen savers count as failed logon attempts. Default: 0 Account lockout duration - This security setting determines the number of minutes a locked-out account remains locked out before automatically becoming unlocked. The available range is from 0 minutes through 99,999 minutes. If you set the account lockout duration to 0, the account will be locked out until an administrator explicitly unlocks it. If an account lockout threshold is defined, the account lockout duration must be greater than or equal to the reset time. Default: None, because this policy setting only has meaning when an Account lockout threshold is specified. Reset account lockout counter after - This security setting determines the number of minutes that must elapse after a failed logon attempt before the failed logon attempt counter is reset to 0 bad logon attempts. The available range is 1 minute to 99,999 minutes. If an account lockout threshold is defined, this reset time must be less than or equal to the Account lockout duration. Default: None, because this policy setting only has meaning when an Account lockout threshold is specified. @@ -59,7 +55,7 @@ Account lockout threshold - This security setting determines the number of faile | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -75,7 +71,7 @@ Account lockout threshold - This security setting determines the number of faile | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -98,7 +94,7 @@ Allow Administrator account lockout This security setting determines whether the | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-1]` | | Default Value | 1 | @@ -125,7 +121,7 @@ Allow Administrator account lockout This security setting determines whether the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -153,7 +149,7 @@ Specifies whether the user must input a PIN or password when the device resumes | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | | Dependency [DeviceLock_AllowIdleReturnWithoutPassword_DependencyGroup] | Dependency Type: `DependsOn`
    Dependency URI: `Device/Vendor/MSFT/Policy/Config/DeviceLock/DevicePasswordEnabled`
    Dependency Allowed Value: `[0]`
    Dependency Allowed Value Type: `Range`
    | @@ -180,7 +176,7 @@ Specifies whether the user must input a PIN or password when the device resumes | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -203,7 +199,7 @@ Specifies whether to show a user-configurable setting to control the screen time | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -229,7 +225,7 @@ Specifies whether to show a user-configurable setting to control the screen time | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -256,7 +252,7 @@ For more information about this policy, see [Exchange ActiveSync Policy Engine O | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | | Dependency [DeviceLock_AllowSimpleDevicePassword_DependencyGroup] | Dependency Type: `DependsOn`
    Dependency URI: `Device/Vendor/MSFT/Policy/Config/DeviceLock/DevicePasswordEnabled`
    Dependency Allowed Value: `[0]`
    Dependency Allowed Value Type: `Range`
    | @@ -283,7 +279,7 @@ For more information about this policy, see [Exchange ActiveSync Policy Engine O | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -312,7 +308,7 @@ Determines the type of PIN or password required. This policy only applies if the | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 2 | | Dependency [DeviceLock_AlphanumericDevicePasswordRequired_DependencyGroup] | Dependency Type: `DependsOn`
    Dependency URI: `Device/Vendor/MSFT/Policy/Config/DeviceLock/DevicePasswordEnabled`
    Dependency Allowed Value: `[0]`
    Dependency Allowed Value Type: `Range`
    | @@ -340,7 +336,7 @@ Determines the type of PIN or password required. This policy only applies if the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -352,7 +348,7 @@ Determines the type of PIN or password required. This policy only applies if the Store passwords using reversible encryption -This security setting determines whether the operating system stores passwords using reversible encryption. This policy provides support for applications that use protocols that require knowledge of the user's password for authentication purposes. Storing passwords using reversible encryption is essentially the same as storing plaintext versions of the passwords. For this reason, this policy should never be enabled unless application requirements outweigh the need to protect password information. This policy is required when using Challenge-Handshake Authentication Protocol (CHAP) authentication through remote access or Internet Authentication Services (IAS). It is also required when using Digest Authentication in Internet Information Services (IIS). +This security setting determines whether the operating system stores passwords using reversible encryption. This policy provides support for applications that use protocols that require knowledge of the user's password for authentication purposes. Storing passwords using reversible encryption is essentially the same as storing plaintext versions of the passwords. For this reason, this policy should never be enabled unless application requirements outweigh the need to protect password information. This policy is required when using Challenge-Handshake Authentication Protocol (CHAP) authentication through remote access or Internet Authentication Services (IAS). It's also required when using Digest Authentication in Internet Information Services (IIS). @@ -364,7 +360,7 @@ This security setting determines whether the operating system stores passwords u | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-1]` | | Default Value | 0 | @@ -391,7 +387,7 @@ This security setting determines whether the operating system stores passwords u | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -447,7 +443,7 @@ Specifies whether device lock is enabled. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -473,7 +469,7 @@ Specifies whether device lock is enabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -502,7 +498,7 @@ For more information about this policy, see [Exchange ActiveSync Policy Engine O | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-730]` | | Default Value | 0 | @@ -521,7 +517,7 @@ For more information about this policy, see [Exchange ActiveSync Policy Engine O | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -552,7 +548,7 @@ For more information about this policy, see [Exchange ActiveSync Policy Engine O | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-50]` | | Default Value | 0 | @@ -571,7 +567,7 @@ For more information about this policy, see [Exchange ActiveSync Policy Engine O | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -582,7 +578,7 @@ For more information about this policy, see [Exchange ActiveSync Policy Engine O -Specifies the default lock screen and logon image shown when no user is signed in. It also sets the specified image for all users, which replaces the default image. The same image is used for both the lock and logon screens. Users will not be able to change this image. Value type is a string, which is the full image filepath and filename. +Specifies the default lock screen and logon image shown when no user is signed in. It also sets the specified image for all users, which replaces the default image. The same image is used for both the lock and logon screens. Users won't be able to change this image. Value type is a string, which is the full image filepath and filename. @@ -594,7 +590,7 @@ Specifies the default lock screen and logon image shown when no user is signed i | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -610,7 +606,7 @@ Specifies the default lock screen and logon image shown when no user is signed i | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -632,7 +628,7 @@ Specifies the default lock screen and logon image shown when no user is signed i | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -648,7 +644,7 @@ Specifies the default lock screen and logon image shown when no user is signed i | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -662,7 +658,7 @@ Specifies the default lock screen and logon image shown when no user is signed i The number of authentication failures allowed before the device will be wiped. A value of 0 disables device wipe functionality. > [!NOTE] -> This policy must be wrapped in an Atomic command. This policy has different behaviors on the mobile device and desktop. On a mobile device, when the user reaches the value set by this policy, then the device is wiped. On a desktop, when the user reaches the value set by this policy, it is not wiped. Instead, the desktop is put on BitLocker recovery mode, which makes the data inaccessible but recoverable. If BitLocker is not enabled, then the policy cannot be enforced. Prior to reaching the failed attempts limit, the user is sent to the lock screen and warned that more failed attempts will lock their computer. When the user reaches the limit, the device automatically reboots and shows the BitLocker recovery page. This page prompts the user for the BitLocker recovery key. Most secure value is 0 if all policy values = 0; otherwise, Min policy value is the most secure value. For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn282287(v=ws.11)). +> This policy must be wrapped in an Atomic command. This policy has different behaviors on the mobile device and desktop. On a mobile device, when the user reaches the value set by this policy, then the device is wiped. On a desktop, when the user reaches the value set by this policy, it isn't wiped. Instead, the desktop is put on BitLocker recovery mode, which makes the data inaccessible but recoverable. If BitLocker isn't enabled, then the policy can't be enforced. Prior to reaching the failed attempts limit, the user is sent to the lock screen and warned that more failed attempts will lock their computer. When the user reaches the limit, the device automatically reboots and shows the BitLocker recovery page. This page prompts the user for the BitLocker recovery key. Most secure value is 0 if all policy values = 0; otherwise, Min policy value is the most secure value. For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn282287(v=ws.11)). @@ -674,7 +670,7 @@ The number of authentication failures allowed before the device will be wiped. A | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-999]` | | Default Value | 0 | @@ -693,7 +689,7 @@ The number of authentication failures allowed before the device will be wiped. A | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -707,7 +703,7 @@ The number of authentication failures allowed before the device will be wiped. A This security setting determines the period of time (in days) that a password can be used before the system requires the user to change it. You can set passwords to expire after a number of days between 1 and 999, or you can specify that passwords never expire by setting the number of days to 0. If the maximum password age is between 1 and 999 days, the Minimum password age must be less than the maximum password age. If the maximum password age is set to 0, the minimum password age can be any value between 0 and 998 days. > [!NOTE] -> It is a security best practice to have passwords expire every 30 to 90 days, depending on your environment. This way, an attacker has a limited amount of time in which to crack a user's password and have access to your network resources. Default: 42. +> It's a security best practice to have passwords expire every 30 to 90 days, depending on your environment. This way, an attacker has a limited amount of time in which to crack a user's password and have access to your network resources. Default: 42. @@ -719,7 +715,7 @@ This security setting determines the period of time (in days) that a password ca | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-999]` | | Default Value | 1 | @@ -746,7 +742,7 @@ This security setting determines the period of time (in days) that a password ca | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -774,7 +770,7 @@ On HoloLens, this timeout is controlled by the device's system sleep timeout, re | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-999]` | | Default Value | 0 | @@ -793,7 +789,7 @@ On HoloLens, this timeout is controlled by the device's system sleep timeout, re | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -816,7 +812,7 @@ Sets the maximum timeout value for the external display. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[1-999]` | | Default Value | 0 | @@ -834,7 +830,7 @@ Sets the maximum timeout value for the external display. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -883,7 +879,7 @@ For more information about this policy, see [Exchange ActiveSync Policy Engine O | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | | Dependency [DeviceLock_MinDevicePasswordComplexCharacters_DependencyGroup] | Dependency Type: `DependsOn DependsOn`
    Dependency URI: `Device/Vendor/MSFT/Policy/Config/DeviceLock/DevicePasswordEnabled Device/Vendor/MSFT/Policy/Config/DeviceLock/AlphanumericDevicePasswordRequired`
    Dependency Allowed Value: `[0] [0]`
    Dependency Allowed Value Type: `Range Range`
    | @@ -912,7 +908,7 @@ For more information about this policy, see [Exchange ActiveSync Policy Engine O | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -941,7 +937,7 @@ For more information about this policy, see [Exchange ActiveSync Policy Engine O | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[4-16]` | | Default Value | 4 | @@ -983,7 +979,7 @@ The following example shows how to set the minimum password length to 4 characte | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -994,7 +990,7 @@ The following example shows how to set the minimum password length to 4 characte -This security setting determines the period of time (in days) that a password must be used before the user can change it. You can set a value between 1 and 998 days, or you can allow changes immediately by setting the number of days to 0. The minimum password age must be less than the Maximum password age, unless the maximum password age is set to 0, indicating that passwords will never expire. If the maximum password age is set to 0, the minimum password age can be set to any value between 0 and 998. Configure the minimum password age to be more than 0 if you want Enforce password history to be effective. Without a minimum password age, users can cycle through passwords repeatedly until they get to an old favorite. The default setting does not follow this recommendation, so that an administrator can specify a password for a user and then require the user to change the administrator-defined password when the user logs on. If the password history is set to 0, the user does not have to choose a new password. For this reason, Enforce password history is set to 1 by default. +This security setting determines the period of time (in days) that a password must be used before the user can change it. You can set a value between 1 and 998 days, or you can allow changes immediately by setting the number of days to 0. The minimum password age must be less than the Maximum password age, unless the maximum password age is set to 0, indicating that passwords will never expire. If the maximum password age is set to 0, the minimum password age can be set to any value between 0 and 998. Configure the minimum password age to be more than 0 if you want Enforce password history to be effective. Without a minimum password age, users can cycle through passwords repeatedly until they get to an old favorite. The default setting doesn't follow this recommendation, so that an administrator can specify a password for a user and then require the user to change the administrator-defined password when the user logs on. If the password history is set to 0, the user doesn't have to choose a new password. For this reason, Enforce password history is set to 1 by default. @@ -1006,7 +1002,7 @@ This security setting determines the period of time (in days) that a password mu | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-998]` | | Default Value | 1 | @@ -1033,7 +1029,7 @@ This security setting determines the period of time (in days) that a password mu | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -1066,7 +1062,7 @@ Complexity requirements are enforced when passwords are changed or created. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-1]` | | Default Value | 1 | @@ -1093,7 +1089,7 @@ Complexity requirements are enforced when passwords are changed or created. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -1105,10 +1101,10 @@ Complexity requirements are enforced when passwords are changed or created. Enforce password history -This security setting determines the number of unique new passwords that have to be associated with a user account before an old password can be reused. The value must be between 0 and 24 passwords. This policy enables administrators to enhance security by ensuring that old passwords are not reused continually. Default: 24 on domain controllers. 0 on stand-alone servers. +This security setting determines the number of unique new passwords that have to be associated with a user account before an old password can be reused. The value must be between 0 and 24 passwords. This policy enables administrators to enhance security by ensuring that old passwords aren't reused continually. Default: 24 on domain controllers. 0 on stand-alone servers. > [!NOTE] -> By default, member computers follow the configuration of their domain controllers. To maintain the effectiveness of the password history, do not allow passwords to be changed immediately after they were just changed by also enabling the Minimum password age security policy setting. For information about the minimum password age security policy setting, see Minimum password age. +> By default, member computers follow the configuration of their domain controllers. To maintain the effectiveness of the password history, don't allow passwords to be changed immediately after they were just changed by also enabling the Minimum password age security policy setting. For information about the minimum password age security policy setting, see Minimum password age. @@ -1120,7 +1116,7 @@ This security setting determines the number of unique new passwords that have to | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-24]` | | Default Value | 24 | @@ -1147,7 +1143,7 @@ This security setting determines the number of unique new passwords that have to | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1162,7 +1158,7 @@ Disables the lock screen camera toggle switch in PC Settings and prevents a came By default, users can enable invocation of an available camera on the lock screen. -If you enable this setting, users will no longer be able to enable or disable lock screen camera access in PC Settings, and the camera cannot be invoked on the lock screen. +If you enable this setting, users will no longer be able to enable or disable lock screen camera access in PC Settings, and the camera can't be invoked on the lock screen. @@ -1174,13 +1170,12 @@ If you enable this setting, users will no longer be able to enable or disable lo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1207,7 +1202,7 @@ If you enable this setting, users will no longer be able to enable or disable lo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1234,13 +1229,12 @@ If you enable this setting, users will no longer be able to modify slide show se | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1267,7 +1261,7 @@ If you enable this setting, users will no longer be able to modify slide show se | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1290,7 +1284,7 @@ Specifies whether to show a user-configurable setting to control the screen time | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[10-1800]` | | Default Value | 10 | diff --git a/windows/client-management/mdm/policy-csp-display.md b/windows/client-management/mdm/policy-csp-display.md index 19f3a8b859..740ba29976 100644 --- a/windows/client-management/mdm/policy-csp-display.md +++ b/windows/client-management/mdm/policy-csp-display.md @@ -4,7 +4,7 @@ description: Learn more about the Display Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -37,19 +37,19 @@ ms.topic: reference -Per Process System DPI is an application compatibility feature for desktop applications that do not render properly after a display-scale factor (DPI) change. When the display scale factor of the primary display changes (which can happen when you connect or disconnect a display that has a different display scale factor (DPI), connect remotely from a device with a different display scale factor, or manually change the display scale factor), many desktop applications can display blurry. Desktop applications that have not been updated to display properly in this scenario will be blurry until the user logs out and back in to Windows. +Per Process System DPI is an application compatibility feature for desktop applications that don't render properly after a display-scale factor (DPI) change. When the display scale factor of the primary display changes (which can happen when you connect or disconnect a display that has a different display scale factor (DPI), connect remotely from a device with a different display scale factor, or manually change the display scale factor), many desktop applications can display blurry. Desktop applications that haven't been updated to display properly in this scenario will be blurry until the user logs out and back in to Windows. -When you enable this policy some blurry applications will be crisp after they are restarted, without requiring the user to log out and back in to Windows. +When you enable this policy some blurry applications will be crisp after they're restarted, without requiring the user to log out and back in to Windows. Be aware of the following: Per Process System DPI will only improve the rendering of desktop applications that are positioned on the primary display. Some desktop applications can still be blurry on secondary displays that have different display scale factors. -Per Process System DPI will not work for all applications as some older desktop applications will always be blurry on high DPI displays. +Per Process System DPI won't work for all applications as some older desktop applications will always be blurry on high DPI displays. In some cases, you may see some odd behavior in some desktop applications. If that happens, Per Process System DPI should be disabled. -Enabling this setting lets you specify the system-wide default for desktop applications as well as per-application overrides. If you disable or do not configure this setting, Per Process System DPI will not apply to any processes on the system. +Enabling this setting lets you specify the system-wide default for desktop applications as well as per-application overrides. If you disable or don't configure this setting, Per Process System DPI won't apply to any processes on the system. @@ -61,7 +61,7 @@ Enabling this setting lets you specify the system-wide default for desktop appli | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -92,7 +92,7 @@ Enabling this setting lets you specify the system-wide default for desktop appli | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -107,19 +107,19 @@ Enabling this setting lets you specify the system-wide default for desktop appli -Per Process System DPI is an application compatibility feature for desktop applications that do not render properly after a display-scale factor (DPI) change. When the display scale factor of the primary display changes (which can happen when you connect or disconnect a display that has a different display scale factor (DPI), connect remotely from a device with a different display scale factor, or manually change the display scale factor), many desktop applications can display blurry. Desktop applications that have not been updated to display properly in this scenario will be blurry until the user logs out and back in to Windows. +Per Process System DPI is an application compatibility feature for desktop applications that don't render properly after a display-scale factor (DPI) change. When the display scale factor of the primary display changes (which can happen when you connect or disconnect a display that has a different display scale factor (DPI), connect remotely from a device with a different display scale factor, or manually change the display scale factor), many desktop applications can display blurry. Desktop applications that haven't been updated to display properly in this scenario will be blurry until the user logs out and back in to Windows. -When you enable this policy some blurry applications will be crisp after they are restarted, without requiring the user to log out and back in to Windows. +When you enable this policy some blurry applications will be crisp after they're restarted, without requiring the user to log out and back in to Windows. Be aware of the following: Per Process System DPI will only improve the rendering of desktop applications that are positioned on the primary display. Some desktop applications can still be blurry on secondary displays that have different display scale factors. -Per Process System DPI will not work for all applications as some older desktop applications will always be blurry on high DPI displays. +Per Process System DPI won't work for all applications as some older desktop applications will always be blurry on high DPI displays. In some cases, you may see some odd behavior in some desktop applications. If that happens, Per Process System DPI should be disabled. -Enabling this setting lets you specify the system-wide default for desktop applications as well as per-application overrides. If you disable or do not configure this setting, Per Process System DPI will not apply to any processes on the system. +Enabling this setting lets you specify the system-wide default for desktop applications as well as per-application overrides. If you disable or don't configure this setting, Per Process System DPI won't apply to any processes on the system. @@ -144,7 +144,7 @@ Enabling this setting lets you specify the system-wide default for desktop appli | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -183,7 +183,7 @@ Enabling this setting lets you specify the system-wide default for desktop appli | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -194,19 +194,19 @@ Enabling this setting lets you specify the system-wide default for desktop appli -Per Process System DPI is an application compatibility feature for desktop applications that do not render properly after a display-scale factor (DPI) change. When the display scale factor of the primary display changes (which can happen when you connect or disconnect a display that has a different display scale factor (DPI), connect remotely from a device with a different display scale factor, or manually change the display scale factor), many desktop applications can display blurry. Desktop applications that have not been updated to display properly in this scenario will be blurry until the user logs out and back in to Windows. +Per Process System DPI is an application compatibility feature for desktop applications that don't render properly after a display-scale factor (DPI) change. When the display scale factor of the primary display changes (which can happen when you connect or disconnect a display that has a different display scale factor (DPI), connect remotely from a device with a different display scale factor, or manually change the display scale factor), many desktop applications can display blurry. Desktop applications that haven't been updated to display properly in this scenario will be blurry until the user logs out and back in to Windows. -When you enable this policy some blurry applications will be crisp after they are restarted, without requiring the user to log out and back in to Windows. +When you enable this policy some blurry applications will be crisp after they're restarted, without requiring the user to log out and back in to Windows. Be aware of the following: Per Process System DPI will only improve the rendering of desktop applications that are positioned on the primary display. Some desktop applications can still be blurry on secondary displays that have different display scale factors. -Per Process System DPI will not work for all applications as some older desktop applications will always be blurry on high DPI displays. +Per Process System DPI won't work for all applications as some older desktop applications will always be blurry on high DPI displays. In some cases, you may see some odd behavior in some desktop applications. If that happens, Per Process System DPI should be disabled. -Enabling this setting lets you specify the system-wide default for desktop applications as well as per-application overrides. If you disable or do not configure this setting, Per Process System DPI will not apply to any processes on the system. +Enabling this setting lets you specify the system-wide default for desktop applications as well as per-application overrides. If you disable or don't configure this setting, Per Process System DPI won't apply to any processes on the system. @@ -218,7 +218,7 @@ Enabling this setting lets you specify the system-wide default for desktop appli | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -249,7 +249,7 @@ Enabling this setting lets you specify the system-wide default for desktop appli | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -260,13 +260,13 @@ Enabling this setting lets you specify the system-wide default for desktop appli -GDI DPI Scaling enables applications that are not DPI aware to become per monitor DPI aware. +GDI DPI Scaling enables applications that aren't DPI aware to become per monitor DPI aware. This policy setting lets you specify legacy applications that have GDI DPI Scaling turned off. -- If you enable this policy setting, GDI DPI Scaling is turned off for all applications in the list, even if they are enabled by using ApplicationCompatibility database, ApplicationCompatibility UI System (Enhanced) setting, or an application manifest. +- If you enable this policy setting, GDI DPI Scaling is turned off for all applications in the list, even if they're enabled by using ApplicationCompatibility database, ApplicationCompatibility UI System (Enhanced) setting, or an application manifest. -- If you disable or do not configure this policy setting, GDI DPI Scaling might still be turned on for legacy applications. +- If you disable or don't configure this policy setting, GDI DPI Scaling might still be turned on for legacy applications. If GDI DPI Scaling is configured to both turn off and turn on an application, the application will be turned off. @@ -289,7 +289,7 @@ If GDI DPI Scaling is configured to both turn-off and turn-on an application, th | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -327,7 +327,7 @@ To validate on Desktop, do the following tasks: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -338,13 +338,13 @@ To validate on Desktop, do the following tasks: -GDI DPI Scaling enables applications that are not DPI aware to become per monitor DPI aware. +GDI DPI Scaling enables applications that aren't DPI aware to become per monitor DPI aware. This policy setting lets you specify legacy applications that have GDI DPI Scaling turned on. - If you enable this policy setting, GDI DPI Scaling is turned on for all legacy applications in the list. -- If you disable or do not configure this policy setting, GDI DPI Scaling will not be enabled for an application except when an application is enabled by using ApplicationCompatibility database, ApplicationCompatibility UI System (Enhanced) setting, or an application manifest. +- If you disable or don't configure this policy setting, GDI DPI Scaling won't be enabled for an application except when an application is enabled by using ApplicationCompatibility database, ApplicationCompatibility UI System (Enhanced) setting, or an application manifest. If GDI DPI Scaling is configured to both turn off and turn on an application, the application will be turned off. @@ -365,7 +365,7 @@ If GDI DPI Scaling is configured to both turn-off and turn-on an application, th | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | diff --git a/windows/client-management/mdm/policy-csp-dmaguard.md b/windows/client-management/mdm/policy-csp-dmaguard.md index 8901e92cae..4d115aecee 100644 --- a/windows/client-management/mdm/policy-csp-dmaguard.md +++ b/windows/client-management/mdm/policy-csp-dmaguard.md @@ -4,7 +4,7 @@ description: Learn more about the DmaGuard Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -37,7 +37,7 @@ ms.topic: reference -Enumeration policy for external DMA-capable devices incompatible with DMA remapping. This policy only takes effect when Kernel DMA Protection is enabled and supported by the system. **Note** this policy does not apply to 1394, PCMCIA or ExpressCard devices. +Enumeration policy for external DMA-capable devices incompatible with DMA remapping. This policy only takes effect when Kernel DMA Protection is enabled and supported by the system. Note this policy doesn't apply to 1394, PCMCIA or ExpressCard devices. @@ -54,7 +54,7 @@ This policy only takes effect when Kernel DMA Protection is supported and enable | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | diff --git a/windows/client-management/mdm/policy-csp-eap.md b/windows/client-management/mdm/policy-csp-eap.md index e5b3933b3c..2960a6ecc4 100644 --- a/windows/client-management/mdm/policy-csp-eap.md +++ b/windows/client-management/mdm/policy-csp-eap.md @@ -4,7 +4,7 @@ description: Learn more about the Eap Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -49,7 +49,7 @@ Added in Windows 10, version 21. H1. Allow or disallow use of TLS 1.3 during EAP | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -59,7 +59,7 @@ Added in Windows 10, version 21. H1. Allow or disallow use of TLS 1.3 during EAP | Value | Description | |:--|:--| -| 0 | Use of TLS version 1.3 is not allowed for authentication. | +| 0 | Use of TLS version 1.3 isn't allowed for authentication. | | 1 (Default) | Use of TLS version 1.3 is allowed for authentication. | diff --git a/windows/client-management/mdm/policy-csp-education.md b/windows/client-management/mdm/policy-csp-education.md index 004ce690a4..9481c59de0 100644 --- a/windows/client-management/mdm/policy-csp-education.md +++ b/windows/client-management/mdm/policy-csp-education.md @@ -4,7 +4,7 @@ description: Learn more about the Education Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -38,7 +38,8 @@ ms.topic: reference This policy setting allows you to control whether graphing functionality is available in the Windows Calculator app. -- If you disable this policy setting, graphing functionality will not be accessible in the Windows Calculator app. + +- If you disable this policy setting, graphing functionality won't be accessible in the Windows Calculator app. - If you enable or don't configure this policy setting, users will be able to access graphing functionality. @@ -52,7 +53,7 @@ This policy setting allows you to control whether graphing functionality is avai | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -92,7 +93,7 @@ This policy setting allows you to control whether graphing functionality is avai | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -116,7 +117,7 @@ The policy value is expected to be the name (network host name) of an installed | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -132,7 +133,7 @@ The policy value is expected to be the name (network host name) of an installed | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -144,7 +145,8 @@ The policy value is expected to be the name (network host name) of an installed This policy setting allows you to control whether EDU-specific theme packs are available in Settings > Personalization. -- If you disable or don't configure this policy setting, EDU-specific theme packs will not be included. + +- If you disable or don't configure this policy setting, EDU-specific theme packs won't be included. - If you enable this policy setting, users will be able to personalize their devices with EDU-specific themes. @@ -158,7 +160,7 @@ This policy setting allows you to control whether EDU-specific theme packs are a | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -184,7 +186,7 @@ This policy setting allows you to control whether EDU-specific theme packs are a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -207,7 +209,7 @@ This policy setting allows tenant to control whether to declare this OS as an ed | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -233,7 +235,7 @@ This policy setting allows tenant to control whether to declare this OS as an ed | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -246,13 +248,13 @@ This policy setting allows tenant to control whether to declare this OS as an ed Prevents users from using familiar methods to add local and network printers. -- If this policy setting is enabled, it removes the Add Printer option from the Start menu. (To find the Add Printer option, click Start, click Printers, and then click Add Printer.) This setting also removes Add Printer from the Printers folder in Control Panel. +- If this policy setting is enabled, it removes the Add Printer option from the Start menu. (To find the Add Printer option, click Start, click Printers, and then click Add Printer). This setting also removes Add Printer from the Printers folder in Control Panel. -Also, users cannot add printers by dragging a printer icon into the Printers folder. If they try, a message appears explaining that the setting prevents the action. +Also, users can't add printers by dragging a printer icon into the Printers folder. If they try, a message appears explaining that the setting prevents the action. -However, this setting does not prevent users from using the Add Hardware Wizard to add a printer. Nor does it prevent users from running other programs to add printers. +However, this setting doesn't prevent users from using the Add Hardware Wizard to add a printer. Nor does it prevent users from running other programs to add printers. -This setting does not delete printers that users have already added. However, if users have not added a printer when this setting is applied, they cannot print. +This setting doesn't delete printers that users have already added. However, if users haven't added a printer when this setting is applied, they can't print. > [!NOTE] > You can use printer permissions to restrict the use of printers without specifying a setting. In the Printers folder, right-click a printer, click Properties, and then click the Security tab. @@ -269,7 +271,7 @@ This setting does not delete printers that users have already added. However, if | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -309,7 +311,7 @@ This setting does not delete printers that users have already added. However, if | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -333,7 +335,7 @@ The policy value is expected to be a `````` separated list of printer na | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | diff --git a/windows/client-management/mdm/policy-csp-enterprisecloudprint.md b/windows/client-management/mdm/policy-csp-enterprisecloudprint.md index 4dcd8140d3..3e576c5845 100644 --- a/windows/client-management/mdm/policy-csp-enterprisecloudprint.md +++ b/windows/client-management/mdm/policy-csp-enterprisecloudprint.md @@ -4,7 +4,7 @@ description: Learn more about the EnterpriseCloudPrint Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -57,7 +57,7 @@ The default value is an empty string. Otherwise, the value should contain the UR | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -73,7 +73,7 @@ The default value is an empty string. Otherwise, the value should contain the UR | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -104,7 +104,7 @@ The default value is an empty string. Otherwise, the value should contain the UR | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -120,7 +120,7 @@ The default value is an empty string. Otherwise, the value should contain the UR | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -151,7 +151,7 @@ The default value is an empty string. Otherwise, the value should contain a GUID | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -167,7 +167,7 @@ The default value is an empty string. Otherwise, the value should contain a GUID | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -198,7 +198,7 @@ The default value is an empty string. Otherwise, the value should contain a URL. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -214,7 +214,7 @@ The default value is an empty string. Otherwise, the value should contain a URL. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -238,7 +238,7 @@ This policy must target ./User, otherwise it fails. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-65535]` | | Default Value | 20 | @@ -256,7 +256,7 @@ This policy must target ./User, otherwise it fails. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -286,7 +286,7 @@ The default value is an empty string. Otherwise, the value should contain a URL. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | diff --git a/windows/client-management/mdm/policy-csp-errorreporting.md b/windows/client-management/mdm/policy-csp-errorreporting.md index 2c1178445b..4de4b61de6 100644 --- a/windows/client-management/mdm/policy-csp-errorreporting.md +++ b/windows/client-management/mdm/policy-csp-errorreporting.md @@ -4,7 +4,7 @@ description: Learn more about the ErrorReporting Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ErrorReporting -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -52,11 +49,11 @@ This policy setting determines the consent behavior of Windows Error Reporting f - 2 (Send parameters): Windows Error Reporting automatically sends the minimum data required to check for an existing solution, and Windows prompts the user for consent to send any additional data requested by Microsoft. -- 3 (Send parameters and safe additional data): Windows Error Reporting automatically sends the minimum data required to check for an existing solution, as well as data which Windows has determined (within a high probability) does not contain personally identifiable data, and prompts the user for consent to send any additional data requested by Microsoft. +- 3 (Send parameters and safe additional data): Windows Error Reporting automatically sends the minimum data required to check for an existing solution, as well as data which Windows has determined (within a high probability) doesn't contain personally identifiable data, and prompts the user for consent to send any additional data requested by Microsoft. - 4 (Send all data): Any data requested by Microsoft is sent automatically. -- If you disable or do not configure this policy setting, then the default consent settings that are applied are those specified by the user in Control Panel, or in the Configure Default Consent policy setting. +- If you disable or don't configure this policy setting, then the default consent settings that are applied are those specified by the user in Control Panel, or in the Configure Default Consent policy setting. @@ -68,13 +65,12 @@ This policy setting determines the consent behavior of Windows Error Reporting f | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -100,7 +96,7 @@ This policy setting determines the consent behavior of Windows Error Reporting f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -111,11 +107,11 @@ This policy setting determines the consent behavior of Windows Error Reporting f -This policy setting turns off Windows Error Reporting, so that reports are not collected or sent to either Microsoft or internal servers within your organization when software unexpectedly stops working or fails. +This policy setting turns off Windows Error Reporting, so that reports aren't collected or sent to either Microsoft or internal servers within your organization when software unexpectedly stops working or fails. -- If you enable this policy setting, Windows Error Reporting does not send any problem information to Microsoft. Additionally, solution information is not available in Security and Maintenance in Control Panel. +- If you enable this policy setting, Windows Error Reporting doesn't send any problem information to Microsoft. Additionally, solution information isn't available in Security and Maintenance in Control Panel. -- If you disable or do not configure this policy setting, the Turn off Windows Error Reporting policy setting in Computer Configuration/Administrative Templates/System/Internet Communication Management/Internet Communication settings takes precedence. If Turn off Windows Error Reporting is also either disabled or not configured, user settings in Control Panel for Windows Error Reporting are applied. +- If you disable or don't configure this policy setting, the Turn off Windows Error Reporting policy setting in Computer Configuration/Administrative Templates/System/Internet Communication Management/Internet Communication settings takes precedence. If Turn off Windows Error Reporting is also either disabled or not configured, user settings in Control Panel for Windows Error Reporting are applied. @@ -127,13 +123,12 @@ This policy setting turns off Windows Error Reporting, so that reports are not c | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -160,7 +155,7 @@ This policy setting turns off Windows Error Reporting, so that reports are not c | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -175,9 +170,9 @@ This policy setting controls whether users are shown an error dialog box that le - If you enable this policy setting, users are notified in a dialog box that an error has occurred, and can display more details about the error. If the Configure Error Reporting policy setting is also enabled, the user can also report the error. -- If you disable this policy setting, users are not notified that errors have occurred. If the Configure Error Reporting policy setting is also enabled, errors are reported, but users receive no notification. Disabling this policy setting is useful for servers that do not have interactive users. +- If you disable this policy setting, users aren't notified that errors have occurred. If the Configure Error Reporting policy setting is also enabled, errors are reported, but users receive no notification. Disabling this policy setting is useful for servers that don't have interactive users. -- If you do not configure this policy setting, users can change this setting in Control Panel, which is set to enable notification by default on computers that are running Windows XP Personal Edition and Windows XP Professional Edition, and disable notification by default on computers that are running Windows Server. +- If you don't configure this policy setting, users can change this setting in Control Panel, which is set to enable notification by default on computers that are running Windows XP Personal Edition and Windows XP Professional Edition, and disable notification by default on computers that are running Windows Server. See also the Configure Error Reporting policy setting. @@ -191,13 +186,12 @@ See also the Configure Error Reporting policy setting. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -224,7 +218,7 @@ See also the Configure Error Reporting policy setting. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -239,7 +233,7 @@ This policy setting controls whether additional data in support of error reports - If you enable this policy setting, any additional data requests from Microsoft in response to a Windows Error Reporting report are automatically declined, without notification to the user. -- If you disable or do not configure this policy setting, then consent policy settings in Computer Configuration/Administrative Templates/Windows Components/Windows Error Reporting/Consent take precedence. +- If you disable or don't configure this policy setting, then consent policy settings in Computer Configuration/Administrative Templates/Windows Components/Windows Error Reporting/Consent take precedence. @@ -251,13 +245,12 @@ This policy setting controls whether additional data in support of error reports | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -284,7 +277,7 @@ This policy setting controls whether additional data in support of error reports | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -297,7 +290,7 @@ This policy setting controls whether additional data in support of error reports This policy setting prevents the display of the user interface for critical errors. -- If you enable or do not configure this policy setting, Windows Error Reporting does not display any GUI-based error messages or dialog boxes for critical errors. +- If you enable or don't configure this policy setting, Windows Error Reporting doesn't display any GUI-based error messages or dialog boxes for critical errors. - If you disable this policy setting, Windows Error Reporting displays the GUI-based error messages or dialog boxes for critical errors. @@ -311,13 +304,12 @@ This policy setting prevents the display of the user interface for critical erro | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-eventlogservice.md b/windows/client-management/mdm/policy-csp-eventlogservice.md index dd4e120109..82a2f6c7de 100644 --- a/windows/client-management/mdm/policy-csp-eventlogservice.md +++ b/windows/client-management/mdm/policy-csp-eventlogservice.md @@ -4,7 +4,7 @@ description: Learn more about the EventLogService Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - EventLogService -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -44,9 +41,9 @@ ms.topic: reference This policy setting controls Event Log behavior when the log file reaches its maximum size. -- If you enable this policy setting and a log file reaches its maximum size, new events are not written to the log and are lost. +- If you enable this policy setting and a log file reaches its maximum size, new events aren't written to the log and are lost. -- If you disable or do not configure this policy setting and a log file reaches its maximum size, new events overwrite old events. +- If you disable or don't configure this policy setting and a log file reaches its maximum size, new events overwrite old events. > [!NOTE] > Old events may or may not be retained according to the "Backup log automatically when full" policy setting. @@ -61,13 +58,12 @@ This policy setting controls Event Log behavior when the log file reaches its ma | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -94,7 +90,7 @@ This policy setting controls Event Log behavior when the log file reaches its ma | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -109,7 +105,7 @@ This policy setting specifies the maximum size of the log file in kilobytes. - If you enable this policy setting, you can configure the maximum log file size to be between 1 megabyte (1024 kilobytes) and 2 terabytes (2147483647 kilobytes), in kilobyte increments. -- If you disable or do not configure this policy setting, the maximum size of the log file will be set to the locally configured value. This value can be changed by the local administrator using the Log Properties dialog, and it defaults to 1 megabyte. +- If you disable or don't configure this policy setting, the maximum size of the log file will be set to the locally configured value. This value can be changed by the local administrator using the Log Properties dialog, and it defaults to 1 megabyte. @@ -121,13 +117,12 @@ This policy setting specifies the maximum size of the log file in kilobytes. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -153,7 +148,7 @@ This policy setting specifies the maximum size of the log file in kilobytes. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -168,7 +163,7 @@ This policy setting specifies the maximum size of the log file in kilobytes. - If you enable this policy setting, you can configure the maximum log file size to be between 20 megabytes (20480 kilobytes) and 2 terabytes (2147483647 kilobytes), in kilobyte increments. -- If you disable or do not configure this policy setting, the maximum size of the log file will be set to the locally configured value. This value can be changed by the local administrator using the Log Properties dialog, and it defaults to 20 megabytes. +- If you disable or don't configure this policy setting, the maximum size of the log file will be set to the locally configured value. This value can be changed by the local administrator using the Log Properties dialog, and it defaults to 20 megabytes. @@ -180,13 +175,12 @@ This policy setting specifies the maximum size of the log file in kilobytes. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -212,7 +206,7 @@ This policy setting specifies the maximum size of the log file in kilobytes. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -227,7 +221,7 @@ This policy setting specifies the maximum size of the log file in kilobytes. - If you enable this policy setting, you can configure the maximum log file size to be between 1 megabyte (1024 kilobytes) and 2 terabytes (2147483647 kilobytes), in kilobyte increments. -- If you disable or do not configure this policy setting, the maximum size of the log file will be set to the locally configured value. This value can be changed by the local administrator using the Log Properties dialog, and it defaults to 1 megabyte. +- If you disable or don't configure this policy setting, the maximum size of the log file will be set to the locally configured value. This value can be changed by the local administrator using the Log Properties dialog, and it defaults to 1 megabyte. @@ -239,13 +233,12 @@ This policy setting specifies the maximum size of the log file in kilobytes. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-experience.md b/windows/client-management/mdm/policy-csp-experience.md index 6505002489..98e5bc674b 100644 --- a/windows/client-management/mdm/policy-csp-experience.md +++ b/windows/client-management/mdm/policy-csp-experience.md @@ -4,7 +4,7 @@ description: Learn more about the Experience Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,8 +16,7 @@ ms.topic: reference # Policy CSP - Experience -> [!IMPORTANT] -> This CSP contains preview policies that are under development and only applicable for [Windows Insider Preview builds](/windows-insider/). These policies are subject to change and may have dependencies on other features or services in preview. +[!INCLUDE [Windows Insider tip](includes/mdm-insider-csp-note.md)] @@ -29,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -43,7 +42,9 @@ ms.topic: reference This policy setting determines whether history of Clipboard contents can be stored in memory. - If you enable this policy setting, history of Clipboard contents are allowed to be stored. -- If you disable this policy setting, history of Clipboard contents are not allowed to be stored. + +- If you disable this policy setting, history of Clipboard contents aren't allowed to be stored. + Policy change takes effect immediately. @@ -56,7 +57,7 @@ Policy change takes effect immediately. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -106,7 +107,7 @@ Policy change takes effect immediately. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -129,7 +130,7 @@ This policy is deprecated. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -155,7 +156,7 @@ This policy is deprecated. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -169,6 +170,7 @@ This policy is deprecated. This policy setting specifies whether Cortana is allowed on the device. - If you enable or don't configure this setting, Cortana will be allowed on the device. + - If you disable this setting, Cortana will be turned off. When Cortana is off, users will still be able to use search to find things on the device. @@ -183,7 +185,7 @@ When Cortana is off, users will still be able to use search to find things on th | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -223,7 +225,7 @@ When Cortana is off, users will still be able to use search to find things on th | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -234,7 +236,7 @@ When Cortana is off, users will still be able to use search to find things on th -Allows users to turn on/off device discovery UX. When set to 0 , the projection pane is disabled. The Win+P and Win+K shortcut keys will not work on. Most restricted value is 0. +Allows users to turn on/off device discovery UX. When set to 0 , the projection pane is disabled. The Win+P and Win+K shortcut keys won't work on. Most restricted value is 0. @@ -246,7 +248,7 @@ Allows users to turn on/off device discovery UX. When set to 0 , the projection | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -272,7 +274,7 @@ Allows users to turn on/off device discovery UX. When set to 0 , the projection | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -287,7 +289,7 @@ This policy turns on Find My Device. When Find My Device is on, the device and its location are registered in the cloud so that the device can be located when the user initiates a Find command from account.microsoft.com. On devices that are compatible with active digitizers, enabling Find My Device will also allow the user to view the last location of use of their active digitizer on their device; this location is stored locally on the user's device after each use of their active digitizer. -When Find My Device is off, the device and its location are not registered and the Find My Device feature will not work. The user will also not be able to view the location of the last use of their active digitizer on their device. +When Find My Device is off, the device and its location aren't registered and the Find My Device feature won't work. The user will also not be able to view the location of the last use of their active digitizer on their device. @@ -299,7 +301,7 @@ When Find My Device is off, the device and its location are not registered and t | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -339,7 +341,7 @@ When Find My Device is off, the device and its location are not registered and t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -365,7 +367,7 @@ Specifies whether to allow the user to delete the workplace account using the wo | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -391,7 +393,7 @@ Specifies whether to allow the user to delete the workplace account using the wo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -414,7 +416,7 @@ This policy is deprecated. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -440,7 +442,7 @@ This policy is deprecated. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -463,7 +465,7 @@ Allow screen capture. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -492,7 +494,7 @@ Allow screen capture. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -515,7 +517,7 @@ This policy is deprecated. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -541,7 +543,7 @@ This policy is deprecated. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -564,7 +566,7 @@ Allow SIM error dialog prompts when no SIM is inserted. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -590,7 +592,7 @@ Allow SIM error dialog prompts when no SIM is inserted. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -604,7 +606,8 @@ Allow SIM error dialog prompts when no SIM is inserted. Specifies whether Spotlight collection is allowed as a Personalization->Background Setting. - If you enable this policy setting, Spotlight collection will show as an option in the user's Personalization Settings, and the user will be able to get daily images from Microsoft displayed on their desktop. -- If you disable this policy setting, Spotlight collection will not show as an option in Personalization Settings, and the user will not have the choice of getting Microsoft daily images shown on their desktop. + +- If you disable this policy setting, Spotlight collection won't show as an option in Personalization Settings, and the user won't have the choice of getting Microsoft daily images shown on their desktop. @@ -620,7 +623,7 @@ The following list shows the supported values: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-1]` | | Default Value | 1 | @@ -652,7 +655,7 @@ The following list shows the supported values: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -675,7 +678,7 @@ Allows or disallows all Windows sync settings on the device. For information abo | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -685,7 +688,7 @@ Allows or disallows all Windows sync settings on the device. For information abo | Value | Description | |:--|:--| -| 0 | Sync settings are not allowed. | +| 0 | Sync settings aren't allowed. | | 1 (Default) | Sync settings allowed. | @@ -701,7 +704,7 @@ Allows or disallows all Windows sync settings on the device. For information abo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -714,11 +717,12 @@ Allows or disallows all Windows sync settings on the device. For information abo This policy allows you to prevent Windows from using diagnostic data to provide customized experiences to the user. -- If you enable this policy setting, Windows will not use diagnostic data from this device to customize content shown on the lock screen, Windows tips, Microsoft consumer features, or other related features. If these features are enabled, users will still see recommendations, tips and offers, but they may be less relevant. -- If you disable or do not configure this policy setting, Microsoft will use diagnostic data to provide personalized recommendations, tips, and offers to tailor Windows for the user's needs and make it work better for them. Diagnostic data can include browser, app and feature usage, depending on the Diagnostic and usage data setting value. +- If you enable this policy setting, Windows won't use diagnostic data from this device to customize content shown on the lock screen, Windows tips, Microsoft consumer features, or other related features. If these features are enabled, users will still see recommendations, tips and offers, but they may be less relevant. + +- If you disable or don't configure this policy setting, Microsoft will use diagnostic data to provide personalized recommendations, tips, and offers to tailor Windows for the user's needs and make it work better for them. Diagnostic data can include browser, app and feature usage, depending on the Diagnostic and usage data setting value. > [!NOTE] -> This setting does not control Cortana cutomized experiences because there are separate policies to configure it. Most restricted value is 0. +> This setting doesn't control Cortana cutomized experiences because there are separate policies to configure it. Most restricted value is 0. @@ -730,7 +734,7 @@ This policy allows you to prevent Windows from using diagnostic data to provide | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | | Dependency [Experience_AllowTailoredExperiencesWithDiagnosticData_DependencyGroup] | Dependency Type: `DependsOn`
    Dependency URI: `User/Vendor/MSFT/Policy/Config/Experience/AllowWindowsSpotlight`
    Dependency Allowed Value: `[1]`
    Dependency Allowed Value Type: `Range`
    | @@ -774,7 +778,7 @@ This policy allows you to prevent Windows from using diagnostic data to provide | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -797,7 +801,7 @@ This policy is deprecated. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -823,7 +827,7 @@ This policy is deprecated. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -846,7 +850,7 @@ Specifies whether to allow app and content suggestions from third-party software | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | | Dependency [Experience_AllowThirdPartySuggestionsInWindowsSpotlight_DependencyGroup] | Dependency Type: `DependsOn`
    Dependency URI: `User/Vendor/MSFT/Policy/Config/Experience/AllowWindowsSpotlight`
    Dependency Allowed Value: `[1]`
    Dependency Allowed Value Type: `Range`
    | @@ -890,7 +894,7 @@ Specifies whether to allow app and content suggestions from third-party software | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -913,7 +917,7 @@ This policy is deprecated. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -939,7 +943,7 @@ This policy is deprecated. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -962,7 +966,7 @@ Prior to Windows 10, version 1803, this policy had User scope. This policy allow | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | | Dependency [Experience_AllowWindowsConsumerFeatures_DependencyGroup] | Dependency Type: `DependsOn`
    Dependency URI: `User/Vendor/MSFT/Policy/Config/Experience/AllowWindowsSpotlight`
    Dependency Allowed Value: `[1]`
    Dependency Allowed Value Type: `Range`
    | @@ -1003,7 +1007,7 @@ Prior to Windows 10, version 1803, this policy had User scope. This policy allow | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ❌ Device
    ✅ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1017,7 +1021,8 @@ Prior to Windows 10, version 1803, this policy had User scope. This policy allow Specifies whether to turn off all Windows spotlight features at once. - If you enable this policy setting, Windows spotlight on lock screen, Windows Tips, Microsoft consumer features and other related features will be turned off. You should enable this policy setting if your goal is to minimize network traffic from target devices. -- If you disable or do not configure this policy setting, Windows spotlight features are allowed and may be controlled individually using their corresponding policy settings. Most restricted value is 0. + +- If you disable or don't configure this policy setting, Windows spotlight features are allowed and may be controlled individually using their corresponding policy settings. Most restricted value is 0. @@ -1029,7 +1034,7 @@ Specifies whether to turn off all Windows spotlight features at once. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1069,7 +1074,7 @@ Specifies whether to turn off all Windows spotlight features at once. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ❌ Device
    ✅ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1083,7 +1088,8 @@ Specifies whether to turn off all Windows spotlight features at once. This policy allows administrators to prevent Windows spotlight notifications from being displayed in the Action Center. - If you enable this policy, Windows spotlight notifications will no longer be displayed in the Action Center. -- If you disable or do not configure this policy, Microsoft may display notifications in the Action Center that will suggest apps or features to help users be more productive on Windows. Most restricted value is 0. + +- If you disable or don't configure this policy, Microsoft may display notifications in the Action Center that will suggest apps or features to help users be more productive on Windows. Most restricted value is 0. @@ -1095,7 +1101,7 @@ This policy allows administrators to prevent Windows spotlight notifications fro | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | | Dependency [Experience_AllowWindowsSpotlightOnActionCenter_DependencyGroup] | Dependency Type: `DependsOn`
    Dependency URI: `User/Vendor/MSFT/Policy/Config/Experience/AllowWindowsSpotlight`
    Dependency Allowed Value: `[1]`
    Dependency Allowed Value Type: `Range`
    | @@ -1136,7 +1142,7 @@ This policy allows administrators to prevent Windows spotlight notifications fro | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ❌ Device
    ✅ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1159,7 +1165,7 @@ This policy allows IT admins to turn off Suggestions in Settings app. These sugg | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1199,7 +1205,7 @@ This policy allows IT admins to turn off Suggestions in Settings app. These sugg | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ❌ Device
    ✅ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1213,7 +1219,8 @@ This policy allows IT admins to turn off Suggestions in Settings app. These sugg This policy setting lets you turn off the Windows spotlight Windows welcome experience feature. The Windows welcome experience feature introduces onboard users to Windows; for example, launching Microsoft Edge with a webpage that highlights new features. - If you enable this policy, the Windows welcome experience will no longer be displayed when there are updates and changes to Windows and its apps. -- If you disable or do not configure this policy, the Windows welcome experience will be launched to inform onboard users about what's new, changed, and suggested. Most restricted value is 0. + +- If you disable or don't configure this policy, the Windows welcome experience will be launched to inform onboard users about what's new, changed, and suggested. Most restricted value is 0. @@ -1225,7 +1232,7 @@ This policy setting lets you turn off the Windows spotlight Windows welcome expe | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | | Dependency [Experience_AllowWindowsSpotlightWindowsWelcomeExperience_DependencyGroup] | Dependency Type: `DependsOn`
    Dependency URI: `User/Vendor/MSFT/Policy/Config/Experience/AllowWindowsSpotlight`
    Dependency Allowed Value: `[1]`
    Dependency Allowed Value Type: `Range`
    | @@ -1266,7 +1273,7 @@ This policy setting lets you turn off the Windows spotlight Windows welcome expe | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1289,7 +1296,7 @@ Enables or disables Windows Tips / soft landing. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | | Dependency [Experience_AllowWindowsTips_DependencyGroup] | Dependency Type: `DependsOn`
    Dependency URI: `User/Vendor/MSFT/Policy/Config/Experience/AllowWindowsSpotlight`
    Dependency Allowed Value: `[1]`
    Dependency Allowed Value Type: `Range`
    | @@ -1333,7 +1340,7 @@ Enables or disables Windows Tips / soft landing. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1350,9 +1357,9 @@ This policy setting allows you to configure the Chat icon on the taskbar. - If you enable this policy setting and set it to Hide, the Chat icon will be hidden by default. Users can show or hide it in Settings. -- If you enable this policy setting and set it to Disabled, the Chat icon will not be displayed, and users cannot show or hide it in Settings. +- If you enable this policy setting and set it to Disabled, the Chat icon won't be displayed, and users can't show or hide it in Settings. -- If you disable or do not configure this policy setting, the Chat icon will be configured according to the defaults for your Windows edition. +- If you disable or don't configure this policy setting, the Chat icon will be configured according to the defaults for your Windows edition. @@ -1366,7 +1373,7 @@ This policy setting allows you to configure the Chat icon on the taskbar. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1408,7 +1415,7 @@ This policy setting allows you to configure the Chat icon on the taskbar. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ❌ Device
    ✅ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1421,13 +1428,13 @@ This policy setting allows you to configure the Chat icon on the taskbar. This policy setting lets you configure Windows spotlight on the lock screen. -- If you enable this policy setting, "Windows spotlight" will be set as the lock screen provider and users will not be able to modify their lock screen. "Windows spotlight" will display daily images from Microsoft on the lock screen. +- If you enable this policy setting, "Windows spotlight" will be set as the lock screen provider and users won't be able to modify their lock screen. "Windows spotlight" will display daily images from Microsoft on the lock screen. -Additionally, if you check the "Include content from Enterprise spotlight" checkbox and your organization has setup an Enterprise spotlight content service in Azure, the lock screen will display internal messages and communications configured in that service, when available. If your organization does not have an Enterprise spotlight content service, the checkbox will have no effect. +Additionally, if you check the "Include content from Enterprise spotlight" checkbox and your organization has setup an Enterprise spotlight content service in Azure, the lock screen will display internal messages and communications configured in that service, when available. If your organization doesn't have an Enterprise spotlight content service, the checkbox will have no effect. - If you disable this policy setting, Windows spotlight will be turned off and users will no longer be able to select it as their lock screen. Users will see the default lock screen image and will be able to select another image, unless you have enabled the "Prevent changing lock screen image" policy. -- If you do not configure this policy, Windows spotlight will be available on the lock screen and will be selected by default, unless you have configured another default lock screen image using the "Force a specific default lock screen and logon image" policy. +- If you don't configure this policy, Windows spotlight will be available on the lock screen and will be selected by default, unless you have configured another default lock screen image using the "Force a specific default lock screen and logon image" policy. > [!NOTE] > This policy is only available for Enterprise SKUs. @@ -1442,7 +1449,7 @@ Additionally, if you check the "Include content from Enterprise spotlight" check | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | | Dependency [Experience_ConfigureWindowsSpotlightOnLockScreen_DependencyGroup] | Dependency Type: `DependsOn`
    Dependency URI: `User/Vendor/MSFT/Policy/Config/Experience/AllowWindowsSpotlight`
    Dependency Allowed Value: `[1]`
    Dependency Allowed Value Type: `Range`
    | @@ -1455,8 +1462,8 @@ Additionally, if you check the "Include content from Enterprise spotlight" check |:--|:--| | 0 | Windows spotlight disabled. | | 1 (Default) | Windows spotlight enabled. | -| 2 | Windows spotlight is always enabled, the user cannot disable it. | -| 3 | Windows spotlight is always enabled, the user cannot disable it. For special configurations only. | +| 2 | Windows spotlight is always enabled, the user can't disable it. | +| 3 | Windows spotlight is always enabled, the user can't disable it. For special configurations only. | @@ -1485,7 +1492,7 @@ Additionally, if you check the "Include content from Enterprise spotlight" check | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1500,7 +1507,7 @@ This policy setting lets you turn off cloud optimized content in all Windows exp - If you enable this policy, Windows experiences that use the cloud optimized content client component, will instead present the default fallback content. -- If you disable or do not configure this policy, Windows experiences will be able to use cloud optimized content. +- If you disable or don't configure this policy, Windows experiences will be able to use cloud optimized content. @@ -1512,7 +1519,7 @@ This policy setting lets you turn off cloud optimized content in all Windows exp | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1552,7 +1559,7 @@ This policy setting lets you turn off cloud optimized content in all Windows exp | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1567,7 +1574,7 @@ This policy setting lets you turn off cloud consumer account state content in al - If you enable this policy, Windows experiences that use the cloud consumer account state content client component, will instead present the default fallback content. -- If you disable or do not configure this policy, Windows experiences will be able to use cloud consumer account state content. +- If you disable or don't configure this policy, Windows experiences will be able to use cloud consumer account state content. @@ -1579,7 +1586,7 @@ This policy setting lets you turn off cloud consumer account state content in al | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1619,7 +1626,7 @@ This policy setting lets you turn off cloud consumer account state content in al | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows Insider Preview | @@ -1642,7 +1649,7 @@ Allows Text Translation feature to be enabled/disabled. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1668,7 +1675,7 @@ Allows Text Translation feature to be enabled/disabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1683,10 +1690,10 @@ This policy setting allows an organization to prevent its devices from showing f - If you enable this policy setting, users will no longer see feedback notifications through the Windows Feedback app. -- If you disable or do not configure this policy setting, users may see notifications through the Windows Feedback app asking users for feedback. +- If you disable or don't configure this policy setting, users may see notifications through the Windows Feedback app asking users for feedback. > [!NOTE] -> If you disable or do not configure this policy setting, users can control how often they receive feedback questions. +> If you disable or don't configure this policy setting, users can control how often they receive feedback questions. @@ -1698,7 +1705,7 @@ This policy setting allows an organization to prevent its devices from showing f | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1708,7 +1715,7 @@ This policy setting allows an organization to prevent its devices from showing f | Value | Description | |:--|:--| -| 0 (Default) | Feedback notifications are not disabled. The actual state of feedback notifications on the device will then depend on what GP has configured or what the user has configured locally. | +| 0 (Default) | Feedback notifications aren't disabled. The actual state of feedback notifications on the device will then depend on what GP has configured or what the user has configured locally. | | 1 | Feedback notifications are disabled. | @@ -1738,7 +1745,7 @@ This policy setting allows an organization to prevent its devices from showing f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -1751,11 +1758,11 @@ This policy setting allows an organization to prevent its devices from showing f Prevent the "browser" group from syncing to and from this PC. This turns off and disables the "browser" group on the "sync your settings" page in PC settings. The "browser" group contains settings and info like history and favorites. -If you enable this policy setting, the "browser" group, including info like history and favorites, will not be synced. +If you enable this policy setting, the "browser" group, including info like history and favorites, won't be synced. Use the option "Allow users to turn browser syncing on" so that syncing is turned off by default but not disabled. -If you do not set or disable this setting, syncing of the "browser" group is on by default and configurable by the user. +If you don't set or disable this setting, syncing of the "browser" group is on by default and configurable by the user. @@ -1768,7 +1775,7 @@ Related policy: [PreventUsersFromTurningOnBrowserSyncing](#preventusersfromturni | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1825,7 +1832,7 @@ _**Turn syncing off by default but don’t disable**_ | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ❌ Device
    ✅ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows Insider Preview | @@ -1848,7 +1855,7 @@ Organizational messages allow Administrators to deliver messages to their end us | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1874,7 +1881,7 @@ Organizational messages allow Administrators to deliver messages to their end us | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -1897,7 +1904,7 @@ By default, the "browser" group syncs automatically between the user's devices, | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1957,7 +1964,7 @@ _**Prevent syncing of browser settings and let users turn on syncing**_ | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -1974,7 +1981,7 @@ Shows or hides lock from the user tile menu. - If you disable this policy setting, the lock option will never be shown in the User Tile menu. -- If you do not configure this policy setting, users will be able to choose whether they want lock to show through the Power Options Control Panel. +- If you don't configure this policy setting, users will be able to choose whether they want lock to show through the Power Options Control Panel. @@ -1986,7 +1993,7 @@ Shows or hides lock from the user tile menu. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1996,7 +2003,7 @@ Shows or hides lock from the user tile menu. | Value | Description | |:--|:--| -| 0 | The lock option is not displayed in the User Tile menu. | +| 0 | The lock option isn't displayed in the User Tile menu. | | 1 (Default) | The lock option is displayed in the User Tile menu. | diff --git a/windows/client-management/mdm/policy-csp-exploitguard.md b/windows/client-management/mdm/policy-csp-exploitguard.md index 8a44d2c7e1..946ae4afdc 100644 --- a/windows/client-management/mdm/policy-csp-exploitguard.md +++ b/windows/client-management/mdm/policy-csp-exploitguard.md @@ -4,7 +4,7 @@ description: Learn more about the ExploitGuard Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -37,7 +37,7 @@ ms.topic: reference -Enables the IT admin to push out a configuration representing the desired system and application mitigation options to all the devices in the organization. The configuration is represented by an XML. For more information Exploit Protection, see [Enable Exploit Protection on Devices](/microsoft-365/security/defender-endpoint/enable-exploit-protection) and [Import, export, and deploy Exploit Protection configurations](/windows/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml). The system settings require a reboot; the application settings do not require a reboot. +Enables the IT admin to push out a configuration representing the desired system and application mitigation options to all the devices in the organization. The configuration is represented by an XML. For more information Exploit Protection, see [Enable Exploit Protection on Devices](/microsoft-365/security/defender-endpoint/enable-exploit-protection) and [Import, export, and deploy Exploit Protection configurations](/windows/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml). The system settings require a reboot; the application settings don't require a reboot. @@ -49,7 +49,7 @@ Enables the IT admin to push out a configuration representing the desired system | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | diff --git a/windows/client-management/mdm/policy-csp-federatedauthentication.md b/windows/client-management/mdm/policy-csp-federatedauthentication.md index 85326a86f9..535a19e772 100644 --- a/windows/client-management/mdm/policy-csp-federatedauthentication.md +++ b/windows/client-management/mdm/policy-csp-federatedauthentication.md @@ -4,7 +4,7 @@ description: Learn more about the FederatedAuthentication Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -51,7 +51,7 @@ Specifies whether web-based sign-in is enabled with the Primary User experience. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | diff --git a/windows/client-management/mdm/policy-csp-fileexplorer.md b/windows/client-management/mdm/policy-csp-fileexplorer.md index cb839593b8..2473c7db0c 100644 --- a/windows/client-management/mdm/policy-csp-fileexplorer.md +++ b/windows/client-management/mdm/policy-csp-fileexplorer.md @@ -4,7 +4,7 @@ description: Learn more about the FileExplorer Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - FileExplorer -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -58,7 +55,7 @@ When the Network folder is restricted, give the user the option to enumerate and | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -84,7 +81,7 @@ When the Network folder is restricted, give the user the option to enumerate and | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -111,7 +108,7 @@ When This PC location is restricted, give the user the option to enumerate and n | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -137,7 +134,7 @@ When This PC location is restricted, give the user the option to enumerate and n | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -160,7 +157,7 @@ Turning off files from Office.com will prevent File Explorer from requesting rec | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -171,7 +168,7 @@ Turning off files from Office.com will prevent File Explorer from requesting rec | Value | Description | |:--|:--| | 0 (Default) | File Explorer will request cloud file metadata and display it in the Quick access view. | -| 1 | File Explorer will not request cloud file metadata or display it in the Quick access view. | +| 1 | File Explorer won't request cloud file metadata or display it in the Quick access view. | @@ -200,7 +197,7 @@ Turning off files from Office.com will prevent File Explorer from requesting rec | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -227,7 +224,7 @@ A value that can represent one or more folder locations in File Explorer. If not | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -257,7 +254,7 @@ A value that can represent one or more folder locations in File Explorer. If not | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -284,7 +281,7 @@ A value that can represent one or more storage locations in File Explorer. If no | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -316,7 +313,7 @@ A value that can represent one or more storage locations in File Explorer. If no | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -339,13 +336,12 @@ Disabling data execution prevention can allow certain legacy plug-in application | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -372,7 +368,7 @@ Disabling data execution prevention can allow certain legacy plug-in application | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -395,13 +391,12 @@ Disabling heap termination on corruption can allow certain legacy plug-in applic | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-games.md b/windows/client-management/mdm/policy-csp-games.md index e27040ab3b..3cbb9c950a 100644 --- a/windows/client-management/mdm/policy-csp-games.md +++ b/windows/client-management/mdm/policy-csp-games.md @@ -4,7 +4,7 @@ description: Learn more about the Games Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -49,7 +49,7 @@ Specifies whether advanced gaming services can be used. These services may send | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | diff --git a/windows/client-management/mdm/policy-csp-handwriting.md b/windows/client-management/mdm/policy-csp-handwriting.md index 92691739f8..c32d17ab4f 100644 --- a/windows/client-management/mdm/policy-csp-handwriting.md +++ b/windows/client-management/mdm/policy-csp-handwriting.md @@ -4,7 +4,7 @@ description: Learn more about the Handwriting Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -52,7 +52,7 @@ The docked mode is especially useful in Kiosk mode, where you don't expect the e | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | diff --git a/windows/client-management/mdm/policy-csp-humanpresence.md b/windows/client-management/mdm/policy-csp-humanpresence.md index 66486d9057..4129760b55 100644 --- a/windows/client-management/mdm/policy-csp-humanpresence.md +++ b/windows/client-management/mdm/policy-csp-humanpresence.md @@ -4,7 +4,7 @@ description: Learn more about the HumanPresence Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,8 +16,7 @@ ms.topic: reference # Policy CSP - HumanPresence -> [!IMPORTANT] -> This CSP contains preview policies that are under development and only applicable for [Windows Insider Preview builds](/windows-insider/). These policies are subject to change and may have dependencies on other features or services in preview. +[!INCLUDE [Windows Insider tip](includes/mdm-insider-csp-note.md)] @@ -29,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows Insider Preview | @@ -40,7 +39,7 @@ ms.topic: reference -Determines whether Allow Adaptive Dimming When External Display Connected checkbox is forced checked/unchecked by the MDM policy. The user will not be able to change this setting and the checkbox in the UI will be greyed out. +Determines whether Allow Adaptive Dimming When External Display Connected checkbox is forced checked/unchecked by the MDM policy. The user won't be able to change this setting and the checkbox in the UI will be greyed out. @@ -52,7 +51,7 @@ Determines whether Allow Adaptive Dimming When External Display Connected checkb | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -88,7 +87,7 @@ Determines whether Allow Adaptive Dimming When External Display Connected checkb | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows Insider Preview | @@ -99,7 +98,7 @@ Determines whether Allow Adaptive Dimming When External Display Connected checkb -Determines whether Allow Lock on Leave When External Display Connected checkbox is forced checked/unchecked by the MDM policy. The user will not be able to change this setting and the checkbox in the UI will be greyed out. +Determines whether Allow Lock on Leave When External Display Connected checkbox is forced checked/unchecked by the MDM policy. The user won't be able to change this setting and the checkbox in the UI will be greyed out. @@ -111,7 +110,7 @@ Determines whether Allow Lock on Leave When External Display Connected checkbox | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -147,7 +146,7 @@ Determines whether Allow Lock on Leave When External Display Connected checkbox | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows Insider Preview | @@ -158,7 +157,7 @@ Determines whether Allow Lock on Leave When External Display Connected checkbox -Determines whether Allow Wake on Approach When External Display Connected checkbox is forced checked/unchecked by the MDM policy. The user will not be able to change this setting and the checkbox in the UI will be greyed out. +Determines whether Allow Wake on Approach When External Display Connected checkbox is forced checked/unchecked by the MDM policy. The user won't be able to change this setting and the checkbox in the UI will be greyed out. @@ -170,7 +169,7 @@ Determines whether Allow Wake on Approach When External Display Connected checkb | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -206,7 +205,7 @@ Determines whether Allow Wake on Approach When External Display Connected checkb | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows Insider Preview | @@ -217,7 +216,7 @@ Determines whether Allow Wake on Approach When External Display Connected checkb -Determines whether Disable Wake on Approach When Battery Saver On checkbox is forced checked/unchecked by the MDM policy. The user will not be able to change this setting and the checkbox in the UI will be greyed out. +Determines whether Disable Wake on Approach When Battery Saver On checkbox is forced checked/unchecked by the MDM policy. The user won't be able to change this setting and the checkbox in the UI will be greyed out. @@ -229,7 +228,7 @@ Determines whether Disable Wake on Approach When Battery Saver On checkbox is fo | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -265,7 +264,7 @@ Determines whether Disable Wake on Approach When Battery Saver On checkbox is fo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -276,7 +275,7 @@ Determines whether Disable Wake on Approach When Battery Saver On checkbox is fo -Determines whether Attention Based Display Dimming is forced on/off by the MDM policy. The user will not be able to change this setting and the toggle in the UI will be greyed out. +Determines whether Attention Based Display Dimming is forced on/off by the MDM policy. The user won't be able to change this setting and the toggle in the UI will be greyed out. @@ -289,7 +288,7 @@ This is a power saving feature that prolongs battery charge. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -329,7 +328,7 @@ This is a power saving feature that prolongs battery charge. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -340,7 +339,7 @@ This is a power saving feature that prolongs battery charge. -Determines whether Lock on Leave is forced on/off by the MDM policy. The user will not be able to change this setting and the toggle in the UI will be greyed out. +Determines whether Lock on Leave is forced on/off by the MDM policy. The user won't be able to change this setting and the toggle in the UI will be greyed out. @@ -352,7 +351,7 @@ Determines whether Lock on Leave is forced on/off by the MDM policy. The user wi | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -393,7 +392,7 @@ Determines whether Lock on Leave is forced on/off by the MDM policy. The user wi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -404,7 +403,7 @@ Determines whether Lock on Leave is forced on/off by the MDM policy. The user wi -Determines whether Wake On Arrival is forced on/off by the MDM policy. The user will not be able to change this setting and the toggle in the UI will be greyed out. +Determines whether Wake On Arrival is forced on/off by the MDM policy. The user won't be able to change this setting and the toggle in the UI will be greyed out. @@ -416,7 +415,7 @@ Determines whether Wake On Arrival is forced on/off by the MDM policy. The user | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -457,7 +456,7 @@ Determines whether Wake On Arrival is forced on/off by the MDM policy. The user | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -480,7 +479,7 @@ Determines the timeout for Lock on Leave forced by the MDM policy. The user will | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | diff --git a/windows/client-management/mdm/policy-csp-internetexplorer.md b/windows/client-management/mdm/policy-csp-internetexplorer.md index d8938e641c..048fcaf893 100644 --- a/windows/client-management/mdm/policy-csp-internetexplorer.md +++ b/windows/client-management/mdm/policy-csp-internetexplorer.md @@ -4,7 +4,7 @@ description: Learn more about the InternetExplorer Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 04/26/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - InternetExplorer -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -53,7 +50,7 @@ This policy setting allows you to add a specific list of search providers to the > [!NOTE] > This list can be created from a custom administrative template file. For information about creating this custom administrative template file, see the Internet Explorer documentation on search providers. -- If you disable or do not configure this policy setting, the user can configure their list of search providers unless another policy setting restricts such configuration. +- If you disable or don't configure this policy setting, the user can configure their list of search providers unless another policy setting restricts such configuration. @@ -65,13 +62,12 @@ This policy setting allows you to add a specific list of search providers to the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -98,7 +94,7 @@ This policy setting allows you to add a specific list of search providers to the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -115,9 +111,9 @@ This policy setting allows you to add a specific list of search providers to the This policy setting controls the ActiveX Filtering feature for websites that are running ActiveX controls. The user can choose to turn off ActiveX Filtering for specific websites so that ActiveX controls can run properly. -- If you enable this policy setting, ActiveX Filtering is enabled by default for the user. The user cannot turn off ActiveX Filtering, although they may add per-site exceptions. +- If you enable this policy setting, ActiveX Filtering is enabled by default for the user. The user can't turn off ActiveX Filtering, although they may add per-site exceptions. -- If you disable or do not configure this policy setting, ActiveX Filtering is not enabled by default for the user. The user can turn ActiveX Filtering on or off. +- If you disable or don't configure this policy setting, ActiveX Filtering isn't enabled by default for the user. The user can turn ActiveX Filtering on or off. @@ -129,13 +125,12 @@ This policy setting controls the ActiveX Filtering feature for websites that are | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -162,7 +157,7 @@ This policy setting controls the ActiveX Filtering feature for websites that are | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -199,13 +194,12 @@ Value - A number indicating whether Internet Explorer should deny or allow the a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -232,7 +226,7 @@ Value - A number indicating whether Internet Explorer should deny or allow the a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -245,11 +239,11 @@ Value - A number indicating whether Internet Explorer should deny or allow the a This AutoComplete feature can remember and suggest User names and passwords on Forms. -- If you enable this setting, the user cannot change "User name and passwords on forms" or "prompt me to save passwords". The Auto Complete feature for User names and passwords on Forms will be turned on. You have to decide whether to select "prompt me to save passwords". +- If you enable this setting, the user can't change "User name and passwords on forms" or "prompt me to save passwords". The Auto Complete feature for User names and passwords on Forms will be turned on. You have to decide whether to select "prompt me to save passwords". -- If you disable this setting the user cannot change "User name and passwords on forms" or "prompt me to save passwords". The Auto Complete feature for User names and passwords on Forms is turned off. The user also cannot opt to be prompted to save passwords. +- If you disable this setting the user can't change "User name and passwords on forms" or "prompt me to save passwords". The Auto Complete feature for User names and passwords on Forms is turned off. The user also can't opt to be prompted to save passwords. -- If you do not configure this setting, the user has the freedom of turning on Auto complete for User name and passwords on forms and the option of prompting to save passwords. To display this option, the users open the Internet Options dialog box, click the Contents Tab and click the Settings button. +- If you don't configure this setting, the user has the freedom of turning on Auto complete for User name and passwords on forms and the option of prompting to save passwords. To display this option, the users open the Internet Options dialog box, click the Contents Tab and click the Settings button. @@ -261,13 +255,12 @@ This AutoComplete feature can remember and suggest User names and passwords on F | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -294,7 +287,7 @@ This AutoComplete feature can remember and suggest User names and passwords on F | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -313,7 +306,7 @@ This policy setting allows you to turn on the certificate address mismatch secur - If you enable this policy setting, the certificate address mismatch warning always appears. -- If you disable or do not configure this policy setting, the user can choose whether the certificate address mismatch warning appears (by using the Advanced page in the Internet Control panel). +- If you disable or don't configure this policy setting, the user can choose whether the certificate address mismatch warning appears (by using the Advanced page in the Internet Control panel). @@ -325,13 +318,12 @@ This policy setting allows you to turn on the certificate address mismatch secur | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -358,7 +350,7 @@ This policy setting allows you to turn on the certificate address mismatch secur | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -375,11 +367,11 @@ This policy setting allows you to turn on the certificate address mismatch secur This policy setting allows the automatic deletion of specified items when the last browser window closes. The preferences selected in the Delete Browsing History dialog box (such as deleting temporary Internet files, cookies, history, form data, and passwords) are applied, and those items are deleted. -- If you enable this policy setting, deleting browsing history on exit is turned on. +- If you enable this policy setting, deleting browsing history on exit's turned on. -- If you disable this policy setting, deleting browsing history on exit is turned off. +- If you disable this policy setting, deleting browsing history on exit's turned off. -- If you do not configure this policy setting, it can be configured on the General tab in Internet Options. +- If you don't configure this policy setting, it can be configured on the General tab in Internet Options. If the "Prevent access to Delete Browsing History" policy setting is enabled, this policy setting has no effect. @@ -393,13 +385,12 @@ If the "Prevent access to Delete Browsing History" policy setting is enabled, th | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -426,7 +417,7 @@ If the "Prevent access to Delete Browsing History" policy setting is enabled, th | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -443,11 +434,11 @@ If the "Prevent access to Delete Browsing History" policy setting is enabled, th Enhanced Protected Mode provides additional protection against malicious websites by using 64-bit processes on 64-bit versions of Windows. For computers running at least Windows 8, Enhanced Protected Mode also limits the locations Internet Explorer can read from in the registry and the file system. -- If you enable this policy setting, Enhanced Protected Mode will be turned on. Any zone that has Protected Mode enabled will use Enhanced Protected Mode. Users will not be able to disable Enhanced Protected Mode. +- If you enable this policy setting, Enhanced Protected Mode will be turned on. Any zone that has Protected Mode enabled will use Enhanced Protected Mode. Users won't be able to disable Enhanced Protected Mode. - If you disable this policy setting, Enhanced Protected Mode will be turned off. Any zone that has Protected Mode enabled will use the version of Protected Mode introduced in Internet Explorer 7 for Windows Vista. -- If you do not configure this policy, users will be able to turn on or turn off Enhanced Protected Mode on the Advanced tab of the Internet Options dialog. +- If you don't configure this policy, users will be able to turn on or turn off Enhanced Protected Mode on the Advanced tab of the Internet Options dialog. @@ -459,13 +450,12 @@ Enhanced Protected Mode provides additional protection against malicious website | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -492,7 +482,7 @@ Enhanced Protected Mode provides additional protection against malicious website | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -525,13 +515,12 @@ This policy setting allows Internet Explorer to provide enhanced suggestions as | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -558,7 +547,7 @@ This policy setting allows Internet Explorer to provide enhanced suggestions as | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -589,13 +578,12 @@ If you disable or don't configure this policy setting, the menu option won't app | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -621,7 +609,7 @@ If you disable or don't configure this policy setting, the menu option won't app | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -652,13 +640,12 @@ This policy setting lets you specify where to find the list of websites you want | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -684,7 +671,7 @@ This policy setting lets you specify where to find the list of websites you want | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -697,9 +684,9 @@ This policy setting lets you specify where to find the list of websites you want This policy setting allows you to block an insecure fallback to SSL 3.0. When this policy is enabled, Internet Explorer will attempt to connect to sites using SSL 3.0 or below when TLS 1.0 or greater fails. -We recommend that you do not allow insecure fallback in order to prevent a man-in-the-middle attack. +We recommend that you don't allow insecure fallback in order to prevent a man-in-the-middle attack. -This policy does not affect which security protocols are enabled. +This policy doesn't affect which security protocols are enabled. If you disable this policy, system defaults will be used. @@ -713,13 +700,12 @@ If you disable this policy, system defaults will be used. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -745,7 +731,7 @@ If you disable this policy, system defaults will be used. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -762,9 +748,9 @@ If you disable this policy, system defaults will be used. This policy setting allows you to add specific sites that must be viewed in Internet Explorer 7 Compatibility View. -- If you enable this policy setting, the user can add and remove sites from the list, but the user cannot remove the entries that you specify. +- If you enable this policy setting, the user can add and remove sites from the list, but the user can't remove the entries that you specify. -- If you disable or do not configure this policy setting, the user can add and remove sites from the list. +- If you disable or don't configure this policy setting, the user can add and remove sites from the list. @@ -776,13 +762,12 @@ This policy setting allows you to add specific sites that must be viewed in Inte | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -808,7 +793,7 @@ This policy setting allows you to add specific sites that must be viewed in Inte | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -825,11 +810,11 @@ This policy setting allows you to add specific sites that must be viewed in Inte This policy setting controls how Internet Explorer displays local intranet content. Intranet content is defined as any webpage that belongs to the local intranet security zone. -- If you enable this policy setting, Internet Explorer uses the current user agent string for local intranet content. Additionally, all local intranet Standards Mode pages appear in the Standards Mode available with the latest version of Internet Explorer. The user cannot change this behavior through the Compatibility View Settings dialog box. +- If you enable this policy setting, Internet Explorer uses the current user agent string for local intranet content. Additionally, all local intranet Standards Mode pages appear in the Standards Mode available with the latest version of Internet Explorer. The user can't change this behavior through the Compatibility View Settings dialog box. -- If you disable this policy setting, Internet Explorer uses an Internet Explorer 7 user agent string (with an additional string appended) for local intranet content. Additionally, all local intranet Standards Mode pages appear in Internet Explorer 7 Standards Mode. The user cannot change this behavior through the Compatibility View Settings dialog box. +- If you disable this policy setting, Internet Explorer uses an Internet Explorer 7 user agent string (with an additional string appended) for local intranet content. Additionally, all local intranet Standards Mode pages appear in Internet Explorer 7 Standards Mode. The user can't change this behavior through the Compatibility View Settings dialog box. -- If you do not configure this policy setting, Internet Explorer uses an Internet Explorer 7 user agent string (with an additional string appended) for local intranet content. Additionally, all local intranet Standards Mode pages appear in Internet Explorer 7 Standards Mode. This option results in the greatest compatibility with existing webpages, but newer content written to common Internet standards may be displayed incorrectly. This option matches the default behavior of Internet Explorer. +- If you don't configure this policy setting, Internet Explorer uses an Internet Explorer 7 user agent string (with an additional string appended) for local intranet content. Additionally, all local intranet Standards Mode pages appear in Internet Explorer 7 Standards Mode. This option results in the greatest compatibility with existing webpages, but newer content written to common Internet standards may be displayed incorrectly. This option matches the default behavior of Internet Explorer. @@ -841,13 +826,12 @@ This policy setting controls how Internet Explorer displays local intranet conte | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -874,7 +858,7 @@ This policy setting controls how Internet Explorer displays local intranet conte | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -895,11 +879,11 @@ This template policy setting allows you to configure policy settings in this zon - If you disable this template policy setting, no security level is configured. -- If you do not configure this template policy setting, no security level is configured. +- If you don't configure this template policy setting, no security level is configured. Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate by comparing the settings in the active URL's zone against those in the Locked-Down equivalent zone. If you select a security level for any zone (including selecting no security), the same change should be made to the Locked-Down equivalent. -Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. +Note. It's recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. @@ -911,13 +895,12 @@ Note. It is recommended to configure template policy settings in one Group Polic | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -944,7 +927,7 @@ Note. It is recommended to configure template policy settings in one Group Polic | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -965,11 +948,11 @@ This template policy setting allows you to configure policy settings in this zon - If you disable this template policy setting, no security level is configured. -- If you do not configure this template policy setting, no security level is configured. +- If you don't configure this template policy setting, no security level is configured. Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate by comparing the settings in the active URL's zone against those in the Locked-Down equivalent zone. If you select a security level for any zone (including selecting no security), the same change should be made to the Locked-Down equivalent. -Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. +Note. It's recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. @@ -981,13 +964,12 @@ Note. It is recommended to configure template policy settings in one Group Polic | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1014,7 +996,7 @@ Note. It is recommended to configure template policy settings in one Group Polic | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1035,11 +1017,11 @@ This template policy setting allows you to configure policy settings in this zon - If you disable this template policy setting, no security level is configured. -- If you do not configure this template policy setting, no security level is configured. +- If you don't configure this template policy setting, no security level is configured. Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate by comparing the settings in the active URL's zone against those in the Locked-Down equivalent zone. If you select a security level for any zone (including selecting no security), the same change should be made to the Locked-Down equivalent. -Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. +Note. It's recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. @@ -1051,13 +1033,12 @@ Note. It is recommended to configure template policy settings in one Group Polic | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1084,7 +1065,7 @@ Note. It is recommended to configure template policy settings in one Group Polic | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1105,11 +1086,11 @@ This template policy setting allows you to configure policy settings in this zon - If you disable this template policy setting, no security level is configured. -- If you do not configure this template policy setting, no security level is configured. +- If you don't configure this template policy setting, no security level is configured. Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate by comparing the settings in the active URL's zone against those in the Locked-Down equivalent zone. If you select a security level for any zone (including selecting no security), the same change should be made to the Locked-Down equivalent. -Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. +Note. It's recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. @@ -1121,13 +1102,12 @@ Note. It is recommended to configure template policy settings in one Group Polic | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1154,7 +1134,7 @@ Note. It is recommended to configure template policy settings in one Group Polic | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1175,11 +1155,11 @@ This template policy setting allows you to configure policy settings in this zon - If you disable this template policy setting, no security level is configured. -- If you do not configure this template policy setting, no security level is configured. +- If you don't configure this template policy setting, no security level is configured. Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate by comparing the settings in the active URL's zone against those in the Locked-Down equivalent zone. If you select a security level for any zone (including selecting no security), the same change should be made to the Locked-Down equivalent. -Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. +Note. It's recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. @@ -1191,13 +1171,12 @@ Note. It is recommended to configure template policy settings in one Group Polic | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1224,7 +1203,7 @@ Note. It is recommended to configure template policy settings in one Group Polic | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1245,11 +1224,11 @@ This template policy setting allows you to configure policy settings in this zon - If you disable this template policy setting, no security level is configured. -- If you do not configure this template policy setting, no security level is configured. +- If you don't configure this template policy setting, no security level is configured. Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate by comparing the settings in the active URL's zone against those in the Locked-Down equivalent zone. If you select a security level for any zone (including selecting no security), the same change should be made to the Locked-Down equivalent. -Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. +Note. It's recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. @@ -1261,13 +1240,12 @@ Note. It is recommended to configure template policy settings in one Group Polic | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1294,7 +1272,7 @@ Note. It is recommended to configure template policy settings in one Group Polic | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1315,11 +1293,11 @@ This template policy setting allows you to configure policy settings in this zon - If you disable this template policy setting, no security level is configured. -- If you do not configure this template policy setting, no security level is configured. +- If you don't configure this template policy setting, no security level is configured. Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate by comparing the settings in the active URL's zone against those in the Locked-Down equivalent zone. If you select a security level for any zone (including selecting no security), the same change should be made to the Locked-Down equivalent. -Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. +Note. It's recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. @@ -1331,13 +1309,12 @@ Note. It is recommended to configure template policy settings in one Group Polic | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1364,7 +1341,7 @@ Note. It is recommended to configure template policy settings in one Group Polic | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1381,9 +1358,9 @@ Note. It is recommended to configure template policy settings in one Group Polic This policy allows the user to go directly to an intranet site for a one-word entry in the Address bar. -- If you enable this policy setting, Internet Explorer goes directly to an intranet site for a one-word entry in the Address bar, if it is available. +- If you enable this policy setting, Internet Explorer goes directly to an intranet site for a one-word entry in the Address bar, if it's available. -- If you disable or do not configure this policy setting, Internet Explorer does not go directly to an intranet site for a one-word entry in the Address bar. +- If you disable or don't configure this policy setting, Internet Explorer doesn't go directly to an intranet site for a one-word entry in the Address bar. @@ -1395,13 +1372,12 @@ This policy allows the user to go directly to an intranet site for a one-word en | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1428,7 +1404,7 @@ This policy allows the user to go directly to an intranet site for a one-word en | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20348] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.1350] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041.789] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20348] and later
    ✅ Windows 10, version 1903 [10.0.18362.1350] and later
    ✅ Windows 10, version 2004 [10.0.19041.789] and later | @@ -1447,7 +1423,7 @@ This policy setting allows admins to enable "Save Target As" context menu in Int - If you enable this policy, "Save Target As" will show up in the Internet Explorer mode context menu and work the same as Internet Explorer. -- If you disable or do not configure this policy setting, "Save Target As" will not show up in the Internet Explorer mode context menu. +- If you disable or don't configure this policy setting, "Save Target As" won't show up in the Internet Explorer mode context menu. For more information, see @@ -1461,13 +1437,12 @@ For more information, see | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1508,7 +1483,7 @@ For more information, see | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1525,15 +1500,15 @@ For more information, see This policy setting allows you to manage a list of sites that you want to associate with a particular security zone. These zone numbers have associated security settings that apply to all of the sites in the zone. -Internet Explorer has 4 security zones, numbered 1-4, and these are used by this policy setting to associate sites to zones. They are: (1) Intranet zone, (2) Trusted Sites zone, (3) Internet zone, and (4) Restricted Sites zone. Security settings can be set for each of these zones through other policy settings, and their default settings are: Trusted Sites zone (Low template), Intranet zone (Medium-Low template), Internet zone (Medium template), and Restricted Sites zone (High template). (The Local Machine zone and its locked down equivalent have special security settings that protect your local computer.) +Internet Explorer has 4 security zones, numbered 1-4, and these are used by this policy setting to associate sites to zones. They are: (1) Intranet zone, (2) Trusted Sites zone, (3) Internet zone, and (4) Restricted Sites zone. Security settings can be set for each of these zones through other policy settings, and their default settings are: Trusted Sites zone (Low template), Intranet zone (Medium-Low template), Internet zone (Medium template), and Restricted Sites zone (High template). (The Local Machine zone and its locked down equivalent have special security settings that protect your local computer). - If you enable this policy setting, you can enter a list of sites and their related zone numbers. The association of a site with a zone will ensure that the security settings for the specified zone are applied to the site. For each entry that you add to the list, enter the following information: -Valuename - A host for an intranet site, or a fully qualified domain name for other sites. The valuename may also include a specific protocol. For example, if you enter as the valuename, other protocols are not affected. If you enter just www.contoso.com, then all protocols are affected for that site, including http, https, ftp, and so on. The site may also be expressed as an IP address (e.g., 127.0.0.1) or range (e.g., 127.0.0.1-10). To avoid creating conflicting policies, do not include additional characters after the domain such as trailing slashes or URL path. For example, policy settings for www.contoso.com and www.contoso.com/mail would be treated as the same policy setting by Internet Explorer, and would therefore be in conflict. +Valuename - A host for an intranet site, or a fully qualified domain name for other sites. The valuename may also include a specific protocol. For example, if you enter as the valuename, other protocols aren't affected. If you enter just www.contoso.com, then all protocols are affected for that site, including http, https, ftp, and so on. The site may also be expressed as an IP address (e.g., 127.0.0.1) or range (e.g., 127.0.0.1-10). To avoid creating conflicting policies, don't include additional characters after the domain such as trailing slashes or URL path. For example, policy settings for www.contoso.com and www.contoso.com/mail would be treated as the same policy setting by Internet Explorer, and would therefore be in conflict. Value - A number indicating the zone with which this site should be associated for security settings. The Internet Explorer zones described above are 1-4. -- If you disable or do not configure this policy, users may choose their own site-to-zone assignments. +- If you disable or don't configure this policy, users may choose their own site-to-zone assignments. @@ -1547,13 +1522,12 @@ Value - A number indicating the zone with which this site should be associated f | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1606,7 +1580,7 @@ Value and index pairs in the SyncML example: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1627,11 +1601,11 @@ This template policy setting allows you to configure policy settings in this zon - If you disable this template policy setting, no security level is configured. -- If you do not configure this template policy setting, no security level is configured. +- If you don't configure this template policy setting, no security level is configured. Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate by comparing the settings in the active URL's zone against those in the Locked-Down equivalent zone. If you select a security level for any zone (including selecting no security), the same change should be made to the Locked-Down equivalent. -Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. +Note. It's recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. @@ -1643,13 +1617,12 @@ Note. It is recommended to configure template policy settings in one Group Polic | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1676,7 +1649,7 @@ Note. It is recommended to configure template policy settings in one Group Polic | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1695,9 +1668,9 @@ This policy setting allows you to manage whether software, such as ActiveX contr - If you enable this policy setting, users will be prompted to install or run files with an invalid signature. -- If you disable this policy setting, users cannot run or install files with an invalid signature. +- If you disable this policy setting, users can't run or install files with an invalid signature. -- If you do not configure this policy, users can choose to run or install files with an invalid signature. +- If you don't configure this policy, users can choose to run or install files with an invalid signature. @@ -1709,13 +1682,12 @@ This policy setting allows you to manage whether software, such as ActiveX contr | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1742,7 +1714,7 @@ This policy setting allows you to manage whether software, such as ActiveX contr | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1763,11 +1735,11 @@ This template policy setting allows you to configure policy settings in this zon - If you disable this template policy setting, no security level is configured. -- If you do not configure this template policy setting, no security level is configured. +- If you don't configure this template policy setting, no security level is configured. Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate by comparing the settings in the active URL's zone against those in the Locked-Down equivalent zone. If you select a security level for any zone (including selecting no security), the same change should be made to the Locked-Down equivalent. -Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. +Note. It's recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. @@ -1779,13 +1751,12 @@ Note. It is recommended to configure template policy settings in one Group Polic | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1812,7 +1783,7 @@ Note. It is recommended to configure template policy settings in one Group Polic | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1829,11 +1800,11 @@ Note. It is recommended to configure template policy settings in one Group Polic This policy setting controls the Suggested Sites feature, which recommends websites based on the user's browsing activity. Suggested Sites reports a user's browsing history to Microsoft to suggest sites that the user might want to visit. -- If you enable this policy setting, the user is not prompted to enable Suggested Sites. The user's browsing history is sent to Microsoft to produce suggestions. +- If you enable this policy setting, the user isn't prompted to enable Suggested Sites. The user's browsing history is sent to Microsoft to produce suggestions. - If you disable this policy setting, the entry points and functionality associated with this feature are turned off. -- If you do not configure this policy setting, the user can turn on and turn off the Suggested Sites feature. +- If you don't configure this policy setting, the user can turn on and turn off the Suggested Sites feature. @@ -1845,13 +1816,12 @@ This policy setting controls the Suggested Sites feature, which recommends websi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1878,7 +1848,7 @@ This policy setting controls the Suggested Sites feature, which recommends websi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1899,11 +1869,11 @@ This template policy setting allows you to configure policy settings in this zon - If you disable this template policy setting, no security level is configured. -- If you do not configure this template policy setting, no security level is configured. +- If you don't configure this template policy setting, no security level is configured. Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate by comparing the settings in the active URL's zone against those in the Locked-Down equivalent zone. If you select a security level for any zone (including selecting no security), the same change should be made to the Locked-Down equivalent. -Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. +Note. It's recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. @@ -1915,13 +1885,12 @@ Note. It is recommended to configure template policy settings in one Group Polic | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1948,7 +1917,7 @@ Note. It is recommended to configure template policy settings in one Group Polic | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1963,13 +1932,13 @@ Note. It is recommended to configure template policy settings in one Group Polic -This policy setting allows you to manage whether Internet Explorer will check revocation status of servers' certificates. Certificates are revoked when they have been compromised or are no longer valid, and this option protects users from submitting confidential data to a site that may be fraudulent or not secure. +This policy setting allows you to manage whether Internet Explorer will check revocation status of servers' certificates. Certificates are revoked when they've been compromised or are no longer valid, and this option protects users from submitting confidential data to a site that may be fraudulent or not secure. - If you enable this policy setting, Internet Explorer will check to see if server certificates have been revoked. -- If you disable this policy setting, Internet Explorer will not check server certificates to see if they have been revoked. +- If you disable this policy setting, Internet Explorer won't check server certificates to see if they've been revoked. -- If you do not configure this policy setting, Internet Explorer will not check server certificates to see if they have been revoked. +- If you don't configure this policy setting, Internet Explorer won't check server certificates to see if they've been revoked. @@ -1981,13 +1950,12 @@ This policy setting allows you to manage whether Internet Explorer will check re | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2014,7 +1982,7 @@ This policy setting allows you to manage whether Internet Explorer will check re | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2033,9 +2001,9 @@ This policy setting allows you to manage whether Internet Explorer checks for di - If you enable this policy setting, Internet Explorer will check the digital signatures of executable programs and display their identities before downloading them to user computers. -- If you disable this policy setting, Internet Explorer will not check the digital signatures of executable programs or display their identities before downloading them to user computers. +- If you disable this policy setting, Internet Explorer won't check the digital signatures of executable programs or display their identities before downloading them to user computers. -- If you do not configure this policy, Internet Explorer will not check the digital signatures of executable programs or display their identities before downloading them to user computers. +- If you don't configure this policy, Internet Explorer won't check the digital signatures of executable programs or display their identities before downloading them to user computers. @@ -2047,13 +2015,12 @@ This policy setting allows you to manage whether Internet Explorer checks for di | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2080,7 +2047,7 @@ This policy setting allows you to manage whether Internet Explorer checks for di | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20348] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.1350] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041.789] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20348] and later
    ✅ Windows 10, version 1903 [10.0.18362.1350] and later
    ✅ Windows 10, version 2004 [10.0.19041.789] and later | @@ -2095,24 +2062,30 @@ This policy setting allows you to manage whether Internet Explorer checks for di -Enables you to configure up to three versions of Microsoft Edge to open a redirected site (in order of preference). Use this policy if your environment is configured to redirect sites from Internet Explorer 11 to Microsoft Edge. If any of the chosen versions are not installed on the device, that preference will be bypassed. +Enables you to configure up to three versions of Microsoft Edge to open a redirected site (in order of preference). Use this policy if your environment is configured to redirect sites from Internet Explorer 11 to Microsoft Edge. If any of the chosen versions aren't installed on the device, that preference will be bypassed. If both the Windows Update for the next version of Microsoft Edge* and Microsoft Edge Stable channel are installed, the following behaviors occur: - - If you disable or don't configure this policy, Microsoft Edge Stable channel is used. This is the default behavior. - - If you enable this policy, you can configure redirected sites to open in up to three of the following channels where: + +- If you disable or don't configure this policy, Microsoft Edge Stable channel is used. This is the default behavior. + +- If you enable this policy, you can configure redirected sites to open in up to three of the following channels where: + 1 = Microsoft Edge Stable 2 = Microsoft Edge Beta version 77 or later 3 = Microsoft Edge Dev version 77 or later -4 = Microsoft Edge Canary version 77 or later +4 = Microsoft Edge Canary version 77 or later. + +If the Windows Update for the next version of Microsoft Edge* or Microsoft Edge Stable channel aren't installed, the following behaviors occur: + +- If you disable or don't configure this policy, Microsoft Edge version 45 or earlier is automatically used. This is the default behavior. + +- If you enable this policy, you can configure redirected sites to open in up to three of the following channels where: -If the Windows Update for the next version of Microsoft Edge* or Microsoft Edge Stable channel are not installed, the following behaviors occur: - - If you disable or don't configure this policy, Microsoft Edge version 45 or earlier is automatically used. This is the default behavior. - - If you enable this policy, you can configure redirected sites to open in up to three of the following channels where: 0 = Microsoft Edge version 45 or earlier 1 = Microsoft Edge Stable 2 = Microsoft Edge Beta version 77 or later 3 = Microsoft Edge Dev version 77 or later -4 = Microsoft Edge Canary version 77 or later +4 = Microsoft Edge Canary version 77 or later. - For more information about the Windows update for the next version of Microsoft Edge including how to disable it, see< https://go.microsoft.com/fwlink/?linkid=2102115>. This update applies only to Windows 10 version 1709 and higher. @@ -2126,13 +2099,12 @@ If the Windows Update for the next version of Microsoft Edge* or Microsoft Edge | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2365,7 +2337,7 @@ If the Windows Update for the next version of Microsoft Edge* or Microsoft Edge | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2386,9 +2358,9 @@ This policy setting determines whether Internet Explorer requires that all file- - If you enable this policy setting, Internet Explorer requires consistent MIME data for all received files. -- If you disable this policy setting, Internet Explorer will not require consistent MIME data for all received files. +- If you disable this policy setting, Internet Explorer won't require consistent MIME data for all received files. -- If you do not configure this policy setting, Internet Explorer requires consistent MIME data for all received files. +- If you don't configure this policy setting, Internet Explorer requires consistent MIME data for all received files. @@ -2400,13 +2372,12 @@ This policy setting determines whether Internet Explorer requires that all file- | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2432,7 +2403,7 @@ This policy setting determines whether Internet Explorer requires that all file- | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -2461,13 +2432,12 @@ For more information, see "Out-of-date ActiveX control blocking" in the Internet | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2494,7 +2464,7 @@ For more information, see "Out-of-date ActiveX control blocking" in the Internet | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -2513,7 +2483,7 @@ This policy setting determines whether the user can bypass warnings from SmartSc - If you enable this policy setting, SmartScreen Filter warnings block the user. -- If you disable or do not configure this policy setting, the user can bypass SmartScreen Filter warnings. +- If you disable or don't configure this policy setting, the user can bypass SmartScreen Filter warnings. @@ -2525,13 +2495,12 @@ This policy setting determines whether the user can bypass warnings from SmartSc | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2558,7 +2527,7 @@ This policy setting determines whether the user can bypass warnings from SmartSc | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -2573,11 +2542,11 @@ This policy setting determines whether the user can bypass warnings from SmartSc -This policy setting determines whether the user can bypass warnings from SmartScreen Filter. SmartScreen Filter warns the user about executable files that Internet Explorer users do not commonly download from the Internet. +This policy setting determines whether the user can bypass warnings from SmartScreen Filter. SmartScreen Filter warns the user about executable files that Internet Explorer users don't commonly download from the Internet. - If you enable this policy setting, SmartScreen Filter warnings block the user. -- If you disable or do not configure this policy setting, the user can bypass SmartScreen Filter warnings. +- If you disable or don't configure this policy setting, the user can bypass SmartScreen Filter warnings. @@ -2589,13 +2558,12 @@ This policy setting determines whether the user can bypass warnings from SmartSc | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2622,7 +2590,7 @@ This policy setting determines whether the user can bypass warnings from SmartSc | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -2639,9 +2607,9 @@ This policy setting determines whether the user can bypass warnings from SmartSc This policy setting controls the Compatibility View feature, which allows the user to fix website display problems that he or she may encounter while browsing. -- If you enable this policy setting, the user cannot use the Compatibility View button or manage the Compatibility View sites list. +- If you enable this policy setting, the user can't use the Compatibility View button or manage the Compatibility View sites list. -- If you disable or do not configure this policy setting, the user can use the Compatibility View button and manage the Compatibility View sites list. +- If you disable or don't configure this policy setting, the user can use the Compatibility View button and manage the Compatibility View sites list. @@ -2653,13 +2621,12 @@ This policy setting controls the Compatibility View feature, which allows the us | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2686,7 +2653,7 @@ This policy setting controls the Compatibility View feature, which allows the us | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2703,9 +2670,9 @@ This policy setting controls the Compatibility View feature, which allows the us This setting specifies the number of days that Internet Explorer tracks views of pages in the History List. To access the Temporary Internet Files and History Settings dialog box, from the Menu bar, on the Tools menu, click Internet Options, click the General tab, and then click Settings under Browsing history. -- If you enable this policy setting, a user cannot set the number of days that Internet Explorer tracks views of the pages in the History List. You must specify the number of days that Internet Explorer tracks views of pages in the History List. Users can not delete browsing history. +- If you enable this policy setting, a user can't set the number of days that Internet Explorer tracks views of the pages in the History List. You must specify the number of days that Internet Explorer tracks views of pages in the History List. Users can't delete browsing history. -- If you disable or do not configure this policy setting, a user can set the number of days that Internet Explorer tracks views of pages in the History list. Users can delete browsing history. +- If you disable or don't configure this policy setting, a user can set the number of days that Internet Explorer tracks views of pages in the History list. Users can delete browsing history. @@ -2717,13 +2684,12 @@ This setting specifies the number of days that Internet Explorer tracks views of | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2750,7 +2716,7 @@ This setting specifies the number of days that Internet Explorer tracks views of | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2769,7 +2735,7 @@ This policy setting allows you to manage the crash detection feature of add-on M - If you enable this policy setting, a crash in Internet Explorer will exhibit behavior found in Windows XP Professional Service Pack 1 and earlier, namely to invoke Windows Error Reporting. All policy settings for Windows Error Reporting continue to apply. -- If you disable or do not configure this policy setting, the crash detection feature for add-on management will be functional. +- If you disable or don't configure this policy setting, the crash detection feature for add-on management will be functional. @@ -2781,13 +2747,12 @@ This policy setting allows you to manage the crash detection feature of add-on M | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2814,7 +2779,7 @@ This policy setting allows you to manage the crash detection feature of add-on M | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -2831,11 +2796,11 @@ This policy setting allows you to manage the crash detection feature of add-on M This policy setting prevents the user from participating in the Customer Experience Improvement Program (CEIP). -- If you enable this policy setting, the user cannot participate in the CEIP, and the Customer Feedback Options command does not appear on the Help menu. +- If you enable this policy setting, the user can't participate in the CEIP, and the Customer Feedback Options command doesn't appear on the Help menu. -- If you disable this policy setting, the user must participate in the CEIP, and the Customer Feedback Options command does not appear on the Help menu. +- If you disable this policy setting, the user must participate in the CEIP, and the Customer Feedback Options command doesn't appear on the Help menu. -- If you do not configure this policy setting, the user can choose to participate in the CEIP. +- If you don't configure this policy setting, the user can choose to participate in the CEIP. @@ -2847,13 +2812,12 @@ This policy setting prevents the user from participating in the Customer Experie | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2880,7 +2844,7 @@ This policy setting prevents the user from participating in the Customer Experie | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2901,7 +2865,7 @@ This policy setting prevents the user from deleting the history of websites that - If you disable this policy setting, websites that the user has visited are deleted when he or she clicks Delete. -- If you do not configure this policy setting, the user can choose whether to delete or preserve visited websites when he or she clicks Delete. +- If you don't configure this policy setting, the user can choose whether to delete or preserve visited websites when he or she clicks Delete. If the "Prevent access to Delete Browsing History" policy setting is enabled, this policy setting is enabled by default. @@ -2915,13 +2879,12 @@ If the "Prevent access to Delete Browsing History" policy setting is enabled, th | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -2948,7 +2911,7 @@ If the "Prevent access to Delete Browsing History" policy setting is enabled, th | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -2965,9 +2928,9 @@ If the "Prevent access to Delete Browsing History" policy setting is enabled, th This policy setting prevents the user from having enclosures (file attachments) downloaded from a feed to the user's computer. -- If you enable this policy setting, the user cannot set the Feed Sync Engine to download an enclosure through the Feed property page. A developer cannot change the download setting through the Feed APIs. +- If you enable this policy setting, the user can't set the Feed Sync Engine to download an enclosure through the Feed property page. A developer can't change the download setting through the Feed APIs. -- If you disable or do not configure this policy setting, the user can set the Feed Sync Engine to download an enclosure through the Feed property page. A developer can change the download setting through the Feed APIs. +- If you disable or don't configure this policy setting, the user can set the Feed Sync Engine to download an enclosure through the Feed property page. A developer can change the download setting through the Feed APIs. @@ -2979,13 +2942,12 @@ This policy setting prevents the user from having enclosures (file attachments) | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3012,7 +2974,7 @@ This policy setting prevents the user from having enclosures (file attachments) | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -3029,9 +2991,9 @@ This policy setting prevents the user from having enclosures (file attachments) This policy setting allows you to turn off support for Transport Layer Security (TLS) 1.0, TLS 1.1, TLS 1.2, Secure Sockets Layer (SSL) 2.0, or SSL 3.0 in the browser. TLS and SSL are protocols that help protect communication between the browser and the target server. When the browser attempts to set up a protected communication with the target server, the browser and server negotiate which protocol and version to use. The browser and server attempt to match each other's list of supported protocols and versions, and they select the most preferred match. -- If you enable this policy setting, the browser negotiates or does not negotiate an encryption tunnel by using the encryption methods that you select from the drop-down list. +- If you enable this policy setting, the browser negotiates or doesn't negotiate an encryption tunnel by using the encryption methods that you select from the drop-down list. -- If you disable or do not configure this policy setting, the user can select which encryption method the browser supports. +- If you disable or don't configure this policy setting, the user can select which encryption method the browser supports. > [!NOTE] > SSL 2.0 is off by default and is no longer supported starting with Windows 10 Version 1607. SSL 2.0 is an outdated security protocol, and enabling SSL 2.0 impairs the performance and functionality of TLS 1.0. @@ -3046,13 +3008,12 @@ This policy setting allows you to turn off support for Transport Layer Security | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3078,7 +3039,7 @@ This policy setting allows you to turn off support for Transport Layer Security | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -3097,7 +3058,7 @@ This policy setting controls whether to have background synchronization for feed - If you enable this policy setting, the ability to synchronize feeds and Web Slices in the background is turned off. -- If you disable or do not configure this policy setting, the user can synchronize feeds and Web Slices in the background. +- If you disable or don't configure this policy setting, the user can synchronize feeds and Web Slices in the background. @@ -3109,13 +3070,12 @@ This policy setting controls whether to have background synchronization for feed | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3142,7 +3102,7 @@ This policy setting controls whether to have background synchronization for feed | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -3160,12 +3120,14 @@ This policy setting controls whether to have background synchronization for feed This policy setting prevents Internet Explorer from running the First Run wizard the first time a user starts the browser after installing Internet Explorer or Windows. - If you enable this policy setting, you must make one of the following choices: - - Skip the First Run wizard, and go directly to the user's home page. - - Skip the First Run wizard, and go directly to the "Welcome to Internet Explorer" webpage. -Starting with Windows 8, the "Welcome to Internet Explorer" webpage is not available. The user's home page will display regardless of which option is chosen. +- Skip the First Run wizard, and go directly to the user's home page. -- If you disable or do not configure this policy setting, Internet Explorer may run the First Run wizard the first time the browser is started after installation. +- Skip the First Run wizard, and go directly to the "Welcome to Internet Explorer" webpage. + +Starting with Windows 8, the "Welcome to Internet Explorer" webpage isn't available. The user's home page will display regardless of which option is chosen. + +- If you disable or don't configure this policy setting, Internet Explorer may run the First Run wizard the first time the browser is started after installation. @@ -3177,13 +3139,12 @@ Starting with Windows 8, the "Welcome to Internet Explorer" webpage is not avail | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3209,7 +3170,7 @@ Starting with Windows 8, the "Welcome to Internet Explorer" webpage is not avail | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -3244,13 +3205,12 @@ Microsoft collects your browsing history to improve how flip ahead with page pre | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3277,7 +3237,7 @@ Microsoft collects your browsing history to improve how flip ahead with page pre | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -3298,7 +3258,7 @@ This policy setting allows you to disable browser geolocation support. This will - If you disable this policy setting, browser geolocation support is turned on. -- If you do not configure this policy setting, browser geolocation support can be turned on or off in Internet Options on the Privacy tab. +- If you don't configure this policy setting, browser geolocation support can be turned on or off in Internet Options on the Privacy tab. @@ -3310,13 +3270,12 @@ This policy setting allows you to disable browser geolocation support. This will | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3343,7 +3302,7 @@ This policy setting allows you to disable browser geolocation support. This will | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -3354,11 +3313,11 @@ This policy setting allows you to disable browser geolocation support. This will -The Home page specified on the General tab of the Internet Options dialog box is the default Web page that Internet Explorer loads whenever it is run. +The Home page specified on the General tab of the Internet Options dialog box is the default Web page that Internet Explorer loads whenever it's run. -- If you enable this policy setting, a user cannot set a custom default home page. You must specify which default home page should load on the user machine. For machines with at least Internet Explorer 7, the home page can be set within this policy to override other home page policies. +- If you enable this policy setting, a user can't set a custom default home page. You must specify which default home page should load on the user machine. For machines with at least Internet Explorer 7, the home page can be set within this policy to override other home page policies. -- If you disable or do not configure this policy setting, the Home page box is enabled and users can choose their own home page. +- If you disable or don't configure this policy setting, the Home page box is enabled and users can choose their own home page. @@ -3370,13 +3329,12 @@ The Home page specified on the General tab of the Internet Options dialog box is | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3403,7 +3361,7 @@ The Home page specified on the General tab of the Internet Options dialog box is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20348.1060] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.3460] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041.2060] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.1030] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20348.1060] and later
    ✅ Windows 10, version 1809 [10.0.17763.3460] and later
    ✅ Windows 10, version 2004 [10.0.19041.2060] and later
    ✅ Windows 11, version 21H2 [10.0.22000.1030] and later
    ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -3422,7 +3380,7 @@ This policy setting specifies if running the HTML Application (HTA file) is bloc - If you enable this policy setting, running the HTML Application (HTA file) will be blocked. -- If you disable or do not configure this policy setting, running the HTML Application (HTA file) is allowed. +- If you disable or don't configure this policy setting, running the HTML Application (HTA file) is allowed. @@ -3434,13 +3392,12 @@ This policy setting specifies if running the HTML Application (HTA file) is bloc | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3467,7 +3424,7 @@ This policy setting specifies if running the HTML Application (HTA file) is bloc | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -3484,9 +3441,9 @@ This policy setting specifies if running the HTML Application (HTA file) is bloc This policy setting prevents the user from ignoring Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificate errors that interrupt browsing (such as "expired", "revoked", or "name mismatch" errors) in Internet Explorer. -- If you enable this policy setting, the user cannot continue browsing. +- If you enable this policy setting, the user can't continue browsing. -- If you disable or do not configure this policy setting, the user can choose to ignore certificate errors and continue browsing. +- If you disable or don't configure this policy setting, the user can choose to ignore certificate errors and continue browsing. @@ -3498,13 +3455,12 @@ This policy setting prevents the user from ignoring Secure Sockets Layer/Transpo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3531,7 +3487,7 @@ This policy setting prevents the user from ignoring Secure Sockets Layer/Transpo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -3554,7 +3510,7 @@ InPrivate Browsing prevents Internet Explorer from storing data about a user's b - If you disable this policy setting, InPrivate Browsing is available for use. -- If you do not configure this policy setting, InPrivate Browsing can be turned on or off through the registry. +- If you don't configure this policy setting, InPrivate Browsing can be turned on or off through the registry. @@ -3566,13 +3522,12 @@ InPrivate Browsing prevents Internet Explorer from storing data about a user's b | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3599,7 +3554,7 @@ InPrivate Browsing prevents Internet Explorer from storing data about a user's b | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20348] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.1350] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041.789] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20348] and later
    ✅ Windows 10, version 1903 [10.0.18362.1350] and later
    ✅ Windows 10, version 2004 [10.0.19041.789] and later | @@ -3617,10 +3572,14 @@ InPrivate Browsing prevents Internet Explorer from storing data about a user's b This policy lets you restrict launching of Internet Explorer as a standalone browser. If you enable this policy, it: - - Prevents Internet Explorer 11 from launching as a standalone browser. - - Restricts Internet Explorer's usage to Microsoft Edge's native 'Internet Explorer mode'. - - Redirects all attempts at launching Internet Explorer 11 to Microsoft Edge Stable Channel browser. - - Overrides any other policies that redirect to Internet Explorer 11. + +- Prevents Internet Explorer 11 from launching as a standalone browser. + +- Restricts Internet Explorer's usage to Microsoft Edge's native 'Internet Explorer mode'. + +- Redirects all attempts at launching Internet Explorer 11 to Microsoft Edge Stable Channel browser. + +- Overrides any other policies that redirect to Internet Explorer 11. If you disable, or don't configure this policy, all sites are opened using the current active browser settings. @@ -3637,13 +3596,12 @@ If you disable, or don't configure this policy, all sites are opened using the c | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3692,7 +3650,7 @@ If you disable, or don't configure this policy, all sites are opened using the c | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -3728,13 +3686,12 @@ This policy setting determines whether Internet Explorer 11 uses 64-bit processe | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3761,7 +3718,7 @@ This policy setting determines whether Internet Explorer 11 uses 64-bit processe | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -3778,9 +3735,9 @@ This policy setting determines whether Internet Explorer 11 uses 64-bit processe This policy setting specifies if a user can change proxy settings. -- If you enable this policy setting, the user will not be able to configure proxy settings. +- If you enable this policy setting, the user won't be able to configure proxy settings. -- If you disable or do not configure this policy setting, the user can configure proxy settings. +- If you disable or don't configure this policy setting, the user can configure proxy settings. @@ -3792,13 +3749,12 @@ This policy setting specifies if a user can change proxy settings. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3825,7 +3781,7 @@ This policy setting specifies if a user can change proxy settings. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -3842,9 +3798,9 @@ This policy setting specifies if a user can change proxy settings. This policy setting prevents the user from changing the default search provider for the Address bar and the toolbar Search box. -- If you enable this policy setting, the user cannot change the default search provider. +- If you enable this policy setting, the user can't change the default search provider. -- If you disable or do not configure this policy setting, the user can change the default search provider. +- If you disable or don't configure this policy setting, the user can change the default search provider. @@ -3856,13 +3812,12 @@ This policy setting prevents the user from changing the default search provider | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3889,7 +3844,7 @@ This policy setting prevents the user from changing the default search provider | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -3906,12 +3861,12 @@ This policy setting prevents the user from changing the default search provider Secondary home pages are the default Web pages that Internet Explorer loads in separate tabs from the home page whenever the browser is run. This policy setting allows you to set default secondary home pages. -- If you enable this policy setting, you can specify which default home pages should load as secondary home pages. The user cannot set custom default secondary home pages. +- If you enable this policy setting, you can specify which default home pages should load as secondary home pages. The user can't set custom default secondary home pages. -- If you disable or do not configure this policy setting, the user can add secondary home pages. +- If you disable or don't configure this policy setting, the user can add secondary home pages. > [!NOTE] -> If the "Disable Changing Home Page Settings" policy is enabled, the user cannot add secondary home pages. +> If the "Disable Changing Home Page Settings" policy is enabled, the user can't add secondary home pages. @@ -3923,13 +3878,12 @@ Secondary home pages are the default Web pages that Internet Explorer loads in s | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -3955,7 +3909,7 @@ Secondary home pages are the default Web pages that Internet Explorer loads in s | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -3974,7 +3928,7 @@ This policy setting turns off the Security Settings Check feature, which checks - If you enable this policy setting, the feature is turned off. -- If you disable or do not configure this policy setting, the feature is turned on. +- If you disable or don't configure this policy setting, the feature is turned on. @@ -3986,13 +3940,12 @@ This policy setting turns off the Security Settings Check feature, which checks | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4019,7 +3972,7 @@ This policy setting turns off the Security Settings Check feature, which checks | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -4032,9 +3985,9 @@ This policy setting turns off the Security Settings Check feature, which checks Prevents Internet Explorer from checking whether a new version of the browser is available. -- If you enable this policy, it prevents Internet Explorer from checking to see whether it is the latest available browser version and notifying users if a new version is available. +- If you enable this policy, it prevents Internet Explorer from checking to see whether it's the latest available browser version and notifying users if a new version is available. -- If you disable this policy or do not configure it, Internet Explorer checks every 30 days by default, and then notifies users if a new version is available. +- If you disable this policy or don't configure it, Internet Explorer checks every 30 days by default, and then notifies users if a new version is available. This policy is intended to help the administrator maintain version control for Internet Explorer by preventing users from being notified about new versions of the browser. @@ -4048,13 +4001,12 @@ This policy is intended to help the administrator maintain version control for I | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4081,7 +4033,7 @@ This policy is intended to help the administrator maintain version control for I | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -4098,11 +4050,11 @@ This policy is intended to help the administrator maintain version control for I This AutoComplete feature suggests possible matches when users are entering Web addresses in the browser address bar. -- If you enable this policy setting, user will not be suggested matches when entering Web addresses. The user cannot change the auto-complete for web-address setting. +- If you enable this policy setting, user won't be suggested matches when entering Web addresses. The user can't change the auto-complete for web-address setting. -- If you disable this policy setting, user will be suggested matches when entering Web addresses. The user cannot change the auto-complete for web-address setting. +- If you disable this policy setting, user will be suggested matches when entering Web addresses. The user can't change the auto-complete for web-address setting. -- If you do not configure this policy setting, a user will have the freedom to choose to turn the auto-complete setting for web-addresses on or off. +- If you don't configure this policy setting, a user will have the freedom to choose to turn the auto-complete setting for web-addresses on or off. @@ -4114,13 +4066,12 @@ This AutoComplete feature suggests possible matches when users are entering Web | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4147,7 +4098,7 @@ This AutoComplete feature suggests possible matches when users are entering Web | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -4162,15 +4113,15 @@ This AutoComplete feature suggests possible matches when users are entering Web -This policy setting prevents ActiveX controls from running in Protected Mode when Enhanced Protected Mode is enabled. When a user has an ActiveX control installed that is not compatible with Enhanced Protected Mode and a website attempts to load the control, Internet Explorer notifies the user and gives the option to run the website in regular Protected Mode. This policy setting disables this notification and forces all websites to run in Enhanced Protected Mode. +This policy setting prevents ActiveX controls from running in Protected Mode when Enhanced Protected Mode is enabled. When a user has an ActiveX control installed that isn't compatible with Enhanced Protected Mode and a website attempts to load the control, Internet Explorer notifies the user and gives the option to run the website in regular Protected Mode. This policy setting disables this notification and forces all websites to run in Enhanced Protected Mode. Enhanced Protected Mode provides additional protection against malicious websites by using 64-bit processes on 64-bit versions of Windows. For computers running at least Windows 8, Enhanced Protected Mode also limits the locations Internet Explorer can read from in the registry and the file system. -When Enhanced Protected Mode is enabled, and a user encounters a website that attempts to load an ActiveX control that is not compatible with Enhanced Protected Mode, Internet Explorer notifies the user and gives the option to disable Enhanced Protected Mode for that particular website. +When Enhanced Protected Mode is enabled, and a user encounters a website that attempts to load an ActiveX control that isn't compatible with Enhanced Protected Mode, Internet Explorer notifies the user and gives the option to disable Enhanced Protected Mode for that particular website. -- If you enable this policy setting, Internet Explorer will not give the user the option to disable Enhanced Protected Mode. All Protected Mode websites will run in Enhanced Protected Mode. +- If you enable this policy setting, Internet Explorer won't give the user the option to disable Enhanced Protected Mode. All Protected Mode websites will run in Enhanced Protected Mode. -- If you disable or do not configure this policy setting, Internet Explorer notifies users and provides an option to run websites with incompatible ActiveX controls in regular Protected Mode. This is the default behavior. +- If you disable or don't configure this policy setting, Internet Explorer notifies users and provides an option to run websites with incompatible ActiveX controls in regular Protected Mode. This is the default behavior. @@ -4182,13 +4133,12 @@ When Enhanced Protected Mode is enabled, and a user encounters a website that at | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4215,7 +4165,7 @@ When Enhanced Protected Mode is enabled, and a user encounters a website that at | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -4228,14 +4178,14 @@ When Enhanced Protected Mode is enabled, and a user encounters a website that at Prevents users from adding or removing sites from security zones. A security zone is a group of Web sites with the same security level. -- If you enable this policy, the site management settings for security zones are disabled. (To see the site management settings for security zones, in the Internet Options dialog box, click the Security tab, and then click the Sites button.) +- If you enable this policy, the site management settings for security zones are disabled. (To see the site management settings for security zones, in the Internet Options dialog box, click the Security tab, and then click the Sites button). -- If you disable this policy or do not configure it, users can add Web sites to or remove sites from the Trusted Sites and Restricted Sites zones, and alter settings for the Local Intranet zone. +- If you disable this policy or don't configure it, users can add Web sites to or remove sites from the Trusted Sites and Restricted Sites zones, and alter settings for the Local Intranet zone. This policy prevents users from changing site management settings for security zones established by the administrator. > [!NOTE] -> The "Disable the Security page" policy (located in \User Configuration\Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel), which removes the Security tab from the interface, takes precedence over this policy. If it is enabled, this policy is ignored. +> The "Disable the Security page" policy (located in \User Configuration\Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel), which removes the Security tab from the interface, takes precedence over this policy. If it's enabled, this policy is ignored. Also, see the "Security zones: Use only machine settings" policy. @@ -4249,13 +4199,12 @@ Also, see the "Security zones: Use only machine settings" policy. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4282,7 +4231,7 @@ Also, see the "Security zones: Use only machine settings" policy. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -4297,12 +4246,12 @@ Prevents users from changing security zone settings. A security zone is a group - If you enable this policy, the Custom Level button and security-level slider on the Security tab in the Internet Options dialog box are disabled. -- If you disable this policy or do not configure it, users can change the settings for security zones. +- If you disable this policy or don't configure it, users can change the settings for security zones. This policy prevents users from changing security zone settings established by the administrator. > [!NOTE] -> The "Disable the Security page" policy (located in \User Configuration\Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel), which removes the Security tab from Internet Explorer in Control Panel, takes precedence over this policy. If it is enabled, this policy is ignored. +> The "Disable the Security page" policy (located in \User Configuration\Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel), which removes the Security tab from Internet Explorer in Control Panel, takes precedence over this policy. If it's enabled, this policy is ignored. Also, see the "Security zones: Use only machine settings" policy. @@ -4316,13 +4265,12 @@ Also, see the "Security zones: Use only machine settings" policy. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4349,7 +4297,7 @@ Also, see the "Security zones: Use only machine settings" policy. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -4382,13 +4330,12 @@ For more information, see "Outdated ActiveX Controls" in the Internet Explorer T | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4415,7 +4362,7 @@ For more information, see "Outdated ActiveX Controls" in the Internet Explorer T | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -4435,9 +4382,9 @@ This policy setting allows you to manage a list of domains on which Internet Exp - If you enable this policy setting, you can enter a custom list of domains for which outdated ActiveX controls won't be blocked in Internet Explorer. Each domain entry must be formatted like one of the following: 1. "domain.name. TLD". For example, if you want to include *.contoso.com/*, use "contoso.com" -2. "hostname". For example, if you want to include https://example, use "example" +2. "hostname". For example, if you want to include https://example, use "example". -3. "file:///path/filename.htm". For example, use "file:///C:/Users/contoso/Desktop/index.htm" +3. "file:///path/filename.htm". For example, use "file:///C:/Users/contoso/Desktop/index.htm". - If you disable or don't configure this policy setting, the list is deleted and Internet Explorer continues to block specific outdated ActiveX controls on all domains in the Internet Zone. @@ -4453,13 +4400,12 @@ For more information, see "Outdated ActiveX Controls" in the Internet Explorer T | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4486,7 +4432,7 @@ For more information, see "Outdated ActiveX Controls" in the Internet Explorer T | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20348.143] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.1474] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041.906] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20348.143] and later
    ✅ Windows 10, version 1903 [10.0.18362.1474] and later
    ✅ Windows 10, version 2004 [10.0.19041.906] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4505,7 +4451,7 @@ This policy setting lets admins enable extended Microsoft Edge Internet Explorer If you enable this policy, extended hotkey functionality is enabled in Internet Explorer mode and work the same as Internet Explorer. -If you disable, or don't configure this policy, extended hotkeys will not work in Internet Explorer mode. +If you disable, or don't configure this policy, extended hotkeys won't work in Internet Explorer mode. For more information, see @@ -4519,13 +4465,12 @@ For more information, see | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4552,7 +4497,7 @@ For more information, see | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20348.558] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1566] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.527] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20348.558] and later
    ✅ Windows 10, version 2004 [10.0.19041.1566] and later
    ✅ Windows 11, version 21H2 [10.0.22000.527] and later
    ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -4568,6 +4513,7 @@ For more information, see This setting allows Internet Explorer mode to use the global window list that enables sharing state with other applications. + The setting will take effect only when Internet Explorer 11 is disabled as a standalone browser. - If you enable this policy, Internet Explorer mode will use the global window list. @@ -4587,13 +4533,12 @@ To learn more about disabling Internet Explorer 11 as a standalone browser, see | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4620,7 +4565,7 @@ To learn more about disabling Internet Explorer 11 as a standalone browser, see | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -4635,13 +4580,13 @@ To learn more about disabling Internet Explorer 11 as a standalone browser, see -This policy setting controls whether local sites which are not explicitly mapped into any Security Zone are forced into the local Intranet security zone. +This policy setting controls whether local sites which aren't explicitly mapped into any Security Zone are forced into the local Intranet security zone. -- If you enable this policy setting, local sites which are not explicitly mapped into a zone are considered to be in the Intranet Zone. +- If you enable this policy setting, local sites which aren't explicitly mapped into a zone are considered to be in the Intranet Zone. -- If you disable this policy setting, local sites which are not explicitly mapped into a zone will not be considered to be in the Intranet Zone (so would typically be in the Internet Zone). +- If you disable this policy setting, local sites which aren't explicitly mapped into a zone won't be considered to be in the Intranet Zone (so would typically be in the Internet Zone). -- If you do not configure this policy setting, users choose whether to force local sites into the Intranet Zone. +- If you don't configure this policy setting, users choose whether to force local sites into the Intranet Zone. @@ -4653,13 +4598,12 @@ This policy setting controls whether local sites which are not explicitly mapped | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4686,7 +4630,7 @@ This policy setting controls whether local sites which are not explicitly mapped | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -4705,9 +4649,9 @@ This policy setting controls whether URLs representing UNCs are mapped into the - If you enable this policy setting, all network paths are mapped into the Intranet Zone. -- If you disable this policy setting, network paths are not necessarily mapped into the Intranet Zone (other rules might map one there). +- If you disable this policy setting, network paths aren't necessarily mapped into the Intranet Zone (other rules might map one there). -- If you do not configure this policy setting, users choose whether network paths are mapped into the Intranet Zone. +- If you don't configure this policy setting, users choose whether network paths are mapped into the Intranet Zone. @@ -4719,13 +4663,12 @@ This policy setting controls whether URLs representing UNCs are mapped into the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4752,7 +4695,7 @@ This policy setting controls whether URLs representing UNCs are mapped into the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -4771,9 +4714,9 @@ This policy setting allows you to manage whether Internet Explorer can access da - If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. -- If you disable this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. +- If you disable this policy setting, users can't load a page in the zone that uses MSXML or ADO to access data from another site in the zone. -- If you do not configure this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. +- If you don't configure this policy setting, users can't load a page in the zone that uses MSXML or ADO to access data from another site in the zone. @@ -4785,13 +4728,12 @@ This policy setting allows you to manage whether Internet Explorer can access da | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4817,7 +4759,7 @@ This policy setting allows you to manage whether Internet Explorer can access da | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -4834,11 +4776,11 @@ This policy setting allows you to manage whether Internet Explorer can access da This policy setting manages whether users will be automatically prompted for ActiveX control installations. -- If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. +- If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they don't have installed. - If you disable this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. -- If you do not configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. +- If you don't configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. @@ -4850,13 +4792,12 @@ This policy setting manages whether users will be automatically prompted for Act | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4882,7 +4823,7 @@ This policy setting manages whether users will be automatically prompted for Act | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -4901,7 +4842,7 @@ This policy setting determines whether users will be prompted for non user-initi - If you enable this setting, users will receive a file download dialog for automatic download attempts. -- If you disable or do not configure this setting, file downloads that are not user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. +- If you disable or don't configure this setting, file downloads that aren't user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. @@ -4913,13 +4854,12 @@ This policy setting determines whether users will be prompted for non user-initi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -4945,7 +4885,7 @@ This policy setting determines whether users will be prompted for non user-initi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -4966,9 +4906,9 @@ This policy setting allows you to manage whether scripts can perform a clipboard If you select Prompt in the drop-down box, users are queried as to whether to perform clipboard operations. -- If you disable this policy setting, a script cannot perform a clipboard operation. +- If you disable this policy setting, a script can't perform a clipboard operation. -- If you do not configure this policy setting, a script can perform a clipboard operation. +- If you don't configure this policy setting, a script can perform a clipboard operation. @@ -4980,13 +4920,12 @@ If you select Prompt in the drop-down box, users are queried as to whether to pe | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5012,7 +4951,7 @@ If you select Prompt in the drop-down box, users are queried as to whether to pe | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -5033,7 +4972,7 @@ This policy setting allows you to manage whether users can drag files or copy an - If you disable this policy setting, users are prevented from dragging files or copying and pasting files from this zone. -- If you do not configure this policy setting, users can drag files or copy and paste files from this zone automatically. +- If you don't configure this policy setting, users can drag files or copy and paste files from this zone automatically. @@ -5045,13 +4984,12 @@ This policy setting allows you to manage whether users can drag files or copy an | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5077,7 +5015,7 @@ This policy setting allows you to manage whether users can drag files or copy an | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -5100,7 +5038,7 @@ This policy setting allows you to manage whether pages of the zone may download - If you disable this policy setting, HTML fonts are prevented from downloading. -- If you do not configure this policy setting, HTML fonts can be downloaded automatically. +- If you don't configure this policy setting, HTML fonts can be downloaded automatically. @@ -5112,13 +5050,12 @@ This policy setting allows you to manage whether pages of the zone may download | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5144,7 +5081,7 @@ This policy setting allows you to manage whether pages of the zone may download | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -5161,11 +5098,11 @@ This policy setting allows you to manage whether pages of the zone may download This policy setting allows you to manage whether Web sites from less privileged zones, such as Restricted Sites, can navigate into this zone. -- If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. +- If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that's provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. -- If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. +- If you disable this policy setting, the possibly harmful navigations is prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. -- If you do not configure this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. +- If you don't configure this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. @@ -5177,13 +5114,12 @@ This policy setting allows you to manage whether Web sites from less privileged | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5209,7 +5145,7 @@ This policy setting allows you to manage whether Web sites from less privileged | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -5226,11 +5162,11 @@ This policy setting allows you to manage whether Web sites from less privileged This policy setting allows you to manage the loading of Extensible Application Markup Language (XAML) files. XAML is an XML-based declarative markup language commonly used for creating rich user interfaces and graphics that take advantage of the Windows Presentation Foundation. -- If you enable this policy setting and set the drop-down box to Enable, XAML files are automatically loaded inside Internet Explorer. The user cannot change this behavior. If you set the drop-down box to Prompt, the user is prompted for loading XAML files. +- If you enable this policy setting and set the drop-down box to Enable, XAML files are automatically loaded inside Internet Explorer. The user can't change this behavior. If you set the drop-down box to Prompt, the user is prompted for loading XAML files. -- If you disable this policy setting, XAML files are not loaded inside Internet Explorer. The user cannot change this behavior. +- If you disable this policy setting, XAML files aren't loaded inside Internet Explorer. The user can't change this behavior. -- If you do not configure this policy setting, the user can decide whether to load XAML files inside Internet Explorer. +- If you don't configure this policy setting, the user can decide whether to load XAML files inside Internet Explorer. @@ -5242,13 +5178,12 @@ This policy setting allows you to manage the loading of Extensible Application M | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5274,7 +5209,7 @@ This policy setting allows you to manage the loading of Extensible Application M | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -5289,13 +5224,13 @@ This policy setting allows you to manage the loading of Extensible Application M -This policy setting allows you to manage whether . NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. +This policy setting allows you to manage whether . NET Framework components that aren't signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. - If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. -- If you disable this policy setting, Internet Explorer will not execute unsigned managed components. +- If you disable this policy setting, Internet Explorer won't execute unsigned managed components. -- If you do not configure this policy setting, Internet Explorer will execute unsigned managed components. +- If you don't configure this policy setting, Internet Explorer will execute unsigned managed components. @@ -5307,13 +5242,12 @@ This policy setting allows you to manage whether . NET Framework components that | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5339,7 +5273,7 @@ This policy setting allows you to manage whether . NET Framework components that | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -5358,7 +5292,7 @@ This policy setting controls whether or not the user is prompted to allow Active - If you enable this policy setting, the user is prompted before ActiveX controls can run from websites in this zone. The user can choose to allow the control to run from the current site or from all sites. -- If you disable this policy setting, the user does not see the per-site ActiveX prompt, and ActiveX controls can run from all sites in this zone. +- If you disable this policy setting, the user doesn't see the per-site ActiveX prompt, and ActiveX controls can run from all sites in this zone. @@ -5370,13 +5304,12 @@ This policy setting controls whether or not the user is prompted to allow Active | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5402,7 +5335,7 @@ This policy setting controls whether or not the user is prompted to allow Active | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -5419,7 +5352,7 @@ This policy setting controls whether or not the user is prompted to allow Active This policy setting controls whether or not the user is allowed to run the TDC ActiveX control on websites. -- If you enable this policy setting, the TDC ActiveX control will not run from websites in this zone. +- If you enable this policy setting, the TDC ActiveX control won't run from websites in this zone. - If you disable this policy setting, the TDC Active X control will run from all sites in this zone. @@ -5433,13 +5366,12 @@ This policy setting controls whether or not the user is allowed to run the TDC A | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5465,7 +5397,7 @@ This policy setting controls whether or not the user is allowed to run the TDC A | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -5484,9 +5416,9 @@ This policy setting determines whether a page can control embedded WebBrowser co - If you enable this policy setting, script access to the WebBrowser control is allowed. -- If you disable this policy setting, script access to the WebBrowser control is not allowed. +- If you disable this policy setting, script access to the WebBrowser control isn't allowed. -- If you do not configure this policy setting, the user can enable or disable script access to the WebBrowser control. By default, script access to the WebBrowser control is allowed only in the Local Machine and Intranet zones. +- If you don't configure this policy setting, the user can enable or disable script access to the WebBrowser control. By default, script access to the WebBrowser control is allowed only in the Local Machine and Intranet zones. @@ -5498,13 +5430,12 @@ This policy setting determines whether a page can control embedded WebBrowser co | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5530,7 +5461,7 @@ This policy setting determines whether a page can control embedded WebBrowser co | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -5547,11 +5478,11 @@ This policy setting determines whether a page can control embedded WebBrowser co This policy setting allows you to manage restrictions on script-initiated pop-up windows and windows that include the title and status bars. -- If you enable this policy setting, Windows Restrictions security will not apply in this zone. The security zone runs without the added layer of security provided by this feature. +- If you enable this policy setting, Windows Restrictions security won't apply in this zone. The security zone runs without the added layer of security provided by this feature. -- If you disable this policy setting, the possible harmful actions contained in script-initiated pop-up windows and windows that include the title and status bars cannot be run. This Internet Explorer security feature will be on in this zone as dictated by the Scripted Windows Security Restrictions feature control setting for the process. +- If you disable this policy setting, the possible harmful actions contained in script-initiated pop-up windows and windows that include the title and status bars can't be run. This Internet Explorer security feature will be on in this zone as dictated by the Scripted Windows Security Restrictions feature control setting for the process. -- If you do not configure this policy setting, the possible harmful actions contained in script-initiated pop-up windows and windows that include the title and status bars cannot be run. This Internet Explorer security feature will be on in this zone as dictated by the Scripted Windows Security Restrictions feature control setting for the process. +- If you don't configure this policy setting, the possible harmful actions contained in script-initiated pop-up windows and windows that include the title and status bars can't be run. This Internet Explorer security feature will be on in this zone as dictated by the Scripted Windows Security Restrictions feature control setting for the process. @@ -5563,13 +5494,12 @@ This policy setting allows you to manage restrictions on script-initiated pop-up | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5595,7 +5525,7 @@ This policy setting allows you to manage restrictions on script-initiated pop-up | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -5614,9 +5544,9 @@ This policy setting allows you to manage whether the user can run scriptlets. - If you enable this policy setting, the user can run scriptlets. -- If you disable this policy setting, the user cannot run scriptlets. +- If you disable this policy setting, the user can't run scriptlets. -- If you do not configure this policy setting, the user can enable or disable scriptlets. +- If you don't configure this policy setting, the user can enable or disable scriptlets. @@ -5628,13 +5558,12 @@ This policy setting allows you to manage whether the user can run scriptlets. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5660,7 +5589,7 @@ This policy setting allows you to manage whether the user can run scriptlets. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -5679,9 +5608,9 @@ This policy setting controls whether SmartScreen Filter scans pages in this zone - If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. -- If you disable this policy setting, SmartScreen Filter does not scan pages in this zone for malicious content. +- If you disable this policy setting, SmartScreen Filter doesn't scan pages in this zone for malicious content. -- If you do not configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. +- If you don't configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. > [!NOTE] > In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. @@ -5696,13 +5625,12 @@ This policy setting controls whether SmartScreen Filter scans pages in this zone | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5728,7 +5656,7 @@ This policy setting controls whether SmartScreen Filter scans pages in this zone | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -5747,7 +5675,7 @@ This policy setting allows you to manage whether script is allowed to update the - If you enable this policy setting, script is allowed to update the status bar. -- If you disable or do not configure this policy setting, script is not allowed to update the status bar. +- If you disable or don't configure this policy setting, script isn't allowed to update the status bar. @@ -5759,13 +5687,12 @@ This policy setting allows you to manage whether script is allowed to update the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5791,7 +5718,7 @@ This policy setting allows you to manage whether script is allowed to update the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -5810,9 +5737,9 @@ This policy setting allows you to manage the preservation of information in the - If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. -- If you disable this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. +- If you disable this policy setting, users can't preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. -- If you do not configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. +- If you don't configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. @@ -5824,13 +5751,12 @@ This policy setting allows you to manage the preservation of information in the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5856,7 +5782,7 @@ This policy setting allows you to manage the preservation of information in the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -5879,7 +5805,7 @@ If you selected Prompt in the drop-down box, users are asked to choose whether t If you selected Disable in the drop-down box, VBScript is prevented from running. -If you do not configure or disable this policy setting, VBScript is prevented from running. +If you don't configure or disable this policy setting, VBScript is prevented from running. @@ -5891,13 +5817,12 @@ If you do not configure or disable this policy setting, VBScript is prevented fr | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5923,7 +5848,7 @@ If you do not configure or disable this policy setting, VBScript is prevented fr | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -5956,13 +5881,12 @@ This policy setting determines whether Internet Explorer runs antimalware progra | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -5988,7 +5912,7 @@ This policy setting determines whether Internet Explorer runs antimalware progra | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -6007,9 +5931,9 @@ This policy setting allows you to manage whether users may download signed Activ - If you enable this policy, users can download signed controls without user intervention. If you select Prompt in the drop-down box, users are queried whether to download controls signed by publishers who aren't trusted. Code signed by trusted publishers is silently downloaded. -- If you disable the policy setting, signed controls cannot be downloaded. +- If you disable the policy setting, signed controls can't be downloaded. -- If you do not configure this policy setting, users are queried whether to download controls signed by publishers who aren't trusted. Code signed by trusted publishers is silently downloaded. +- If you don't configure this policy setting, users are queried whether to download controls signed by publishers who aren't trusted. Code signed by trusted publishers is silently downloaded. @@ -6021,13 +5945,12 @@ This policy setting allows you to manage whether users may download signed Activ | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6053,7 +5976,7 @@ This policy setting allows you to manage whether users may download signed Activ | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -6072,9 +5995,9 @@ This policy setting allows you to manage whether users may download unsigned Act - If you enable this policy setting, users can run unsigned controls without user intervention. If you select Prompt in the drop-down box, users are queried to choose whether to allow the unsigned control to run. -- If you disable this policy setting, users cannot run unsigned controls. +- If you disable this policy setting, users can't run unsigned controls. -- If you do not configure this policy setting, users cannot run unsigned controls. +- If you don't configure this policy setting, users can't run unsigned controls. @@ -6086,13 +6009,12 @@ This policy setting allows you to manage whether users may download unsigned Act | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6118,7 +6040,7 @@ This policy setting allows you to manage whether users may download unsigned Act | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -6149,13 +6071,12 @@ This policy controls whether or not the Cross-Site Scripting (XSS) Filter will d | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6181,7 +6102,7 @@ This policy controls whether or not the Cross-Site Scripting (XSS) Filter will d | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -6198,13 +6119,13 @@ This policy controls whether or not the Cross-Site Scripting (XSS) Filter will d This policy setting allows you to set options for dragging content from one domain to a different domain when the source and destination are in different windows. -- If you enable this policy setting and click Enable, users can drag content from one domain to a different domain when the source and destination are in different windows. Users cannot change this setting. +If you enable this policy setting and click Enable, users can drag content from one domain to a different domain when the source and destination are in different windows. Users can't change this setting. -- If you enable this policy setting and click Disable, users cannot drag content from one domain to a different domain when both the source and destination are in different windows. Users cannot change this setting. +If you enable this policy setting and click Disable, users can't drag content from one domain to a different domain when both the source and destination are in different windows. Users can't change this setting. -In Internet Explorer 10, if you disable this policy setting or do not configure it, users cannot drag content from one domain to a different domain when the source and destination are in different windows. Users can change this setting in the Internet Options dialog. +In Internet Explorer 10, if you disable this policy setting or don't configure it, users can't drag content from one domain to a different domain when the source and destination are in different windows. Users can change this setting in the Internet Options dialog. -In Internet Explorer 9 and earlier versions, if you disable this policy or do not configure it, users can drag content from one domain to a different domain when the source and destination are in different windows. Users cannot change this setting. +In Internet Explorer 9 and earlier versions, if you disable this policy or don't configure it, users can drag content from one domain to a different domain when the source and destination are in different windows. Users can't change this setting. @@ -6216,13 +6137,12 @@ In Internet Explorer 9 and earlier versions, if you disable this policy or do no | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6248,7 +6168,7 @@ In Internet Explorer 9 and earlier versions, if you disable this policy or do no | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -6265,13 +6185,13 @@ In Internet Explorer 9 and earlier versions, if you disable this policy or do no This policy setting allows you to set options for dragging content from one domain to a different domain when the source and destination are in the same window. -- If you enable this policy setting and click Enable, users can drag content from one domain to a different domain when the source and destination are in the same window. Users cannot change this setting. +If you enable this policy setting and click Enable, users can drag content from one domain to a different domain when the source and destination are in the same window. Users can't change this setting. -- If you enable this policy setting and click Disable, users cannot drag content from one domain to a different domain when the source and destination are in the same window. Users cannot change this setting in the Internet Options dialog. +If you enable this policy setting and click Disable, users can't drag content from one domain to a different domain when the source and destination are in the same window. Users can't change this setting in the Internet Options dialog. -In Internet Explorer 10, if you disable this policy setting or do not configure it, users cannot drag content from one domain to a different domain when the source and destination are in the same window. Users can change this setting in the Internet Options dialog. +In Internet Explorer 10, if you disable this policy setting or don't configure it, users can't drag content from one domain to a different domain when the source and destination are in the same window. Users can change this setting in the Internet Options dialog. -In Internet Explorer 9 and earlier versions, if you disable this policy setting or do not configure it, users can drag content from one domain to a different domain when the source and destination are in the same window. Users cannot change this setting in the Internet Options dialog. +In Internet Explorer 9 and earlier versions, if you disable this policy setting or don't configure it, users can drag content from one domain to a different domain when the source and destination are in the same window. Users can't change this setting in the Internet Options dialog. @@ -6283,13 +6203,12 @@ In Internet Explorer 9 and earlier versions, if you disable this policy setting | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6315,7 +6234,7 @@ In Internet Explorer 9 and earlier versions, if you disable this policy setting | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -6332,11 +6251,11 @@ In Internet Explorer 9 and earlier versions, if you disable this policy setting This policy setting allows you to manage MIME sniffing for file promotion from one type to another based on a MIME sniff. A MIME sniff is the recognition by Internet Explorer of the file type based on a bit signature. -- If you enable this policy setting, the MIME Sniffing Safety Feature will not apply in this zone. The security zone will run without the added layer of security provided by this feature. +- If you enable this policy setting, the MIME Sniffing Safety Feature won't apply in this zone. The security zone will run without the added layer of security provided by this feature. -- If you disable this policy setting, the actions that may be harmful cannot run; this Internet Explorer security feature will be turned on in this zone, as dictated by the feature control setting for the process. +- If you disable this policy setting, the actions that may be harmful can't run; this Internet Explorer security feature will be turned on in this zone, as dictated by the feature control setting for the process. -- If you do not configure this policy setting, the MIME Sniffing Safety Feature will not apply in this zone. +- If you don't configure this policy setting, the MIME Sniffing Safety Feature won't apply in this zone. @@ -6348,13 +6267,12 @@ This policy setting allows you to manage MIME sniffing for file promotion from o | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6380,7 +6298,7 @@ This policy setting allows you to manage MIME sniffing for file promotion from o | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -6397,11 +6315,11 @@ This policy setting allows you to manage MIME sniffing for file promotion from o This policy setting allows you to turn on Protected Mode. Protected Mode helps protect Internet Explorer from exploited vulnerabilities by reducing the locations that Internet Explorer can write to in the registry and the file system. -- If you enable this policy setting, Protected Mode is turned on. The user cannot turn off Protected Mode. +- If you enable this policy setting, Protected Mode is turned on. The user can't turn off Protected Mode. -- If you disable this policy setting, Protected Mode is turned off. The user cannot turn on Protected Mode. +- If you disable this policy setting, Protected Mode is turned off. The user can't turn on Protected Mode. -- If you do not configure this policy setting, the user can turn on or turn off Protected Mode. +- If you don't configure this policy setting, the user can turn on or turn off Protected Mode. @@ -6413,13 +6331,12 @@ This policy setting allows you to turn on Protected Mode. Protected Mode helps p | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6445,7 +6362,7 @@ This policy setting allows you to turn on Protected Mode. Protected Mode helps p | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -6466,7 +6383,7 @@ This policy setting controls whether or not local path information is sent when - If you disable this policy setting, path information is removed when the user is uploading a file via an HTML form. -- If you do not configure this policy setting, the user can choose whether path information is sent when he or she is uploading a file via an HTML form. By default, path information is sent. +- If you don't configure this policy setting, the user can choose whether path information is sent when he or she is uploading a file via an HTML form. By default, path information is sent. @@ -6478,13 +6395,12 @@ This policy setting controls whether or not local path information is sent when | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6510,7 +6426,7 @@ This policy setting controls whether or not local path information is sent when | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -6527,13 +6443,13 @@ This policy setting controls whether or not local path information is sent when This policy setting allows you to manage ActiveX controls not marked as safe. -- If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. +- If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting isn't recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. - If you enable this policy setting and select Prompt in the drop-down box, users are queried whether to allow the control to be loaded with parameters or scripted. -- If you disable this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. +- If you disable this policy setting, ActiveX controls that can't be made safe aren't loaded with parameters or scripted. -- If you do not configure this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. +- If you don't configure this policy setting, ActiveX controls that can't be made safe aren't loaded with parameters or scripted. @@ -6545,13 +6461,12 @@ This policy setting allows you to manage ActiveX controls not marked as safe. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6577,7 +6492,7 @@ This policy setting allows you to manage ActiveX controls not marked as safe. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -6598,13 +6513,13 @@ This policy setting allows you to manage permissions for Java applets. Low Safety enables applets to perform all operations. -Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program cannot make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O. +Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program can't make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O. High Safety enables applets to run in their sandbox. Disable Java to prevent any applets from running. -- If you disable this policy setting, Java applets cannot run. +- If you disable this policy setting, Java applets can't run. -- If you do not configure this policy setting, the permission is set to High Safety. +- If you don't configure this policy setting, the permission is set to High Safety. @@ -6616,13 +6531,12 @@ High Safety enables applets to run in their sandbox. Disable Java to prevent any | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6648,7 +6562,7 @@ High Safety enables applets to run in their sandbox. Disable Java to prevent any | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -6669,7 +6583,7 @@ This policy setting allows you to manage whether applications may be run and fil - If you disable this policy setting, users are prevented from running applications and downloading files from IFRAMEs on the pages in this zone. -- If you do not configure this policy setting, users are queried to choose whether to run applications and download files from IFRAMEs on the pages in this zone. +- If you don't configure this policy setting, users are queried to choose whether to run applications and download files from IFRAMEs on the pages in this zone. @@ -6681,13 +6595,12 @@ This policy setting allows you to manage whether applications may be run and fil | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6713,7 +6626,7 @@ This policy setting allows you to manage whether applications may be run and fil | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -6738,11 +6651,11 @@ Prompt for user name and password to query users for user IDs and passwords. Aft Automatic logon only in Intranet zone to query users for user IDs and passwords in other zones. After a user is queried, these values can be used silently for the remainder of the session. -Automatic logon with current user name and password to attempt logon using Windows NT Challenge Response (also known as NTLM authentication). If Windows NT Challenge Response is supported by the server, the logon uses the user's network user name and password for logon. If Windows NT Challenge Response is not supported by the server, the user is queried to provide the user name and password. +Automatic logon with current user name and password to attempt logon using Windows NT Challenge Response (also known as NTLM authentication). If Windows NT Challenge Response is supported by the server, the logon uses the user's network user name and password for logon. If Windows NT Challenge Response isn't supported by the server, the user is queried to provide the user name and password. - If you disable this policy setting, logon is set to Automatic logon only in Intranet zone. -- If you do not configure this policy setting, logon is set to Automatic logon only in Intranet zone. +- If you don't configure this policy setting, logon is set to Automatic logon only in Intranet zone. @@ -6754,13 +6667,12 @@ Automatic logon with current user name and password to attempt logon using Windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6786,7 +6698,7 @@ Automatic logon with current user name and password to attempt logon using Windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -6803,11 +6715,11 @@ Automatic logon with current user name and password to attempt logon using Windo This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. -- If you enable this policy setting, users can open windows and frames from othe domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. +- If you enable this policy setting, users can open windows and frames from other domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. -- If you disable this policy setting, users cannot open windows and frames to access applications from different domains. +- If you disable this policy setting, users can't open windows and frames to access applications from different domains. -- If you do not configure this policy setting, users can open windows and frames from othe domains and access applications from other domains. +- If you don't configure this policy setting, users can open windows and frames from other domains and access applications from other domains. @@ -6819,13 +6731,12 @@ This policy setting allows you to manage the opening of windows and frames and a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6851,7 +6762,7 @@ This policy setting allows you to manage the opening of windows and frames and a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -6870,9 +6781,9 @@ This policy setting allows you to manage whether . NET Framework components that - If you enable this policy setting, Internet Explorer will execute signed managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute signed managed components. -- If you disable this policy setting, Internet Explorer will not execute signed managed components. +- If you disable this policy setting, Internet Explorer won't execute signed managed components. -- If you do not configure this policy setting, Internet Explorer will execute signed managed components. +- If you don't configure this policy setting, Internet Explorer will execute signed managed components. @@ -6884,13 +6795,12 @@ This policy setting allows you to manage whether . NET Framework components that | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6916,7 +6826,7 @@ This policy setting allows you to manage whether . NET Framework components that | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -6935,9 +6845,9 @@ This policy setting controls whether or not the "Open File - Security Warning" m - If you enable this policy setting and set the drop-down box to Enable, these files open without a security warning. If you set the drop-down box to Prompt, a security warning appears before the files open. -- If you disable this policy setting, these files do not open. +- If you disable this policy setting, these files don't open. -- If you do not configure this policy setting, the user can configure how the computer handles these files. By default, these files are blocked in the Restricted zone, enabled in the Intranet and Local Computer zones, and set to prompt in the Internet and Trusted zones. +- If you don't configure this policy setting, the user can configure how the computer handles these files. By default, these files are blocked in the Restricted zone, enabled in the Intranet and Local Computer zones, and set to prompt in the Internet and Trusted zones. @@ -6949,13 +6859,12 @@ This policy setting controls whether or not the "Open File - Security Warning" m | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -6981,7 +6890,7 @@ This policy setting controls whether or not the "Open File - Security Warning" m | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -6996,13 +6905,13 @@ This policy setting controls whether or not the "Open File - Security Warning" m -This policy setting allows you to manage whether unwanted pop-up windows appear. Pop-up windows that are opened when the end user clicks a link are not blocked. +This policy setting allows you to manage whether unwanted pop-up windows appear. Pop-up windows that are opened when the end user clicks a link aren't blocked. - If you enable this policy setting, most unwanted pop-up windows are prevented from appearing. -- If you disable this policy setting, pop-up windows are not prevented from appearing. +- If you disable this policy setting, pop-up windows aren't prevented from appearing. -- If you do not configure this policy setting, most unwanted pop-up windows are prevented from appearing. +- If you don't configure this policy setting, most unwanted pop-up windows are prevented from appearing. @@ -7014,13 +6923,12 @@ This policy setting allows you to manage whether unwanted pop-up windows appear. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7046,7 +6954,7 @@ This policy setting allows you to manage whether unwanted pop-up windows appear. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -7065,9 +6973,9 @@ This policy setting allows you to manage whether Internet Explorer can access da - If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. -- If you disable this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. +- If you disable this policy setting, users can't load a page in the zone that uses MSXML or ADO to access data from another site in the zone. -- If you do not configure this policy setting, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. +- If you don't configure this policy setting, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. @@ -7079,13 +6987,12 @@ This policy setting allows you to manage whether Internet Explorer can access da | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7111,7 +7018,7 @@ This policy setting allows you to manage whether Internet Explorer can access da | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -7128,11 +7035,11 @@ This policy setting allows you to manage whether Internet Explorer can access da This policy setting manages whether users will be automatically prompted for ActiveX control installations. -- If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. +- If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they don't have installed. - If you disable this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. -- If you do not configure this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. +- If you don't configure this policy setting, users will receive a prompt when a site instantiates an ActiveX control they don't have installed. @@ -7144,13 +7051,12 @@ This policy setting manages whether users will be automatically prompted for Act | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7176,7 +7082,7 @@ This policy setting manages whether users will be automatically prompted for Act | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -7195,7 +7101,7 @@ This policy setting determines whether users will be prompted for non user-initi - If you enable this setting, users will receive a file download dialog for automatic download attempts. -- If you disable or do not configure this setting, users will receive a file download dialog for automatic download attempts. +- If you disable or don't configure this setting, users will receive a file download dialog for automatic download attempts. @@ -7207,13 +7113,12 @@ This policy setting determines whether users will be prompted for non user-initi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7239,7 +7144,7 @@ This policy setting determines whether users will be prompted for non user-initi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -7262,7 +7167,7 @@ This policy setting allows you to manage whether pages of the zone may download - If you disable this policy setting, HTML fonts are prevented from downloading. -- If you do not configure this policy setting, HTML fonts can be downloaded automatically. +- If you don't configure this policy setting, HTML fonts can be downloaded automatically. @@ -7274,13 +7179,12 @@ This policy setting allows you to manage whether pages of the zone may download | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7306,7 +7210,7 @@ This policy setting allows you to manage whether pages of the zone may download | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -7323,11 +7227,11 @@ This policy setting allows you to manage whether pages of the zone may download This policy setting allows you to manage whether Web sites from less privileged zones, such as Restricted Sites, can navigate into this zone. -- If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. +- If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that's provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. -- If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. +- If you disable this policy setting, the possibly harmful navigations is prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. -- If you do not configure this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. +- If you don't configure this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. @@ -7339,13 +7243,12 @@ This policy setting allows you to manage whether Web sites from less privileged | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7371,7 +7274,7 @@ This policy setting allows you to manage whether Web sites from less privileged | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -7386,13 +7289,13 @@ This policy setting allows you to manage whether Web sites from less privileged -This policy setting allows you to manage whether . NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. +This policy setting allows you to manage whether . NET Framework components that aren't signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. - If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. -- If you disable this policy setting, Internet Explorer will not execute unsigned managed components. +- If you disable this policy setting, Internet Explorer won't execute unsigned managed components. -- If you do not configure this policy setting, Internet Explorer will execute unsigned managed components. +- If you don't configure this policy setting, Internet Explorer will execute unsigned managed components. @@ -7404,13 +7307,12 @@ This policy setting allows you to manage whether . NET Framework components that | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7436,7 +7338,7 @@ This policy setting allows you to manage whether . NET Framework components that | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -7455,9 +7357,9 @@ This policy setting allows you to manage whether the user can run scriptlets. - If you enable this policy setting, the user can run scriptlets. -- If you disable this policy setting, the user cannot run scriptlets. +- If you disable this policy setting, the user can't run scriptlets. -- If you do not configure this policy setting, the user can enable or disable scriptlets. +- If you don't configure this policy setting, the user can enable or disable scriptlets. @@ -7469,13 +7371,12 @@ This policy setting allows you to manage whether the user can run scriptlets. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7501,7 +7402,7 @@ This policy setting allows you to manage whether the user can run scriptlets. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -7520,9 +7421,9 @@ This policy setting controls whether SmartScreen Filter scans pages in this zone - If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. -- If you disable this policy setting, SmartScreen Filter does not scan pages in this zone for malicious content. +- If you disable this policy setting, SmartScreen Filter doesn't scan pages in this zone for malicious content. -- If you do not configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. +- If you don't configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. > [!NOTE] > In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. @@ -7537,13 +7438,12 @@ This policy setting controls whether SmartScreen Filter scans pages in this zone | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7569,7 +7469,7 @@ This policy setting controls whether SmartScreen Filter scans pages in this zone | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -7588,9 +7488,9 @@ This policy setting allows you to manage the preservation of information in the - If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. -- If you disable this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. +- If you disable this policy setting, users can't preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. -- If you do not configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. +- If you don't configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. @@ -7602,13 +7502,12 @@ This policy setting allows you to manage the preservation of information in the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7634,7 +7533,7 @@ This policy setting allows you to manage the preservation of information in the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -7667,13 +7566,12 @@ This policy setting determines whether Internet Explorer runs antimalware progra | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7699,7 +7597,7 @@ This policy setting determines whether Internet Explorer runs antimalware progra | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -7716,13 +7614,13 @@ This policy setting determines whether Internet Explorer runs antimalware progra This policy setting allows you to manage ActiveX controls not marked as safe. -- If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. +- If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting isn't recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. - If you enable this policy setting and select Prompt in the drop-down box, users are queried whether to allow the control to be loaded with parameters or scripted. -- If you disable this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. +- If you disable this policy setting, ActiveX controls that can't be made safe aren't loaded with parameters or scripted. -- If you do not configure this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. +- If you don't configure this policy setting, ActiveX controls that can't be made safe aren't loaded with parameters or scripted. @@ -7734,13 +7632,12 @@ This policy setting allows you to manage ActiveX controls not marked as safe. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7766,7 +7663,7 @@ This policy setting allows you to manage ActiveX controls not marked as safe. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -7787,13 +7684,13 @@ This policy setting allows you to manage permissions for Java applets. Low Safety enables applets to perform all operations. -Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program cannot make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O. +Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program can't make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O. High Safety enables applets to run in their sandbox. Disable Java to prevent any applets from running. -- If you disable this policy setting, Java applets cannot run. +- If you disable this policy setting, Java applets can't run. -- If you do not configure this policy setting, the permission is set to Medium Safety. +- If you don't configure this policy setting, the permission is set to Medium Safety. @@ -7805,13 +7702,12 @@ High Safety enables applets to run in their sandbox. Disable Java to prevent any | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7837,7 +7733,7 @@ High Safety enables applets to run in their sandbox. Disable Java to prevent any | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -7854,11 +7750,11 @@ High Safety enables applets to run in their sandbox. Disable Java to prevent any This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. -- If you enable this policy setting, users can open windows and frames from othe domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. +- If you enable this policy setting, users can open windows and frames from other domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. -- If you disable this policy setting, users cannot open windows and frames to access applications from different domains. +- If you disable this policy setting, users can't open windows and frames to access applications from different domains. -- If you do not configure this policy setting, users can open windows and frames from othe domains and access applications from other domains. +- If you don't configure this policy setting, users can open windows and frames from other domains and access applications from other domains. @@ -7870,13 +7766,12 @@ This policy setting allows you to manage the opening of windows and frames and a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7902,7 +7797,7 @@ This policy setting allows you to manage the opening of windows and frames and a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -7935,13 +7830,12 @@ This policy setting specifies whether JScript or JScript9Legacy is loaded for MS | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -7968,7 +7862,7 @@ This policy setting specifies whether JScript or JScript9Legacy is loaded for MS | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20348] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.1350] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041.789] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20348] and later
    ✅ Windows 10, version 1903 [10.0.18362.1350] and later
    ✅ Windows 10, version 2004 [10.0.19041.789] and later | @@ -7992,8 +7886,9 @@ Prevents intranet sites from being opened in any browser except Internet Explore We strongly recommend keeping this policy in sync with the 'Send all intranet sites to Internet Explorer' ('SendIntranetToInternetExplorer') policy. Additionally, it's best to enable this policy only if your intranet sites have known compatibility problems with Microsoft Edge. Related policies: - - Send all intranet sites to Internet Explorer ('SendIntranetToInternetExplorer') - - Send all sites not included in the Enterprise Mode Site List to Microsoft Edge ('RestrictIE') + +- Send all intranet sites to Internet Explorer ('SendIntranetToInternetExplorer') +- Send all sites not included in the Enterprise Mode Site List to Microsoft Edge ('RestrictIE') For more info about how to use this policy together with other related policies to create the optimal configuration for your organization, see< https://go.microsoft.com/fwlink/?linkid=2094210>. @@ -8007,13 +7902,12 @@ For more info about how to use this policy together with other related policies | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -8063,7 +7957,7 @@ For more info about how to use this policy together with other related policies | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -8082,9 +7976,9 @@ This policy setting allows you to manage whether Internet Explorer can access da - If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. -- If you disable this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. +- If you disable this policy setting, users can't load a page in the zone that uses MSXML or ADO to access data from another site in the zone. -- If you do not configure this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. +- If you don't configure this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. @@ -8096,13 +7990,12 @@ This policy setting allows you to manage whether Internet Explorer can access da | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -8128,7 +8021,7 @@ This policy setting allows you to manage whether Internet Explorer can access da | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -8145,11 +8038,11 @@ This policy setting allows you to manage whether Internet Explorer can access da This policy setting manages whether users will be automatically prompted for ActiveX control installations. -- If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. +- If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they don't have installed. - If you disable this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. -- If you do not configure this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. +- If you don't configure this policy setting, users will receive a prompt when a site instantiates an ActiveX control they don't have installed. @@ -8161,13 +8054,12 @@ This policy setting manages whether users will be automatically prompted for Act | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -8193,7 +8085,7 @@ This policy setting manages whether users will be automatically prompted for Act | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -8212,7 +8104,7 @@ This policy setting determines whether users will be prompted for non user-initi - If you enable this setting, users will receive a file download dialog for automatic download attempts. -- If you disable or do not configure this setting, users will receive a file download dialog for automatic download attempts. +- If you disable or don't configure this setting, users will receive a file download dialog for automatic download attempts. @@ -8224,13 +8116,12 @@ This policy setting determines whether users will be prompted for non user-initi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -8256,7 +8147,7 @@ This policy setting determines whether users will be prompted for non user-initi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -8279,7 +8170,7 @@ This policy setting allows you to manage whether pages of the zone may download - If you disable this policy setting, HTML fonts are prevented from downloading. -- If you do not configure this policy setting, HTML fonts can be downloaded automatically. +- If you don't configure this policy setting, HTML fonts can be downloaded automatically. @@ -8291,13 +8182,12 @@ This policy setting allows you to manage whether pages of the zone may download | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -8323,7 +8213,7 @@ This policy setting allows you to manage whether pages of the zone may download | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -8340,11 +8230,11 @@ This policy setting allows you to manage whether pages of the zone may download This policy setting allows you to manage whether Web sites from less privileged zones, such as Internet sites, can navigate into this zone. -- If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. +- If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that's provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. -- If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. +- If you disable this policy setting, the possibly harmful navigations is prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. -- If you do not configure this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. +- If you don't configure this policy setting, the possibly harmful navigations is prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. @@ -8356,13 +8246,12 @@ This policy setting allows you to manage whether Web sites from less privileged | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -8388,7 +8277,7 @@ This policy setting allows you to manage whether Web sites from less privileged | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -8403,13 +8292,13 @@ This policy setting allows you to manage whether Web sites from less privileged -This policy setting allows you to manage whether . NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. +This policy setting allows you to manage whether . NET Framework components that aren't signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. - If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. -- If you disable this policy setting, Internet Explorer will not execute unsigned managed components. +- If you disable this policy setting, Internet Explorer won't execute unsigned managed components. -- If you do not configure this policy setting, Internet Explorer will not execute unsigned managed components. +- If you don't configure this policy setting, Internet Explorer won't execute unsigned managed components. @@ -8421,13 +8310,12 @@ This policy setting allows you to manage whether . NET Framework components that | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -8453,7 +8341,7 @@ This policy setting allows you to manage whether . NET Framework components that | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -8472,9 +8360,9 @@ This policy setting allows you to manage whether the user can run scriptlets. - If you enable this policy setting, the user can run scriptlets. -- If you disable this policy setting, the user cannot run scriptlets. +- If you disable this policy setting, the user can't run scriptlets. -- If you do not configure this policy setting, the user can enable or disable scriptlets. +- If you don't configure this policy setting, the user can enable or disable scriptlets. @@ -8486,13 +8374,12 @@ This policy setting allows you to manage whether the user can run scriptlets. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -8518,7 +8405,7 @@ This policy setting allows you to manage whether the user can run scriptlets. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -8537,9 +8424,9 @@ This policy setting controls whether SmartScreen Filter scans pages in this zone - If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. -- If you disable this policy setting, SmartScreen Filter does not scan pages in this zone for malicious content. +- If you disable this policy setting, SmartScreen Filter doesn't scan pages in this zone for malicious content. -- If you do not configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. +- If you don't configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. > [!NOTE] > In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. @@ -8554,13 +8441,12 @@ This policy setting controls whether SmartScreen Filter scans pages in this zone | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -8586,7 +8472,7 @@ This policy setting controls whether SmartScreen Filter scans pages in this zone | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -8605,9 +8491,9 @@ This policy setting allows you to manage the preservation of information in the - If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. -- If you disable this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. +- If you disable this policy setting, users can't preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. -- If you do not configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. +- If you don't configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. @@ -8619,13 +8505,12 @@ This policy setting allows you to manage the preservation of information in the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -8651,7 +8536,7 @@ This policy setting allows you to manage the preservation of information in the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -8684,13 +8569,12 @@ This policy setting determines whether Internet Explorer runs antimalware progra | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -8716,7 +8600,7 @@ This policy setting determines whether Internet Explorer runs antimalware progra | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -8733,13 +8617,13 @@ This policy setting determines whether Internet Explorer runs antimalware progra This policy setting allows you to manage ActiveX controls not marked as safe. -- If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. +- If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting isn't recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. - If you enable this policy setting and select Prompt in the drop-down box, users are queried whether to allow the control to be loaded with parameters or scripted. -- If you disable this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. +- If you disable this policy setting, ActiveX controls that can't be made safe aren't loaded with parameters or scripted. -- If you do not configure this policy setting, users are queried whether to allow the control to be loaded with parameters or scripted. +- If you don't configure this policy setting, users are queried whether to allow the control to be loaded with parameters or scripted. @@ -8751,13 +8635,12 @@ This policy setting allows you to manage ActiveX controls not marked as safe. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -8783,7 +8666,7 @@ This policy setting allows you to manage ActiveX controls not marked as safe. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -8804,13 +8687,13 @@ This policy setting allows you to manage permissions for Java applets. Low Safety enables applets to perform all operations. -Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program cannot make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O. +Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program can't make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O. High Safety enables applets to run in their sandbox. Disable Java to prevent any applets from running. -- If you disable this policy setting, Java applets cannot run. +- If you disable this policy setting, Java applets can't run. -- If you do not configure this policy setting, the permission is set to Medium Safety. +- If you don't configure this policy setting, the permission is set to Medium Safety. @@ -8822,13 +8705,12 @@ High Safety enables applets to run in their sandbox. Disable Java to prevent any | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -8854,7 +8736,7 @@ High Safety enables applets to run in their sandbox. Disable Java to prevent any | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -8871,11 +8753,11 @@ High Safety enables applets to run in their sandbox. Disable Java to prevent any This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. -- If you enable this policy setting, users can open windows and frames from othe domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. +- If you enable this policy setting, users can open windows and frames from other domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. -- If you disable this policy setting, users cannot open windows and frames to access applications from different domains. +- If you disable this policy setting, users can't open windows and frames to access applications from different domains. -- If you do not configure this policy setting, users can open windows and frames from othe domains and access applications from other domains. +- If you don't configure this policy setting, users can open windows and frames from other domains and access applications from other domains. @@ -8887,13 +8769,12 @@ This policy setting allows you to manage the opening of windows and frames and a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -8919,7 +8800,7 @@ This policy setting allows you to manage the opening of windows and frames and a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -8938,9 +8819,9 @@ This policy setting allows you to manage whether Internet Explorer can access da - If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. -- If you disable this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. +- If you disable this policy setting, users can't load a page in the zone that uses MSXML or ADO to access data from another site in the zone. -- If you do not configure this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. +- If you don't configure this policy setting, users can't load a page in the zone that uses MSXML or ADO to access data from another site in the zone. @@ -8952,13 +8833,12 @@ This policy setting allows you to manage whether Internet Explorer can access da | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -8984,7 +8864,7 @@ This policy setting allows you to manage whether Internet Explorer can access da | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -9001,11 +8881,11 @@ This policy setting allows you to manage whether Internet Explorer can access da This policy setting manages whether users will be automatically prompted for ActiveX control installations. -- If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. +- If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they don't have installed. - If you disable this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. -- If you do not configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. +- If you don't configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. @@ -9017,13 +8897,12 @@ This policy setting manages whether users will be automatically prompted for Act | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -9049,7 +8928,7 @@ This policy setting manages whether users will be automatically prompted for Act | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -9068,7 +8947,7 @@ This policy setting determines whether users will be prompted for non user-initi - If you enable this setting, users will receive a file download dialog for automatic download attempts. -- If you disable or do not configure this setting, file downloads that are not user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. +- If you disable or don't configure this setting, file downloads that aren't user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. @@ -9080,13 +8959,12 @@ This policy setting determines whether users will be prompted for non user-initi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -9112,7 +8990,7 @@ This policy setting determines whether users will be prompted for non user-initi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -9135,7 +9013,7 @@ This policy setting allows you to manage whether pages of the zone may download - If you disable this policy setting, HTML fonts are prevented from downloading. -- If you do not configure this policy setting, HTML fonts can be downloaded automatically. +- If you don't configure this policy setting, HTML fonts can be downloaded automatically. @@ -9147,13 +9025,12 @@ This policy setting allows you to manage whether pages of the zone may download | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -9179,7 +9056,7 @@ This policy setting allows you to manage whether pages of the zone may download | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -9196,11 +9073,11 @@ This policy setting allows you to manage whether pages of the zone may download This policy setting allows you to manage whether Web sites from less privileged zones, such as Internet sites, can navigate into this zone. -- If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. +- If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that's provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. -- If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. +- If you disable this policy setting, the possibly harmful navigations is prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. -- If you do not configure this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. +- If you don't configure this policy setting, the possibly harmful navigations is prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. @@ -9212,13 +9089,12 @@ This policy setting allows you to manage whether Web sites from less privileged | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -9244,7 +9120,7 @@ This policy setting allows you to manage whether Web sites from less privileged | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -9259,13 +9135,13 @@ This policy setting allows you to manage whether Web sites from less privileged -This policy setting allows you to manage whether . NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. +This policy setting allows you to manage whether . NET Framework components that aren't signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. - If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. -- If you disable this policy setting, Internet Explorer will not execute unsigned managed components. +- If you disable this policy setting, Internet Explorer won't execute unsigned managed components. -- If you do not configure this policy setting, Internet Explorer will not execute unsigned managed components. +- If you don't configure this policy setting, Internet Explorer won't execute unsigned managed components. @@ -9277,13 +9153,12 @@ This policy setting allows you to manage whether . NET Framework components that | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -9309,7 +9184,7 @@ This policy setting allows you to manage whether . NET Framework components that | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -9328,9 +9203,9 @@ This policy setting allows you to manage whether the user can run scriptlets. - If you enable this policy setting, the user can run scriptlets. -- If you disable this policy setting, the user cannot run scriptlets. +- If you disable this policy setting, the user can't run scriptlets. -- If you do not configure this policy setting, the user can enable or disable scriptlets. +- If you don't configure this policy setting, the user can enable or disable scriptlets. @@ -9342,13 +9217,12 @@ This policy setting allows you to manage whether the user can run scriptlets. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -9374,7 +9248,7 @@ This policy setting allows you to manage whether the user can run scriptlets. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -9393,9 +9267,9 @@ This policy setting controls whether SmartScreen Filter scans pages in this zone - If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. -- If you disable this policy setting, SmartScreen Filter does not scan pages in this zone for malicious content. +- If you disable this policy setting, SmartScreen Filter doesn't scan pages in this zone for malicious content. -- If you do not configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. +- If you don't configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. > [!NOTE] > In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. @@ -9410,13 +9284,12 @@ This policy setting controls whether SmartScreen Filter scans pages in this zone | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -9442,7 +9315,7 @@ This policy setting controls whether SmartScreen Filter scans pages in this zone | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -9461,9 +9334,9 @@ This policy setting allows you to manage the preservation of information in the - If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. -- If you disable this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. +- If you disable this policy setting, users can't preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. -- If you do not configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. +- If you don't configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. @@ -9475,13 +9348,12 @@ This policy setting allows you to manage the preservation of information in the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -9507,7 +9379,7 @@ This policy setting allows you to manage the preservation of information in the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -9524,13 +9396,13 @@ This policy setting allows you to manage the preservation of information in the This policy setting allows you to manage ActiveX controls not marked as safe. -- If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. +- If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting isn't recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. - If you enable this policy setting and select Prompt in the drop-down box, users are queried whether to allow the control to be loaded with parameters or scripted. -- If you disable this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. +- If you disable this policy setting, ActiveX controls that can't be made safe aren't loaded with parameters or scripted. -- If you do not configure this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. +- If you don't configure this policy setting, ActiveX controls that can't be made safe aren't loaded with parameters or scripted. @@ -9542,13 +9414,12 @@ This policy setting allows you to manage ActiveX controls not marked as safe. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -9574,7 +9445,7 @@ This policy setting allows you to manage ActiveX controls not marked as safe. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -9595,13 +9466,13 @@ This policy setting allows you to manage permissions for Java applets. Low Safety enables applets to perform all operations. -Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program cannot make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O. +Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program can't make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O. High Safety enables applets to run in their sandbox. Disable Java to prevent any applets from running. -- If you disable this policy setting, Java applets cannot run. +- If you disable this policy setting, Java applets can't run. -- If you do not configure this policy setting, Java applets are disabled. +- If you don't configure this policy setting, Java applets are disabled. @@ -9613,13 +9484,12 @@ High Safety enables applets to run in their sandbox. Disable Java to prevent any | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -9645,7 +9515,7 @@ High Safety enables applets to run in their sandbox. Disable Java to prevent any | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -9662,11 +9532,11 @@ High Safety enables applets to run in their sandbox. Disable Java to prevent any This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. -- If you enable this policy setting, users can open windows and frames from othe domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. +- If you enable this policy setting, users can open windows and frames from other domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. -- If you disable this policy setting, users cannot open windows and frames to access applications from different domains. +- If you disable this policy setting, users can't open windows and frames to access applications from different domains. -- If you do not configure this policy setting, users can open windows and frames from othe domains and access applications from other domains. +- If you don't configure this policy setting, users can open windows and frames from other domains and access applications from other domains. @@ -9678,13 +9548,12 @@ This policy setting allows you to manage the opening of windows and frames and a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -9710,7 +9579,7 @@ This policy setting allows you to manage the opening of windows and frames and a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -9731,13 +9600,13 @@ This policy setting allows you to manage permissions for Java applets. Low Safety enables applets to perform all operations. -Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program cannot make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O. +Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program can't make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O. High Safety enables applets to run in their sandbox. Disable Java to prevent any applets from running. -- If you disable this policy setting, Java applets cannot run. +- If you disable this policy setting, Java applets can't run. -- If you do not configure this policy setting, Java applets are disabled. +- If you don't configure this policy setting, Java applets are disabled. @@ -9749,13 +9618,12 @@ High Safety enables applets to run in their sandbox. Disable Java to prevent any | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -9781,7 +9649,7 @@ High Safety enables applets to run in their sandbox. Disable Java to prevent any | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -9800,9 +9668,9 @@ This policy setting allows you to manage whether Internet Explorer can access da - If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. -- If you disable this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. +- If you disable this policy setting, users can't load a page in the zone that uses MSXML or ADO to access data from another site in the zone. -- If you do not configure this policy setting, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. +- If you don't configure this policy setting, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. @@ -9814,13 +9682,12 @@ This policy setting allows you to manage whether Internet Explorer can access da | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -9846,7 +9713,7 @@ This policy setting allows you to manage whether Internet Explorer can access da | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -9863,11 +9730,11 @@ This policy setting allows you to manage whether Internet Explorer can access da This policy setting manages whether users will be automatically prompted for ActiveX control installations. -- If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. +- If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they don't have installed. - If you disable this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. -- If you do not configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. +- If you don't configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. @@ -9879,13 +9746,12 @@ This policy setting manages whether users will be automatically prompted for Act | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -9911,7 +9777,7 @@ This policy setting manages whether users will be automatically prompted for Act | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -9930,7 +9796,7 @@ This policy setting determines whether users will be prompted for non user-initi - If you enable this setting, users will receive a file download dialog for automatic download attempts. -- If you disable or do not configure this setting, file downloads that are not user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. +- If you disable or don't configure this setting, file downloads that aren't user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. @@ -9942,13 +9808,12 @@ This policy setting determines whether users will be prompted for non user-initi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -9974,7 +9839,7 @@ This policy setting determines whether users will be prompted for non user-initi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -9997,7 +9862,7 @@ This policy setting allows you to manage whether pages of the zone may download - If you disable this policy setting, HTML fonts are prevented from downloading. -- If you do not configure this policy setting, HTML fonts can be downloaded automatically. +- If you don't configure this policy setting, HTML fonts can be downloaded automatically. @@ -10009,13 +9874,12 @@ This policy setting allows you to manage whether pages of the zone may download | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -10041,7 +9905,7 @@ This policy setting allows you to manage whether pages of the zone may download | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -10058,11 +9922,11 @@ This policy setting allows you to manage whether pages of the zone may download This policy setting allows you to manage whether Web sites from less privileged zones, such as Internet sites, can navigate into this zone. -- If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. +- If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that's provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. -- If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. +- If you disable this policy setting, the possibly harmful navigations is prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. -- If you do not configure this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. +- If you don't configure this policy setting, the possibly harmful navigations is prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. @@ -10074,13 +9938,12 @@ This policy setting allows you to manage whether Web sites from less privileged | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -10106,7 +9969,7 @@ This policy setting allows you to manage whether Web sites from less privileged | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -10121,13 +9984,13 @@ This policy setting allows you to manage whether Web sites from less privileged -This policy setting allows you to manage whether . NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. +This policy setting allows you to manage whether . NET Framework components that aren't signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. - If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. -- If you disable this policy setting, Internet Explorer will not execute unsigned managed components. +- If you disable this policy setting, Internet Explorer won't execute unsigned managed components. -- If you do not configure this policy setting, Internet Explorer will not execute unsigned managed components. +- If you don't configure this policy setting, Internet Explorer won't execute unsigned managed components. @@ -10139,13 +10002,12 @@ This policy setting allows you to manage whether . NET Framework components that | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -10171,7 +10033,7 @@ This policy setting allows you to manage whether . NET Framework components that | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -10190,9 +10052,9 @@ This policy setting allows you to manage whether the user can run scriptlets. - If you enable this policy setting, the user can run scriptlets. -- If you disable this policy setting, the user cannot run scriptlets. +- If you disable this policy setting, the user can't run scriptlets. -- If you do not configure this policy setting, the user can enable or disable scriptlets. +- If you don't configure this policy setting, the user can enable or disable scriptlets. @@ -10204,13 +10066,12 @@ This policy setting allows you to manage whether the user can run scriptlets. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -10236,7 +10097,7 @@ This policy setting allows you to manage whether the user can run scriptlets. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -10255,9 +10116,9 @@ This policy setting controls whether SmartScreen Filter scans pages in this zone - If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. -- If you disable this policy setting, SmartScreen Filter does not scan pages in this zone for malicious content. +- If you disable this policy setting, SmartScreen Filter doesn't scan pages in this zone for malicious content. -- If you do not configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. +- If you don't configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. > [!NOTE] > In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. @@ -10272,13 +10133,12 @@ This policy setting controls whether SmartScreen Filter scans pages in this zone | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -10304,7 +10164,7 @@ This policy setting controls whether SmartScreen Filter scans pages in this zone | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -10323,9 +10183,9 @@ This policy setting allows you to manage the preservation of information in the - If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. -- If you disable this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. +- If you disable this policy setting, users can't preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. -- If you do not configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. +- If you don't configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. @@ -10337,13 +10197,12 @@ This policy setting allows you to manage the preservation of information in the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -10369,7 +10228,7 @@ This policy setting allows you to manage the preservation of information in the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -10386,13 +10245,13 @@ This policy setting allows you to manage the preservation of information in the This policy setting allows you to manage ActiveX controls not marked as safe. -- If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. +- If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting isn't recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. - If you enable this policy setting and select Prompt in the drop-down box, users are queried whether to allow the control to be loaded with parameters or scripted. -- If you disable this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. +- If you disable this policy setting, ActiveX controls that can't be made safe aren't loaded with parameters or scripted. -- If you do not configure this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. +- If you don't configure this policy setting, ActiveX controls that can't be made safe aren't loaded with parameters or scripted. @@ -10404,13 +10263,12 @@ This policy setting allows you to manage ActiveX controls not marked as safe. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -10436,7 +10294,7 @@ This policy setting allows you to manage ActiveX controls not marked as safe. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -10453,11 +10311,11 @@ This policy setting allows you to manage ActiveX controls not marked as safe. This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. -- If you enable this policy setting, users can open windows and frames from othe domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. +- If you enable this policy setting, users can open windows and frames from other domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. -- If you disable this policy setting, users cannot open windows and frames to access applications from different domains. +- If you disable this policy setting, users can't open windows and frames to access applications from different domains. -- If you do not configure this policy setting, users can open windows and frames from othe domains and access applications from other domains. +- If you don't configure this policy setting, users can open windows and frames from other domains and access applications from other domains. @@ -10469,13 +10327,12 @@ This policy setting allows you to manage the opening of windows and frames and a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -10501,7 +10358,7 @@ This policy setting allows you to manage the opening of windows and frames and a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -10520,9 +10377,9 @@ This policy setting allows you to manage whether Internet Explorer can access da - If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. -- If you disable this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. +- If you disable this policy setting, users can't load a page in the zone that uses MSXML or ADO to access data from another site in the zone. -- If you do not configure this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. +- If you don't configure this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. @@ -10534,13 +10391,12 @@ This policy setting allows you to manage whether Internet Explorer can access da | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -10566,7 +10422,7 @@ This policy setting allows you to manage whether Internet Explorer can access da | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -10583,11 +10439,11 @@ This policy setting allows you to manage whether Internet Explorer can access da This policy setting manages whether users will be automatically prompted for ActiveX control installations. -- If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. +- If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they don't have installed. - If you disable this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. -- If you do not configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. +- If you don't configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. @@ -10599,13 +10455,12 @@ This policy setting manages whether users will be automatically prompted for Act | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -10631,7 +10486,7 @@ This policy setting manages whether users will be automatically prompted for Act | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -10650,7 +10505,7 @@ This policy setting determines whether users will be prompted for non user-initi - If you enable this setting, users will receive a file download dialog for automatic download attempts. -- If you disable or do not configure this setting, file downloads that are not user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. +- If you disable or don't configure this setting, file downloads that aren't user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. @@ -10662,13 +10517,12 @@ This policy setting determines whether users will be prompted for non user-initi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -10694,7 +10548,7 @@ This policy setting determines whether users will be prompted for non user-initi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -10717,7 +10571,7 @@ This policy setting allows you to manage whether pages of the zone may download - If you disable this policy setting, HTML fonts are prevented from downloading. -- If you do not configure this policy setting, HTML fonts can be downloaded automatically. +- If you don't configure this policy setting, HTML fonts can be downloaded automatically. @@ -10729,13 +10583,12 @@ This policy setting allows you to manage whether pages of the zone may download | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -10761,7 +10614,7 @@ This policy setting allows you to manage whether pages of the zone may download | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -10778,11 +10631,11 @@ This policy setting allows you to manage whether pages of the zone may download This policy setting allows you to manage whether Web sites from less privileged zones, such as Internet sites, can navigate into this zone. -- If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. +- If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that's provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. -- If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. +- If you disable this policy setting, the possibly harmful navigations is prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. -- If you do not configure this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. +- If you don't configure this policy setting, the possibly harmful navigations is prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. @@ -10794,13 +10647,12 @@ This policy setting allows you to manage whether Web sites from less privileged | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -10826,7 +10678,7 @@ This policy setting allows you to manage whether Web sites from less privileged | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -10841,13 +10693,13 @@ This policy setting allows you to manage whether Web sites from less privileged -This policy setting allows you to manage whether . NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. +This policy setting allows you to manage whether . NET Framework components that aren't signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. - If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. -- If you disable this policy setting, Internet Explorer will not execute unsigned managed components. +- If you disable this policy setting, Internet Explorer won't execute unsigned managed components. -- If you do not configure this policy setting, Internet Explorer will not execute unsigned managed components. +- If you don't configure this policy setting, Internet Explorer won't execute unsigned managed components. @@ -10859,13 +10711,12 @@ This policy setting allows you to manage whether . NET Framework components that | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -10891,7 +10742,7 @@ This policy setting allows you to manage whether . NET Framework components that | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -10910,9 +10761,9 @@ This policy setting allows you to manage whether the user can run scriptlets. - If you enable this policy setting, the user can run scriptlets. -- If you disable this policy setting, the user cannot run scriptlets. +- If you disable this policy setting, the user can't run scriptlets. -- If you do not configure this policy setting, the user can enable or disable scriptlets. +- If you don't configure this policy setting, the user can enable or disable scriptlets. @@ -10924,13 +10775,12 @@ This policy setting allows you to manage whether the user can run scriptlets. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -10956,7 +10806,7 @@ This policy setting allows you to manage whether the user can run scriptlets. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -10975,9 +10825,9 @@ This policy setting controls whether SmartScreen Filter scans pages in this zone - If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. -- If you disable this policy setting, SmartScreen Filter does not scan pages in this zone for malicious content. +- If you disable this policy setting, SmartScreen Filter doesn't scan pages in this zone for malicious content. -- If you do not configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. +- If you don't configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. > [!NOTE] > In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. @@ -10992,13 +10842,12 @@ This policy setting controls whether SmartScreen Filter scans pages in this zone | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -11024,7 +10873,7 @@ This policy setting controls whether SmartScreen Filter scans pages in this zone | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -11043,9 +10892,9 @@ This policy setting allows you to manage the preservation of information in the - If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. -- If you disable this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. +- If you disable this policy setting, users can't preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. -- If you do not configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. +- If you don't configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. @@ -11057,13 +10906,12 @@ This policy setting allows you to manage the preservation of information in the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -11089,7 +10937,7 @@ This policy setting allows you to manage the preservation of information in the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -11106,13 +10954,13 @@ This policy setting allows you to manage the preservation of information in the This policy setting allows you to manage ActiveX controls not marked as safe. -- If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. +- If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting isn't recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. - If you enable this policy setting and select Prompt in the drop-down box, users are queried whether to allow the control to be loaded with parameters or scripted. -- If you disable this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. +- If you disable this policy setting, ActiveX controls that can't be made safe aren't loaded with parameters or scripted. -- If you do not configure this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. +- If you don't configure this policy setting, ActiveX controls that can't be made safe aren't loaded with parameters or scripted. @@ -11124,13 +10972,12 @@ This policy setting allows you to manage ActiveX controls not marked as safe. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -11156,7 +11003,7 @@ This policy setting allows you to manage ActiveX controls not marked as safe. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -11177,13 +11024,13 @@ This policy setting allows you to manage permissions for Java applets. Low Safety enables applets to perform all operations. -Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program cannot make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O. +Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program can't make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O. High Safety enables applets to run in their sandbox. Disable Java to prevent any applets from running. -- If you disable this policy setting, Java applets cannot run. +- If you disable this policy setting, Java applets can't run. -- If you do not configure this policy setting, Java applets are disabled. +- If you don't configure this policy setting, Java applets are disabled. @@ -11195,13 +11042,12 @@ High Safety enables applets to run in their sandbox. Disable Java to prevent any | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -11227,7 +11073,7 @@ High Safety enables applets to run in their sandbox. Disable Java to prevent any | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -11244,11 +11090,11 @@ High Safety enables applets to run in their sandbox. Disable Java to prevent any This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. -- If you enable this policy setting, users can open windows and frames from othe domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. +- If you enable this policy setting, users can open windows and frames from other domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. -- If you disable this policy setting, users cannot open windows and frames to access applications from different domains. +- If you disable this policy setting, users can't open windows and frames to access applications from different domains. -- If you do not configure this policy setting, users can open windows and frames from othe domains and access applications from other domains. +- If you don't configure this policy setting, users can open windows and frames from other domains and access applications from other domains. @@ -11260,13 +11106,12 @@ This policy setting allows you to manage the opening of windows and frames and a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -11292,7 +11137,7 @@ This policy setting allows you to manage the opening of windows and frames and a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -11311,9 +11156,9 @@ This policy setting allows you to manage whether Internet Explorer can access da - If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. -- If you disable this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. +- If you disable this policy setting, users can't load a page in the zone that uses MSXML or ADO to access data from another site in the zone. -- If you do not configure this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. +- If you don't configure this policy setting, users can't load a page in the zone that uses MSXML or ADO to access data from another site in the zone. @@ -11325,13 +11170,12 @@ This policy setting allows you to manage whether Internet Explorer can access da | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -11357,7 +11201,7 @@ This policy setting allows you to manage whether Internet Explorer can access da | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -11374,11 +11218,11 @@ This policy setting allows you to manage whether Internet Explorer can access da This policy setting manages whether users will be automatically prompted for ActiveX control installations. -- If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. +- If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they don't have installed. - If you disable this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. -- If you do not configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. +- If you don't configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. @@ -11390,13 +11234,12 @@ This policy setting manages whether users will be automatically prompted for Act | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -11422,7 +11265,7 @@ This policy setting manages whether users will be automatically prompted for Act | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -11441,7 +11284,7 @@ This policy setting determines whether users will be prompted for non user-initi - If you enable this setting, users will receive a file download dialog for automatic download attempts. -- If you disable or do not configure this setting, file downloads that are not user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. +- If you disable or don't configure this setting, file downloads that aren't user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. @@ -11453,13 +11296,12 @@ This policy setting determines whether users will be prompted for non user-initi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -11485,7 +11327,7 @@ This policy setting determines whether users will be prompted for non user-initi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -11508,7 +11350,7 @@ This policy setting allows you to manage whether pages of the zone may download - If you disable this policy setting, HTML fonts are prevented from downloading. -- If you do not configure this policy setting, users are queried whether to allow HTML fonts to download. +- If you don't configure this policy setting, users are queried whether to allow HTML fonts to download. @@ -11520,13 +11362,12 @@ This policy setting allows you to manage whether pages of the zone may download | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -11552,7 +11393,7 @@ This policy setting allows you to manage whether pages of the zone may download | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -11569,11 +11410,11 @@ This policy setting allows you to manage whether pages of the zone may download This policy setting allows you to manage whether Web sites from less privileged zones, such as Internet sites, can navigate into this zone. -- If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. +- If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that's provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. -- If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. +- If you disable this policy setting, the possibly harmful navigations is prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. -- If you do not configure this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. +- If you don't configure this policy setting, the possibly harmful navigations is prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. @@ -11585,13 +11426,12 @@ This policy setting allows you to manage whether Web sites from less privileged | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -11617,7 +11457,7 @@ This policy setting allows you to manage whether Web sites from less privileged | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -11632,13 +11472,13 @@ This policy setting allows you to manage whether Web sites from less privileged -This policy setting allows you to manage whether . NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. +This policy setting allows you to manage whether . NET Framework components that aren't signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. - If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. -- If you disable this policy setting, Internet Explorer will not execute unsigned managed components. +- If you disable this policy setting, Internet Explorer won't execute unsigned managed components. -- If you do not configure this policy setting, Internet Explorer will not execute unsigned managed components. +- If you don't configure this policy setting, Internet Explorer won't execute unsigned managed components. @@ -11650,13 +11490,12 @@ This policy setting allows you to manage whether . NET Framework components that | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -11682,7 +11521,7 @@ This policy setting allows you to manage whether . NET Framework components that | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -11701,9 +11540,9 @@ This policy setting allows you to manage whether the user can run scriptlets. - If you enable this policy setting, the user can run scriptlets. -- If you disable this policy setting, the user cannot run scriptlets. +- If you disable this policy setting, the user can't run scriptlets. -- If you do not configure this policy setting, the user can enable or disable scriptlets. +- If you don't configure this policy setting, the user can enable or disable scriptlets. @@ -11715,13 +11554,12 @@ This policy setting allows you to manage whether the user can run scriptlets. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -11747,7 +11585,7 @@ This policy setting allows you to manage whether the user can run scriptlets. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -11766,9 +11604,9 @@ This policy setting controls whether SmartScreen Filter scans pages in this zone - If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. -- If you disable this policy setting, SmartScreen Filter does not scan pages in this zone for malicious content. +- If you disable this policy setting, SmartScreen Filter doesn't scan pages in this zone for malicious content. -- If you do not configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. +- If you don't configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. > [!NOTE] > In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. @@ -11783,13 +11621,12 @@ This policy setting controls whether SmartScreen Filter scans pages in this zone | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -11815,7 +11652,7 @@ This policy setting controls whether SmartScreen Filter scans pages in this zone | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -11834,9 +11671,9 @@ This policy setting allows you to manage the preservation of information in the - If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. -- If you disable this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. +- If you disable this policy setting, users can't preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. -- If you do not configure this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. +- If you don't configure this policy setting, users can't preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. @@ -11848,13 +11685,12 @@ This policy setting allows you to manage the preservation of information in the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -11880,7 +11716,7 @@ This policy setting allows you to manage the preservation of information in the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -11897,13 +11733,13 @@ This policy setting allows you to manage the preservation of information in the This policy setting allows you to manage ActiveX controls not marked as safe. -- If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. +- If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting isn't recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. - If you enable this policy setting and select Prompt in the drop-down box, users are queried whether to allow the control to be loaded with parameters or scripted. -- If you disable this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. +- If you disable this policy setting, ActiveX controls that can't be made safe aren't loaded with parameters or scripted. -- If you do not configure this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. +- If you don't configure this policy setting, ActiveX controls that can't be made safe aren't loaded with parameters or scripted. @@ -11915,13 +11751,12 @@ This policy setting allows you to manage ActiveX controls not marked as safe. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -11947,7 +11782,7 @@ This policy setting allows you to manage ActiveX controls not marked as safe. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -11968,13 +11803,13 @@ This policy setting allows you to manage permissions for Java applets. Low Safety enables applets to perform all operations. -Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program cannot make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O. +Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program can't make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O. High Safety enables applets to run in their sandbox. Disable Java to prevent any applets from running. -- If you disable this policy setting, Java applets cannot run. +- If you disable this policy setting, Java applets can't run. -- If you do not configure this policy setting, Java applets are disabled. +- If you don't configure this policy setting, Java applets are disabled. @@ -11986,13 +11821,12 @@ High Safety enables applets to run in their sandbox. Disable Java to prevent any | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -12018,7 +11852,7 @@ High Safety enables applets to run in their sandbox. Disable Java to prevent any | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -12037,9 +11871,9 @@ This policy setting allows you to manage the opening of windows and frames and a - If you enable this policy setting, users can open additional windows and frames from other domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow additional windows and frames to access applications from other domains. -- If you disable this policy setting, users cannot open other windows and frames from other domains or access applications from different domains. +- If you disable this policy setting, users can't open other windows and frames from other domains or access applications from different domains. -- If you do not configure this policy setting, users cannot open other windows and frames from different domains or access applications from different domains. +- If you don't configure this policy setting, users can't open other windows and frames from different domains or access applications from different domains. @@ -12051,13 +11885,12 @@ This policy setting allows you to manage the opening of windows and frames and a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -12083,7 +11916,7 @@ This policy setting allows you to manage the opening of windows and frames and a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -12102,9 +11935,9 @@ This policy setting allows you to manage whether Internet Explorer can access da - If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. -- If you disable this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. +- If you disable this policy setting, users can't load a page in the zone that uses MSXML or ADO to access data from another site in the zone. -- If you do not configure this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. +- If you don't configure this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. @@ -12116,13 +11949,12 @@ This policy setting allows you to manage whether Internet Explorer can access da | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -12148,7 +11980,7 @@ This policy setting allows you to manage whether Internet Explorer can access da | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -12165,11 +11997,11 @@ This policy setting allows you to manage whether Internet Explorer can access da This policy setting manages whether users will be automatically prompted for ActiveX control installations. -- If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. +- If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they don't have installed. - If you disable this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. -- If you do not configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. +- If you don't configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. @@ -12181,13 +12013,12 @@ This policy setting manages whether users will be automatically prompted for Act | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -12213,7 +12044,7 @@ This policy setting manages whether users will be automatically prompted for Act | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -12232,7 +12063,7 @@ This policy setting determines whether users will be prompted for non user-initi - If you enable this setting, users will receive a file download dialog for automatic download attempts. -- If you disable or do not configure this setting, file downloads that are not user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. +- If you disable or don't configure this setting, file downloads that aren't user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. @@ -12244,13 +12075,12 @@ This policy setting determines whether users will be prompted for non user-initi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -12276,7 +12106,7 @@ This policy setting determines whether users will be prompted for non user-initi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -12299,7 +12129,7 @@ This policy setting allows you to manage whether pages of the zone may download - If you disable this policy setting, HTML fonts are prevented from downloading. -- If you do not configure this policy setting, HTML fonts can be downloaded automatically. +- If you don't configure this policy setting, HTML fonts can be downloaded automatically. @@ -12311,13 +12141,12 @@ This policy setting allows you to manage whether pages of the zone may download | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -12343,7 +12172,7 @@ This policy setting allows you to manage whether pages of the zone may download | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -12360,11 +12189,11 @@ This policy setting allows you to manage whether pages of the zone may download This policy setting allows you to manage whether Web sites from less privileged zones, such as Internet sites, can navigate into this zone. -- If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. +- If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that's provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. -- If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. +- If you disable this policy setting, the possibly harmful navigations is prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. -- If you do not configure this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. +- If you don't configure this policy setting, the possibly harmful navigations is prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. @@ -12376,13 +12205,12 @@ This policy setting allows you to manage whether Web sites from less privileged | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -12408,7 +12236,7 @@ This policy setting allows you to manage whether Web sites from less privileged | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -12423,13 +12251,13 @@ This policy setting allows you to manage whether Web sites from less privileged -This policy setting allows you to manage whether . NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. +This policy setting allows you to manage whether . NET Framework components that aren't signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. - If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. -- If you disable this policy setting, Internet Explorer will not execute unsigned managed components. +- If you disable this policy setting, Internet Explorer won't execute unsigned managed components. -- If you do not configure this policy setting, Internet Explorer will not execute unsigned managed components. +- If you don't configure this policy setting, Internet Explorer won't execute unsigned managed components. @@ -12441,13 +12269,12 @@ This policy setting allows you to manage whether . NET Framework components that | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -12473,7 +12300,7 @@ This policy setting allows you to manage whether . NET Framework components that | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -12492,9 +12319,9 @@ This policy setting allows you to manage whether the user can run scriptlets. - If you enable this policy setting, the user can run scriptlets. -- If you disable this policy setting, the user cannot run scriptlets. +- If you disable this policy setting, the user can't run scriptlets. -- If you do not configure this policy setting, the user can enable or disable scriptlets. +- If you don't configure this policy setting, the user can enable or disable scriptlets. @@ -12506,13 +12333,12 @@ This policy setting allows you to manage whether the user can run scriptlets. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -12538,7 +12364,7 @@ This policy setting allows you to manage whether the user can run scriptlets. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -12557,9 +12383,9 @@ This policy setting controls whether SmartScreen Filter scans pages in this zone - If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. -- If you disable this policy setting, SmartScreen Filter does not scan pages in this zone for malicious content. +- If you disable this policy setting, SmartScreen Filter doesn't scan pages in this zone for malicious content. -- If you do not configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. +- If you don't configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. > [!NOTE] > In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. @@ -12574,13 +12400,12 @@ This policy setting controls whether SmartScreen Filter scans pages in this zone | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -12606,7 +12431,7 @@ This policy setting controls whether SmartScreen Filter scans pages in this zone | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -12625,9 +12450,9 @@ This policy setting allows you to manage the preservation of information in the - If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. -- If you disable this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. +- If you disable this policy setting, users can't preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. -- If you do not configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. +- If you don't configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. @@ -12639,13 +12464,12 @@ This policy setting allows you to manage the preservation of information in the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -12671,7 +12495,7 @@ This policy setting allows you to manage the preservation of information in the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -12688,13 +12512,13 @@ This policy setting allows you to manage the preservation of information in the This policy setting allows you to manage ActiveX controls not marked as safe. -- If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. +- If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting isn't recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. - If you enable this policy setting and select Prompt in the drop-down box, users are queried whether to allow the control to be loaded with parameters or scripted. -- If you disable this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. +- If you disable this policy setting, ActiveX controls that can't be made safe aren't loaded with parameters or scripted. -- If you do not configure this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. +- If you don't configure this policy setting, ActiveX controls that can't be made safe aren't loaded with parameters or scripted. @@ -12706,13 +12530,12 @@ This policy setting allows you to manage ActiveX controls not marked as safe. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -12738,7 +12561,7 @@ This policy setting allows you to manage ActiveX controls not marked as safe. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -12759,13 +12582,13 @@ This policy setting allows you to manage permissions for Java applets. Low Safety enables applets to perform all operations. -Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program cannot make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O. +Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program can't make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O. High Safety enables applets to run in their sandbox. Disable Java to prevent any applets from running. -- If you disable this policy setting, Java applets cannot run. +- If you disable this policy setting, Java applets can't run. -- If you do not configure this policy setting, Java applets are disabled. +- If you don't configure this policy setting, Java applets are disabled. @@ -12777,13 +12600,12 @@ High Safety enables applets to run in their sandbox. Disable Java to prevent any | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -12809,7 +12631,7 @@ High Safety enables applets to run in their sandbox. Disable Java to prevent any | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -12826,11 +12648,11 @@ High Safety enables applets to run in their sandbox. Disable Java to prevent any This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. -- If you enable this policy setting, users can open windows and frames from othe domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. +- If you enable this policy setting, users can open windows and frames from other domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. -- If you disable this policy setting, users cannot open windows and frames to access applications from different domains. +- If you disable this policy setting, users can't open windows and frames to access applications from different domains. -- If you do not configure this policy setting, users can open windows and frames from othe domains and access applications from other domains. +- If you don't configure this policy setting, users can open windows and frames from other domains and access applications from other domains. @@ -12842,13 +12664,12 @@ This policy setting allows you to manage the opening of windows and frames and a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -12874,7 +12695,7 @@ This policy setting allows you to manage the opening of windows and frames and a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -12895,7 +12716,7 @@ This policy setting determines whether Internet Explorer MIME sniffing will prev - If you disable this policy setting, Internet Explorer processes will allow a MIME sniff promoting a file of one type to a more dangerous file type. -- If you do not configure this policy setting, MIME sniffing will never promote a file of one type to a more dangerous file type. +- If you don't configure this policy setting, MIME sniffing will never promote a file of one type to a more dangerous file type. @@ -12907,13 +12728,12 @@ This policy setting determines whether Internet Explorer MIME sniffing will prev | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -12939,7 +12759,7 @@ This policy setting determines whether Internet Explorer MIME sniffing will prev | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -12960,7 +12780,7 @@ The MK Protocol Security Restriction policy setting reduces attack surface area - If you disable this policy setting, applications can use the MK protocol API. Resources hosted on the MK protocol will work for the File Explorer and Internet Explorer processes. -- If you do not configure this policy setting, the MK Protocol is prevented for File Explorer and Internet Explorer, and resources hosted on the MK protocol will fail. +- If you don't configure this policy setting, the MK Protocol is prevented for File Explorer and Internet Explorer, and resources hosted on the MK protocol will fail. @@ -12972,13 +12792,12 @@ The MK Protocol Security Restriction policy setting reduces attack surface area | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -13004,7 +12823,7 @@ The MK Protocol Security Restriction policy setting reduces attack surface area | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -13019,11 +12838,11 @@ The MK Protocol Security Restriction policy setting reduces attack surface area -This policy setting allows you to specify what is displayed when the user opens a new tab. +This policy setting allows you to specify what's displayed when the user opens a new tab. - If you enable this policy setting, you can choose which page to display when the user opens a new tab: blank page (about:blank), the first home page, the new tab page or the new tab page with my news feed. -- If you disable or do not configure this policy setting, the user can select his or her preference for this behavior. +- If you disable or don't configure this policy setting, the user can select his or her preference for this behavior. @@ -13035,13 +12854,12 @@ This policy setting allows you to specify what is displayed when the user opens | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -13067,7 +12885,7 @@ This policy setting allows you to specify what is displayed when the user opens | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -13086,9 +12904,9 @@ This policy setting allows you to manage whether the Notification bar is display - If you enable this policy setting, the Notification bar will be displayed for Internet Explorer Processes. -- If you disable this policy setting, the Notification bar will not be displayed for Internet Explorer processes. +- If you disable this policy setting, the Notification bar won't be displayed for Internet Explorer processes. -- If you do not configure this policy setting, the Notification bar will be displayed for Internet Explorer Processes. +- If you don't configure this policy setting, the Notification bar will be displayed for Internet Explorer Processes. @@ -13100,13 +12918,12 @@ This policy setting allows you to manage whether the Notification bar is display | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -13132,7 +12949,7 @@ This policy setting allows you to manage whether the Notification bar is display | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -13149,9 +12966,9 @@ This policy setting allows you to manage whether the Notification bar is display This policy setting prevents the user from managing SmartScreen Filter, which warns the user if the website being visited is known for fraudulent attempts to gather personal information through "phishing," or is known to host malware. -- If you enable this policy setting, the user is not prompted to turn on SmartScreen Filter. All website addresses that are not on the filter's allow list are sent automatically to Microsoft without prompting the user. +- If you enable this policy setting, the user isn't prompted to turn on SmartScreen Filter. All website addresses that aren't on the filter's allow list are sent automatically to Microsoft without prompting the user. -- If you disable or do not configure this policy setting, the user is prompted to decide whether to turn on SmartScreen Filter during the first-run experience. +- If you disable or don't configure this policy setting, the user is prompted to decide whether to turn on SmartScreen Filter during the first-run experience. @@ -13163,13 +12980,12 @@ This policy setting prevents the user from managing SmartScreen Filter, which wa | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -13195,7 +13011,7 @@ This policy setting prevents the user from managing SmartScreen Filter, which wa | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -13212,9 +13028,9 @@ This policy setting prevents the user from managing SmartScreen Filter, which wa This policy setting allows you to prevent the installation of ActiveX controls on a per-user basis. -- If you enable this policy setting, ActiveX controls cannot be installed on a per-user basis. +- If you enable this policy setting, ActiveX controls can't be installed on a per-user basis. -- If you disable or do not configure this policy setting, ActiveX controls can be installed on a per-user basis. +- If you disable or don't configure this policy setting, ActiveX controls can be installed on a per-user basis. @@ -13226,13 +13042,12 @@ This policy setting allows you to prevent the installation of ActiveX controls o | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -13259,7 +13074,7 @@ This policy setting allows you to prevent the installation of ActiveX controls o | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -13280,7 +13095,7 @@ Internet Explorer places restrictions on each Web page it opens. The restriction - If you disable this policy setting, no zone receives such protection for Internet Explorer processes. -- If you do not configure this policy setting, any zone can be protected from zone elevation by Internet Explorer processes. +- If you don't configure this policy setting, any zone can be protected from zone elevation by Internet Explorer processes. @@ -13292,13 +13107,12 @@ Internet Explorer places restrictions on each Web page it opens. The restriction | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -13324,7 +13138,7 @@ Internet Explorer places restrictions on each Web page it opens. The restriction | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -13357,13 +13171,12 @@ For more information, see "Outdated ActiveX Controls" in the Internet Explorer T | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -13390,7 +13203,7 @@ For more information, see "Outdated ActiveX Controls" in the Internet Explorer T | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20348.261] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.1832] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1266] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000.282] and later
    :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20348.261] and later
    ✅ Windows 10, version 1903 [10.0.18362.1832] and later
    ✅ Windows 10, version 2004 [10.0.19041.1266] and later
    ✅ Windows 11, version 21H2 [10.0.22000.282] and later
    ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -13407,7 +13220,7 @@ For more information, see "Outdated ActiveX Controls" in the Internet Explorer T This policy setting lets admins reset zoom to default for HTML dialogs in Internet Explorer mode. -If you enable this policy, the zoom of an HTML dialog in Internet Explorer mode will not get propagated from its parent page. +If you enable this policy, the zoom of an HTML dialog in Internet Explorer mode won't get propagated from its parent page. If you disable, or don't configure this policy, the zoom of an HTML dialog in Internet Explorer mode will be set based on the zoom of it's parent page. @@ -13423,13 +13236,12 @@ For more information, see | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -13456,7 +13268,7 @@ For more information, see | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -13475,9 +13287,9 @@ This policy setting enables blocking of ActiveX control installation prompts for - If you enable this policy setting, prompting for ActiveX control installations will be blocked for Internet Explorer processes. -- If you disable this policy setting, prompting for ActiveX control installations will not be blocked for Internet Explorer processes. +- If you disable this policy setting, prompting for ActiveX control installations won't be blocked for Internet Explorer processes. -- If you do not configure this policy setting, the user's preference will be used to determine whether to block ActiveX control installations for Internet Explorer processes. +- If you don't configure this policy setting, the user's preference will be used to determine whether to block ActiveX control installations for Internet Explorer processes. @@ -13489,13 +13301,12 @@ This policy setting enables blocking of ActiveX control installation prompts for | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -13521,7 +13332,7 @@ This policy setting enables blocking of ActiveX control installation prompts for | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -13540,9 +13351,9 @@ This policy setting allows you to manage whether Internet Explorer can access da - If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. -- If you disable this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. +- If you disable this policy setting, users can't load a page in the zone that uses MSXML or ADO to access data from another site in the zone. -- If you do not configure this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. +- If you don't configure this policy setting, users can't load a page in the zone that uses MSXML or ADO to access data from another site in the zone. @@ -13554,13 +13365,12 @@ This policy setting allows you to manage whether Internet Explorer can access da | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -13586,7 +13396,7 @@ This policy setting allows you to manage whether Internet Explorer can access da | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -13607,7 +13417,7 @@ This policy setting allows you to manage whether script code on pages in the zon - If you disable this policy setting, script code on pages in the zone is prevented from running. -- If you do not configure this policy setting, script code on pages in the zone is prevented from running. +- If you don't configure this policy setting, script code on pages in the zone is prevented from running. @@ -13619,13 +13429,12 @@ This policy setting allows you to manage whether script code on pages in the zon | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -13651,7 +13460,7 @@ This policy setting allows you to manage whether script code on pages in the zon | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -13668,11 +13477,11 @@ This policy setting allows you to manage whether script code on pages in the zon This policy setting manages whether users will be automatically prompted for ActiveX control installations. -- If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. +- If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they don't have installed. - If you disable this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. -- If you do not configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. +- If you don't configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. @@ -13684,13 +13493,12 @@ This policy setting manages whether users will be automatically prompted for Act | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -13716,7 +13524,7 @@ This policy setting manages whether users will be automatically prompted for Act | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -13735,7 +13543,7 @@ This policy setting determines whether users will be prompted for non user-initi - If you enable this setting, users will receive a file download dialog for automatic download attempts. -- If you disable or do not configure this setting, file downloads that are not user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. +- If you disable or don't configure this setting, file downloads that aren't user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. @@ -13747,13 +13555,12 @@ This policy setting determines whether users will be prompted for non user-initi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -13779,7 +13586,7 @@ This policy setting determines whether users will be prompted for non user-initi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -13798,9 +13605,9 @@ This policy setting allows you to manage dynamic binary and script behaviors: co - If you enable this policy setting, binary and script behaviors are available. If you select Administrator approved in the drop-down box, only behaviors listed in the Admin-approved Behaviors under Binary Behaviors Security Restriction policy are available. -- If you disable this policy setting, binary and script behaviors are not available unless applications have implemented a custom security manager. +- If you disable this policy setting, binary and script behaviors aren't available unless applications have implemented a custom security manager. -- If you do not configure this policy setting, binary and script behaviors are not available unless applications have implemented a custom security manager. +- If you don't configure this policy setting, binary and script behaviors aren't available unless applications have implemented a custom security manager. @@ -13812,13 +13619,12 @@ This policy setting allows you to manage dynamic binary and script behaviors: co | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -13844,7 +13650,7 @@ This policy setting allows you to manage dynamic binary and script behaviors: co | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -13865,9 +13671,9 @@ This policy setting allows you to manage whether scripts can perform a clipboard If you select Prompt in the drop-down box, users are queried as to whether to perform clipboard operations. -- If you disable this policy setting, a script cannot perform a clipboard operation. +- If you disable this policy setting, a script can't perform a clipboard operation. -- If you do not configure this policy setting, a script cannot perform a clipboard operation. +- If you don't configure this policy setting, a script can't perform a clipboard operation. @@ -13879,13 +13685,12 @@ If you select Prompt in the drop-down box, users are queried as to whether to pe | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -13911,7 +13716,7 @@ If you select Prompt in the drop-down box, users are queried as to whether to pe | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -13932,7 +13737,7 @@ This policy setting allows you to manage whether users can drag files or copy an - If you disable this policy setting, users are prevented from dragging files or copying and pasting files from this zone. -- If you do not configure this policy setting, users are queried to choose whether to drag or copy files from this zone. +- If you don't configure this policy setting, users are queried to choose whether to drag or copy files from this zone. @@ -13944,13 +13749,12 @@ This policy setting allows you to manage whether users can drag files or copy an | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -13976,7 +13780,7 @@ This policy setting allows you to manage whether users can drag files or copy an | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -13997,7 +13801,7 @@ This policy setting allows you to manage whether file downloads are permitted fr - If you disable this policy setting, files are prevented from being downloaded from the zone. -- If you do not configure this policy setting, files are prevented from being downloaded from the zone. +- If you don't configure this policy setting, files are prevented from being downloaded from the zone. @@ -14009,13 +13813,12 @@ This policy setting allows you to manage whether file downloads are permitted fr | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -14041,7 +13844,7 @@ This policy setting allows you to manage whether file downloads are permitted fr | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -14064,7 +13867,7 @@ This policy setting allows you to manage whether pages of the zone may download - If you disable this policy setting, HTML fonts are prevented from downloading. -- If you do not configure this policy setting, users are queried whether to allow HTML fonts to download. +- If you don't configure this policy setting, users are queried whether to allow HTML fonts to download. @@ -14076,13 +13879,12 @@ This policy setting allows you to manage whether pages of the zone may download | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -14108,7 +13910,7 @@ This policy setting allows you to manage whether pages of the zone may download | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -14125,11 +13927,11 @@ This policy setting allows you to manage whether pages of the zone may download This policy setting allows you to manage whether Web sites from less privileged zones, such as Internet sites, can navigate into this zone. -- If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. +- If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that's provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. -- If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. +- If you disable this policy setting, the possibly harmful navigations is prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. -- If you do not configure this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. +- If you don't configure this policy setting, the possibly harmful navigations is prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. @@ -14141,13 +13943,12 @@ This policy setting allows you to manage whether Web sites from less privileged | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -14173,7 +13974,7 @@ This policy setting allows you to manage whether Web sites from less privileged | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -14190,11 +13991,11 @@ This policy setting allows you to manage whether Web sites from less privileged This policy setting allows you to manage the loading of Extensible Application Markup Language (XAML) files. XAML is an XML-based declarative markup language commonly used for creating rich user interfaces and graphics that take advantage of the Windows Presentation Foundation. -- If you enable this policy setting and set the drop-down box to Enable, XAML files are automatically loaded inside Internet Explorer. The user cannot change this behavior. If you set the drop-down box to Prompt, the user is prompted for loading XAML files. +- If you enable this policy setting and set the drop-down box to Enable, XAML files are automatically loaded inside Internet Explorer. The user can't change this behavior. If you set the drop-down box to Prompt, the user is prompted for loading XAML files. -- If you disable this policy setting, XAML files are not loaded inside Internet Explorer. The user cannot change this behavior. +- If you disable this policy setting, XAML files aren't loaded inside Internet Explorer. The user can't change this behavior. -- If you do not configure this policy setting, the user can decide whether to load XAML files inside Internet Explorer. +- If you don't configure this policy setting, the user can decide whether to load XAML files inside Internet Explorer. @@ -14206,13 +14007,12 @@ This policy setting allows you to manage the loading of Extensible Application M | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -14238,7 +14038,7 @@ This policy setting allows you to manage the loading of Extensible Application M | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -14257,9 +14057,9 @@ This policy setting allows you to manage whether a user's browser can be redirec - If you enable this policy setting, a user's browser that loads a page containing an active Meta Refresh setting can be redirected to another Web page. -- If you disable this policy setting, a user's browser that loads a page containing an active Meta Refresh setting cannot be redirected to another Web page. +- If you disable this policy setting, a user's browser that loads a page containing an active Meta Refresh setting can't be redirected to another Web page. -- If you do not configure this policy setting, a user's browser that loads a page containing an active Meta Refresh setting cannot be redirected to another Web page. +- If you don't configure this policy setting, a user's browser that loads a page containing an active Meta Refresh setting can't be redirected to another Web page. @@ -14271,13 +14071,12 @@ This policy setting allows you to manage whether a user's browser can be redirec | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -14303,7 +14102,7 @@ This policy setting allows you to manage whether a user's browser can be redirec | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -14318,13 +14117,13 @@ This policy setting allows you to manage whether a user's browser can be redirec -This policy setting allows you to manage whether . NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. +This policy setting allows you to manage whether . NET Framework components that aren't signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. - If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. -- If you disable this policy setting, Internet Explorer will not execute unsigned managed components. +- If you disable this policy setting, Internet Explorer won't execute unsigned managed components. -- If you do not configure this policy setting, Internet Explorer will not execute unsigned managed components. +- If you don't configure this policy setting, Internet Explorer won't execute unsigned managed components. @@ -14336,13 +14135,12 @@ This policy setting allows you to manage whether . NET Framework components that | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -14368,7 +14166,7 @@ This policy setting allows you to manage whether . NET Framework components that | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -14387,7 +14185,7 @@ This policy setting controls whether or not the user is prompted to allow Active - If you enable this policy setting, the user is prompted before ActiveX controls can run from websites in this zone. The user can choose to allow the control to run from the current site or from all sites. -- If you disable this policy setting, the user does not see the per-site ActiveX prompt, and ActiveX controls can run from all sites in this zone. +- If you disable this policy setting, the user doesn't see the per-site ActiveX prompt, and ActiveX controls can run from all sites in this zone. @@ -14399,13 +14197,12 @@ This policy setting controls whether or not the user is prompted to allow Active | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -14431,7 +14228,7 @@ This policy setting controls whether or not the user is prompted to allow Active | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -14448,7 +14245,7 @@ This policy setting controls whether or not the user is prompted to allow Active This policy setting controls whether or not the user is allowed to run the TDC ActiveX control on websites. -- If you enable this policy setting, the TDC ActiveX control will not run from websites in this zone. +- If you enable this policy setting, the TDC ActiveX control won't run from websites in this zone. - If you disable this policy setting, the TDC Active X control will run from all sites in this zone. @@ -14462,13 +14259,12 @@ This policy setting controls whether or not the user is allowed to run the TDC A | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -14494,7 +14290,7 @@ This policy setting controls whether or not the user is allowed to run the TDC A | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -14513,9 +14309,9 @@ This policy setting determines whether a page can control embedded WebBrowser co - If you enable this policy setting, script access to the WebBrowser control is allowed. -- If you disable this policy setting, script access to the WebBrowser control is not allowed. +- If you disable this policy setting, script access to the WebBrowser control isn't allowed. -- If you do not configure this policy setting, the user can enable or disable script access to the WebBrowser control. By default, script access to the WebBrowser control is allowed only in the Local Machine and Intranet zones. +- If you don't configure this policy setting, the user can enable or disable script access to the WebBrowser control. By default, script access to the WebBrowser control is allowed only in the Local Machine and Intranet zones. @@ -14527,13 +14323,12 @@ This policy setting determines whether a page can control embedded WebBrowser co | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -14559,7 +14354,7 @@ This policy setting determines whether a page can control embedded WebBrowser co | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -14576,11 +14371,11 @@ This policy setting determines whether a page can control embedded WebBrowser co This policy setting allows you to manage restrictions on script-initiated pop-up windows and windows that include the title and status bars. -- If you enable this policy setting, Windows Restrictions security will not apply in this zone. The security zone runs without the added layer of security provided by this feature. +- If you enable this policy setting, Windows Restrictions security won't apply in this zone. The security zone runs without the added layer of security provided by this feature. -- If you disable this policy setting, the possible harmful actions contained in script-initiated pop-up windows and windows that include the title and status bars cannot be run. This Internet Explorer security feature will be on in this zone as dictated by the Scripted Windows Security Restrictions feature control setting for the process. +- If you disable this policy setting, the possible harmful actions contained in script-initiated pop-up windows and windows that include the title and status bars can't be run. This Internet Explorer security feature will be on in this zone as dictated by the Scripted Windows Security Restrictions feature control setting for the process. -- If you do not configure this policy setting, the possible harmful actions contained in script-initiated pop-up windows and windows that include the title and status bars cannot be run. This Internet Explorer security feature will be on in this zone as dictated by the Scripted Windows Security Restrictions feature control setting for the process. +- If you don't configure this policy setting, the possible harmful actions contained in script-initiated pop-up windows and windows that include the title and status bars can't be run. This Internet Explorer security feature will be on in this zone as dictated by the Scripted Windows Security Restrictions feature control setting for the process. @@ -14592,13 +14387,12 @@ This policy setting allows you to manage restrictions on script-initiated pop-up | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -14624,7 +14418,7 @@ This policy setting allows you to manage restrictions on script-initiated pop-up | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -14643,9 +14437,9 @@ This policy setting allows you to manage whether the user can run scriptlets. - If you enable this policy setting, the user can run scriptlets. -- If you disable this policy setting, the user cannot run scriptlets. +- If you disable this policy setting, the user can't run scriptlets. -- If you do not configure this policy setting, the user can enable or disable scriptlets. +- If you don't configure this policy setting, the user can enable or disable scriptlets. @@ -14657,13 +14451,12 @@ This policy setting allows you to manage whether the user can run scriptlets. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -14689,7 +14482,7 @@ This policy setting allows you to manage whether the user can run scriptlets. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -14708,9 +14501,9 @@ This policy setting controls whether SmartScreen Filter scans pages in this zone - If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. -- If you disable this policy setting, SmartScreen Filter does not scan pages in this zone for malicious content. +- If you disable this policy setting, SmartScreen Filter doesn't scan pages in this zone for malicious content. -- If you do not configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. +- If you don't configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. > [!NOTE] > In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. @@ -14725,13 +14518,12 @@ This policy setting controls whether SmartScreen Filter scans pages in this zone | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -14757,7 +14549,7 @@ This policy setting controls whether SmartScreen Filter scans pages in this zone | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -14776,7 +14568,7 @@ This policy setting allows you to manage whether script is allowed to update the - If you enable this policy setting, script is allowed to update the status bar. -- If you disable or do not configure this policy setting, script is not allowed to update the status bar. +- If you disable or don't configure this policy setting, script isn't allowed to update the status bar. @@ -14788,13 +14580,12 @@ This policy setting allows you to manage whether script is allowed to update the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -14820,7 +14611,7 @@ This policy setting allows you to manage whether script is allowed to update the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -14839,9 +14630,9 @@ This policy setting allows you to manage the preservation of information in the - If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. -- If you disable this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. +- If you disable this policy setting, users can't preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. -- If you do not configure this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. +- If you don't configure this policy setting, users can't preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. @@ -14853,13 +14644,12 @@ This policy setting allows you to manage the preservation of information in the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -14885,7 +14675,7 @@ This policy setting allows you to manage the preservation of information in the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -14908,7 +14698,7 @@ If you selected Prompt in the drop-down box, users are asked to choose whether t If you selected Disable in the drop-down box, VBScript is prevented from running. -If you do not configure or disable this policy setting, VBScript is prevented from running. +If you don't configure or disable this policy setting, VBScript is prevented from running. @@ -14920,13 +14710,12 @@ If you do not configure or disable this policy setting, VBScript is prevented fr | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -14952,7 +14741,7 @@ If you do not configure or disable this policy setting, VBScript is prevented fr | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -14985,13 +14774,12 @@ This policy setting determines whether Internet Explorer runs antimalware progra | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -15017,7 +14805,7 @@ This policy setting determines whether Internet Explorer runs antimalware progra | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -15036,9 +14824,9 @@ This policy setting allows you to manage whether users may download signed Activ - If you enable this policy, users can download signed controls without user intervention. If you select Prompt in the drop-down box, users are queried whether to download controls signed by publishers who aren't trusted. Code signed by trusted publishers is silently downloaded. -- If you disable the policy setting, signed controls cannot be downloaded. +- If you disable the policy setting, signed controls can't be downloaded. -- If you do not configure this policy setting, signed controls cannot be downloaded. +- If you don't configure this policy setting, signed controls can't be downloaded. @@ -15050,13 +14838,12 @@ This policy setting allows you to manage whether users may download signed Activ | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -15082,7 +14869,7 @@ This policy setting allows you to manage whether users may download signed Activ | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -15101,9 +14888,9 @@ This policy setting allows you to manage whether users may download unsigned Act - If you enable this policy setting, users can run unsigned controls without user intervention. If you select Prompt in the drop-down box, users are queried to choose whether to allow the unsigned control to run. -- If you disable this policy setting, users cannot run unsigned controls. +- If you disable this policy setting, users can't run unsigned controls. -- If you do not configure this policy setting, users cannot run unsigned controls. +- If you don't configure this policy setting, users can't run unsigned controls. @@ -15115,13 +14902,12 @@ This policy setting allows you to manage whether users may download unsigned Act | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -15147,7 +14933,7 @@ This policy setting allows you to manage whether users may download unsigned Act | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -15178,13 +14964,12 @@ This policy controls whether or not the Cross-Site Scripting (XSS) Filter will d | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -15210,7 +14995,7 @@ This policy controls whether or not the Cross-Site Scripting (XSS) Filter will d | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -15227,13 +15012,13 @@ This policy controls whether or not the Cross-Site Scripting (XSS) Filter will d This policy setting allows you to set options for dragging content from one domain to a different domain when the source and destination are in different windows. -- If you enable this policy setting and click Enable, users can drag content from one domain to a different domain when the source and destination are in different windows. Users cannot change this setting. +If you enable this policy setting and click Enable, users can drag content from one domain to a different domain when the source and destination are in different windows. Users can't change this setting. -- If you enable this policy setting and click Disable, users cannot drag content from one domain to a different domain when both the source and destination are in different windows. Users cannot change this setting. +If you enable this policy setting and click Disable, users can't drag content from one domain to a different domain when both the source and destination are in different windows. Users can't change this setting. -In Internet Explorer 10, if you disable this policy setting or do not configure it, users cannot drag content from one domain to a different domain when the source and destination are in different windows. Users can change this setting in the Internet Options dialog. +In Internet Explorer 10, if you disable this policy setting or don't configure it, users can't drag content from one domain to a different domain when the source and destination are in different windows. Users can change this setting in the Internet Options dialog. -In Internet Explorer 9 and earlier versions, if you disable this policy or do not configure it, users can drag content from one domain to a different domain when the source and destination are in different windows. Users cannot change this setting. +In Internet Explorer 9 and earlier versions, if you disable this policy or don't configure it, users can drag content from one domain to a different domain when the source and destination are in different windows. Users can't change this setting. @@ -15245,13 +15030,12 @@ In Internet Explorer 9 and earlier versions, if you disable this policy or do no | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -15277,7 +15061,7 @@ In Internet Explorer 9 and earlier versions, if you disable this policy or do no | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -15294,13 +15078,13 @@ In Internet Explorer 9 and earlier versions, if you disable this policy or do no This policy setting allows you to set options for dragging content from one domain to a different domain when the source and destination are in the same window. -- If you enable this policy setting and click Enable, users can drag content from one domain to a different domain when the source and destination are in the same window. Users cannot change this setting. +If you enable this policy setting and click Enable, users can drag content from one domain to a different domain when the source and destination are in the same window. Users can't change this setting. -- If you enable this policy setting and click Disable, users cannot drag content from one domain to a different domain when the source and destination are in the same window. Users cannot change this setting in the Internet Options dialog. +If you enable this policy setting and click Disable, users can't drag content from one domain to a different domain when the source and destination are in the same window. Users can't change this setting in the Internet Options dialog. -In Internet Explorer 10, if you disable this policy setting or do not configure it, users cannot drag content from one domain to a different domain when the source and destination are in the same window. Users can change this setting in the Internet Options dialog. +In Internet Explorer 10, if you disable this policy setting or don't configure it, users can't drag content from one domain to a different domain when the source and destination are in the same window. Users can change this setting in the Internet Options dialog. -In Internet Explorer 9 and earlier versions, if you disable this policy setting or do not configure it, users can drag content from one domain to a different domain when the source and destination are in the same window. Users cannot change this setting in the Internet Options dialog. +In Internet Explorer 9 and earlier versions, if you disable this policy setting or don't configure it, users can drag content from one domain to a different domain when the source and destination are in the same window. Users can't change this setting in the Internet Options dialog. @@ -15312,13 +15096,12 @@ In Internet Explorer 9 and earlier versions, if you disable this policy setting | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -15344,7 +15127,7 @@ In Internet Explorer 9 and earlier versions, if you disable this policy setting | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -15361,11 +15144,11 @@ In Internet Explorer 9 and earlier versions, if you disable this policy setting This policy setting allows you to manage MIME sniffing for file promotion from one type to another based on a MIME sniff. A MIME sniff is the recognition by Internet Explorer of the file type based on a bit signature. -- If you enable this policy setting, the MIME Sniffing Safety Feature will not apply in this zone. The security zone will run without the added layer of security provided by this feature. +- If you enable this policy setting, the MIME Sniffing Safety Feature won't apply in this zone. The security zone will run without the added layer of security provided by this feature. -- If you disable this policy setting, the actions that may be harmful cannot run; this Internet Explorer security feature will be turned on in this zone, as dictated by the feature control setting for the process. +- If you disable this policy setting, the actions that may be harmful can't run; this Internet Explorer security feature will be turned on in this zone, as dictated by the feature control setting for the process. -- If you do not configure this policy setting, the actions that may be harmful cannot run; this Internet Explorer security feature will be turned on in this zone, as dictated by the feature control setting for the process. +- If you don't configure this policy setting, the actions that may be harmful can't run; this Internet Explorer security feature will be turned on in this zone, as dictated by the feature control setting for the process. @@ -15377,13 +15160,12 @@ This policy setting allows you to manage MIME sniffing for file promotion from o | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -15409,7 +15191,7 @@ This policy setting allows you to manage MIME sniffing for file promotion from o | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -15430,7 +15212,7 @@ This policy setting controls whether or not local path information is sent when - If you disable this policy setting, path information is removed when the user is uploading a file via an HTML form. -- If you do not configure this policy setting, the user can choose whether path information is sent when he or she is uploading a file via an HTML form. By default, path information is sent. +- If you don't configure this policy setting, the user can choose whether path information is sent when he or she is uploading a file via an HTML form. By default, path information is sent. @@ -15442,13 +15224,12 @@ This policy setting controls whether or not local path information is sent when | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -15474,7 +15255,7 @@ This policy setting controls whether or not local path information is sent when | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -15491,13 +15272,13 @@ This policy setting controls whether or not local path information is sent when This policy setting allows you to manage ActiveX controls not marked as safe. -- If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. +- If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting isn't recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. - If you enable this policy setting and select Prompt in the drop-down box, users are queried whether to allow the control to be loaded with parameters or scripted. -- If you disable this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. +- If you disable this policy setting, ActiveX controls that can't be made safe aren't loaded with parameters or scripted. -- If you do not configure this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. +- If you don't configure this policy setting, ActiveX controls that can't be made safe aren't loaded with parameters or scripted. @@ -15509,13 +15290,12 @@ This policy setting allows you to manage ActiveX controls not marked as safe. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -15541,7 +15321,7 @@ This policy setting allows you to manage ActiveX controls not marked as safe. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -15562,13 +15342,13 @@ This policy setting allows you to manage permissions for Java applets. Low Safety enables applets to perform all operations. -Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program cannot make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O. +Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program can't make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O. High Safety enables applets to run in their sandbox. Disable Java to prevent any applets from running. -- If you disable this policy setting, Java applets cannot run. +- If you disable this policy setting, Java applets can't run. -- If you do not configure this policy setting, Java applets are disabled. +- If you don't configure this policy setting, Java applets are disabled. @@ -15580,13 +15360,12 @@ High Safety enables applets to run in their sandbox. Disable Java to prevent any | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -15612,7 +15391,7 @@ High Safety enables applets to run in their sandbox. Disable Java to prevent any | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -15633,7 +15412,7 @@ This policy setting allows you to manage whether applications may be run and fil - If you disable this policy setting, users are prevented from running applications and downloading files from IFRAMEs on the pages in this zone. -- If you do not configure this policy setting, users are prevented from running applications and downloading files from IFRAMEs on the pages in this zone. +- If you don't configure this policy setting, users are prevented from running applications and downloading files from IFRAMEs on the pages in this zone. @@ -15645,13 +15424,12 @@ This policy setting allows you to manage whether applications may be run and fil | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -15677,7 +15455,7 @@ This policy setting allows you to manage whether applications may be run and fil | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -15702,11 +15480,11 @@ Prompt for user name and password to query users for user IDs and passwords. Aft Automatic logon only in Intranet zone to query users for user IDs and passwords in other zones. After a user is queried, these values can be used silently for the remainder of the session. -Automatic logon with current user name and password to attempt logon using Windows NT Challenge Response (also known as NTLM authentication). If Windows NT Challenge Response is supported by the server, the logon uses the user's network user name and password for logon. If Windows NT Challenge Response is not supported by the server, the user is queried to provide the user name and password. +Automatic logon with current user name and password to attempt logon using Windows NT Challenge Response (also known as NTLM authentication). If Windows NT Challenge Response is supported by the server, the logon uses the user's network user name and password for logon. If Windows NT Challenge Response isn't supported by the server, the user is queried to provide the user name and password. - If you disable this policy setting, logon is set to Automatic logon only in Intranet zone. -- If you do not configure this policy setting, logon is set to Prompt for username and password. +- If you don't configure this policy setting, logon is set to Prompt for username and password. @@ -15718,13 +15496,12 @@ Automatic logon with current user name and password to attempt logon using Windo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -15750,7 +15527,7 @@ Automatic logon with current user name and password to attempt logon using Windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -15769,9 +15546,9 @@ This policy setting allows you to manage the opening of windows and frames and a - If you enable this policy setting, users can open additional windows and frames from other domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow additional windows and frames to access applications from other domains. -- If you disable this policy setting, users cannot open other windows and frames from other domains or access applications from different domains. +- If you disable this policy setting, users can't open other windows and frames from other domains or access applications from different domains. -- If you do not configure this policy setting, users cannot open other windows and frames from different domains or access applications from different domains. +- If you don't configure this policy setting, users can't open other windows and frames from different domains or access applications from different domains. @@ -15783,13 +15560,12 @@ This policy setting allows you to manage the opening of windows and frames and a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -15815,7 +15591,7 @@ This policy setting allows you to manage the opening of windows and frames and a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -15838,7 +15614,7 @@ If you selected Prompt in the drop-down box, users are asked to choose whether t - If you disable this policy setting, controls and plug-ins are prevented from running. -- If you do not configure this policy setting, controls and plug-ins are prevented from running. +- If you don't configure this policy setting, controls and plug-ins are prevented from running. @@ -15850,13 +15626,12 @@ If you selected Prompt in the drop-down box, users are asked to choose whether t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -15882,7 +15657,7 @@ If you selected Prompt in the drop-down box, users are asked to choose whether t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -15901,9 +15676,9 @@ This policy setting allows you to manage whether . NET Framework components that - If you enable this policy setting, Internet Explorer will execute signed managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute signed managed components. -- If you disable this policy setting, Internet Explorer will not execute signed managed components. +- If you disable this policy setting, Internet Explorer won't execute signed managed components. -- If you do not configure this policy setting, Internet Explorer will not execute signed managed components. +- If you don't configure this policy setting, Internet Explorer won't execute signed managed components. @@ -15915,13 +15690,12 @@ This policy setting allows you to manage whether . NET Framework components that | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -15947,7 +15721,7 @@ This policy setting allows you to manage whether . NET Framework components that | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -15970,7 +15744,7 @@ If you select Prompt in the drop-down box, users are queried to choose whether t - If you disable this policy setting, script interaction is prevented from occurring. -- If you do not configure this policy setting, script interaction is prevented from occurring. +- If you don't configure this policy setting, script interaction is prevented from occurring. @@ -15982,13 +15756,12 @@ If you select Prompt in the drop-down box, users are queried to choose whether t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -16014,7 +15787,7 @@ If you select Prompt in the drop-down box, users are queried to choose whether t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -16037,7 +15810,7 @@ If you select Prompt in the drop-down box, users are queried to choose whether t - If you disable this policy setting, scripts are prevented from accessing applets. -- If you do not configure this policy setting, scripts are prevented from accessing applets. +- If you don't configure this policy setting, scripts are prevented from accessing applets. @@ -16049,13 +15822,12 @@ If you select Prompt in the drop-down box, users are queried to choose whether t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -16081,7 +15853,7 @@ If you select Prompt in the drop-down box, users are queried to choose whether t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -16100,9 +15872,9 @@ This policy setting controls whether or not the "Open File - Security Warning" m - If you enable this policy setting and set the drop-down box to Enable, these files open without a security warning. If you set the drop-down box to Prompt, a security warning appears before the files open. -- If you disable this policy setting, these files do not open. +- If you disable this policy setting, these files don't open. -- If you do not configure this policy setting, the user can configure how the computer handles these files. By default, these files are blocked in the Restricted zone, enabled in the Intranet and Local Computer zones, and set to prompt in the Internet and Trusted zones. +- If you don't configure this policy setting, the user can configure how the computer handles these files. By default, these files are blocked in the Restricted zone, enabled in the Intranet and Local Computer zones, and set to prompt in the Internet and Trusted zones. @@ -16114,13 +15886,12 @@ This policy setting controls whether or not the "Open File - Security Warning" m | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -16146,7 +15917,7 @@ This policy setting controls whether or not the "Open File - Security Warning" m | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -16163,11 +15934,11 @@ This policy setting controls whether or not the "Open File - Security Warning" m This policy setting allows you to turn on Protected Mode. Protected Mode helps protect Internet Explorer from exploited vulnerabilities by reducing the locations that Internet Explorer can write to in the registry and the file system. -- If you enable this policy setting, Protected Mode is turned on. The user cannot turn off Protected Mode. +- If you enable this policy setting, Protected Mode is turned on. The user can't turn off Protected Mode. -- If you disable this policy setting, Protected Mode is turned off. The user cannot turn on Protected Mode. +- If you disable this policy setting, Protected Mode is turned off. The user can't turn on Protected Mode. -- If you do not configure this policy setting, the user can turn on or turn off Protected Mode. +- If you don't configure this policy setting, the user can turn on or turn off Protected Mode. @@ -16179,13 +15950,12 @@ This policy setting allows you to turn on Protected Mode. Protected Mode helps p | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -16211,7 +15981,7 @@ This policy setting allows you to turn on Protected Mode. Protected Mode helps p | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -16226,13 +15996,13 @@ This policy setting allows you to turn on Protected Mode. Protected Mode helps p -This policy setting allows you to manage whether unwanted pop-up windows appear. Pop-up windows that are opened when the end user clicks a link are not blocked. +This policy setting allows you to manage whether unwanted pop-up windows appear. Pop-up windows that are opened when the end user clicks a link aren't blocked. - If you enable this policy setting, most unwanted pop-up windows are prevented from appearing. -- If you disable this policy setting, pop-up windows are not prevented from appearing. +- If you disable this policy setting, pop-up windows aren't prevented from appearing. -- If you do not configure this policy setting, most unwanted pop-up windows are prevented from appearing. +- If you don't configure this policy setting, most unwanted pop-up windows are prevented from appearing. @@ -16244,13 +16014,12 @@ This policy setting allows you to manage whether unwanted pop-up windows appear. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -16276,7 +16045,7 @@ This policy setting allows you to manage whether unwanted pop-up windows appear. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -16291,13 +16060,13 @@ This policy setting allows you to manage whether unwanted pop-up windows appear. -This policy setting enables blocking of file download prompts that are not user initiated. +This policy setting enables blocking of file download prompts that aren't user initiated. -- If you enable this policy setting, file download prompts that are not user initiated will be blocked for Internet Explorer processes. +- If you enable this policy setting, file download prompts that aren't user initiated will be blocked for Internet Explorer processes. -- If you disable this policy setting, prompting will occur for file downloads that are not user initiated for Internet Explorer processes. +- If you disable this policy setting, prompting will occur for file downloads that aren't user initiated for Internet Explorer processes. -- If you do not configure this policy setting, the user's preference determines whether to prompt for file downloads that are not user initiated for Internet Explorer processes. +- If you don't configure this policy setting, the user's preference determines whether to prompt for file downloads that aren't user initiated for Internet Explorer processes. @@ -16309,13 +16078,12 @@ This policy setting enables blocking of file download prompts that are not user | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -16341,7 +16109,7 @@ This policy setting enables blocking of file download prompts that are not user | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -16356,13 +16124,13 @@ This policy setting enables blocking of file download prompts that are not user -Internet Explorer allows scripts to programmatically open, resize, and reposition windows of various types. The Window Restrictions security feature restricts popup windows and prohibits scripts from displaying windows in which the title and status bars are not visible to the user or obfuscate other Windows' title and status bars. +Internet Explorer allows scripts to programmatically open, resize, and reposition windows of various types. The Window Restrictions security feature restricts popup windows and prohibits scripts from displaying windows in which the title and status bars aren't visible to the user or obfuscate other Windows' title and status bars. - If you enable this policy setting, popup windows and other restrictions apply for File Explorer and Internet Explorer processes. - If you disable this policy setting, scripts can continue to create popup windows and windows that obfuscate other windows. -- If you do not configure this policy setting, popup windows and other restrictions apply for File Explorer and Internet Explorer processes. +- If you don't configure this policy setting, popup windows and other restrictions apply for File Explorer and Internet Explorer processes. @@ -16374,13 +16142,12 @@ Internet Explorer allows scripts to programmatically open, resize, and repositio | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -16406,7 +16173,7 @@ Internet Explorer allows scripts to programmatically open, resize, and repositio | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -16423,12 +16190,12 @@ Internet Explorer allows scripts to programmatically open, resize, and repositio This policy setting allows you to restrict the search providers that appear in the Search box in Internet Explorer to those defined in the list of policy keys for search providers (found under [HKCU or HKLM\Software\policies\Microsoft\Internet Explorer\SearchScopes]). Normally, search providers can be added from third-party toolbars or in Setup, but the user can also add them from a search provider's website. -- If you enable this policy setting, the user cannot configure the list of search providers on his or her computer, and any default providers installed do not appear (including providers installed from other applications). The only providers that appear are those in the list of policy keys for search providers. +- If you enable this policy setting, the user can't configure the list of search providers on his or her computer, and any default providers installed don't appear (including providers installed from other applications). The only providers that appear are those in the list of policy keys for search providers. > [!NOTE] > This list can be created through a custom administrative template file. For information about creating this custom administrative template file, see the Internet Explorer documentation on search providers. -- If you disable or do not configure this policy setting, the user can configure his or her list of search providers. +- If you disable or don't configure this policy setting, the user can configure his or her list of search providers. @@ -16440,13 +16207,12 @@ This policy setting allows you to restrict the search providers that appear in t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -16473,7 +16239,7 @@ This policy setting allows you to restrict the search providers that appear in t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -16488,11 +16254,11 @@ Applies security zone information to all users of the same computer. A security - If you enable this policy, changes that the user makes to a security zone will apply to all users of that computer. -- If you disable this policy or do not configure it, users of the same computer can establish their own security zone settings. +- If you disable this policy or don't configure it, users of the same computer can establish their own security zone settings. -This policy is intended to ensure that security zone settings apply uniformly to the same computer and do not vary from user to user. +This policy is intended to ensure that security zone settings apply uniformly to the same computer and don't vary from user to user. -Also, see the "Security zones: Do not allow users to change policies" policy. +Also, see the "Security zones: Don't allow users to change policies" policy. @@ -16504,13 +16270,12 @@ Also, see the "Security zones: Do not allow users to change policies" policy. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -16537,7 +16302,7 @@ Also, see the "Security zones: Do not allow users to change policies" policy. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20348] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.1350] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041.789] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20348] and later
    ✅ Windows 10, version 1903 [10.0.18362.1350] and later
    ✅ Windows 10, version 2004 [10.0.19041.789] and later | @@ -16573,13 +16338,12 @@ Disabling, or not configuring this setting, opens all sites based on the current | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -16629,7 +16393,7 @@ Disabling, or not configuring this setting, opens all sites based on the current | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -16648,7 +16412,7 @@ This policy setting allows you to specify how ActiveX controls are installed. - If you enable this policy setting, ActiveX controls are installed only if the ActiveX Installer Service is present and has been configured to allow the installation of ActiveX controls. -- If you disable or do not configure this policy setting, ActiveX controls, including per-user controls, are installed through the standard installation process. +- If you disable or don't configure this policy setting, ActiveX controls, including per-user controls, are installed through the standard installation process. @@ -16660,13 +16424,12 @@ This policy setting allows you to specify how ActiveX controls are installed. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -16693,7 +16456,7 @@ This policy setting allows you to specify how ActiveX controls are installed. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -16712,9 +16475,9 @@ This policy setting allows you to manage whether Internet Explorer can access da - If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. -- If you disable this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. +- If you disable this policy setting, users can't load a page in the zone that uses MSXML or ADO to access data from another site in the zone. -- If you do not configure this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. +- If you don't configure this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. @@ -16726,13 +16489,12 @@ This policy setting allows you to manage whether Internet Explorer can access da | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -16758,7 +16520,7 @@ This policy setting allows you to manage whether Internet Explorer can access da | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -16775,11 +16537,11 @@ This policy setting allows you to manage whether Internet Explorer can access da This policy setting manages whether users will be automatically prompted for ActiveX control installations. -- If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. +- If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they don't have installed. - If you disable this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. -- If you do not configure this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. +- If you don't configure this policy setting, users will receive a prompt when a site instantiates an ActiveX control they don't have installed. @@ -16791,13 +16553,12 @@ This policy setting manages whether users will be automatically prompted for Act | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -16823,7 +16584,7 @@ This policy setting manages whether users will be automatically prompted for Act | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -16842,7 +16603,7 @@ This policy setting determines whether users will be prompted for non user-initi - If you enable this setting, users will receive a file download dialog for automatic download attempts. -- If you disable or do not configure this setting, users will receive a file download dialog for automatic download attempts. +- If you disable or don't configure this setting, users will receive a file download dialog for automatic download attempts. @@ -16854,13 +16615,12 @@ This policy setting determines whether users will be prompted for non user-initi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -16886,7 +16646,7 @@ This policy setting determines whether users will be prompted for non user-initi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -16909,7 +16669,7 @@ This policy setting allows you to manage whether pages of the zone may download - If you disable this policy setting, HTML fonts are prevented from downloading. -- If you do not configure this policy setting, HTML fonts can be downloaded automatically. +- If you don't configure this policy setting, HTML fonts can be downloaded automatically. @@ -16921,13 +16681,12 @@ This policy setting allows you to manage whether pages of the zone may download | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -16953,7 +16712,7 @@ This policy setting allows you to manage whether pages of the zone may download | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -16970,11 +16729,11 @@ This policy setting allows you to manage whether pages of the zone may download This policy setting allows you to manage whether Web sites from less privileged zones, such as Restricted Sites, can navigate into this zone. -- If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. +- If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that's provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. -- If you disable this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. +- If you disable this policy setting, the possibly harmful navigations is prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. -- If you do not configure this policy setting, a warning is issued to the user that potentially risky navigation is about to occur. +- If you don't configure this policy setting, a warning is issued to the user that potentially risky navigation is about to occur. @@ -16986,13 +16745,12 @@ This policy setting allows you to manage whether Web sites from less privileged | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -17018,7 +16776,7 @@ This policy setting allows you to manage whether Web sites from less privileged | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -17033,13 +16791,13 @@ This policy setting allows you to manage whether Web sites from less privileged -This policy setting allows you to manage whether . NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. +This policy setting allows you to manage whether . NET Framework components that aren't signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. - If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. -- If you disable this policy setting, Internet Explorer will not execute unsigned managed components. +- If you disable this policy setting, Internet Explorer won't execute unsigned managed components. -- If you do not configure this policy setting, Internet Explorer will execute unsigned managed components. +- If you don't configure this policy setting, Internet Explorer will execute unsigned managed components. @@ -17051,13 +16809,12 @@ This policy setting allows you to manage whether . NET Framework components that | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -17083,7 +16840,7 @@ This policy setting allows you to manage whether . NET Framework components that | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -17102,9 +16859,9 @@ This policy setting allows you to manage whether the user can run scriptlets. - If you enable this policy setting, the user can run scriptlets. -- If you disable this policy setting, the user cannot run scriptlets. +- If you disable this policy setting, the user can't run scriptlets. -- If you do not configure this policy setting, the user can enable or disable scriptlets. +- If you don't configure this policy setting, the user can enable or disable scriptlets. @@ -17116,13 +16873,12 @@ This policy setting allows you to manage whether the user can run scriptlets. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -17148,7 +16904,7 @@ This policy setting allows you to manage whether the user can run scriptlets. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -17167,9 +16923,9 @@ This policy setting controls whether SmartScreen Filter scans pages in this zone - If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. -- If you disable this policy setting, SmartScreen Filter does not scan pages in this zone for malicious content. +- If you disable this policy setting, SmartScreen Filter doesn't scan pages in this zone for malicious content. -- If you do not configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. +- If you don't configure this policy setting, the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. > [!NOTE] > In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. @@ -17184,13 +16940,12 @@ This policy setting controls whether SmartScreen Filter scans pages in this zone | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -17216,7 +16971,7 @@ This policy setting controls whether SmartScreen Filter scans pages in this zone | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -17235,9 +16990,9 @@ This policy setting allows you to manage the preservation of information in the - If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. -- If you disable this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. +- If you disable this policy setting, users can't preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. -- If you do not configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. +- If you don't configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. @@ -17249,13 +17004,12 @@ This policy setting allows you to manage the preservation of information in the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -17281,7 +17035,7 @@ This policy setting allows you to manage the preservation of information in the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -17314,13 +17068,12 @@ This policy setting determines whether Internet Explorer runs antimalware progra | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -17346,7 +17099,7 @@ This policy setting determines whether Internet Explorer runs antimalware progra | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -17363,13 +17116,13 @@ This policy setting determines whether Internet Explorer runs antimalware progra This policy setting allows you to manage ActiveX controls not marked as safe. -- If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. +- If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting isn't recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. - If you enable this policy setting and select Prompt in the drop-down box, users are queried whether to allow the control to be loaded with parameters or scripted. -- If you disable this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. +- If you disable this policy setting, ActiveX controls that can't be made safe aren't loaded with parameters or scripted. -- If you do not configure this policy setting, users are queried whether to allow the control to be loaded with parameters or scripted. +- If you don't configure this policy setting, users are queried whether to allow the control to be loaded with parameters or scripted. @@ -17381,13 +17134,12 @@ This policy setting allows you to manage ActiveX controls not marked as safe. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -17413,7 +17165,7 @@ This policy setting allows you to manage ActiveX controls not marked as safe. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -17434,13 +17186,13 @@ This policy setting allows you to manage permissions for Java applets. Low Safety enables applets to perform all operations. -Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program cannot make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O. +Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program can't make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O. High Safety enables applets to run in their sandbox. Disable Java to prevent any applets from running. -- If you disable this policy setting, Java applets cannot run. +- If you disable this policy setting, Java applets can't run. -- If you do not configure this policy setting, the permission is set to Low Safety. +- If you don't configure this policy setting, the permission is set to Low Safety. @@ -17452,13 +17204,12 @@ High Safety enables applets to run in their sandbox. Disable Java to prevent any | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -17484,7 +17235,7 @@ High Safety enables applets to run in their sandbox. Disable Java to prevent any | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -17501,11 +17252,11 @@ High Safety enables applets to run in their sandbox. Disable Java to prevent any This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. -- If you enable this policy setting, users can open windows and frames from othe domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. +- If you enable this policy setting, users can open windows and frames from other domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. -- If you disable this policy setting, users cannot open windows and frames to access applications from different domains. +- If you disable this policy setting, users can't open windows and frames to access applications from different domains. -- If you do not configure this policy setting, users can open windows and frames from othe domains and access applications from other domains. +- If you don't configure this policy setting, users can open windows and frames from other domains and access applications from other domains. @@ -17517,13 +17268,12 @@ This policy setting allows you to manage the opening of windows and frames and a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-kerberos.md b/windows/client-management/mdm/policy-csp-kerberos.md index 16587b8ce0..3368906aa4 100644 --- a/windows/client-management/mdm/policy-csp-kerberos.md +++ b/windows/client-management/mdm/policy-csp-kerberos.md @@ -4,7 +4,7 @@ description: Learn more about the Kerberos Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 04/26/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - Kerberos -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -44,9 +41,9 @@ ms.topic: reference This policy setting defines the list of trusting forests that the Kerberos client searches when attempting to resolve two-part service principal names (SPNs). -- If you enable this policy setting, the Kerberos client searches the forests in this list, if it is unable to resolve a two-part SPN. If a match is found, the Kerberos client requests a referral ticket to the appropriate domain. +- If you enable this policy setting, the Kerberos client searches the forests in this list, if it's unable to resolve a two-part SPN. If a match is found, the Kerberos client requests a referral ticket to the appropriate domain. -- If you disable or do not configure this policy setting, the Kerberos client does not search the listed forests to resolve the SPN. If the Kerberos client is unable to resolve the SPN because the name is not found, NTLM authentication might be used. +- If you disable or don't configure this policy setting, the Kerberos client doesn't search the listed forests to resolve the SPN. If the Kerberos client is unable to resolve the SPN because the name isn't found, NTLM authentication might be used. @@ -58,13 +55,12 @@ This policy setting defines the list of trusting forests that the Kerberos clien | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -91,7 +87,7 @@ This policy setting defines the list of trusting forests that the Kerberos clien | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -104,7 +100,7 @@ This policy setting defines the list of trusting forests that the Kerberos clien This policy setting allows retrieving the Azure AD Kerberos Ticket Granting Ticket during logon. -- If you disable or do not configure this policy setting, the Azure AD Kerberos Ticket Granting Ticket is not retrieved during logon. +- If you disable or don't configure this policy setting, the Azure AD Kerberos Ticket Granting Ticket isn't retrieved during logon. - If you enable this policy setting, the Azure AD Kerberos Ticket Granting Ticket is retrieved during logon. @@ -118,7 +114,7 @@ This policy setting allows retrieving the Azure AD Kerberos Ticket Granting Tick | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -158,7 +154,7 @@ This policy setting allows retrieving the Azure AD Kerberos Ticket Granting Tick | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -173,7 +169,7 @@ This policy setting controls whether a device will request claims and compound a - If you enable this policy setting, the client computers will request claims, provide information required to create compounded authentication and armor Kerberos messages in domains which support claims and compound authentication for Dynamic Access Control and Kerberos armoring. -- If you disable or do not configure this policy setting, the client devices will not request claims, provide information required to create compounded authentication and armor Kerberos messages. Services hosted on the device will not be able to retrieve claims for clients using Kerberos protocol transition. +- If you disable or don't configure this policy setting, the client devices won't request claims, provide information required to create compounded authentication and armor Kerberos messages. Services hosted on the device won't be able to retrieve claims for clients using Kerberos protocol transition. @@ -185,13 +181,12 @@ This policy setting controls whether a device will request claims and compound a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -218,7 +213,7 @@ This policy setting controls whether a device will request claims and compound a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -231,17 +226,17 @@ This policy setting controls whether a device will request claims and compound a This policy setting controls hash or checksum algorithms used by the Kerberos client when performing certificate authentication. -- If you enable this policy, you will be able to configure one of four states for each algorithm: +- If you enable this policy, you'll be able to configure one of four states for each algorithm: - "Default" sets the algorithm to the recommended state. - "Supported" enables usage of the algorithm. Enabling algorithms that have been disabled by default may reduce your security. -- "Audited" enables usage of the algorithm and reports an event (ID 206) every time it is used. This state is intended to verify that the algorithm is not being used and can be safely disabled. +- "Audited" enables usage of the algorithm and reports an event (ID 206) every time it's used. This state is intended to verify that the algorithm isn't being used and can be safely disabled. - "Not Supported" disables usage of the algorithm. This state is intended for algorithms that are deemed to be insecure. -- If you disable or do not configure this policy, each algorithm will assume the "Default" state. +- If you disable or don't configure this policy, each algorithm will assume the "Default" state. Events generated by this configuration: 205, 206, 207, 208. @@ -255,7 +250,7 @@ Events generated by this configuration: 205, 206, 207, 208. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -295,7 +290,7 @@ Events generated by this configuration: 205, 206, 207, 208. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -325,7 +320,7 @@ If you don't configure this policy, the SHA1 algorithm will assume the **Default | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | | Dependency [PKINIT_Hash_Algorithm_Configuration_DependencyGroup] | Dependency Type: `DependsOn`
    Dependency URI: `Device/Vendor/MSFT/Policy/Config/Kerberos/PKInitHashAlgorithmConfigurationEnabled`
    Dependency Allowed Value: `[1]`
    Dependency Allowed Value Type: `Range`
    | @@ -368,7 +363,7 @@ If you don't configure this policy, the SHA1 algorithm will assume the **Default | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -398,7 +393,7 @@ If you don't configure this policy, the SHA256 algorithm will assume the **Defau | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | | Dependency [PKINIT_Hash_Algorithm_Configuration_DependencyGroup] | Dependency Type: `DependsOn`
    Dependency URI: `Device/Vendor/MSFT/Policy/Config/Kerberos/PKInitHashAlgorithmConfigurationEnabled`
    Dependency Allowed Value: `[1]`
    Dependency Allowed Value Type: `Range`
    | @@ -441,7 +436,7 @@ If you don't configure this policy, the SHA256 algorithm will assume the **Defau | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -471,7 +466,7 @@ If you don't configure this policy, the SHA384 algorithm will assume the **Defau | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | | Dependency [PKINIT_Hash_Algorithm_Configuration_DependencyGroup] | Dependency Type: `DependsOn`
    Dependency URI: `Device/Vendor/MSFT/Policy/Config/Kerberos/PKInitHashAlgorithmConfigurationEnabled`
    Dependency Allowed Value: `[1]`
    Dependency Allowed Value Type: `Range`
    | @@ -514,7 +509,7 @@ If you don't configure this policy, the SHA384 algorithm will assume the **Defau | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -544,7 +539,7 @@ If you don't configure this policy, the SHA512 algorithm will assume the **Defau | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | | Dependency [PKINIT_Hash_Algorithm_Configuration_DependencyGroup] | Dependency Type: `DependsOn`
    Dependency URI: `Device/Vendor/MSFT/Policy/Config/Kerberos/PKInitHashAlgorithmConfigurationEnabled`
    Dependency Allowed Value: `[1]`
    Dependency Allowed Value Type: `Range`
    | @@ -587,7 +582,7 @@ If you don't configure this policy, the SHA512 algorithm will assume the **Defau | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -601,14 +596,14 @@ If you don't configure this policy, the SHA512 algorithm will assume the **Defau This policy setting controls whether a computer requires that Kerberos message exchanges be armored when communicating with a domain controller. > [!WARNING] -> When a domain does not support Kerberos armoring by enabling "Support Dynamic Access Control and Kerberos armoring", then all authentication for all its users will fail from computers with this policy setting enabled. +> When a domain doesn't support Kerberos armoring by enabling "Support Dynamic Access Control and Kerberos armoring", then all authentication for all its users will fail from computers with this policy setting enabled. - If you enable this policy setting, the client computers in the domain enforce the use of Kerberos armoring in only authentication service (AS) and ticket-granting service (TGS) message exchanges with the domain controllers. > [!NOTE] > The Kerberos Group Policy "Kerberos client support for claims, compound authentication and Kerberos armoring" must also be enabled to support Kerberos armoring. -- If you disable or do not configure this policy setting, the client computers in the domain enforce the use of Kerberos armoring when possible as supported by the target domain. +- If you disable or don't configure this policy setting, the client computers in the domain enforce the use of Kerberos armoring when possible as supported by the target domain. @@ -620,13 +615,12 @@ This policy setting controls whether a computer requires that Kerberos message e | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -653,7 +647,7 @@ This policy setting controls whether a computer requires that Kerberos message e | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -666,9 +660,9 @@ This policy setting controls whether a computer requires that Kerberos message e This policy setting controls the Kerberos client's behavior in validating the KDC certificate for smart card and system certificate logon. -- If you enable this policy setting, the Kerberos client requires that the KDC's X.509 certificate contains the KDC key purpose object identifier in the Extended Key Usage (EKU) extensions, and that the KDC's X.509 certificate contains a dNSName subjectAltName (SAN) extension that matches the DNS name of the domain. If the computer is joined to a domain, the Kerberos client requires that the KDC's X.509 certificate must be signed by a Certificate Authority (CA) in the NTAuth store. If the computer is not joined to a domain, the Kerberos client allows the root CA certificate on the smart card to be used in the path validation of the KDC's X.509 certificate. +- If you enable this policy setting, the Kerberos client requires that the KDC's X.509 certificate contains the KDC key purpose object identifier in the Extended Key Usage (EKU) extensions, and that the KDC's X.509 certificate contains a dNSName subjectAltName (SAN) extension that matches the DNS name of the domain. If the computer is joined to a domain, the Kerberos client requires that the KDC's X.509 certificate must be signed by a Certificate Authority (CA) in the NTAuth store. If the computer isn't joined to a domain, the Kerberos client allows the root CA certificate on the smart card to be used in the path validation of the KDC's X.509 certificate. -- If you disable or do not configure this policy setting, the Kerberos client requires only that the KDC certificate contain the Server Authentication purpose object identifier in the EKU extensions which can be issued to any server. +- If you disable or don't configure this policy setting, the Kerberos client requires only that the KDC certificate contains the Server Authentication purpose object identifier in the EKU extensions which can be issued to any server. @@ -680,13 +674,12 @@ This policy setting controls the Kerberos client's behavior in validating the KD | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -713,7 +706,7 @@ This policy setting controls the Kerberos client's behavior in validating the KD | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -730,10 +723,10 @@ The size of the context token buffer determines the maximum size of SSPI context - If you enable this policy setting, the Kerberos client or server uses the configured value, or the locally allowed maximum value, whichever is smaller. -- If you disable or do not configure this policy setting, the Kerberos client or server uses the locally configured value or the default value. +- If you disable or don't configure this policy setting, the Kerberos client or server uses the locally configured value or the default value. > [!NOTE] -> This policy setting configures the existing MaxTokenSize registry value in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters, which was added in Windows XP and Windows Server 2003, with a default value of 12,000 bytes. Beginning with Windows 8 the default is 48,000 bytes. Due to HTTP's base64 encoding of authentication context tokens, it is not advised to set this value more than 48,000 bytes. +> This policy setting configures the existing MaxTokenSize registry value in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters, which was added in Windows XP and Windows Server 2003, with a default value of 12,000 bytes. Beginning with Windows 8 the default is 48,000 bytes. Due to HTTP's base64 encoding of authentication context tokens, it isn't advised to set this value more than 48,000 bytes. @@ -745,13 +738,12 @@ The size of the context token buffer determines the maximum size of SSPI context | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -778,7 +770,7 @@ The size of the context token buffer determines the maximum size of SSPI context | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -790,7 +782,7 @@ The size of the context token buffer determines the maximum size of SSPI context Devices joined to Azure Active Directory in a hybrid environment need to interact with Active Directory Domain Controllers, but they lack the built-in ability to find a Domain Controller that a domain-joined device has. This can cause failures when such a device needs to resolve an AAD UPN into an Active Directory Principal. -This parameter adds a list of domains that an Azure Active Directory joined device should attempt to contact if it is otherwise unable to resolve a UPN to a principal. +This parameter adds a list of domains that an Azure Active Directory joined device should attempt to contact if it's otherwise unable to resolve a UPN to a principal. @@ -802,7 +794,7 @@ This parameter adds a list of domains that an Azure Active Directory joined devi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | diff --git a/windows/client-management/mdm/policy-csp-kioskbrowser.md b/windows/client-management/mdm/policy-csp-kioskbrowser.md index cffc594e00..28662221fb 100644 --- a/windows/client-management/mdm/policy-csp-kioskbrowser.md +++ b/windows/client-management/mdm/policy-csp-kioskbrowser.md @@ -4,7 +4,7 @@ description: Learn more about the KioskBrowser Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -55,7 +55,7 @@ List of exceptions to the blocked website URLs (with wildcard support). This is | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -72,7 +72,7 @@ List of exceptions to the blocked website URLs (with wildcard support). This is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -87,7 +87,7 @@ List of exceptions to the blocked website URLs (with wildcard support). This is -List of blocked website URLs (with wildcard support). This is used to configure blocked URLs kiosk browsers can not navigate to. +List of blocked website URLs (with wildcard support). This is used to configure blocked URLs kiosk browsers can't navigate to. @@ -101,7 +101,7 @@ List of blocked website URLs (with wildcard support). This is used to configure | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -118,7 +118,7 @@ List of blocked website URLs (with wildcard support). This is used to configure | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -147,7 +147,7 @@ Configures the default URL kiosk browsers to navigate on launch and restart. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -163,7 +163,7 @@ Configures the default URL kiosk browsers to navigate on launch and restart. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -191,7 +191,7 @@ When the policy is enabled, the Kiosk Browser app shows a button to reset the br | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -217,7 +217,7 @@ When the policy is enabled, the Kiosk Browser app shows a button to reset the br | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -246,7 +246,7 @@ Enable/disable kiosk browser's home button. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -272,7 +272,7 @@ Enable/disable kiosk browser's home button. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -301,7 +301,7 @@ Enable/disable kiosk browser's navigation buttons (forward/back). | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -327,7 +327,7 @@ Enable/disable kiosk browser's navigation buttons (forward/back). | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -358,7 +358,7 @@ The value is an int 1-1440 that specifies the number of minutes the session is i | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[1-1440]` | | Default Value | 0 | diff --git a/windows/client-management/mdm/policy-csp-lanmanworkstation.md b/windows/client-management/mdm/policy-csp-lanmanworkstation.md index eeb195ac8a..45c8c19788 100644 --- a/windows/client-management/mdm/policy-csp-lanmanworkstation.md +++ b/windows/client-management/mdm/policy-csp-lanmanworkstation.md @@ -4,7 +4,7 @@ description: Learn more about the LanmanWorkstation Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -39,11 +39,11 @@ ms.topic: reference This policy setting determines if the SMB client will allow insecure guest logons to an SMB server. -- If you enable this policy setting or if you do not configure this policy setting, the SMB client will allow insecure guest logons. +- If you enable this policy setting or if you don't configure this policy setting, the SMB client will allow insecure guest logons. - If you disable this policy setting, the SMB client will reject insecure guest logons. -Insecure guest logons are used by file servers to allow unauthenticated access to shared folders. While uncommon in an enterprise environment, insecure guest logons are frequently used by consumer Network Attached Storage (NAS) appliances acting as file servers. Windows file servers require authentication and do not use insecure guest logons by default. Since insecure guest logons are unauthenticated, important security features such as SMB Signing and SMB Encryption are disabled. As a result, clients that allow insecure guest logons are vulnerable to a variety of man-in-the-middle attacks that can result in data loss, data corruption, and exposure to malware. Additionally, any data written to a file server using an insecure guest logon is potentially accessible to anyone on the network. Microsoft recommends disabling insecure guest logons and configuring file servers to require authenticated access." +Insecure guest logons are used by file servers to allow unauthenticated access to shared folders. While uncommon in an enterprise environment, insecure guest logons are frequently used by consumer Network Attached Storage (NAS) appliances acting as file servers. Windows file servers require authentication and don't use insecure guest logons by default. Since insecure guest logons are unauthenticated, important security features such as SMB Signing and SMB Encryption are disabled. As a result, clients that allow insecure guest logons are vulnerable to a variety of man-in-the-middle attacks that can result in data loss, data corruption, and exposure to malware. Additionally, any data written to a file server using an insecure guest logon is potentially accessible to anyone on the network. Microsoft recommends disabling insecure guest logons and configuring file servers to require authenticated access". @@ -55,7 +55,7 @@ Insecure guest logons are used by file servers to allow unauthenticated access t | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | diff --git a/windows/client-management/mdm/policy-csp-licensing.md b/windows/client-management/mdm/policy-csp-licensing.md index 4ece74db51..430bd00cd2 100644 --- a/windows/client-management/mdm/policy-csp-licensing.md +++ b/windows/client-management/mdm/policy-csp-licensing.md @@ -4,7 +4,7 @@ description: Learn more about the Licensing Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -38,10 +38,12 @@ ms.topic: reference This policy setting controls whether OS Reactivation is blocked on a device. + Policy Options: - - Not Configured (default -- Windows registration and reactivation is allowed) - - Disabled (Windows registration and reactivation is not allowed) - - Enabled (Windows registration is allowed) + +- Not Configured (default -- Windows registration and reactivation is allowed) +- Disabled (Windows registration and reactivation isn't allowed) +- Enabled (Windows registration is allowed) @@ -53,7 +55,7 @@ Policy Options: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -93,7 +95,7 @@ Policy Options: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -105,11 +107,14 @@ Policy Options: This policy setting lets you opt-out of sending KMS client activation data to Microsoft automatically. Enabling this setting prevents this computer from sending data to Microsoft regarding its activation state. -If you disable or do not configure this policy setting, KMS client activation data will be sent to Microsoft services when this device activates. + +If you disable or don't configure this policy setting, KMS client activation data will be sent to Microsoft services when this device activates. + Policy Options: - - Not Configured (default -- data will be automatically sent to Microsoft) - - Disabled (data will be automatically sent to Microsoft) - - Enabled (data will not be sent to Microsoft) + +- Not Configured (default -- data will be automatically sent to Microsoft) +- Disabled (data will be automatically sent to Microsoft) +- Enabled (data won't be sent to Microsoft) @@ -121,7 +126,7 @@ Policy Options: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | diff --git a/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md index b85c550c26..3a0caa4237 100644 --- a/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md +++ b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md @@ -4,7 +4,7 @@ description: Learn more about the LocalPoliciesSecurityOptions Area in Policy CS author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,8 +16,7 @@ ms.topic: reference # Policy CSP - LocalPoliciesSecurityOptions -> [!IMPORTANT] -> This CSP contains preview policies that are under development and only applicable for [Windows Insider Preview builds](/windows-insider/). These policies are subject to change and may have dependencies on other features or services in preview. +[!INCLUDE [Windows Insider tip](includes/mdm-insider-csp-note.md)] @@ -31,7 +30,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -42,7 +41,7 @@ ms.topic: reference -This policy setting prevents users from adding new Microsoft accounts on this computer. If you select the "Users can't add Microsoft accounts" option, users will not be able to create new Microsoft accounts on this computer, switch a local account to a Microsoft account, or connect a domain account to a Microsoft account. This is the preferred option if you need to limit the use of Microsoft accounts in your enterprise. If you select the "Users can't add or log on with Microsoft accounts" option, existing Microsoft account users will not be able to log on to Windows. Selecting this option might make it impossible for an existing administrator on this computer to log on and manage the system. If you disable or do not configure this policy (recommended), users will be able to use Microsoft accounts with Windows. +This policy setting prevents users from adding new Microsoft accounts on this computer. If you select the "Users can't add Microsoft accounts" option, users won't be able to create new Microsoft accounts on this computer, switch a local account to a Microsoft account, or connect a domain account to a Microsoft account. This is the preferred option if you need to limit the use of Microsoft accounts in your enterprise. If you select the "Users can't add or log on with Microsoft accounts" option, existing Microsoft account users won't be able to log on to Windows. Selecting this option might make it impossible for an existing administrator on this computer to log on and manage the system. If you disable or don't configure this policy (recommended), users will be able to use Microsoft accounts with Windows. @@ -54,7 +53,7 @@ This policy setting prevents users from adding new Microsoft accounts on this co | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -90,7 +89,7 @@ This policy setting prevents users from adding new Microsoft accounts on this co | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -104,7 +103,7 @@ This policy setting prevents users from adding new Microsoft accounts on this co This security setting determines whether the local Administrator account is enabled or disabled. > [!NOTE] -> If you try to reenable the Administrator account after it has been disabled, and if the current Administrator password does not meet the password requirements, you cannot reenable the account. In this case, an alternative member of the Administrators group must reset the password on the Administrator account. For information about how to reset a password, see To reset a password. Disabling the Administrator account can become a maintenance issue under certain circumstances. Under Safe Mode boot, the disabled Administrator account will only be enabled if the machine is non-domain joined and there are no other local active administrator accounts. If the computer is domain joined the disabled administrator will not be enabled. Default: Disabled. +> If you try to reenable the Administrator account after it has been disabled, and if the current Administrator password doesn't meet the password requirements, you can't reenable the account. In this case, an alternative member of the Administrators group must reset the password on the Administrator account. For information about how to reset a password, see To reset a password. Disabling the Administrator account can become a maintenance issue under certain circumstances. Under Safe Mode boot, the disabled Administrator account will only be enabled if the machine is non-domain joined and there are no other local active administrator accounts. If the computer is domain joined the disabled administrator won't be enabled. Default: Disabled. @@ -116,7 +115,7 @@ This security setting determines whether the local Administrator account is enab | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -151,7 +150,7 @@ This security setting determines whether the local Administrator account is enab | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -177,7 +176,7 @@ This security setting determines if the Guest account is enabled or disabled. De | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -212,7 +211,7 @@ This security setting determines if the Guest account is enabled or disabled. De | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -223,13 +222,13 @@ This security setting determines if the Guest account is enabled or disabled. De -Accounts: Limit local account use of blank passwords to console logon only This security setting determines whether local accounts that are not password protected can be used to log on from locations other than the physical computer console. If enabled, local accounts that are not password protected will only be able to log on at the computer's keyboard. Default: Enabled. +Accounts: Limit local account use of blank passwords to console logon only This security setting determines whether local accounts that aren't password protected can be used to log on from locations other than the physical computer console. If enabled, local accounts that aren't password protected will only be able to log on at the computer's keyboard. Default: Enabled. > [!WARNING] -> Computers that are not in physically secure locations should always enforce strong password policies for all local user accounts. Otherwise, anyone with physical access to the computer can log on by using a user account that does not have a password. This is especially important for portable computers. If you apply this security policy to the Everyone group, no one will be able to log on through Remote Desktop Services. +> Computers that aren't in physically secure locations should always enforce strong password policies for all local user accounts. Otherwise, anyone with physical access to the computer can log on by using a user account that doesn't have a password. This is especially important for portable computers. If you apply this security policy to the Everyone group, no one will be able to log on through Remote Desktop Services. > [!NOTE] -> This setting does not affect logons that use domain accounts. It is possible for applications that use remote interactive logons to bypass this setting. +> This setting doesn't affect logons that use domain accounts. It's possible for applications that use remote interactive logons to bypass this setting. @@ -241,7 +240,7 @@ Accounts: Limit local account use of blank passwords to console logon only This | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -276,7 +275,7 @@ Accounts: Limit local account use of blank passwords to console logon only This | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -299,7 +298,7 @@ Accounts: Rename administrator account This security setting determines whether | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Default Value | Administrator | @@ -325,7 +324,7 @@ Accounts: Rename administrator account This security setting determines whether | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -336,7 +335,7 @@ Accounts: Rename administrator account This security setting determines whether -Accounts: Rename guest account This security setting determines whether a different account name is associated with the security identifier (SID) for the account "Guest." Renaming the well-known Guest account makes it slightly more difficult for unauthorized persons to guess this user name and password combination. Default: Guest. +Accounts: Rename guest account This security setting determines whether a different account name is associated with the security identifier (SID) for the account "Guest". Renaming the well-known Guest account makes it slightly more difficult for unauthorized persons to guess this user name and password combination. Default: Guest. @@ -348,7 +347,7 @@ Accounts: Rename guest account This security setting determines whether a differ | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Default Value | Guest | @@ -374,7 +373,7 @@ Accounts: Rename guest account This security setting determines whether a differ | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -385,7 +384,7 @@ Accounts: Rename guest account This security setting determines whether a differ -Devices: Allowed to format and eject removable media This security setting determines who is allowed to format and eject removable NTFS media. This capability can be given to: Administrators Administrators and Interactive Users Default: This policy is not defined and only Administrators have this ability. +Devices: Allowed to format and eject removable media This security setting determines who is allowed to format and eject removable NTFS media. This capability can be given to: Administrators Administrators and Interactive Users Default: This policy isn't defined and only Administrators have this ability. @@ -397,7 +396,7 @@ Devices: Allowed to format and eject removable media This security setting deter | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -423,7 +422,7 @@ Devices: Allowed to format and eject removable media This security setting deter | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -434,7 +433,7 @@ Devices: Allowed to format and eject removable media This security setting deter -Devices: Allow undock without having to log on This security setting determines whether a portable computer can be undocked without having to log on. If this policy is enabled, logon is not required and an external hardware eject button can be used to undock the computer. If disabled, a user must log on and have the Remove computer from docking station privilege to undock the computer. Default: Enabled. +Devices: Allow undock without having to log on This security setting determines whether a portable computer can be undocked without having to log on. If this policy is enabled, logon isn't required and an external hardware eject button can be used to undock the computer. If disabled, a user must log on and have the Remove computer from docking station privilege to undock the computer. Default: Enabled. > [!CAUTION] > Disabling this policy may tempt users to try and physically remove the laptop from its docking station using methods other than the external hardware eject button. Since this may cause damage to the hardware, this setting, in general, should only be disabled on laptop configurations that are physically securable. @@ -449,7 +448,7 @@ Devices: Allow undock without having to log on This security setting determines | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -484,7 +483,7 @@ Devices: Allow undock without having to log on This security setting determines | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -498,7 +497,8 @@ Devices: Allow undock without having to log on This security setting determines Devices: Prevent users from installing printer drivers when connecting to shared printers For a computer to print to a shared printer, the driver for that shared printer must be installed on the local computer. This security setting determines who is allowed to install a printer driver as part of connecting to a shared printer. - If this setting is enabled, only Administrators can install a printer driver as part of connecting to a shared printer. -- If this setting is disabled, any user can install a printer driver as part of connecting to a shared printer. Default on servers: Enabled. Default on workstations: Disabled Notes This setting does not affect the ability to add a local printer. This setting does not affect Administrators. + +- If this setting is disabled, any user can install a printer driver as part of connecting to a shared printer. Default on servers: Enabled. Default on workstations: Disabled Notes This setting doesn't affect the ability to add a local printer. This setting doesn't affect Administrators. @@ -510,7 +510,7 @@ Devices: Prevent users from installing printer drivers when connecting to shared | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -545,7 +545,7 @@ Devices: Prevent users from installing printer drivers when connecting to shared | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -556,7 +556,7 @@ Devices: Prevent users from installing printer drivers when connecting to shared -Devices: Restrict CD-ROM access to locally logged-on user only This security setting determines whether a CD-ROM is accessible to both local and remote users simultaneously. If this policy is enabled, it allows only the interactively logged-on user to access removable CD-ROM media. If this policy is enabled and no one is logged on interactively, the CD-ROM can be accessed over the network. Default: This policy is not defined and CD-ROM access is not restricted to the locally logged-on user. +Devices: Restrict CD-ROM access to locally logged-on user only This security setting determines whether a CD-ROM is accessible to both local and remote users simultaneously. If this policy is enabled, it allows only the interactively logged-on user to access removable CD-ROM media. If this policy is enabled and no one is logged-on interactively, the CD-ROM can be accessed over the network. Default: This policy isn't defined and CD-ROM access isn't restricted to the locally logged-on user. @@ -568,7 +568,7 @@ Devices: Restrict CD-ROM access to locally logged-on user only This security set | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -594,7 +594,7 @@ Devices: Restrict CD-ROM access to locally logged-on user only This security set | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -605,7 +605,7 @@ Devices: Restrict CD-ROM access to locally logged-on user only This security set -Interactive Logon:Display user information when the session is locked User display name, domain and user names (1) User display name only (2) Do not display user information (3) Domain and user names only (4) +Interactive Logon:Display user information when the session is locked User display name, domain and user names (1) User display name only (2) Don't display user information (3) Domain and user names only (4) @@ -617,7 +617,7 @@ Interactive Logon:Display user information when the session is locked User displ | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -629,7 +629,7 @@ Interactive Logon:Display user information when the session is locked User displ |:--|:--| | 1 (Default) | User display name, domain and user names. | | 2 | User display name only. | -| 3 | Do not display user information. | +| 3 | Don't display user information. | | 4 | Domain and user names only. | @@ -654,7 +654,7 @@ Interactive Logon:Display user information when the session is locked User displ | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -665,7 +665,7 @@ Interactive Logon:Display user information when the session is locked User displ -Interactive logon: Don't display last signed-in This security setting determines whether the Windows sign-in screen will show the username of the last person who signed in on this PC. If this policy is enabled, the username will not be shown. If this policy is disabled, the username will be shown. Default: Disabled. +Interactive logon: Don't display last signed-in This security setting determines whether the Windows sign-in screen will show the username of the last person who signed in on this PC. If this policy is enabled, the username won't be shown. If this policy is disabled, the username will be shown. Default: Disabled. @@ -677,7 +677,7 @@ Interactive logon: Don't display last signed-in This security setting determines | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -688,7 +688,7 @@ Interactive logon: Don't display last signed-in This security setting determines | Value | Description | |:--|:--| | 0 (Default) | Disabled (username will be shown). | -| 1 | Enabled (username will not be shown). | +| 1 | Enabled (username won't be shown). | @@ -712,7 +712,7 @@ Interactive logon: Don't display last signed-in This security setting determines | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -723,7 +723,7 @@ Interactive logon: Don't display last signed-in This security setting determines -Interactive logon: Don't display username at sign-in This security setting determines whether the username of the person signing in to this PC appears at Windows sign-in, after credentials are entered, and before the PC desktop is shown. If this policy is enabled, the username will not be shown. If this policy is disabled, the username will be shown. Default: Disabled. +Interactive logon: Don't display username at sign-in This security setting determines whether the username of the person signing in to this PC appears at Windows sign-in, after credentials are entered, and before the PC desktop is shown. If this policy is enabled, the username won't be shown. If this policy is disabled, the username will be shown. Default: Disabled. @@ -735,7 +735,7 @@ Interactive logon: Don't display username at sign-in This security setting deter | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -746,7 +746,7 @@ Interactive logon: Don't display username at sign-in This security setting deter | Value | Description | |:--|:--| | 0 | Disabled (username will be shown). | -| 1 (Default) | Enabled (username will not be shown). | +| 1 (Default) | Enabled (username won't be shown). | @@ -770,7 +770,7 @@ Interactive logon: Don't display username at sign-in This security setting deter | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -781,7 +781,7 @@ Interactive logon: Don't display username at sign-in This security setting deter -Interactive logon: Do not require CTRL+ALT+DEL This security setting determines whether pressing CTRL+ALT+DEL is required before a user can log on. If this policy is enabled on a computer, a user is not required to press CTRL+ALT+DEL to log on. Not having to press CTRL+ALT+DEL leaves users susceptible to attacks that attempt to intercept the users' passwords. Requiring CTRL+ALT+DEL before users log on ensures that users are communicating by means of a trusted path when entering their passwords. If this policy is disabled, any user is required to press CTRL+ALT+DEL before logging on to Windows. Default on domain-computers: Enabled: At least Windows 8/Disabled: Windows 7 or earlier. Default on stand-alone computers: Enabled. +Interactive logon: Don't require CTRL+ALT+DEL This security setting determines whether pressing CTRL+ALT+DEL is required before a user can log on. If this policy is enabled on a computer, a user isn't required to press CTRL+ALT+DEL to log on. Not having to press CTRL+ALT+DEL leaves users susceptible to attacks that attempt to intercept the users' passwords. Requiring CTRL+ALT+DEL before users log on ensures that users are communicating by means of a trusted path when entering their passwords. If this policy is disabled, any user is required to press CTRL+ALT+DEL before logging on to Windows. Default on domain-computers: Enabled: At least Windows 8/Disabled: Windows 7 or earlier. Default on stand-alone computers: Enabled. @@ -793,7 +793,7 @@ Interactive logon: Do not require CTRL+ALT+DEL This security setting determines | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -804,7 +804,7 @@ Interactive logon: Do not require CTRL+ALT+DEL This security setting determines | Value | Description | |:--|:--| | 0 | Disabled. | -| 1 (Default) | Enabled (a user is not required to press CTRL+ALT+DEL to log on). | +| 1 (Default) | Enabled (a user isn't required to press CTRL+ALT+DEL to log on). | @@ -812,7 +812,7 @@ Interactive logon: Do not require CTRL+ALT+DEL This security setting determines | Name | Value | |:--|:--| -| Name | Interactive logon: Do not require CTRL+ALT+DEL | +| Name | Interactive logon: Don't require CTRL+ALT+DEL | | Path | Windows Settings > Security Settings > Local Policies > Security Options | @@ -828,7 +828,7 @@ Interactive logon: Do not require CTRL+ALT+DEL This security setting determines | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -851,7 +851,7 @@ Interactive logon: Machine inactivity limit. Windows notices inactivity of a log | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-599940]` | | Default Value | 0 | @@ -881,7 +881,7 @@ Valid values: From 0 to 599940, where the value is the amount of inactivity time | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -892,7 +892,7 @@ Valid values: From 0 to 599940, where the value is the amount of inactivity time -Interactive logon: Message text for users attempting to log on This security setting specifies a text message that is displayed to users when they log on. This text is often used for legal reasons, for example, to warn users about the ramifications of misusing company information or to warn them that their actions may be audited. Default: No message. +Interactive logon: Message text for users attempting to log on This security setting specifies a text message that's displayed to users when they log on. This text is often used for legal reasons, for example, to warn users about the ramifications of misusing company information or to warn them that their actions may be audited. Default: No message. @@ -904,7 +904,7 @@ Interactive logon: Message text for users attempting to log on This security set | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -930,7 +930,7 @@ Interactive logon: Message text for users attempting to log on This security set | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -953,7 +953,7 @@ Interactive logon: Message title for users attempting to log on This security se | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -978,7 +978,7 @@ Interactive logon: Message title for users attempting to log on This security se | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -992,7 +992,7 @@ Interactive logon: Message title for users attempting to log on This security se Interactive logon: Smart card removal behavior This security setting determines what happens when the smart card for a logged-on user is removed from the smart card reader. The options are: No Action Lock Workstation Force Logoff Disconnect if a Remote Desktop Services session If you click Lock Workstation in the Properties dialog box for this policy, the workstation is locked when the smart card is removed, allowing users to leave the area, take their smart card with them, and still maintain a protected session. If you click Force Logoff in the Properties dialog box for this policy, the user is automatically logged off when the smart card is removed. If you click Disconnect if a Remote Desktop Services session, removal of the smart card disconnects the session without logging the user off. This allows the user to insert the smart card and resume the session later, or at another smart card reader-equipped computer, without having to log on again. If the session is local, this policy functions identically to Lock Workstation. > [!NOTE] -> Remote Desktop Services was called Terminal Services in previous versions of Windows Server. Default: This policy is not defined, which means that the system treats it as No action. On Windows Vista and above: For this setting to work, the Smart Card Removal Policy service must be started. +> Remote Desktop Services was called Terminal Services in previous versions of Windows Server. Default: This policy isn't defined, which means that the system treats it as No action. On Windows Vista and above: For this setting to work, the Smart Card Removal Policy service must be started. @@ -1004,7 +1004,7 @@ Interactive logon: Smart card removal behavior This security setting determines | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1041,7 +1041,7 @@ Interactive logon: Smart card removal behavior This security setting determines | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -1054,7 +1054,8 @@ Interactive logon: Smart card removal behavior This security setting determines Microsoft network client: Digitally sign communications (always) This security setting determines whether packet signing is required by the SMB client component. The server message block (SMB) protocol provides the basis for Microsoft file and print sharing and many other networking operations, such as remote Windows administration. To prevent man-in-the-middle attacks that modify SMB packets in transit, the SMB protocol supports the digital signing of SMB packets. This policy setting determines whether SMB packet signing must be negotiated before further communication with an SMB server is permitted. -- If this setting is enabled, the Microsoft network client will not communicate with a Microsoft network server unless that server agrees to perform SMB packet signing. +- If this setting is enabled, the Microsoft network client won't communicate with a Microsoft network server unless that server agrees to perform SMB packet signing. + - If this policy is disabled, SMB packet signing is negotiated between the client and server. Default: Disabled. > [!IMPORTANT] @@ -1073,7 +1074,7 @@ Microsoft network client: Digitally sign communications (always) This security s | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1108,7 +1109,7 @@ Microsoft network client: Digitally sign communications (always) This security s | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1122,6 +1123,7 @@ Microsoft network client: Digitally sign communications (always) This security s Microsoft network client: Digitally sign communications (if server agrees) This security setting determines whether the SMB client attempts to negotiate SMB packet signing. The server message block (SMB) protocol provides the basis for Microsoft file and print sharing and many other networking operations, such as remote Windows administration. To prevent man-in-the-middle attacks that modify SMB packets in transit, the SMB protocol supports the digital signing of SMB packets. This policy setting determines whether the SMB client component attempts to negotiate SMB packet signing when it connects to an SMB server. - If this setting is enabled, the Microsoft network client will ask the server to perform SMB packet signing upon session setup. If packet signing has been enabled on the server, packet signing will be negotiated. + - If this policy is disabled, the SMB client will never negotiate SMB packet signing. Default: Enabled. > [!NOTE] @@ -1137,7 +1139,7 @@ Microsoft network client: Digitally sign communications (if server agrees) This | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1172,7 +1174,7 @@ Microsoft network client: Digitally sign communications (if server agrees) This | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1183,7 +1185,7 @@ Microsoft network client: Digitally sign communications (if server agrees) This -Microsoft network client: Send unencrypted password to connect to third-party SMB servers If this security setting is enabled, the Server Message Block (SMB) redirector is allowed to send plaintext passwords to non-Microsoft SMB servers that do not support password encryption during authentication. Sending unencrypted passwords is a security risk. Default: Disabled. +Microsoft network client: Send unencrypted password to connect to third-party SMB servers If this security setting is enabled, the Server Message Block (SMB) redirector is allowed to send plaintext passwords to non-Microsoft SMB servers that don't support password encryption during authentication. Sending unencrypted passwords is a security risk. Default: Disabled. @@ -1195,7 +1197,7 @@ Microsoft network client: Send unencrypted password to connect to third-party SM | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1230,7 +1232,7 @@ Microsoft network client: Send unencrypted password to connect to third-party SM | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1243,11 +1245,12 @@ Microsoft network client: Send unencrypted password to connect to third-party SM Microsoft network server: Digitally sign communications (always) This security setting determines whether packet signing is required by the SMB server component. The server message block (SMB) protocol provides the basis for Microsoft file and print sharing and many other networking operations, such as remote Windows administration. To prevent man-in-the-middle attacks that modify SMB packets in transit, the SMB protocol supports the digital signing of SMB packets. This policy setting determines whether SMB packet signing must be negotiated before further communication with an SMB client is permitted. -- If this setting is enabled, the Microsoft network server will not communicate with a Microsoft network client unless that client agrees to perform SMB packet signing. +- If this setting is enabled, the Microsoft network server won't communicate with a Microsoft network client unless that client agrees to perform SMB packet signing. + - If this setting is disabled, SMB packet signing is negotiated between the client and server. Default: Disabled for member servers. Enabled for domain controllers. > [!NOTE] -> All Windows operating systems support both a client-side SMB component and a server-side SMB component. On Windows 2000 and later, enabling or requiring packet signing for client and server-side SMB components is controlled by the following four policy settings: Microsoft network client: Digitally sign communications (always) - Controls whether or not the client-side SMB component requires packet signing. Microsoft network client: Digitally sign communications (if server agrees) - Controls whether or not the client-side SMB component has packet signing enabled. Microsoft network server: Digitally sign communications (always) - Controls whether or not the server-side SMB component requires packet signing. Microsoft network server: Digitally sign communications (if client agrees) - Controls whether or not the server-side SMB component has packet signing enabled. Similarly, if client-side SMB signing is required, that client will not be able to establish a session with servers that do not have packet signing enabled. By default, server-side SMB signing is enabled only on domain controllers. If server-side SMB signing is enabled, SMB packet signing will be negotiated with clients that have client-side SMB signing enabled. SMB packet signing can significantly degrade SMB performance, depending on dialect version, OS version, file sizes, processor offloading capabilities, and application IO behaviors. +> All Windows operating systems support both a client-side SMB component and a server-side SMB component. On Windows 2000 and later, enabling or requiring packet signing for client and server-side SMB components is controlled by the following four policy settings: Microsoft network client: Digitally sign communications (always) - Controls whether or not the client-side SMB component requires packet signing. Microsoft network client: Digitally sign communications (if server agrees) - Controls whether or not the client-side SMB component has packet signing enabled. Microsoft network server: Digitally sign communications (always) - Controls whether or not the server-side SMB component requires packet signing. Microsoft network server: Digitally sign communications (if client agrees) - Controls whether or not the server-side SMB component has packet signing enabled. Similarly, if client-side SMB signing is required, that client won't be able to establish a session with servers that don't have packet signing enabled. By default, server-side SMB signing is enabled only on domain controllers. If server-side SMB signing is enabled, SMB packet signing will be negotiated with clients that have client-side SMB signing enabled. SMB packet signing can significantly degrade SMB performance, depending on dialect version, OS version, file sizes, processor offloading capabilities, and application IO behaviors. > [!IMPORTANT] > For this policy to take effect on computers running Windows 2000, server-side packet signing must also be enabled. To enable server-side SMB packet signing, set the following policy: Microsoft network server: Digitally sign communications (if server agrees) For Windows 2000 servers to negotiate signing with Windows NT 4.0 clients, the following registry value must be set to 1 on the Windows 2000 server: HKLM\System\CurrentControlSet\Services\lanmanserver\parameters\enableW9xsecuritysignature For more information, reference:< https://go.microsoft.com/fwlink/?LinkID=787136>. @@ -1262,7 +1265,7 @@ Microsoft network server: Digitally sign communications (always) This security s | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1297,7 +1300,7 @@ Microsoft network server: Digitally sign communications (always) This security s | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1311,6 +1314,7 @@ Microsoft network server: Digitally sign communications (always) This security s Microsoft network server: Digitally sign communications (if client agrees) This security setting determines whether the SMB server will negotiate SMB packet signing with clients that request it. The server message block (SMB) protocol provides the basis for Microsoft file and print sharing and many other networking operations, such as remote Windows administration. To prevent man-in-the-middle attacks that modify SMB packets in transit, the SMB protocol supports the digital signing of SMB packets. This policy setting determines whether the SMB server will negotiate SMB packet signing when an SMB client requests it. - If this setting is enabled, the Microsoft network server will negotiate SMB packet signing as requested by the client. That is, if packet signing has been enabled on the client, packet signing will be negotiated. + - If this policy is disabled, the SMB client will never negotiate SMB packet signing. Default: Enabled on domain controllers only. > [!IMPORTANT] @@ -1326,7 +1330,7 @@ Microsoft network server: Digitally sign communications (if client agrees) This | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1361,7 +1365,7 @@ Microsoft network server: Digitally sign communications (if client agrees) This | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -1373,8 +1377,10 @@ Microsoft network server: Digitally sign communications (if client agrees) This Network access: Allow anonymous SID/name translation This policy setting determines whether an anonymous user can request security identifier (SID) attributes for another user. + - If this policy is enabled, an anonymous user can request the SID attribute for another user. An anonymous user with knowledge of an administrator's SID could contact a computer that has this policy enabled and use the SID to get the administrator's name. This setting affects both the SID-to-name translation as well as the name-to-SID translation. -- If this policy setting is disabled, an anonymous user cannot request the SID attribute for another user. Default on workstations and member servers: Disabled. Default on domain controllers running Windows Server 2008 or later: Disabled. Default on domain controllers running Windows Server 2003 R2 or earlier: Enabled. + +- If this policy setting is disabled, an anonymous user can't request the SID attribute for another user. Default on workstations and member servers: Disabled. Default on domain controllers running Windows Server 2008 or later: Disabled. Default on domain controllers running Windows Server 2003 R2 or earlier: Enabled. @@ -1386,7 +1392,7 @@ Network access: Allow anonymous SID/name translation This policy setting determi | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1421,7 +1427,7 @@ Network access: Allow anonymous SID/name translation This policy setting determi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1432,7 +1438,7 @@ Network access: Allow anonymous SID/name translation This policy setting determi -Network access: Do not allow anonymous enumeration of SAM accounts This security setting determines what additional permissions will be granted for anonymous connections to the computer. Windows allows anonymous users to perform certain activities, such as enumerating the names of domain accounts and network shares. This is convenient, for example, when an administrator wants to grant access to users in a trusted domain that does not maintain a reciprocal trust. This security option allows additional restrictions to be placed on anonymous connections as follows: Enabled: Do not allow enumeration of SAM accounts. This option replaces Everyone with Authenticated Users in the security permissions for resources. Disabled: No additional restrictions. Rely on default permissions. Default on workstations: Enabled. Default on server:Enabled. +Network access: Don't allow anonymous enumeration of SAM accounts This security setting determines what additional permissions will be granted for anonymous connections to the computer. Windows allows anonymous users to perform certain activities, such as enumerating the names of domain accounts and network shares. This is convenient, for example, when an administrator wants to grant access to users in a trusted domain that doesn't maintain a reciprocal trust. This security option allows additional restrictions to be placed on anonymous connections as follows: Enabled: Don't allow enumeration of SAM accounts. This option replaces Everyone with Authenticated Users in the security permissions for resources. Disabled: No additional restrictions. Rely on default permissions. Default on workstations: Enabled. Default on server:Enabled. > [!IMPORTANT] > This policy has no impact on domain controllers. @@ -1447,7 +1453,7 @@ Network access: Do not allow anonymous enumeration of SAM accounts This security | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1466,7 +1472,7 @@ Network access: Do not allow anonymous enumeration of SAM accounts This security | Name | Value | |:--|:--| -| Name | Network access: Do not allow anonymous enumeration of SAM accounts | +| Name | Network access: Don't allow anonymous enumeration of SAM accounts | | Path | Windows Settings > Security Settings > Local Policies > Security Options | @@ -1482,7 +1488,7 @@ Network access: Do not allow anonymous enumeration of SAM accounts This security | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1493,7 +1499,7 @@ Network access: Do not allow anonymous enumeration of SAM accounts This security -Network access: Do not allow anonymous enumeration of SAM accounts and shares This security setting determines whether anonymous enumeration of SAM accounts and shares is allowed. Windows allows anonymous users to perform certain activities, such as enumerating the names of domain accounts and network shares. This is convenient, for example, when an administrator wants to grant access to users in a trusted domain that does not maintain a reciprocal trust. If you do not want to allow anonymous enumeration of SAM accounts and shares, then enable this policy. Default: Disabled. +Network access: Don't allow anonymous enumeration of SAM accounts and shares This security setting determines whether anonymous enumeration of SAM accounts and shares is allowed. Windows allows anonymous users to perform certain activities, such as enumerating the names of domain accounts and network shares. This is convenient, for example, when an administrator wants to grant access to users in a trusted domain that doesn't maintain a reciprocal trust. If you don't want to allow anonymous enumeration of SAM accounts and shares, then enable this policy. Default: Disabled. @@ -1505,7 +1511,7 @@ Network access: Do not allow anonymous enumeration of SAM accounts and shares Th | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1524,7 +1530,7 @@ Network access: Do not allow anonymous enumeration of SAM accounts and shares Th | Name | Value | |:--|:--| -| Name | Network access: Do not allow anonymous enumeration of SAM accounts and shares | +| Name | Network access: Don't allow anonymous enumeration of SAM accounts and shares | | Path | Windows Settings > Security Settings > Local Policies > Security Options | @@ -1540,7 +1546,7 @@ Network access: Do not allow anonymous enumeration of SAM accounts and shares Th | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1563,7 +1569,7 @@ Network access: Restrict anonymous access to Named Pipes and Shares When enabled | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1598,7 +1604,7 @@ Network access: Restrict anonymous access to Named Pipes and Shares When enabled | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1621,7 +1627,7 @@ Network access: Restrict clients allowed to make remote calls to SAM This policy | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1646,7 +1652,7 @@ Network access: Restrict clients allowed to make remote calls to SAM This policy | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -1660,10 +1666,11 @@ Network access: Restrict clients allowed to make remote calls to SAM This policy Network security: Allow Local System to use computer identity for NTLM This policy setting allows Local System services that use Negotiate to use the computer identity when reverting to NTLM authentication. - If you enable this policy setting, services running as Local System that use Negotiate will use the computer identity. This might cause some authentication requests between Windows operating systems to fail and log an error. + - If you disable this policy setting, services running as Local System that use Negotiate when reverting to NTLM authentication will authenticate anonymously. By default, this policy is enabled on Windows 7 and above. By default, this policy is disabled on Windows Vista. This policy is supported on at least Windows Vista or Windows Server 2008. > [!NOTE] -> Windows Vista or Windows Server 2008 do not expose this setting in Group Policy. +> Windows Vista or Windows Server 2008 don't expose this setting in Group Policy. @@ -1677,7 +1684,7 @@ Network security: Allow Local System to use computer identity for NTLM This poli | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1712,7 +1719,7 @@ Network security: Allow Local System to use computer identity for NTLM This poli | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1735,7 +1742,7 @@ Network security: Allow PKU2U authentication requests to this computer to use on | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1773,7 +1780,7 @@ Network security: Allow PKU2U authentication requests to this computer to use on | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1784,7 +1791,7 @@ Network security: Allow PKU2U authentication requests to this computer to use on -Network security: Do not store LAN Manager hash value on next password change This security setting determines if, at the next password change, the LAN Manager (LM) hash value for the new password is stored. The LM hash is relatively weak and prone to attack, as compared with the cryptographically stronger Windows NT hash. Since the LM hash is stored on the local computer in the security database the passwords can be compromised if the security database is attacked. Default on Windows Vista and above: Enabled Default on Windows XP: Disabled. +Network security: Don't store LAN Manager hash value on next password change This security setting determines if, at the next password change, the LAN Manager (LM) hash value for the new password is stored. The LM hash is relatively weak and prone to attack, as compared with the cryptographically stronger Windows NT hash. Since the LM hash is stored on the local computer in the security database the passwords can be compromised if the security database is attacked. Default on Windows Vista and above: Enabled Default on Windows XP: Disabled. > [!IMPORTANT] > Windows 2000 Service Pack 2 (SP2) and above offer compatibility with authentication to previous versions of Windows, such as Microsoft Windows NT 4.0. This setting can affect the ability of computers running Windows 2000 Server, Windows 2000 Professional, Windows XP, and the Windows Server 2003 family to communicate with computers running Windows 95 and Windows 98. @@ -1799,7 +1806,7 @@ Network security: Do not store LAN Manager hash value on next password change Th | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1818,7 +1825,7 @@ Network security: Do not store LAN Manager hash value on next password change Th | Name | Value | |:--|:--| -| Name | Network security: Do not store LAN Manager hash value on next password change | +| Name | Network security: Don't store LAN Manager hash value on next password change | | Path | Windows Settings > Security Settings > Local Policies > Security Options | @@ -1834,7 +1841,7 @@ Network security: Do not store LAN Manager hash value on next password change Th | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -1848,7 +1855,7 @@ Network security: Do not store LAN Manager hash value on next password change Th Network security: Force logoff when logon hours expire This security setting determines whether to disconnect users who are connected to the local computer outside their user account's valid logon hours. This setting affects the Server Message Block (SMB) component. When this policy is enabled, it causes client sessions with the SMB server to be forcibly disconnected when the client's logon hours expire. If this policy is disabled, an established client session is allowed to be maintained after the client's logon hours have expired. Default: Enabled. > [!NOTE] -> This security setting behaves as an account policy. For domain accounts, there can be only one account policy. The account policy must be defined in the Default Domain Policy, and it is enforced by the domain controllers that make up the domain. A domain controller always pulls the account policy from the Default Domain Policy Group Policy object (GPO), even if there is a different account policy applied to the organizational unit that contains the domain controller. By default, workstations and servers that are joined to a domain (for example, member computers) also receive the same account policy for their local accounts. However, local account policies for member computers can be different from the domain account policy by defining an account policy for the organizational unit that contains the member computers. Kerberos settings are not applied to member computers. +> This security setting behaves as an account policy. For domain accounts, there can be only one account policy. The account policy must be defined in the Default Domain Policy, and it's enforced by the domain controllers that make up the domain. A domain controller always pulls the account policy from the Default Domain Policy Group Policy object (GPO), even if there is a different account policy applied to the organizational unit that contains the domain controller. By default, workstations and servers that are joined to a domain (for example, member computers) also receive the same account policy for their local accounts. However, local account policies for member computers can be different from the domain account policy by defining an account policy for the organizational unit that contains the member computers. Kerberos settings aren't applied to member computers. @@ -1860,7 +1867,7 @@ Network security: Force logoff when logon hours expire This security setting det | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1895,7 +1902,7 @@ Network security: Force logoff when logon hours expire This security setting det | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1909,7 +1916,7 @@ Network security: Force logoff when logon hours expire This security setting det Network security LAN Manager authentication level This security setting determines which challenge/response authentication protocol is used for network logons. This choice affects the level of authentication protocol used by clients, the level of session security negotiated, and the level of authentication accepted by servers as follows: Send LM and NTLM responses: Clients use LM and NTLM authentication and never use NTLMv2 session security; domain controllers accept LM, NTLM, and NTLMv2 authentication. Send LM and NTLM - use NTLMv2 session security if negotiated: Clients use LM and NTLM authentication and use NTLMv2 session security if the server supports it; domain controllers accept LM, NTLM, and NTLMv2 authentication. Send NTLM response only: Clients use NTLM authentication only and use NTLMv2 session security if the server supports it; domain controllers accept LM, NTLM, and NTLMv2 authentication. Send NTLMv2 response only: Clients use NTLMv2 authentication only and use NTLMv2 session security if the server supports it; domain controllers accept LM, NTLM, and NTLMv2 authentication. Send NTLMv2 response only\refuse LM: Clients use NTLMv2 authentication only and use NTLMv2 session security if the server supports it; domain controllers refuse LM (accept only NTLM and NTLMv2 authentication). Send NTLMv2 response only\refuse LM and NTLM: Clients use NTLMv2 authentication only and use NTLMv2 session security if the server supports it; domain controllers refuse LM and NTLM (accept only NTLMv2 authentication). > [!IMPORTANT] -> This setting can affect the ability of computers running Windows 2000 Server, Windows 2000 Professional, Windows XP Professional, and the Windows Server 2003 family to communicate with computers running Windows NT 4.0 and earlier over the network. For example, at the time of this writing, computers running Windows NT 4.0 SP4 and earlier did not support NTLMv2. Computers running Windows 95 and Windows 98 did not support NTLM. Default: Windows 2000 and windows XP: send LM and NTLM responses Windows Server 2003: Send NTLM response only Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2: Send NTLMv2 response only. +> This setting can affect the ability of computers running Windows 2000 Server, Windows 2000 Professional, Windows XP Professional, and the Windows Server 2003 family to communicate with computers running Windows NT 4.0 and earlier over the network. For example, at the time of this writing, computers running Windows NT 4.0 SP4 and earlier didn't support NTLMv2. Computers running Windows 95 and Windows 98 didn't support NTLM. Default: Windows 2000 and windows XP: send LM and NTLM responses Windows Server 2003: Send NTLM response only Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2: Send NTLMv2 response only. @@ -1921,7 +1928,7 @@ Network security LAN Manager authentication level This security setting determin | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 3 | @@ -1960,7 +1967,7 @@ Network security LAN Manager authentication level This security setting determin | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -1971,7 +1978,7 @@ Network security LAN Manager authentication level This security setting determin -Network security: Minimum session security for NTLM SSP based (including secure RPC) clients This security setting allows a client to require the negotiation of 128-bit encryption and/or NTLMv2 session security. These values are dependent on the LAN Manager Authentication Level security setting value. The options are: Require NTLMv2 session security: The connection will fail if NTLMv2 protocol is not negotiated. Require 128-bit encryption: The connection will fail if strong encryption (128-bit) is not negotiated. Default: Windows XP, Windows Vista, Windows 2000 Server, Windows Server 2003, and Windows Server 2008: No requirements. Windows 7 and Windows Server 2008 R2: Require 128-bit encryption. +Network security: Minimum session security for NTLM SSP based (including secure RPC) clients This security setting allows a client to require the negotiation of 128-bit encryption and/or NTLMv2 session security. These values are dependent on the LAN Manager Authentication Level security setting value. The options are: Require NTLMv2 session security: The connection will fail if NTLMv2 protocol isn't negotiated. Require 128-bit encryption: The connection will fail if strong encryption (128-bit) isn't negotiated. Default: Windows XP, Windows Vista, Windows 2000 Server, Windows Server 2003, and Windows Server 2008: No requirements. Windows 7 and Windows Server 2008 R2: Require 128-bit encryption. @@ -1983,7 +1990,7 @@ Network security: Minimum session security for NTLM SSP based (including secure | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 536870912 | @@ -2020,7 +2027,7 @@ Network security: Minimum session security for NTLM SSP based (including secure | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -2031,7 +2038,7 @@ Network security: Minimum session security for NTLM SSP based (including secure -Network security: Minimum session security for NTLM SSP based (including secure RPC) servers This security setting allows a server to require the negotiation of 128-bit encryption and/or NTLMv2 session security. These values are dependent on the LAN Manager Authentication Level security setting value. The options are: Require NTLMv2 session security: The connection will fail if message integrity is not negotiated. Require 128-bit encryption. The connection will fail if strong encryption (128-bit) is not negotiated. Default: Windows XP, Windows Vista, Windows 2000 Server, Windows Server 2003, and Windows Server 2008: No requirements. Windows 7 and Windows Server 2008 R2: Require 128-bit encryption. +Network security: Minimum session security for NTLM SSP based (including secure RPC) servers This security setting allows a server to require the negotiation of 128-bit encryption and/or NTLMv2 session security. These values are dependent on the LAN Manager Authentication Level security setting value. The options are: Require NTLMv2 session security: The connection will fail if message integrity isn't negotiated. Require 128-bit encryption. The connection will fail if strong encryption (128-bit) isn't negotiated. Default: Windows XP, Windows Vista, Windows 2000 Server, Windows Server 2003, and Windows Server 2008: No requirements. Windows 7 and Windows Server 2008 R2: Require 128-bit encryption. @@ -2043,7 +2050,7 @@ Network security: Minimum session security for NTLM SSP based (including secure | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 536870912 | @@ -2080,7 +2087,7 @@ Network security: Minimum session security for NTLM SSP based (including secure | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -2092,8 +2099,10 @@ Network security: Minimum session security for NTLM SSP based (including secure Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication This policy setting allows you to create an exception list of remote servers to which clients are allowed to use NTLM authentication if the "Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers" policy setting is configured. + - If you configure this policy setting, you can define a list of remote servers to which clients are allowed to use NTLM authentication. -- If you do not configure this policy setting, no exceptions will be applied. The naming format for servers on this exception list is the fully qualified domain name (FQDN) or NetBIOS server name used by the application, listed one per line. To ensure exceptions the name used by all applications needs to be in the list, and to ensure an exception is accurate, the server name should be listed in both naming formats . A single asterisk (*) can be used anywhere in the string as a wildcard character. + +- If you don't configure this policy setting, no exceptions will be applied. The naming format for servers on this exception list is the fully qualified domain name (FQDN) or NetBIOS server name used by the application, listed one per line. To ensure exceptions the name used by all applications needs to be in the list, and to ensure an exception is accurate, the server name should be listed in both naming formats . A single asterisk (*) can be used anywhere in the string as a wildcard character. @@ -2105,7 +2114,7 @@ Network security: Restrict NTLM: Add remote server exceptions for NTLM authentic | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -2131,7 +2140,7 @@ Network security: Restrict NTLM: Add remote server exceptions for NTLM authentic | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -2142,7 +2151,7 @@ Network security: Restrict NTLM: Add remote server exceptions for NTLM authentic -Network security: Restrict NTLM: Audit Incoming NTLM Traffic This policy setting allows you to audit incoming NTLM traffic. If you select "Disable", or do not configure this policy setting, the server will not log events for incoming NTLM traffic. If you select "Enable auditing for domain accounts", the server will log events for NTLM pass-through authentication requests that would be blocked when the "Network Security: Restrict NTLM: Incoming NTLM traffic" policy setting is set to the "Deny all domain accounts" option. If you select "Enable auditing for all accounts", the server will log events for all NTLM authentication requests that would be blocked when the "Network Security: Restrict NTLM: Incoming NTLM traffic" policy setting is set to the "Deny all accounts" option. This policy is supported on at least Windows 7 or Windows Server 2008 R2. +Network security: Restrict NTLM: Audit Incoming NTLM Traffic This policy setting allows you to audit incoming NTLM traffic. If you select "Disable", or don't configure this policy setting, the server won't log events for incoming NTLM traffic. If you select "Enable auditing for domain accounts", the server will log events for NTLM pass-through authentication requests that would be blocked when the "Network Security: Restrict NTLM: Incoming NTLM traffic" policy setting is set to the "Deny all domain accounts" option. If you select "Enable auditing for all accounts", the server will log events for all NTLM authentication requests that would be blocked when the "Network Security: Restrict NTLM: Incoming NTLM traffic" policy setting is set to the "Deny all accounts" option. This policy is supported on at least Windows 7 or Windows Server 2008 R2. > [!NOTE] > Audit events are recorded on this computer in the "Operational" Log located under the Applications and Services Log/Microsoft/Windows/NTLM. @@ -2157,7 +2166,7 @@ Network security: Restrict NTLM: Audit Incoming NTLM Traffic This policy setting | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2193,7 +2202,7 @@ Network security: Restrict NTLM: Audit Incoming NTLM Traffic This policy setting | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -2204,7 +2213,7 @@ Network security: Restrict NTLM: Audit Incoming NTLM Traffic This policy setting -Network security: Restrict NTLM: Incoming NTLM traffic This policy setting allows you to deny or allow incoming NTLM traffic. If you select "Allow all" or do not configure this policy setting, the server will allow all NTLM authentication requests. If you select "Deny all domain accounts," the server will deny NTLM authentication requests for domain logon and display an NTLM blocked error, but allow local account logon. If you select "Deny all accounts," the server will deny NTLM authentication requests from incoming traffic and display an NTLM blocked error. This policy is supported on at least Windows 7 or Windows Server 2008 R2. +Network security: Restrict NTLM: Incoming NTLM traffic This policy setting allows you to deny or allow incoming NTLM traffic. If you select "Allow all" or don't configure this policy setting, the server will allow all NTLM authentication requests. If you select "Deny all domain accounts," the server will deny NTLM authentication requests for domain logon and display an NTLM blocked error, but allow local account logon. If you select "Deny all accounts," the server will deny NTLM authentication requests from incoming traffic and display an NTLM blocked error. This policy is supported on at least Windows 7 or Windows Server 2008 R2. > [!NOTE] > Block events are recorded on this computer in the "Operational" Log located under the Applications and Services Log/Microsoft/Windows/NTLM. @@ -2219,7 +2228,7 @@ Network security: Restrict NTLM: Incoming NTLM traffic This policy setting allow | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2255,7 +2264,7 @@ Network security: Restrict NTLM: Incoming NTLM traffic This policy setting allow | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -2266,7 +2275,7 @@ Network security: Restrict NTLM: Incoming NTLM traffic This policy setting allow -Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers This policy setting allows you to deny or audit outgoing NTLM traffic from this Windows 7 or this Windows Server 2008 R2 computer to any Windows remote server. If you select "Allow all" or do not configure this policy setting, the client computer can authenticate identities to a remote server by using NTLM authentication. If you select "Audit all," the client computer logs an event for each NTLM authentication request to a remote server. This allows you to identify those servers receiving NTLM authentication requests from the client computer. If you select "Deny all," the client computer cannot authenticate identities to a remote server by using NTLM authentication. You can use the "Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication" policy setting to define a list of remote servers to which clients are allowed to use NTLM authentication. This policy is supported on at least Windows 7 or Windows Server 2008 R2. +Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers This policy setting allows you to deny or audit outgoing NTLM traffic from this Windows 7 or this Windows Server 2008 R2 computer to any Windows remote server. If you select "Allow all" or don't configure this policy setting, the client computer can authenticate identities to a remote server by using NTLM authentication. If you select "Audit all," the client computer logs an event for each NTLM authentication request to a remote server. This allows you to identify those servers receiving NTLM authentication requests from the client computer. If you select "Deny all," the client computer can't authenticate identities to a remote server by using NTLM authentication. You can use the "Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication" policy setting to define a list of remote servers to which clients are allowed to use NTLM authentication. This policy is supported on at least Windows 7 or Windows Server 2008 R2. > [!NOTE] > Audit and block events are recorded on this computer in the "Operational" Log located under the Applications and Services Log/Microsoft/Windows/NTLM. @@ -2281,7 +2290,7 @@ Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers This po | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2317,7 +2326,7 @@ Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers This po | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2328,7 +2337,7 @@ Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers This po -Shutdown: Allow system to be shut down without having to log on This security setting determines whether a computer can be shut down without having to log on to Windows. When this policy is enabled, the Shut Down command is available on the Windows logon screen. When this policy is disabled, the option to shut down the computer does not appear on the Windows logon screen. In this case, users must be able to log on to the computer successfully and have the Shut down the system user right before they can perform a system shutdown. Default on workstations: Enabled. Default on servers: Disabled. +Shutdown: Allow system to be shut down without having to log on This security setting determines whether a computer can be shut down without having to log on to Windows. When this policy is enabled, the Shut Down command is available on the Windows logon screen. When this policy is disabled, the option to shut down the computer doesn't appear on the Windows logon screen. In this case, users must be able to log on to the computer successfully and have the Shut down the system user right before they can perform a system shutdown. Default on workstations: Enabled. Default on servers: Disabled. @@ -2340,7 +2349,7 @@ Shutdown: Allow system to be shut down without having to log on This security se | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -2375,7 +2384,7 @@ Shutdown: Allow system to be shut down without having to log on This security se | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2386,7 +2395,7 @@ Shutdown: Allow system to be shut down without having to log on This security se -Shutdown: Clear virtual memory pagefile This security setting determines whether the virtual memory pagefile is cleared when the system is shut down. Virtual memory support uses a system pagefile to swap pages of memory to disk when they are not used. On a running system, this pagefile is opened exclusively by the operating system, and it is well protected. However, systems that are configured to allow booting to other operating systems might have to make sure that the system pagefile is wiped clean when this system shuts down. This ensures that sensitive information from process memory that might go into the pagefile is not available to an unauthorized user who manages to directly access the pagefile. When this policy is enabled, it causes the system pagefile to be cleared upon clean shutdown. If you enable this security option, the hibernation file (hiberfil.sys) is also zeroed out when hibernation is disabled. Default: Disabled. +Shutdown: Clear virtual memory pagefile This security setting determines whether the virtual memory pagefile is cleared when the system is shut down. Virtual memory support uses a system pagefile to swap pages of memory to disk when they aren't used. On a running system, this pagefile is opened exclusively by the operating system, and it's well protected. However, systems that are configured to allow booting to other operating systems might have to make sure that the system pagefile is wiped clean when this system shuts down. This ensures that sensitive information from process memory that might go into the pagefile isn't available to an unauthorized user who manages to directly access the pagefile. When this policy is enabled, it causes the system pagefile to be cleared upon clean shutdown. If you enable this security option, the hibernation file (hiberfil.sys) is also zeroed out when hibernation is disabled. Default: Disabled. @@ -2398,7 +2407,7 @@ Shutdown: Clear virtual memory pagefile This security setting determines whether | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2433,7 +2442,7 @@ Shutdown: Clear virtual memory pagefile This security setting determines whether | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2444,7 +2453,7 @@ Shutdown: Clear virtual memory pagefile This security setting determines whether -User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop. This policy setting controls whether User Interface Accessibility (UIAccess or UIA) programs can automatically disable the secure desktop for elevation prompts used by a standard user. - Enabled: UIA programs, including Windows Remote Assistance, automatically disable the secure desktop for elevation prompts. If you do not disable the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting, the prompts appear on the interactive user's desktop instead of the secure desktop. - Disabled: (Default) The secure desktop can be disabled only by the user of the interactive desktop or by disabling the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting. +User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop. This policy setting controls whether User Interface Accessibility (UIAccess or UIA) programs can automatically disable the secure desktop for elevation prompts used by a standard user. - Enabled: UIA programs, including Windows Remote Assistance, automatically disable the secure desktop for elevation prompts. If you don't disable the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting, the prompts appear on the interactive user's desktop instead of the secure desktop. - Disabled: (Default) The secure desktop can be disabled only by the user of the interactive desktop or by disabling the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting. @@ -2456,7 +2465,7 @@ User Account Control: Allow UIAccess applications to prompt for elevation withou | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2491,7 +2500,7 @@ User Account Control: Allow UIAccess applications to prompt for elevation withou | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2517,7 +2526,7 @@ User Account Control: Behavior of the elevation prompt for administrators in Adm | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 5 | @@ -2556,7 +2565,7 @@ User Account Control: Behavior of the elevation prompt for administrators in Adm | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2567,7 +2576,7 @@ User Account Control: Behavior of the elevation prompt for administrators in Adm -User Account Control: Behavior of the elevation prompt for standard users This policy setting controls the behavior of the elevation prompt for standard users. The options are: - Prompt for credentials: (Default) When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. - Automatically deny elevation requests: When an operation requires elevation of privilege, a configurable access denied error message is displayed. An enterprise that is running desktops as standard user may choose this setting to reduce help desk calls. - Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a different user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. +User Account Control: Behavior of the elevation prompt for standard users This policy setting controls the behavior of the elevation prompt for standard users. The options are: - Prompt for credentials: (Default) When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. - Automatically deny elevation requests: When an operation requires elevation of privilege, a configurable access denied error message is displayed. An enterprise that's running desktops as standard user may choose this setting to reduce help desk calls. - Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a different user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. @@ -2579,7 +2588,7 @@ User Account Control: Behavior of the elevation prompt for standard users This p | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 3 | @@ -2615,7 +2624,7 @@ User Account Control: Behavior of the elevation prompt for standard users This p | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2626,7 +2635,7 @@ User Account Control: Behavior of the elevation prompt for standard users This p -User Account Control: Detect application installations and prompt for elevation This policy setting controls the behavior of application installation detection for the computer. The options are: Enabled: (Default) When an application installation package is detected that requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. Disabled: Application installation packages are not detected and prompted for elevation. Enterprises that are running standard user desktops and use delegated installation technologies such as Group Policy Software Installation or Systems Management Server (SMS) should disable this policy setting. In this case, installer detection is unnecessary. +User Account Control: Detect application installations and prompt for elevation This policy setting controls the behavior of application installation detection for the computer. The options are: Enabled: (Default) When an application installation package is detected that requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. Disabled: Application installation packages aren't detected and prompted for elevation. Enterprises that are running standard user desktops and use delegated installation technologies such as Group Policy Software Installation or Systems Management Server (SMS) should disable this policy setting. In this case, installer detection is unnecessary. @@ -2638,7 +2647,7 @@ User Account Control: Detect application installations and prompt for elevation | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -2673,7 +2682,7 @@ User Account Control: Detect application installations and prompt for elevation | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2684,7 +2693,7 @@ User Account Control: Detect application installations and prompt for elevation -User Account Control: Only elevate executable files that are signed and validated This policy setting enforces public key infrastructure (PKI) signature checks for any interactive applications that request elevation of privilege. Enterprise administrators can control which applications are allowed to run by adding certificates to the Trusted Publishers certificate store on local computers. The options are: - Enabled: Enforces the PKI certification path validation for a given executable file before it is permitted to run. - Disabled: (Default) Does not enforce PKI certification path validation before a given executable file is permitted to run. +User Account Control: Only elevate executable files that are signed and validated This policy setting enforces public key infrastructure (PKI) signature checks for any interactive applications that request elevation of privilege. Enterprise administrators can control which applications are allowed to run by adding certificates to the Trusted Publishers certificate store on local computers. The options are: - Enabled: Enforces the PKI certification path validation for a given executable file before it's permitted to run. - Disabled: (Default) Does not enforce PKI certification path validation before a given executable file is permitted to run. @@ -2696,7 +2705,7 @@ User Account Control: Only elevate executable files that are signed and validate | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2731,7 +2740,7 @@ User Account Control: Only elevate executable files that are signed and validate | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2742,7 +2751,7 @@ User Account Control: Only elevate executable files that are signed and validate -User Account Control: Only elevate UIAccess applications that are installed in secure locations This policy setting controls whether applications that request to run with a User Interface Accessibility (UIAccess) integrity level must reside in a secure location in the file system. Secure locations are limited to the following: - ...\Program Files\, including subfolders - ...\Windows\system32\ - ...\Program Files (x86)\, including subfolders for 64-bit versions of Windows Note: Windows enforces a public key infrastructure (PKI) signature check on any interactive application that requests to run with a UIAccess integrity level regardless of the state of this security setting. The options are: - Enabled: (Default) If an application resides in a secure location in the file system, it runs only with UIAccess integrity. - Disabled: An application runs with UIAccess integrity even if it does not reside in a secure location in the file system. +User Account Control: Only elevate UIAccess applications that are installed in secure locations This policy setting controls whether applications that request to run with a User Interface Accessibility (UIAccess) integrity level must reside in a secure location in the file system. Secure locations are limited to the following: - ...\Program Files\, including subfolders - ...\Windows\system32\ - ...\Program Files (x86)\, including subfolders for 64-bit versions of Windows Note: Windows enforces a public key infrastructure (PKI) signature check on any interactive application that requests to run with a UIAccess integrity level regardless of the state of this security setting. The options are: - Enabled: (Default) If an application resides in a secure location in the file system, it runs only with UIAccess integrity. - Disabled: An application runs with UIAccess integrity even if it doesn't reside in a secure location in the file system. @@ -2754,7 +2763,7 @@ User Account Control: Only elevate UIAccess applications that are installed in s | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -2764,7 +2773,7 @@ User Account Control: Only elevate UIAccess applications that are installed in s | Value | Description | |:--|:--| -| 0 | Disabled: Application runs with UIAccess integrity even if it does not reside in a secure location. | +| 0 | Disabled: Application runs with UIAccess integrity even if it doesn't reside in a secure location. | | 1 (Default) | Enabled: Application runs with UIAccess integrity only if it resides in secure location. | @@ -2789,7 +2798,7 @@ User Account Control: Only elevate UIAccess applications that are installed in s | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2815,7 +2824,7 @@ User Account Control: Turn on Admin Approval Mode This policy setting controls t | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -2850,7 +2859,7 @@ User Account Control: Turn on Admin Approval Mode This policy setting controls t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2873,7 +2882,7 @@ User Account Control: Switch to the secure desktop when prompting for elevation | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -2908,7 +2917,7 @@ User Account Control: Switch to the secure desktop when prompting for elevation | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2931,7 +2940,7 @@ User Account Control: Use Admin Approval Mode for the built-in Administrator acc | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2966,7 +2975,7 @@ User Account Control: Use Admin Approval Mode for the built-in Administrator acc | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2989,7 +2998,7 @@ User Account Control: Virtualize file and registry write failures to per-user lo | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | diff --git a/windows/client-management/mdm/policy-csp-localusersandgroups.md b/windows/client-management/mdm/policy-csp-localusersandgroups.md index bf0872d969..de3dcc67d2 100644 --- a/windows/client-management/mdm/policy-csp-localusersandgroups.md +++ b/windows/client-management/mdm/policy-csp-localusersandgroups.md @@ -4,7 +4,7 @@ description: Learn more about the LocalUsersAndGroups Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2009 [10.0.19042] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2009 [10.0.19042] and later | @@ -41,12 +41,11 @@ This Setting allows an administrator to manage local groups on a Device. Possible settings: 1. Update Group Membership: Update a group and add and/or remove members though the 'U' action. -When using Update, existing group members that are not specified in the policy remain untouched. - +When using Update, existing group members that aren't specified in the policy remain untouched. 2. Replace Group Membership: Restrict a group by replacing group membership through the 'R' action. When using Replace, existing group membership is replaced by the list of members specified in the add member section. This option works in the same way as a Restricted Group and any group -members that are not specified in the policy are removed. +members that aren't specified in the policy are removed. > [!CAUTION] > If the same group is configured with both Replace and Update, then Replace will win. @@ -65,7 +64,7 @@ members that are not specified in the policy are removed. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | diff --git a/windows/client-management/mdm/policy-csp-lockdown.md b/windows/client-management/mdm/policy-csp-lockdown.md index d622ee011f..401457470e 100644 --- a/windows/client-management/mdm/policy-csp-lockdown.md +++ b/windows/client-management/mdm/policy-csp-lockdown.md @@ -4,7 +4,7 @@ description: Learn more about the LockDown Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -37,9 +37,9 @@ ms.topic: reference -- If you disable this policy setting, users will not be able to invoke any system UI by swiping in from any screen edge. +- If you disable this policy setting, users won't be able to invoke any system UI by swiping in from any screen edge. -- If you enable or do not configure this policy setting, users will be able to invoke system UI by swiping in from the screen edges. +- If you enable or don't configure this policy setting, users will be able to invoke system UI by swiping in from the screen edges. @@ -53,7 +53,7 @@ The easiest way to verify the policy is to restart the explorer process or to re | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | diff --git a/windows/client-management/mdm/policy-csp-lsa.md b/windows/client-management/mdm/policy-csp-lsa.md index 44b1d9a8ae..0cbc03d1cb 100644 --- a/windows/client-management/mdm/policy-csp-lsa.md +++ b/windows/client-management/mdm/policy-csp-lsa.md @@ -4,7 +4,7 @@ description: Learn more about the LocalSecurityAuthority Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - LocalSecurityAuthority -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -44,9 +41,9 @@ ms.topic: reference This policy controls the configuration under which LSASS loads custom SSPs and APs. -- If you enable this setting or do not configure it, LSA allows custom SSPs and APs to be loaded. +- If you enable this setting or don't configure it, LSA allows custom SSPs and APs to be loaded. -- If you disable this setting, LSA does not load custom SSPs and APs. +- If you disable this setting, LSA doesn't load custom SSPs and APs. @@ -58,13 +55,12 @@ This policy controls the configuration under which LSASS loads custom SSPs and A | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -91,7 +87,7 @@ This policy controls the configuration under which LSASS loads custom SSPs and A | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -104,13 +100,13 @@ This policy controls the configuration under which LSASS loads custom SSPs and A This policy controls the configuration under which LSASS is run. -- If you do not configure this policy and there is no current setting in the registry, LSA will run as protected process for clean installed, HVCI capable, client SKUs that are domain or cloud domain joined devices. This configuration is not UEFI locked. This can be overridden if the policy is configured. +- If you don't configure this policy and there is no current setting in the registry, LSA will run as protected process for clean installed, HVCI capable, client SKUs that are domain or cloud domain joined devices. This configuration isn't UEFI locked. This can be overridden if the policy is configured. -- If you configure and set this policy setting to "Disabled", LSA will not run as a protected process. +- If you configure and set this policy setting to "Disabled", LSA won't run as a protected process. - If you configure and set this policy setting to "EnabledWithUEFILock," LSA will run as a protected process and this configuration is UEFI locked. -- If you configure and set this policy setting to "EnabledWithoutUEFILock", LSA will run as a protected process and this configuration is not UEFI locked. +- If you configure and set this policy setting to "EnabledWithoutUEFILock", LSA will run as a protected process and this configuration isn't UEFI locked. @@ -122,7 +118,7 @@ This policy controls the configuration under which LSASS is run. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -132,9 +128,9 @@ This policy controls the configuration under which LSASS is run. | Value | Description | |:--|:--| -| 0 (Default) | Disabled. Default value. LSA will not run as protected process. | +| 0 (Default) | Disabled. Default value. LSA won't run as protected process. | | 1 | Enabled with UEFI lock. LSA will run as protected process and this configuration is UEFI locked. | -| 2 | Enabled without UEFI lock. LSA will run as protected process and this configuration is not UEFI locked. | +| 2 | Enabled without UEFI lock. LSA will run as protected process and this configuration isn't UEFI locked. | diff --git a/windows/client-management/mdm/policy-csp-maps.md b/windows/client-management/mdm/policy-csp-maps.md index 60f394302c..e705032c66 100644 --- a/windows/client-management/mdm/policy-csp-maps.md +++ b/windows/client-management/mdm/policy-csp-maps.md @@ -4,7 +4,7 @@ description: Learn more about the Maps Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -49,7 +49,7 @@ Allows the download and update of map data over metered connections. After the p | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 65535 | @@ -76,7 +76,7 @@ Allows the download and update of map data over metered connections. After the p | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -99,7 +99,7 @@ Disables the automatic download and update of map data. After the policy is appl | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 65535 | diff --git a/windows/client-management/mdm/policy-csp-memorydump.md b/windows/client-management/mdm/policy-csp-memorydump.md index 26fdcc2171..0ad94279f0 100644 --- a/windows/client-management/mdm/policy-csp-memorydump.md +++ b/windows/client-management/mdm/policy-csp-memorydump.md @@ -4,7 +4,7 @@ description: Learn more about the MemoryDump Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -49,7 +49,7 @@ This policy setting decides if crash dump collection on the machine is allowed o | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -75,7 +75,7 @@ This policy setting decides if crash dump collection on the machine is allowed o | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -98,7 +98,7 @@ This policy setting decides if live dump collection on the machine is allowed or | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | diff --git a/windows/client-management/mdm/policy-csp-messaging.md b/windows/client-management/mdm/policy-csp-messaging.md index dc279d3c41..e4c4f04b6a 100644 --- a/windows/client-management/mdm/policy-csp-messaging.md +++ b/windows/client-management/mdm/policy-csp-messaging.md @@ -4,7 +4,7 @@ description: Learn more about the Messaging Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -51,7 +51,7 @@ Disable this feature to avoid information being stored on servers outside of you | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -61,7 +61,7 @@ Disable this feature to avoid information being stored on servers outside of you | Value | Description | |:--|:--| -| 0 | Message sync is not allowed and cannot be changed by the user. | +| 0 | Message sync isn't allowed and can't be changed by the user. | | 1 (Default) | Message sync is allowed. The user can change this setting. | @@ -91,7 +91,7 @@ Disable this feature to avoid information being stored on servers outside of you | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -114,7 +114,7 @@ This policy setting allows you to enable or disable the sending and receiving ce | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -140,7 +140,7 @@ This policy setting allows you to enable or disable the sending and receiving ce | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -163,7 +163,7 @@ This policy setting allows you to enable or disable the sending and receiving of | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | diff --git a/windows/client-management/mdm/policy-csp-mixedreality.md b/windows/client-management/mdm/policy-csp-mixedreality.md index ad926281b0..6bf3263e8a 100644 --- a/windows/client-management/mdm/policy-csp-mixedreality.md +++ b/windows/client-management/mdm/policy-csp-mixedreality.md @@ -4,7 +4,7 @@ description: Learn more about the MixedReality Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 04/26/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - MixedReality -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -32,7 +29,7 @@ These policies are only supported on [Microsoft HoloLens 2](/hololens/hololens2- | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -68,7 +65,7 @@ Steps to use this policy correctly: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-60]` | | Default Value | 0 | @@ -86,7 +83,7 @@ Steps to use this policy correctly: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: [10.0.20348] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ [10.0.20348] and later | @@ -110,7 +107,7 @@ This opt-in policy can help with the setup of new devices in new areas or new us | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -120,7 +117,7 @@ This opt-in policy can help with the setup of new devices in new areas or new us | Value | Description | |:--|:--| -| 0 (Default) | Displaying captive portal is not allowed. | +| 0 (Default) | Displaying captive portal isn't allowed. | | 1 | Displaying captive portal is allowed. | @@ -136,7 +133,7 @@ This opt-in policy can help with the setup of new devices in new areas or new us | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: [10.0.20348] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ [10.0.20348] and later | @@ -162,7 +159,7 @@ For more information on the Launcher API, see [Launcher Class (Windows.System) - | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -172,7 +169,7 @@ For more information on the Launcher API, see [Launcher Class (Windows.System) - | Value | Description | |:--|:--| -| 0 (Default) | Applications are not allowed to be launched with Launcher API, when in single app kiosk mode. | +| 0 (Default) | Applications aren't allowed to be launched with Launcher API, when in single app kiosk mode. | | 1 | Applications are allowed to be launched with Launcher API, when in single app kiosk mode. | @@ -188,7 +185,7 @@ For more information on the Launcher API, see [Launcher Class (Windows.System) - | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: [10.0.20348] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ [10.0.20348] and later | @@ -221,7 +218,7 @@ On a device where you configure this policy, the user specified in the policy ne | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -237,7 +234,7 @@ On a device where you configure this policy, the user specified in the policy ne | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -248,7 +245,7 @@ On a device where you configure this policy, the user specified in the policy ne -This policy controls if the HoloLens displays will be automatically adjusted for your eyes to improve hologram visual quality when an user wears the device. When this feature is enabled, a new user upon wearing the device will not be prompted to calibrate and yet the displays will be adjusted to suite them automatically. However if an immersive application is launched that depends on eye tracking interactions, the user will be prompted to perform the calibration. +This policy controls if the HoloLens displays will be automatically adjusted for your eyes to improve hologram visual quality when a user wears the device. When this feature is enabled, a new user upon wearing the device won't be prompted to calibrate and yet the displays will be adjusted to suite them automatically. However if an immersive application is launched that depends on eye tracking interactions, the user will be prompted to perform the calibration. @@ -260,7 +257,7 @@ This policy controls if the HoloLens displays will be automatically adjusted for | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -286,7 +283,7 @@ This policy controls if the HoloLens displays will be automatically adjusted for | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -309,7 +306,7 @@ This policy setting controls if pressing the brightness button changes the brigh | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -320,7 +317,7 @@ This policy setting controls if pressing the brightness button changes the brigh | Value | Description | |:--|:--| | 0 (Default) | Brightness can be changed with press of brightness button. | -| 1 | Brightness cannot be changed with press of brightness button. | +| 1 | Brightness can't be changed with press of brightness button. | @@ -335,7 +332,7 @@ This policy setting controls if pressing the brightness button changes the brigh | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: [10.0.20348] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ [10.0.20348] and later | @@ -359,7 +356,7 @@ For more information, see [Moving platform mode on low dynamic motion moving pla | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -370,8 +367,8 @@ For more information, see [Moving platform mode on low dynamic motion moving pla | Value | Description | |:--|:--| | 0 (Default) | Last set user's preference. Initial state is OFF and after that user's preference is persisted across reboots and is used to initialize the system. | -| 1 | Moving platform is disabled and cannot be changed by user. | -| 2 | Moving platform is enabled and cannot be changed by user. | +| 1 | Moving platform is disabled and can't be changed by user. | +| 2 | Moving platform is enabled and can't be changed by user. | @@ -386,7 +383,7 @@ For more information, see [Moving platform mode on low dynamic motion moving pla | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: [10.0.20348] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ [10.0.20348] and later | @@ -401,28 +398,35 @@ This policy setting specifies a set of parameters for controlling the Windows NT - If you enable this policy setting, you can specify the following parameters for the Windows NTP Client. -- If you disable or do not configure this policy setting, the WIndows NTP Client uses the defaults of each of the following parameters. +- If you disable or don't configure this policy setting, the Windows NTP Client uses the defaults of each of the following parameters. + +NtpServer. -NtpServer The Domain Name System (DNS) name or IP address of an NTP time source. This value is in the form of "dnsName,flags" where "flags" is a hexadecimal bitmask of the flags for that host. For more information, see the NTP Client Group Policy Settings Associated with Windows Time section of the Windows Time Service Group Policy Settings. The default value is "time.windows.com,0x09". -Type +Type. + This value controls the authentication that W32time uses. The default value is NT5DS. -CrossSiteSyncFlags -This value, expressed as a bitmask, controls how W32time chooses time sources outside its own site. The possible values are 0, 1, and 2. Setting this value to 0 (None) indicates that the time client should not attempt to synchronize time outside its site. Setting this value to 1 (PdcOnly) indicates that only the computers that function as primary domain controller (PDC) emulator operations masters in other domains can be used as synchronization partners when the client has to synchronize time with a partner outside its own site. Setting a value of 2 (All) indicates that any synchronization partner can be used. This value is ignored if the NT5DS value is not set. The default value is 2 decimal (0x02 hexadecimal). +CrossSiteSyncFlags. + +This value, expressed as a bitmask, controls how W32time chooses time sources outside its own site. The possible values are 0, 1, and 2. Setting this value to 0 (None) indicates that the time client shouldn't attempt to synchronize time outside its site. Setting this value to 1 (PdcOnly) indicates that only the computers that function as primary domain controller (PDC) emulator operations masters in other domains can be used as synchronization partners when the client has to synchronize time with a partner outside its own site. Setting a value of 2 (All) indicates that any synchronization partner can be used. This value is ignored if the NT5DS value isn't set. The default value is 2 decimal (0x02 hexadecimal). + +ResolvePeerBackoffMinutes. -ResolvePeerBackoffMinutes This value, expressed in minutes, controls how long W32time waits before it attempts to resolve a DNS name when a previous attempt failed. The default value is 15 minutes. -ResolvePeerBackoffMaxTimes +ResolvePeerBackoffMaxTimes. + This value controls how many times W32time attempts to resolve a DNS name before the discovery process is restarted. Each time DNS name resolution fails, the amount of time to wait before the next attempt will be twice the previous amount. The default value is seven attempts. -SpecialPollInterval -This NTP client value, expressed in seconds, controls how often a manually configured time source is polled when the time source is configured to use a special polling interval. If the SpecialInterval flag is enabled on the NTPServer setting, the client uses the value that is set as the SpecialPollInterval, instead of a variable interval between MinPollInterval and MaxPollInterval values, to determine how frequently to poll the time source. SpecialPollInterval must be in the range of [MinPollInterval, MaxPollInterval], else the nearest value of the range is picked. Default: 1024 seconds. +SpecialPollInterval. -EventLogFlags -This value is a bitmask that controls events that may be logged to the System log in Event Viewer. Setting this value to 0x1 indicates that W32time will create an event whenever a time jump is detected. Setting this value to 0x2 indicates that W32time will create an event whenever a time source change is made. Because it is a bitmask value, setting 0x3 (the addition of 0x1 and 0x2) indicates that both time jumps and time source changes will be logged. +This NTP client value, expressed in seconds, controls how often a manually configured time source is polled when the time source is configured to use a special polling interval. If the SpecialInterval flag is enabled on the NTPServer setting, the client uses the value that's set as the SpecialPollInterval, instead of a variable interval between MinPollInterval and MaxPollInterval values, to determine how frequently to poll the time source. SpecialPollInterval must be in the range of [MinPollInterval, MaxPollInterval], else the nearest value of the range is picked. Default: 1024 seconds. + +EventLogFlags. + +This value is a bitmask that controls events that may be logged to the System log in Event Viewer. Setting this value to 0x1 indicates that W32time will create an event whenever a time jump is detected. Setting this value to 0x2 indicates that W32time will create an event whenever a time source change is made. Because it's a bitmask value, setting 0x3 (the addition of 0x1 and 0x2) indicates that both time jumps and time source changes will be logged. @@ -444,13 +448,12 @@ For more information, see [ADMX_W32Time Policy CSP - W32Time_Policy_Configure_NT | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -491,7 +494,7 @@ The following XML string is an example of the value for this policy: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: [10.0.20348] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ [10.0.20348] and later | @@ -515,7 +518,7 @@ Windows Network Connectivity Status Indicator may get a false positive internet- | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -541,7 +544,7 @@ Windows Network Connectivity Status Indicator may get a false positive internet- | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -564,7 +567,7 @@ This policy controls when a new person uses HoloLens device, if HoloLens should | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -590,7 +593,7 @@ This policy controls when a new person uses HoloLens device, if HoloLens should | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -613,7 +616,7 @@ This policy setting controls, when and if diagnostic logs can be collected using | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 2 | @@ -623,7 +626,7 @@ This policy setting controls, when and if diagnostic logs can be collected using | Value | Description | |:--|:--| -| 0 | Not allowed. Diagnostic logs cannot be collected by pressing the button combination. | +| 0 | Not allowed. Diagnostic logs can't be collected by pressing the button combination. | | 1 | Allowed for device owners only. Diagnostics logs can be collected by pressing the button combination only if signed-in user is considered as device owner. | | 2 (Default) | Allowed for all users. Diagnostic logs can be collected by pressing the button combination. | @@ -640,7 +643,7 @@ This policy setting controls, when and if diagnostic logs can be collected using | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -669,7 +672,7 @@ This policy configures behavior of HUP to determine, which algorithm to use for | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-1]` | | Default Value | 0 | @@ -687,7 +690,7 @@ This policy configures behavior of HUP to determine, which algorithm to use for | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: [10.0.20348] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ [10.0.20348] and later | @@ -711,7 +714,7 @@ When the system automatically determines the down direction, it's using the meas | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -722,7 +725,7 @@ When the system automatically determines the down direction, it's using the meas | Value | Description | |:--|:--| | 0 (Default) | User is allowed to manually change down direction. | -| 1 | User is not allowed to manually change down direction. | +| 1 | User isn't allowed to manually change down direction. | @@ -737,7 +740,7 @@ When the system automatically determines the down direction, it's using the meas | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -760,7 +763,7 @@ This policy setting controls whether microphone on HoloLens 2 is disabled or not | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -771,7 +774,7 @@ This policy setting controls whether microphone on HoloLens 2 is disabled or not | Value | Description | |:--|:--| | 0 (Default) | Microphone can be used for voice. | -| 1 | Microphone cannot be used for voice. | +| 1 | Microphone can't be used for voice. | @@ -786,7 +789,7 @@ This policy setting controls whether microphone on HoloLens 2 is disabled or not | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: [10.0.20348] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ [10.0.20348] and later | @@ -803,7 +806,7 @@ Enabling the Windows NTP Client allows your computer to synchronize its computer - If you enable this policy setting, you can set the local computer clock to synchronize time with NTP servers. -- If you disable or do not configure this policy setting, the local computer clock does not synchronize time with NTP servers. +- If you disable or don't configure this policy setting, the local computer clock doesn't synchronize time with NTP servers. @@ -816,13 +819,12 @@ For more information, see the [ConfigureNtpClient](#configurentpclient) policy. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -856,7 +858,7 @@ The following example XML string shows the value to enable this policy: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: [10.0.20348] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ [10.0.20348] and later | @@ -867,7 +869,7 @@ The following example XML string shows the value to enable this policy: -This policy configures whether the device will take the user through the eye tracking calibration process during device setup and first time user setup. If this policy is enabled, the device will not show the eye tracking calibration process during device setup and first time user setup. **Note** that until the user goes through the calibration process, eye tracking will not work on the device. If an app requires eye tracking and the user has not gone through the calibration process, the user will be prompted to do so. +This policy configures whether the device will take the user through the eye tracking calibration process during device setup and first time user setup. If this policy is enabled, the device won't show the eye tracking calibration process during device setup and first time user setup. Note that until the user goes through the calibration process, eye tracking won't work on the device. If an app requires eye tracking and the user hasn't gone through the calibration process, the user will be prompted to do so. @@ -881,7 +883,7 @@ This policy configures whether the device will take the user through the eye tra | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -892,7 +894,7 @@ This policy configures whether the device will take the user through the eye tra | Value | Description | |:--|:--| | 0 (Default) | Eye tracking calibration process will be shown during device setup and first time user setup. | -| 1 | Eye tracking calibration process will not be shown during device setup and first time user setup. | +| 1 | Eye tracking calibration process won't be shown during device setup and first time user setup. | @@ -907,7 +909,7 @@ This policy configures whether the device will take the user through the eye tra | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: [10.0.20348] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ [10.0.20348] and later | @@ -918,7 +920,7 @@ This policy configures whether the device will take the user through the eye tra -This policy configures whether the device will take the user through a training process during device setup and first time user setup. If this policy is enabled, the device will not show the training process during device setup and first time user setup. If the user wishes to go through that training process, the user can launch the Tips app. +This policy configures whether the device will take the user through a training process during device setup and first time user setup. If this policy is enabled, the device won't show the training process during device setup and first time user setup. If the user wishes to go through that training process, the user can launch the Tips app. @@ -931,7 +933,7 @@ It skips the training experience of interactions with the hummingbird and Start | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -942,7 +944,7 @@ It skips the training experience of interactions with the hummingbird and Start | Value | Description | |:--|:--| | 0 (Default) | Training process will be shown during device setup and first time user setup. | -| 1 | Training process will not be shown during device setup and first time user setup. | +| 1 | Training process won't be shown during device setup and first time user setup. | @@ -957,7 +959,7 @@ It skips the training experience of interactions with the hummingbird and Start | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: [10.0.20348] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ [10.0.20348] and later | @@ -980,7 +982,7 @@ This policy controls whether a visitor user will be automatically logged in. Vis | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -990,7 +992,7 @@ This policy controls whether a visitor user will be automatically logged in. Vis | Value | Description | |:--|:--| -| 0 (Default) | Visitor user will not be signed in automatically. | +| 0 (Default) | Visitor user won't be signed in automatically. | | 1 | Visitor user will be signed in automatically. | @@ -1006,7 +1008,7 @@ This policy controls whether a visitor user will be automatically logged in. Vis | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -1029,7 +1031,7 @@ This policy setting controls if pressing the volume button changes the volume or | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1040,7 +1042,7 @@ This policy setting controls if pressing the volume button changes the volume or | Value | Description | |:--|:--| | 0 (Default) | Volume can be changed with press of the volume button. | -| 1 | Volume cannot be changed with press of the volume button. | +| 1 | Volume can't be changed with press of the volume button. | diff --git a/windows/client-management/mdm/policy-csp-mssecurityguide.md b/windows/client-management/mdm/policy-csp-mssecurityguide.md index 98481bddc4..9223a88620 100644 --- a/windows/client-management/mdm/policy-csp-mssecurityguide.md +++ b/windows/client-management/mdm/policy-csp-mssecurityguide.md @@ -4,7 +4,7 @@ description: Learn more about the MSSecurityGuide Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 02/17/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - MSSecurityGuide -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -53,14 +50,13 @@ ms.topic: reference | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -82,7 +78,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -104,14 +100,13 @@ ms.topic: reference | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -133,7 +128,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -155,14 +150,13 @@ ms.topic: reference | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -184,7 +178,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -206,14 +200,13 @@ ms.topic: reference | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -235,7 +228,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -257,14 +250,13 @@ ms.topic: reference | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -286,7 +278,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -308,14 +300,13 @@ ms.topic: reference | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-msslegacy.md b/windows/client-management/mdm/policy-csp-msslegacy.md index c164d07e12..11890d1e1f 100644 --- a/windows/client-management/mdm/policy-csp-msslegacy.md +++ b/windows/client-management/mdm/policy-csp-msslegacy.md @@ -4,7 +4,7 @@ description: Learn more about the MSSLegacy Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - MSSLegacy -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -54,14 +51,13 @@ Allow ICMP redirects to override OSPF generated routes. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -83,7 +79,7 @@ Allow ICMP redirects to override OSPF generated routes. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -106,14 +102,13 @@ Allow the computer to ignore NetBIOS name release requests except from WINS serv | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -135,7 +130,7 @@ Allow the computer to ignore NetBIOS name release requests except from WINS serv | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -158,14 +153,13 @@ IP source routing protection level (protects against packet spoofing). | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -187,7 +181,7 @@ IP source routing protection level (protects against packet spoofing). | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -210,14 +204,13 @@ IPv6 source routing protection level (protects against packet spoofing). | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-multitasking.md b/windows/client-management/mdm/policy-csp-multitasking.md index c4a07c645d..bd5f22db3a 100644 --- a/windows/client-management/mdm/policy-csp-multitasking.md +++ b/windows/client-management/mdm/policy-csp-multitasking.md @@ -4,7 +4,7 @@ description: Learn more about the Multitasking Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -60,7 +60,7 @@ This policy only applies to the Alt+Tab switcher. When the policy isn't enabled, | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | diff --git a/windows/client-management/mdm/policy-csp-networkisolation.md b/windows/client-management/mdm/policy-csp-networkisolation.md index ec7813abdb..372eef8d37 100644 --- a/windows/client-management/mdm/policy-csp-networkisolation.md +++ b/windows/client-management/mdm/policy-csp-networkisolation.md @@ -4,7 +4,7 @@ description: Learn more about the NetworkIsolation Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -37,7 +37,7 @@ ms.topic: reference -This setting does not apply to desktop apps. +This setting doesn't apply to desktop apps. A pipe-separated list of domain cloud resources. Each cloud resource can also be paired optionally with an internal proxy server by using a trailing comma followed by the proxy address. @@ -45,7 +45,7 @@ Contains a list of Enterprise resource domains hosted in the cloud. Connections If a proxy is paired with a cloud resource, traffic to the cloud resource will be routed through the enterprise network via the denoted proxy server (on Port 80). A proxy server used for this purpose must also be configured using the Intranet proxy servers for apps policy. -Example: [cloudresource]|[cloudresource]|[cloudresource],[proxy]|[cloudresource]|[cloudresource],[proxy]| +Example: [cloudresource]|[cloudresource]|[cloudresource],[proxy]|[cloudresource]|[cloudresource],[proxy]|. For more information see: @@ -59,7 +59,7 @@ For more information see: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `|`) | @@ -90,7 +90,7 @@ For more information see: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -101,13 +101,13 @@ For more information see: -This setting does not apply to desktop apps. +This setting doesn't apply to desktop apps. A semicolon-separated list of intranet proxy server IP addresses. These addresses are categorized as private by Windows Network Isolation and are accessible to apps that have the Home/Work Networking capability. - If you enable this policy setting, it allows an administrator to configure a set of proxies that provide access to intranet resources. -- If you disable or do not configure this policy setting, Windows Network Isolation attempts to discover proxies and configures them as Internet nodes. +- If you disable or don't configure this policy setting, Windows Network Isolation attempts to discover proxies and configures them as Internet nodes. This setting should NOT be used to configure Internet proxies. @@ -125,7 +125,7 @@ For more information see: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `,`) | @@ -156,7 +156,7 @@ For more information see: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -167,7 +167,7 @@ For more information see: -This setting does not apply to desktop apps. +This setting doesn't apply to desktop apps. A comma-separated list of IP address ranges that are in your corporate network. @@ -177,7 +177,7 @@ Windows Network Isolation attempts to automatically discover private network hos To ensure that these addresses are the only addresses ever classified as private, enable the "Subnet definitions are authoritative" policy setting. -- If you disable or do not configure this policy setting, Windows Network Isolation attempts to automatically discover your private network hosts. +- If you disable or don't configure this policy setting, Windows Network Isolation attempts to automatically discover your private network hosts. Example: 3efe:1092::/96,18.1.1.1/10 @@ -193,7 +193,7 @@ For more information see: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `,`) | @@ -234,7 +234,7 @@ fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -245,13 +245,13 @@ fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff -This setting does not apply to desktop apps. +This setting doesn't apply to desktop apps. Turns off Windows Network Isolation's automatic discovery of private network hosts in the domain corporate environment. - If you enable this policy setting, it turns off Windows Network Isolation's automatic discovery of private network hosts in the domain corporate environment. Only network hosts within the address ranges configured via Group Policy will be classified as private. -- If you disable or do not configure this policy setting, Windows Network Isolation attempts to automatically discover your private network hosts in the domain corporate environment. +- If you disable or don't configure this policy setting, Windows Network Isolation attempts to automatically discover your private network hosts in the domain corporate environment. For more information see: @@ -265,7 +265,7 @@ For more information see: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -305,7 +305,7 @@ For more information see: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -316,7 +316,7 @@ For more information see: -This is the list of domains that comprise the boundaries of the enterprise. Data from one of these domains that is sent to a device will be considered enterprise data and protected These locations will be considered a safe destination for enterprise data to be shared to. This is a comma-separated list of domains, for example contoso. sharepoint. com, Fabrikam. com. +This is the list of domains that comprise the boundaries of the enterprise. Data from one of these domains that's sent to a device will be considered enterprise data and protected These locations will be considered a safe destination for enterprise data to be shared to. This is a comma-separated list of domains, for example contoso. sharepoint. com, Fabrikam. com. > [!NOTE] > The client requires domain name to be canonical, otherwise the setting will be rejected by the client. Here are the steps to create canonical domain names:Transform the ASCII characters (A-Z only) to lower case. For example, Microsoft. COM -> microsoft. com. Call IdnToAscii with IDN_USE_STD3_ASCII_RULES as the flags. Call IdnToUnicode with no flags set (dwFlags = 0). @@ -336,7 +336,7 @@ For more information, see the following APIs: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `,`) | @@ -353,7 +353,7 @@ For more information, see the following APIs: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -364,13 +364,13 @@ For more information, see the following APIs: -This setting does not apply to desktop apps. +This setting doesn't apply to desktop apps. A semicolon-separated list of Internet proxy server IP addresses. These addresses are categorized as Internet by Windows Network Isolation and are accessible to apps that have the Internet Client or Internet Client/Server capabilities. - If you enable this policy setting, apps on proxied networks can access the Internet without relying on the Private Network capability. However, in most situations Windows Network Isolation will be able to correctly discover proxies. By default, any proxies configured with this setting are merged with proxies that are auto-discovered. To make this policy configuration the sole list of allowed proxies, enable the "Proxy definitions are authoritative" setting. -- If you disable or do not configure this policy setting, apps will use the Internet proxies auto-discovered by Windows Network Isolation. +- If you disable or don't configure this policy setting, apps will use the Internet proxies auto-discovered by Windows Network Isolation. Example: [3efe:3022::1000];18.0.0.1;18.0.0.2 @@ -386,7 +386,7 @@ For more information see: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `,`) | @@ -417,7 +417,7 @@ For more information see: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -428,13 +428,13 @@ For more information see: -This setting does not apply to desktop apps. +This setting doesn't apply to desktop apps. Turns off Windows Network Isolation's automatic proxy discovery in the domain corporate environment. - If you enable this policy setting, it turns off Windows Network Isolation's automatic proxy discovery in the domain corporate environment. Only proxies configured with Group Policy are authoritative. This applies to both Internet and intranet proxies. -- If you disable or do not configure this policy setting, Windows Network Isolation attempts to automatically discover your proxy server addresses. +- If you disable or don't configure this policy setting, Windows Network Isolation attempts to automatically discover your proxy server addresses. For more information see: @@ -448,7 +448,7 @@ For more information see: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -488,7 +488,7 @@ For more information see: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -499,7 +499,7 @@ For more information see: -This setting does not apply to desktop apps. +This setting doesn't apply to desktop apps. A comma-separated list of domain names that can be used as both work or personal resource. @@ -515,7 +515,7 @@ For more information see: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `,`) | diff --git a/windows/client-management/mdm/policy-csp-networklistmanager.md b/windows/client-management/mdm/policy-csp-networklistmanager.md index 783e4f6580..d911d882c5 100644 --- a/windows/client-management/mdm/policy-csp-networklistmanager.md +++ b/windows/client-management/mdm/policy-csp-networklistmanager.md @@ -4,7 +4,7 @@ description: Learn more about the NetworkListManager Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 2009 [10.0.19042] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 2009 [10.0.19042] and later | @@ -62,7 +62,7 @@ Invoke-WebRequest -Uri https://nls.corp.contoso.com -Method get -UseBasicParsing | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -79,7 +79,7 @@ Invoke-WebRequest -Uri https://nls.corp.contoso.com -Method get -UseBasicParsing | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 2009 [10.0.19042] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 2009 [10.0.19042] and later | @@ -104,7 +104,7 @@ This policy setting provides the string that names a network. If this setting is | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | diff --git a/windows/client-management/mdm/policy-csp-newsandinterests.md b/windows/client-management/mdm/policy-csp-newsandinterests.md index 7fa317d7de..d6ebc245a3 100644 --- a/windows/client-management/mdm/policy-csp-newsandinterests.md +++ b/windows/client-management/mdm/policy-csp-newsandinterests.md @@ -4,7 +4,7 @@ description: Learn more about the NewsAndInterests Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -38,7 +38,9 @@ ms.topic: reference This policy specifies whether the widgets feature is allowed on the device. + Widgets will be turned on by default unless you change this in your settings. + If you turned this feature on before, it will stay on automatically unless you turn it off. @@ -53,7 +55,7 @@ This policy applies to the entire widgets experience, including content on the t | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | diff --git a/windows/client-management/mdm/policy-csp-notifications.md b/windows/client-management/mdm/policy-csp-notifications.md index 5f2769f2f1..65ea9ad54a 100644 --- a/windows/client-management/mdm/policy-csp-notifications.md +++ b/windows/client-management/mdm/policy-csp-notifications.md @@ -4,7 +4,7 @@ description: Learn more about the Notifications Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -39,11 +39,11 @@ ms.topic: reference This policy setting blocks applications from using the network to send notifications to update tiles, tile badges, toast, or raw notifications. This policy setting turns off the connection between Windows and the Windows Push Notification Service (WNS). This policy setting also stops applications from being able to poll application services to update tiles. -- If you enable this policy setting, applications and system features will not be able receive notifications from the network from WNS or via notification polling APIs. +- If you enable this policy setting, applications and system features won't be able receive notifications from the network from WNS or via notification polling APIs. - If you enable this policy setting, notifications can still be raised by applications running on the machine via local API calls from within the application. -- If you disable or do not configure this policy setting, the client computer will connect to WNS at user login and applications will be allowed to poll for tile notification updates in the background. +- If you disable or don't configure this policy setting, the client computer will connect to WNS at user login and applications will be allowed to poll for tile notification updates in the background. No reboots or service restarts are required for this policy setting to take effect. @@ -68,7 +68,7 @@ To validate the configuration: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -108,7 +108,7 @@ To validate the configuration: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -121,9 +121,9 @@ To validate the configuration: This policy setting turns off notification mirroring. -- If you enable this policy setting, notifications from applications and system will not be mirrored to your other devices. +- If you enable this policy setting, notifications from applications and system won't be mirrored to your other devices. -- If you disable or do not configure this policy setting, notifications will be mirrored, and can be turned off by the administrator or user. +- If you disable or don't configure this policy setting, notifications will be mirrored, and can be turned off by the administrator or user. No reboots or service restarts are required for this policy setting to take effect. @@ -139,7 +139,7 @@ This feature can be turned off by apps that don't want to participate in notific | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -179,7 +179,7 @@ This feature can be turned off by apps that don't want to participate in notific | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -192,9 +192,9 @@ This feature can be turned off by apps that don't want to participate in notific This policy setting turns off tile notifications. -- If you enable this policy setting, applications and system features will not be able to update their tiles and tile badges in the Start screen. +- If you enable this policy setting, applications and system features won't be able to update their tiles and tile badges in the Start screen. -- If you disable or do not configure this policy setting, tile and badge notifications are enabled and can be turned off by the administrator or user. +- If you disable or don't configure this policy setting, tile and badge notifications are enabled and can be turned off by the administrator or user. No reboots or service restarts are required for this policy setting to take effect. @@ -208,7 +208,7 @@ No reboots or service restarts are required for this policy setting to take effe | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -248,7 +248,7 @@ No reboots or service restarts are required for this policy setting to take effe | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1620] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1620] and later | @@ -262,7 +262,8 @@ No reboots or service restarts are required for this policy setting to take effe This policy setting turns on multiple expanded toast notifications in action center. - If you enable this policy setting, the first three notifications of each application will be expanded by default in action center. -- If you disable or do not configure this policy setting, only the first notification of each application will be expanded by default in action center. Windows 10 only. This will be immediately deprecated for Windows 11. No reboots or service restarts are required for this policy setting to take effect. + +- If you disable or don't configure this policy setting, only the first notification of each application will be expanded by default in action center. Windows 10 only. This will be immediately deprecated for Windows 11. No reboots or service restarts are required for this policy setting to take effect. @@ -274,7 +275,7 @@ This policy setting turns on multiple expanded toast notifications in action cen | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -309,7 +310,7 @@ This policy setting turns on multiple expanded toast notifications in action cen | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -339,7 +340,7 @@ If you disable or don't configure this setting, the push notifications will conn | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | diff --git a/windows/client-management/mdm/policy-csp-power.md b/windows/client-management/mdm/policy-csp-power.md index a8a8f001c3..1df08d3e35 100644 --- a/windows/client-management/mdm/policy-csp-power.md +++ b/windows/client-management/mdm/policy-csp-power.md @@ -4,7 +4,7 @@ description: Learn more about the Power Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - Power -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -54,7 +51,7 @@ This policy setting decides if hibernate on the machine is allowed or not. Suppo | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -80,7 +77,7 @@ This policy setting decides if hibernate on the machine is allowed or not. Suppo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -93,9 +90,9 @@ This policy setting decides if hibernate on the machine is allowed or not. Suppo This policy setting manages whether or not Windows is allowed to use standby states when putting the computer in a sleep state. -- If you enable or do not configure this policy setting, Windows uses standby states to put the computer in a sleep state. +- If you enable or don't configure this policy setting, Windows uses standby states to put the computer in a sleep state. -- If you disable this policy setting, standby states (S1-S3) are not allowed. +- If you disable this policy setting, standby states (S1-S3) aren't allowed. @@ -107,13 +104,12 @@ This policy setting manages whether or not Windows is allowed to use standby sta | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -140,7 +136,7 @@ This policy setting manages whether or not Windows is allowed to use standby sta | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -153,9 +149,9 @@ This policy setting manages whether or not Windows is allowed to use standby sta This policy setting manages whether or not Windows is allowed to use standby states when putting the computer in a sleep state. -- If you enable or do not configure this policy setting, Windows uses standby states to put the computer in a sleep state. +- If you enable or don't configure this policy setting, Windows uses standby states to put the computer in a sleep state. -- If you disable this policy setting, standby states (S1-S3) are not allowed. +- If you disable this policy setting, standby states (S1-S3) aren't allowed. @@ -167,13 +163,12 @@ This policy setting manages whether or not Windows is allowed to use standby sta | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -200,7 +195,7 @@ This policy setting manages whether or not Windows is allowed to use standby sta | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -215,7 +210,7 @@ This policy setting allows you to specify the period of inactivity before Window - If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows turns off the display. -- If you disable or do not configure this policy setting, users control this setting. +- If you disable or don't configure this policy setting, users control this setting. If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the display from turning off. The "Prevent enabling lock screen slide show" policy setting can be used to disable the slide show feature. @@ -229,13 +224,12 @@ If the user has configured a slide show to run on the lock screen when the machi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -261,7 +255,7 @@ If the user has configured a slide show to run on the lock screen when the machi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -276,7 +270,7 @@ This policy setting allows you to specify the period of inactivity before Window - If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows turns off the display. -- If you disable or do not configure this policy setting, users control this setting. +- If you disable or don't configure this policy setting, users control this setting. If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the display from turning off. The "Prevent enabling lock screen slide show" policy setting can be used to disable the slide show feature. @@ -290,13 +284,12 @@ If the user has configured a slide show to run on the lock screen when the machi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -322,7 +315,7 @@ If the user has configured a slide show to run on the lock screen when the machi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -337,7 +330,7 @@ This policy setting allows you to specify battery charge level at which Energy S - If you enable this policy setting, you must provide a percent value, indicating the battery charge level. Energy Saver will be automatically turned on at (and below) the specified level. -- If you disable or do not configure this policy setting, users control this setting. +- If you disable or don't configure this policy setting, users control this setting. @@ -349,7 +342,7 @@ This policy setting allows you to specify battery charge level at which Energy S | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-100]` | | Default Value | 0 | @@ -381,7 +374,7 @@ This policy setting allows you to specify battery charge level at which Energy S | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -396,7 +389,7 @@ This policy setting allows you to specify battery charge level at which Energy S - If you enable this policy setting, you must provide a percent value, indicating the battery charge level. Energy Saver will be automatically turned on at (and below) the specified level. -- If you disable or do not configure this policy setting, users control this setting. +- If you disable or don't configure this policy setting, users control this setting. @@ -408,7 +401,7 @@ This policy setting allows you to specify battery charge level at which Energy S | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-100]` | | Default Value | 0 | @@ -440,7 +433,7 @@ This policy setting allows you to specify battery charge level at which Energy S | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -455,7 +448,7 @@ This policy setting allows you to specify the period of inactivity before Window - If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows transitions to hibernate. -- If you disable or do not configure this policy setting, users control this setting. +- If you disable or don't configure this policy setting, users control this setting. If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occuring. The "Prevent enabling lock screen slide show" policy setting can be used to disable the slide show feature. @@ -469,13 +462,12 @@ If the user has configured a slide show to run on the lock screen when the machi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -501,7 +493,7 @@ If the user has configured a slide show to run on the lock screen when the machi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -516,7 +508,7 @@ This policy setting allows you to specify the period of inactivity before Window - If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows transitions to hibernate. -- If you disable or do not configure this policy setting, users control this setting. +- If you disable or don't configure this policy setting, users control this setting. If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occuring. The "Prevent enabling lock screen slide show" policy setting can be used to disable the slide show feature. @@ -530,13 +522,12 @@ If the user has configured a slide show to run on the lock screen when the machi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -562,7 +553,7 @@ If the user has configured a slide show to run on the lock screen when the machi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -575,9 +566,9 @@ If the user has configured a slide show to run on the lock screen when the machi This policy setting specifies whether or not the user is prompted for a password when the system resumes from sleep. -- If you enable or do not configure this policy setting, the user is prompted for a password when the system resumes from sleep. +- If you enable or don't configure this policy setting, the user is prompted for a password when the system resumes from sleep. -- If you disable this policy setting, the user is not prompted for a password when the system resumes from sleep. +- If you disable this policy setting, the user isn't prompted for a password when the system resumes from sleep. @@ -589,13 +580,12 @@ This policy setting specifies whether or not the user is prompted for a password | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -622,7 +612,7 @@ This policy setting specifies whether or not the user is prompted for a password | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -635,9 +625,9 @@ This policy setting specifies whether or not the user is prompted for a password This policy setting specifies whether or not the user is prompted for a password when the system resumes from sleep. -- If you enable or do not configure this policy setting, the user is prompted for a password when the system resumes from sleep. +- If you enable or don't configure this policy setting, the user is prompted for a password when the system resumes from sleep. -- If you disable this policy setting, the user is not prompted for a password when the system resumes from sleep. +- If you disable this policy setting, the user isn't prompted for a password when the system resumes from sleep. @@ -649,13 +639,12 @@ This policy setting specifies whether or not the user is prompted for a password | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -682,7 +671,7 @@ This policy setting specifies whether or not the user is prompted for a password | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -696,14 +685,15 @@ This policy setting specifies whether or not the user is prompted for a password This policy setting specifies the action that Windows takes when a user closes the lid on a mobile PC. Possible actions include: + -Take no action -Sleep -Hibernate --Shut down +-Shut down. - If you enable this policy setting, you must select the desired action. -- If you disable this policy setting or do not configure it, users can see and change this setting. +- If you disable this policy setting or don't configure it, users can see and change this setting. @@ -715,7 +705,7 @@ Possible actions include: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -757,7 +747,7 @@ Possible actions include: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -771,14 +761,15 @@ Possible actions include: This policy setting specifies the action that Windows takes when a user closes the lid on a mobile PC. Possible actions include: + -Take no action -Sleep -Hibernate --Shut down +-Shut down. - If you enable this policy setting, you must select the desired action. -- If you disable this policy setting or do not configure it, users can see and change this setting. +- If you disable this policy setting or don't configure it, users can see and change this setting. @@ -790,7 +781,7 @@ Possible actions include: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -832,7 +823,7 @@ Possible actions include: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -846,14 +837,15 @@ Possible actions include: This policy setting specifies the action that Windows takes when a user presses the power button. Possible actions include: + -Take no action -Sleep -Hibernate --Shut down +-Shut down. - If you enable this policy setting, you must select the desired action. -- If you disable this policy setting or do not configure it, users can see and change this setting. +- If you disable this policy setting or don't configure it, users can see and change this setting. @@ -865,7 +857,7 @@ Possible actions include: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -907,7 +899,7 @@ Possible actions include: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -921,14 +913,15 @@ Possible actions include: This policy setting specifies the action that Windows takes when a user presses the power button. Possible actions include: + -Take no action -Sleep -Hibernate --Shut down +-Shut down. - If you enable this policy setting, you must select the desired action. -- If you disable this policy setting or do not configure it, users can see and change this setting. +- If you disable this policy setting or don't configure it, users can see and change this setting. @@ -940,7 +933,7 @@ Possible actions include: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -982,7 +975,7 @@ Possible actions include: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -996,14 +989,15 @@ Possible actions include: This policy setting specifies the action that Windows takes when a user presses the sleep button. Possible actions include: + -Take no action -Sleep -Hibernate --Shut down +-Shut down. - If you enable this policy setting, you must select the desired action. -- If you disable this policy setting or do not configure it, users can see and change this setting. +- If you disable this policy setting or don't configure it, users can see and change this setting. @@ -1015,7 +1009,7 @@ Possible actions include: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1057,7 +1051,7 @@ Possible actions include: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -1071,14 +1065,15 @@ Possible actions include: This policy setting specifies the action that Windows takes when a user presses the sleep button. Possible actions include: + -Take no action -Sleep -Hibernate --Shut down +-Shut down. - If you enable this policy setting, you must select the desired action. -- If you disable this policy setting or do not configure it, users can see and change this setting. +- If you disable this policy setting or don't configure it, users can see and change this setting. @@ -1090,7 +1085,7 @@ Possible actions include: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1132,7 +1127,7 @@ Possible actions include: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1147,7 +1142,7 @@ This policy setting allows you to specify the period of inactivity before Window - If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows transitions to sleep. -- If you disable or do not configure this policy setting, users control this setting. +- If you disable or don't configure this policy setting, users control this setting. If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occuring. The "Prevent enabling lock screen slide show" policy setting can be used to disable the slide show feature. @@ -1161,13 +1156,12 @@ If the user has configured a slide show to run on the lock screen when the machi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1193,7 +1187,7 @@ If the user has configured a slide show to run on the lock screen when the machi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1208,7 +1202,7 @@ This policy setting allows you to specify the period of inactivity before Window - If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows transitions to sleep. -- If you disable or do not configure this policy setting, users control this setting. +- If you disable or don't configure this policy setting, users control this setting. If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occuring. The "Prevent enabling lock screen slide show" policy setting can be used to disable the slide show feature. @@ -1222,13 +1216,12 @@ If the user has configured a slide show to run on the lock screen when the machi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1254,7 +1247,7 @@ If the user has configured a slide show to run on the lock screen when the machi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -1267,9 +1260,9 @@ If the user has configured a slide show to run on the lock screen when the machi This policy setting allows you to turn off hybrid sleep. -- If you enable this policy setting, a hiberfile is not generated when the system transitions to sleep (Stand By). +- If you enable this policy setting, a hiberfile isn't generated when the system transitions to sleep (Stand By). -- If you disable or do not configure this policy setting, users control this setting. +- If you disable or don't configure this policy setting, users control this setting. @@ -1281,7 +1274,7 @@ This policy setting allows you to turn off hybrid sleep. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1321,7 +1314,7 @@ This policy setting allows you to turn off hybrid sleep. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -1334,9 +1327,9 @@ This policy setting allows you to turn off hybrid sleep. This policy setting allows you to turn off hybrid sleep. -- If you enable this policy setting, a hiberfile is not generated when the system transitions to sleep (Stand By). +- If you enable this policy setting, a hiberfile isn't generated when the system transitions to sleep (Stand By). -- If you disable or do not configure this policy setting, users control this setting. +- If you disable or don't configure this policy setting, users control this setting. @@ -1348,7 +1341,7 @@ This policy setting allows you to turn off hybrid sleep. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1388,7 +1381,7 @@ This policy setting allows you to turn off hybrid sleep. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -1399,11 +1392,11 @@ This policy setting allows you to turn off hybrid sleep. -This policy setting allows you to specify the period of inactivity before Windows transitions to sleep automatically when a user is not present at the computer. +This policy setting allows you to specify the period of inactivity before Windows transitions to sleep automatically when a user isn't present at the computer. -- If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows automatically transitions to sleep when left unattended. If you specify 0 seconds, Windows does not automatically transition to sleep. +- If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows automatically transitions to sleep when left unattended. If you specify 0 seconds, Windows doesn't automatically transition to sleep. -- If you disable or do not configure this policy setting, users control this setting. +- If you disable or don't configure this policy setting, users control this setting. If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occuring. The "Prevent enabling lock screen slide show" policy setting can be used to disable the slide show feature. @@ -1417,7 +1410,7 @@ If the user has configured a slide show to run on the lock screen when the machi | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-4294967295]` | | Default Value | 0 | @@ -1449,7 +1442,7 @@ If the user has configured a slide show to run on the lock screen when the machi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -1460,11 +1453,11 @@ If the user has configured a slide show to run on the lock screen when the machi -This policy setting allows you to specify the period of inactivity before Windows transitions to sleep automatically when a user is not present at the computer. +This policy setting allows you to specify the period of inactivity before Windows transitions to sleep automatically when a user isn't present at the computer. -- If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows automatically transitions to sleep when left unattended. If you specify 0 seconds, Windows does not automatically transition to sleep. +- If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows automatically transitions to sleep when left unattended. If you specify 0 seconds, Windows doesn't automatically transition to sleep. -- If you disable or do not configure this policy setting, users control this setting. +- If you disable or don't configure this policy setting, users control this setting. If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occuring. The "Prevent enabling lock screen slide show" policy setting can be used to disable the slide show feature. @@ -1478,7 +1471,7 @@ If the user has configured a slide show to run on the lock screen when the machi | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-4294967295]` | | Default Value | 0 | diff --git a/windows/client-management/mdm/policy-csp-printers.md b/windows/client-management/mdm/policy-csp-printers.md index 61ca4d4ecc..0236d23909 100644 --- a/windows/client-management/mdm/policy-csp-printers.md +++ b/windows/client-management/mdm/policy-csp-printers.md @@ -4,7 +4,7 @@ description: Learn more about the Printers Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - Printers -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -59,13 +56,12 @@ The format of this setting is `/[,/]`. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -91,7 +87,7 @@ The format of this setting is `/[,/]`. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -119,13 +115,12 @@ The format of this setting is `/[,/]`. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -151,7 +146,7 @@ The format of this setting is `/[,/]`. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -166,7 +161,7 @@ Manages how Queue-specific files are processed during printer installation. At p You can enable this setting to change the default behavior involving queue-specific files. To use this setting, select one of the options below from the "Manage processing of Queue-specific files" box. -If you disable or do not configure this policy setting, the default behavior is "Limit Queue-specific files to Color profiles". +If you disable or don't configure this policy setting, the default behavior is "Limit Queue-specific files to Color profiles". - "Do not allow Queue-specific files" specifies that no queue-specific files will be allowed/processed during print queue/printer connection installation. @@ -189,13 +184,12 @@ The following are the supported values: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -221,7 +215,7 @@ The following are the supported values: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -232,13 +226,13 @@ The following are the supported values: -This policy setting controls the print driver signature validation mechanism. This policy controls the type of digital signature that is required for a print driver to be considered valid and installed on the system. +This policy setting controls the print driver signature validation mechanism. This policy controls the type of digital signature that's required for a print driver to be considered valid and installed on the system. As part of this validation the catalog/embedded signature is verified and all files in the driver must be a part of the catalog or have their own embedded signature that can be used for validation. You can enable this setting to change the default signature validation method. To use this setting, select one of the options below from the "Select the driver signature mechanism for this computer" box. -If you disable or do not configure this policy setting, the default method is "Allow all validly signed drivers". +If you disable or don't configure this policy setting, the default method is "Allow all validly signed drivers". - "Require inbox signed drivers" specifies only drivers that are shipped as part of a Windows image are allowed on this computer. @@ -252,7 +246,7 @@ If you disable or do not configure this policy setting, the default method is "A The 'PrintDrivers' certificate store needs to be created by an administrator under the local machine store location. -The 'Trusted Publishers' certificate store can contain certificates from sources that are not related to print drivers. +The 'Trusted Publishers' certificate store can contain certificates from sources that aren't related to print drivers. @@ -271,13 +265,12 @@ The following are the supported values: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -303,7 +296,7 @@ The following are the supported values: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -316,11 +309,11 @@ The following are the supported values: Determines whether to always send page count information for accounting purposes for printers using the Microsoft IPP Class Driver. -By default, pages are sent to the printer as soon as they are rendered and page count information is not sent to the printer unless pages must be reordered. +By default, pages are sent to the printer as soon as they're rendered and page count information isn't sent to the printer unless pages must be reordered. - If you enable this setting the system will render all print job pages up front and send the printer the total page count for the print job. -- If you disable this setting or do not configure it, pages are printed as soon as they are rendered and page counts are only sent when page reordering is required to process the job. +- If you disable this setting or don't configure it, pages are printed as soon as they're rendered and page counts are only sent when page reordering is required to process the job. @@ -336,13 +329,12 @@ The following are the supported values: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -369,7 +361,7 @@ The following are the supported values: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -384,15 +376,15 @@ Determines whether Redirection Guard is enabled for the print spooler. You can enable this setting to configure the Redirection Guard policy being applied to spooler. -- If you disable or do not configure this policy setting, Redirection Guard will default to being 'enabled'. +- If you disable or don't configure this policy setting, Redirection Guard will default to being 'enabled'. - If you enable this setting you may select the following options: -- Enabled : Redirection Guard will prevent any file redirections from being followed +- Enabled: Redirection Guard will prevent any file redirections from being followed. -- Disabled : Redirection Guard will not be enabled and file redirections may be used within the spooler process +- Disabled: Redirection Guard won't be enabled and file redirections may be used within the spooler process. -- Audit : Redirection Guard will log events as though it were enabled but will not actually prevent file redirections from being used within the spooler. +- Audit: Redirection Guard will log events as though it were enabled but won't actually prevent file redirections from being used within the spooler. @@ -409,13 +401,12 @@ The following are the supported values: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -441,7 +432,7 @@ The following are the supported values: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -463,14 +454,13 @@ The following are the supported values: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -492,7 +482,7 @@ The following are the supported values: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -508,15 +498,17 @@ This policy setting controls which protocol and protocol settings to use for out By default, RPC over TCP is used and authentication is always enabled. For RPC over named pipes, authentication is always enabled for domain joined machines but disabled for non domain joined machines. Protocol to use for outgoing RPC connections: - - "RPC over TCP": Use RPC over TCP for outgoing RPC connections to a remote print spooler - - "RPC over named pipes": Use RPC over named pipes for outgoing RPC connections to a remote print spooler + +- "RPC over TCP": Use RPC over TCP for outgoing RPC connections to a remote print spooler +- "RPC over named pipes": Use RPC over named pipes for outgoing RPC connections to a remote print spooler. Use authentication for outgoing RPC over named pipes connections: - - "Default": By default domain joined computers enable RPC authentication for RPC over named pipes while non domain joined computers disable RPC authentication for RPC over named pipes - - "Authentication enabled": RPC authentication will be used for outgoing RPC over named pipes connections - - "Authentication disabled": RPC authentication will not be used for outgoing RPC over named pipes connections -If you disable or do not configure this policy setting, the above defaults will be used. +- "Default": By default domain joined computers enable RPC authentication for RPC over named pipes while non domain joined computers disable RPC authentication for RPC over named pipes +- "Authentication enabled": RPC authentication will be used for outgoing RPC over named pipes connections +- "Authentication disabled": RPC authentication won't be used for outgoing RPC over named pipes connections. + +If you disable or don't configure this policy setting, the above defaults will be used. @@ -528,13 +520,12 @@ If you disable or do not configure this policy setting, the above defaults will | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -560,7 +551,7 @@ If you disable or do not configure this policy setting, the above defaults will | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -576,15 +567,17 @@ This policy setting controls which protocols incoming RPC connections to the pri By default, RPC over TCP is enabled and Negotiate is used for the authentication protocol. Protocols to allow for incoming RPC connections: - - "RPC over named pipes": Incoming RPC connections are only allowed over named pipes - - "RPC over TCP": Incoming RPC connections are only allowed over TCP (the default option) - - "RPC over named pipes and TCP": Incoming RPC connections will be allowed over TCP and named pipes + +- "RPC over named pipes": Incoming RPC connections are only allowed over named pipes +- "RPC over TCP": Incoming RPC connections are only allowed over TCP (the default option) +- "RPC over named pipes and TCP": Incoming RPC connections will be allowed over TCP and named pipes. Authentication protocol to use for incoming RPC connections: - - "Negotiate": Use the Negotiate authentication protocol (the default option) - - "Kerberos": Use the Kerberos authentication protocol -If you disable or do not configure this policy setting, the above defaults will be used. +- "Negotiate": Use the Negotiate authentication protocol (the default option) +- "Kerberos": Use the Kerberos authentication protocol. + +If you disable or don't configure this policy setting, the above defaults will be used. @@ -596,13 +589,12 @@ If you disable or do not configure this policy setting, the above defaults will | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -628,7 +620,7 @@ If you disable or do not configure this policy setting, the above defaults will | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -644,9 +636,10 @@ This policy setting controls which port is used for RPC over TCP for incoming co By default dynamic TCP ports are used. RPC over TCP port: - - The port to use for RPC over TCP. A value of 0 is the default and indicates that dynamic TCP ports will be used -If you disable or do not configure this policy setting, dynamic TCP ports are used. +- The port to use for RPC over TCP. A value of 0 is the default and indicates that dynamic TCP ports will be used. + +If you disable or don't configure this policy setting, dynamic TCP ports are used. @@ -658,13 +651,12 @@ If you disable or do not configure this policy setting, dynamic TCP ports are us | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -690,7 +682,7 @@ If you disable or do not configure this policy setting, dynamic TCP ports are us | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -707,7 +699,7 @@ By default, there are no restrictions to printing based on connection type or pr - If you enable this setting, the computer will restrict printing to printer connections on the corporate network or approved USB-connected printers. -- If you disable this setting or do not configure it, there are no restrictions to printing based on connection type or printer Make/Model. +- If you disable this setting or don't configure it, there are no restrictions to printing based on connection type or printer Make/Model. @@ -719,13 +711,12 @@ By default, there are no restrictions to printing based on connection type or pr | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -752,7 +743,7 @@ By default, there are no restrictions to printing based on connection type or pr | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -769,7 +760,7 @@ By default, there are no restrictions to printing based on connection type or pr - If you enable this setting, the computer will restrict printing to printer connections on the corporate network or approved USB-connected printers. -- If you disable this setting or do not configure it, there are no restrictions to printing based on connection type or printer Make/Model. +- If you disable this setting or don't configure it, there are no restrictions to printing based on connection type or printer Make/Model. @@ -781,13 +772,12 @@ By default, there are no restrictions to printing based on connection type or pr | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -814,7 +804,7 @@ By default, there are no restrictions to printing based on connection type or pr | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -825,13 +815,13 @@ By default, there are no restrictions to printing based on connection type or pr -This policy setting controls the print driver exclusion list. The exclusion list allows an administrator to curate a list of printer drivers that are not allowed to be installed on the system. +This policy setting controls the print driver exclusion list. The exclusion list allows an administrator to curate a list of printer drivers that aren't allowed to be installed on the system. This checks outranks the signature check and allows drivers that have a valid signature level for the Print Driver signature validation policy to be excluded. Entries in the exclusion list consist of a SHA256 hash (or SHA1 hash for Win7) of the INF file and/or main driver DLL file of the driver and the name of the file. -If you disable or do not configure this policy setting, the registry key and values associated with this policy setting will be deleted, if currently set to a value. +If you disable or don't configure this policy setting, the registry key and values associated with this policy setting will be deleted, if currently set to a value. @@ -843,13 +833,12 @@ If you disable or do not configure this policy setting, the registry key and val | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -875,7 +864,7 @@ If you disable or do not configure this policy setting, the registry key and val | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -889,20 +878,31 @@ If you disable or do not configure this policy setting, the registry key and val This policy setting controls the client Point and Print behavior, including the security prompts for Windows Vista computers. The policy setting applies only to non-Print Administrator clients, and only to computers that are members of a domain. - If you enable this policy setting: --Windows XP and later clients will only download print driver components from a list of explicitly named servers. If a compatible print driver is available on the client, a printer connection will be made. If a compatible print driver is not available on the client, no connection will be made. --You can configure Windows Vista clients so that security warnings and elevated command prompts do not appear when users Point and Print, or when printer connection drivers need to be updated. -- If you do not configure this policy setting: +-Windows XP and later clients will only download print driver components from a list of explicitly named servers. If a compatible print driver is available on the client, a printer connection will be made. If a compatible print driver isn't available on the client, no connection will be made. + +-You can configure Windows Vista clients so that security warnings and elevated command prompts don't appear when users Point and Print, or when printer connection drivers need to be updated. + +- If you don't configure this policy setting: + -Windows Vista client computers can point and print to any server. + -Windows Vista computers will show a warning and an elevated command prompt when users create a printer connection to any server using Point and Print. + -Windows Vista computers will show a warning and an elevated command prompt when an existing printer connection driver needs to be updated. + -Windows Server 2003 and Windows XP client computers can create a printer connection to any server in their forest using Point and Print. - If you disable this policy setting: + -Windows Vista client computers can create a printer connection to any server using Point and Print. --Windows Vista computers will not show a warning or an elevated command prompt when users create a printer connection to any server using Point and Print. --Windows Vista computers will not show a warning or an elevated command prompt when an existing printer connection driver needs to be updated. + +-Windows Vista computers won't show a warning or an elevated command prompt when users create a printer connection to any server using Point and Print. + +-Windows Vista computers won't show a warning or an elevated command prompt when an existing printer connection driver needs to be updated. + -Windows Server 2003 and Windows XP client computers can create a printer connection to any server using Point and Print. + -The "Users can only point and print to computers in their forest" setting applies only to Windows Server 2003 and Windows XP SP1 (and later service packs). @@ -915,13 +915,12 @@ This policy setting controls the client Point and Print behavior, including the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -948,7 +947,7 @@ This policy setting controls the client Point and Print behavior, including the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -962,20 +961,31 @@ This policy setting controls the client Point and Print behavior, including the This policy setting controls the client Point and Print behavior, including the security prompts for Windows Vista computers. The policy setting applies only to non-Print Administrator clients, and only to computers that are members of a domain. - If you enable this policy setting: --Windows XP and later clients will only download print driver components from a list of explicitly named servers. If a compatible print driver is available on the client, a printer connection will be made. If a compatible print driver is not available on the client, no connection will be made. --You can configure Windows Vista clients so that security warnings and elevated command prompts do not appear when users Point and Print, or when printer connection drivers need to be updated. -- If you do not configure this policy setting: +-Windows XP and later clients will only download print driver components from a list of explicitly named servers. If a compatible print driver is available on the client, a printer connection will be made. If a compatible print driver isn't available on the client, no connection will be made. + +-You can configure Windows Vista clients so that security warnings and elevated command prompts don't appear when users Point and Print, or when printer connection drivers need to be updated. + +- If you don't configure this policy setting: + -Windows Vista client computers can point and print to any server. + -Windows Vista computers will show a warning and an elevated command prompt when users create a printer connection to any server using Point and Print. + -Windows Vista computers will show a warning and an elevated command prompt when an existing printer connection driver needs to be updated. + -Windows Server 2003 and Windows XP client computers can create a printer connection to any server in their forest using Point and Print. - If you disable this policy setting: + -Windows Vista client computers can create a printer connection to any server using Point and Print. --Windows Vista computers will not show a warning or an elevated command prompt when users create a printer connection to any server using Point and Print. --Windows Vista computers will not show a warning or an elevated command prompt when an existing printer connection driver needs to be updated. + +-Windows Vista computers won't show a warning or an elevated command prompt when users create a printer connection to any server using Point and Print. + +-Windows Vista computers won't show a warning or an elevated command prompt when an existing printer connection driver needs to be updated. + -Windows Server 2003 and Windows XP client computers can create a printer connection to any server using Point and Print. + -The "Users can only point and print to computers in their forest" setting applies only to Windows Server 2003 and Windows XP SP1 (and later service packs). @@ -988,13 +998,12 @@ This policy setting controls the client Point and Print behavior, including the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1021,7 +1030,7 @@ This policy setting controls the client Point and Print behavior, including the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1034,9 +1043,9 @@ This policy setting controls the client Point and Print behavior, including the Determines whether the computer's shared printers can be published in Active Directory. -- If you enable this setting or do not configure it, users can use the "List in directory" option in the Printer's Properties' Sharing tab to publish shared printers in Active Directory. +- If you enable this setting or don't configure it, users can use the "List in directory" option in the Printer's Properties' Sharing tab to publish shared printers in Active Directory. -- If you disable this setting, this computer's shared printers cannot be published in Active Directory, and the "List in directory" option is not available. +- If you disable this setting, this computer's shared printers can't be published in Active Directory, and the "List in directory" option isn't available. > [!NOTE] > This settings takes priority over the setting "Automatically publish new printers in the Active Directory". @@ -1051,13 +1060,12 @@ Determines whether the computer's shared printers can be published in Active Dir | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1084,7 +1092,7 @@ Determines whether the computer's shared printers can be published in Active Dir | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -1099,7 +1107,7 @@ Determines whether users that aren't Administrators can install print drivers on By default, users that aren't Administrators can't install print drivers on this computer. -- If you enable this setting or do not configure it, the system will limit installation of print drivers to Administrators of this computer. +- If you enable this setting or don't configure it, the system will limit installation of print drivers to Administrators of this computer. - If you disable this setting, the system won't limit installation of print drivers to this computer. @@ -1113,13 +1121,12 @@ By default, users that aren't Administrators can't install print drivers on this | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-privacy.md b/windows/client-management/mdm/policy-csp-privacy.md index 507250a860..28175d1f22 100644 --- a/windows/client-management/mdm/policy-csp-privacy.md +++ b/windows/client-management/mdm/policy-csp-privacy.md @@ -4,7 +4,7 @@ description: Learn more about the Privacy Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 04/26/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -52,7 +52,7 @@ Allows or disallows the automatic acceptance of the pairing and privacy user con | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -78,7 +78,7 @@ Allows or disallows the automatic acceptance of the pairing and privacy user con | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -92,7 +92,9 @@ Allows or disallows the automatic acceptance of the pairing and privacy user con This policy setting determines whether Clipboard contents can be synchronized across devices. - If you enable this policy setting, Clipboard contents are allowed to be synchronized across devices logged in under the same Microsoft account or Azure AD account. -- If you disable this policy setting, Clipboard contents cannot be shared to other devices. + +- If you disable this policy setting, Clipboard contents can't be shared to other devices. + Policy change takes effect immediately. @@ -107,7 +109,7 @@ Most restrictive value is `0` to not allow cross-device clipboard. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -147,7 +149,7 @@ Most restrictive value is `0` to not allow cross-device clipboard. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -162,7 +164,7 @@ This policy specifies whether users on the device have the option to enable onli If this policy is enabled or not configured, control is deferred to users, and users may choose whether to enable speech services via settings. -If this policy is disabled, speech services will be disabled, and users cannot enable speech services via settings. +If this policy is disabled, speech services will be disabled, and users can't enable speech services via settings. @@ -180,7 +182,7 @@ The most restrictive value is `0` to not allow speech services. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -220,7 +222,7 @@ The most restrictive value is `0` to not allow speech services. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -235,7 +237,7 @@ This policy setting turns off the advertising ID, preventing apps from using the - If you enable this policy setting, the advertising ID is turned off. Apps can't use the ID for experiences across apps. -- If you disable or do not configure this policy setting, users can control whether apps can use the advertising ID for experiences across apps. +- If you disable or don't configure this policy setting, users can control whether apps can use the advertising ID for experiences across apps. @@ -247,7 +249,7 @@ This policy setting turns off the advertising ID, preventing apps from using the | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 65535 | @@ -288,7 +290,7 @@ This policy setting turns off the advertising ID, preventing apps from using the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -305,9 +307,9 @@ This policy setting turns off the advertising ID, preventing apps from using the When logging into a new user account for the first time or after an upgrade in some scenarios, that user may be presented with a screen or series of screens that prompts the user to choose privacy settings for their account. Enable this policy to prevent this experience from launching. -If this policy is enabled, the privacy experience will not launch for newly-created user accounts or for accounts that would have been prompted to choose their privacy settings after an upgrade. +If this policy is enabled, the privacy experience won't launch for newly created user accounts or for accounts that would've been prompted to choose their privacy settings after an upgrade. -If this policy is disabled or not configured, then the privacy experience may launch for newly-created user accounts or for accounts that should be prompted to choose their privacy settings after an upgrade. +If this policy is disabled or not configured, then the privacy experience may launch for newly created user accounts or for accounts that should be prompted to choose their privacy settings after an upgrade. @@ -321,7 +323,7 @@ In some managed environments, the privacy settings may be set by other policies. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -332,7 +334,7 @@ In some managed environments, the privacy settings may be set by other policies. | Value | Description | |:--|:--| | 0 (Default) | Allow the 'choose privacy settings for your device' screen for a new user during their first logon or when an existing user logs in for the first time after an upgrade. | -| 1 | Do not allow the 'choose privacy settings for your device' screen when a new user logs in or an existing user logs in for the first time after an upgrade. | +| 1 | Don't allow the 'choose privacy settings for your device' screen when a new user logs in or an existing user logs in for the first time after an upgrade. | @@ -361,7 +363,7 @@ In some managed environments, the privacy settings may be set by other policies. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -375,7 +377,9 @@ In some managed environments, the privacy settings may be set by other policies. This policy setting determines whether ActivityFeed is enabled. - If you enable this policy setting, all activity types (as applicable) are allowed to be published and ActivityFeed shall roam these activities across device graph of the user. + - If you disable this policy setting, activities can't be published and ActivityFeed shall disable cloud sync. + Policy change takes effect immediately. @@ -388,7 +392,7 @@ Policy change takes effect immediately. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -428,7 +432,7 @@ Policy change takes effect immediately. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -445,11 +449,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access account information by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access account information and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access account information and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access account information and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access account information and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access account information by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access account information by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -465,7 +469,7 @@ The most restrictive value is `2` to deny apps access to account information. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -506,7 +510,7 @@ The most restrictive value is `2` to deny apps access to account information. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -523,11 +527,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access account information by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access account information and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access account information and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access account information and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access account information and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access account information by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access account information by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -541,7 +545,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -571,7 +575,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -588,11 +592,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access account information by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access account information and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access account information and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access account information and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access account information and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access account information by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access account information by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -606,7 +610,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -636,7 +640,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -653,11 +657,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access account information by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access account information and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access account information and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access account information and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access account information and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access account information by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access account information by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -671,7 +675,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -701,7 +705,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -726,7 +730,7 @@ This policy setting specifies whether Windows apps can access the movement of th | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -753,7 +757,7 @@ This policy setting specifies whether Windows apps can access the movement of th | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -778,7 +782,7 @@ List of semi-colon delimited Package Family Names of Windows Store Apps. Listed | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -795,7 +799,7 @@ List of semi-colon delimited Package Family Names of Windows Store Apps. Listed | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -821,7 +825,7 @@ List of semi-colon delimited Package Family Names of Windows Store Apps. Listed | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -838,7 +842,7 @@ List of semi-colon delimited Package Family Names of Windows Store Apps. Listed | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -864,7 +868,7 @@ List of semi-colon delimited Package Family Names of Windows Store Apps. The use | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -881,7 +885,7 @@ List of semi-colon delimited Package Family Names of Windows Store Apps. The use | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -898,11 +902,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access the calendar by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access the calendar and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access the calendar and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access the calendar and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access the calendar and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access the calendar by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access the calendar by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -918,7 +922,7 @@ The most restrictive value is `2` to deny apps access to the calendar. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -959,7 +963,7 @@ The most restrictive value is `2` to deny apps access to the calendar. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -976,11 +980,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access the calendar by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access the calendar and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access the calendar and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access the calendar and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access the calendar and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access the calendar by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access the calendar by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -994,7 +998,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -1024,7 +1028,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1041,11 +1045,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access the calendar by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access the calendar and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access the calendar and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access the calendar and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access the calendar and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access the calendar by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access the calendar by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -1059,7 +1063,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -1089,7 +1093,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1106,11 +1110,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access the calendar by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access the calendar and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access the calendar and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access the calendar and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access the calendar and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access the calendar by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access the calendar by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -1124,7 +1128,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -1154,7 +1158,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1171,11 +1175,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access call history by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access the call history and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access the call history and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access the call history and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access the call history and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access the call history by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access the call history by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -1191,7 +1195,7 @@ The most restrictive value is `2` to deny apps access to call history. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1232,7 +1236,7 @@ The most restrictive value is `2` to deny apps access to call history. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1249,11 +1253,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access call history by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access the call history and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access the call history and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access the call history and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access the call history and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access the call history by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access the call history by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -1267,7 +1271,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -1297,7 +1301,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1314,11 +1318,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access call history by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access the call history and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access the call history and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access the call history and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access the call history and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access the call history by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access the call history by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -1332,7 +1336,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -1362,7 +1366,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1379,11 +1383,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access call history by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access the call history and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access the call history and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access the call history and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access the call history and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access the call history by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access the call history by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -1397,7 +1401,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -1427,7 +1431,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1444,11 +1448,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access the camera by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access the camera and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access the camera and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access the camera and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access the camera and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access the camera by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access the camera by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -1464,7 +1468,7 @@ The most restrictive value is `2` to deny apps access to the camera. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1505,7 +1509,7 @@ The most restrictive value is `2` to deny apps access to the camera. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1522,11 +1526,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access the camera by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access the camera and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access the camera and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access the camera and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access the camera and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access the camera by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access the camera by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -1540,7 +1544,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -1570,7 +1574,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1587,11 +1591,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access the camera by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access the camera and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access the camera and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access the camera and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access the camera and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access the camera by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access the camera by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -1605,7 +1609,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -1635,7 +1639,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1652,11 +1656,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access the camera by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access the camera and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access the camera and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access the camera and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access the camera and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access the camera by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access the camera by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -1670,7 +1674,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -1700,7 +1704,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1717,11 +1721,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access contacts by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access contacts and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access contacts and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access contacts and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access contacts and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access contacts by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access contacts by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -1737,7 +1741,7 @@ The most restrictive value is `2` to deny apps access to contacts. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1778,7 +1782,7 @@ The most restrictive value is `2` to deny apps access to contacts. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1795,11 +1799,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access contacts by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access contacts and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access contacts and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access contacts and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access contacts and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access contacts by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access contacts by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -1813,7 +1817,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -1843,7 +1847,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1860,11 +1864,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access contacts by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access contacts and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access contacts and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access contacts and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access contacts and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access contacts by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access contacts by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -1878,7 +1882,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -1908,7 +1912,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1925,11 +1929,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access contacts by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access contacts and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access contacts and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access contacts and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access contacts and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access contacts by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access contacts by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -1943,7 +1947,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -1973,7 +1977,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1990,11 +1994,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access email by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access email and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access email and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access email and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access email and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access email by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access email by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -2010,7 +2014,7 @@ The most restrictive value is `2` to deny apps access to email. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2051,7 +2055,7 @@ The most restrictive value is `2` to deny apps access to email. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -2068,11 +2072,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access email by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access email and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access email and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access email and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access email and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access email by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access email by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -2086,7 +2090,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -2116,7 +2120,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -2133,11 +2137,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access email by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access email and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access email and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access email and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access email and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access email by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access email by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -2151,7 +2155,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -2181,7 +2185,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -2198,11 +2202,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access email by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access email and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access email and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access email and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access email and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access email by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access email by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -2216,7 +2220,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -2246,7 +2250,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -2269,7 +2273,7 @@ This policy setting specifies whether Windows apps can access the eye tracker. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-2]` | | Default Value | 0 | @@ -2287,7 +2291,7 @@ This policy setting specifies whether Windows apps can access the eye tracker. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -2310,7 +2314,7 @@ List of semi-colon delimited Package Family Names of Windows Store Apps. Listed | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -2327,7 +2331,7 @@ List of semi-colon delimited Package Family Names of Windows Store Apps. Listed | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -2350,7 +2354,7 @@ List of semi-colon delimited Package Family Names of Windows Store Apps. Listed | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -2367,7 +2371,7 @@ List of semi-colon delimited Package Family Names of Windows Store Apps. Listed | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -2390,7 +2394,7 @@ List of semi-colon delimited Package Family Names of Windows Store Apps. The use | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -2407,7 +2411,7 @@ List of semi-colon delimited Package Family Names of Windows Store Apps. The use | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2424,11 +2428,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can take screenshots of various windows or displays by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to take screenshots of various windows or displays and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to take screenshots of various windows or displays and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to take screenshots of various windows or displays and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to take screenshots of various windows or displays and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can take screenshots of various windows or displays by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can take screenshots of various windows or displays by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -2442,7 +2446,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-2]` | | Default Value | 0 | @@ -2473,7 +2477,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2490,11 +2494,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can take screenshots of various windows or displays by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to take screenshots of various windows or displays and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to take screenshots of various windows or displays and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to take screenshots of various windows or displays and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to take screenshots of various windows or displays and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can take screenshots of various windows or displays by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can take screenshots of various windows or displays by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -2508,7 +2512,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -2538,7 +2542,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2555,11 +2559,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can take screenshots of various windows or displays by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to take screenshots of various windows or displays and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to take screenshots of various windows or displays and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to take screenshots of various windows or displays and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to take screenshots of various windows or displays and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can take screenshots of various windows or displays by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can take screenshots of various windows or displays by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -2573,7 +2577,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -2603,7 +2607,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2620,11 +2624,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can take screenshots of various windows or displays by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to take screenshots of various windows or displays and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to take screenshots of various windows or displays and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to take screenshots of various windows or displays and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to take screenshots of various windows or displays and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can take screenshots of various windows or displays by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can take screenshots of various windows or displays by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -2638,7 +2642,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -2668,7 +2672,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2685,11 +2689,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can turn off the screenshot border by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to turn off the screenshot border and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to turn off the screenshot border and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to turn off the screenshot border and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to turn off the screenshot border and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can turn off the screenshot border by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can turn off the screenshot border by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -2703,7 +2707,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-2]` | | Default Value | 0 | @@ -2735,7 +2739,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2752,11 +2756,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can turn off the screenshot border by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to turn off the screenshot border and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to turn off the screenshot border and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to turn off the screenshot border and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to turn off the screenshot border and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can turn off the screenshot border by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can turn off the screenshot border by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -2770,7 +2774,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -2800,7 +2804,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2817,11 +2821,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can turn off the screenshot border by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to turn off the screenshot border and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to turn off the screenshot border and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to turn off the screenshot border and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to turn off the screenshot border and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can turn off the screenshot border by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can turn off the screenshot border by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -2835,7 +2839,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -2865,7 +2869,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2882,11 +2886,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can turn off the screenshot border by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to turn off the screenshot border and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to turn off the screenshot border and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to turn off the screenshot border and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to turn off the screenshot border and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can turn off the screenshot border by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can turn off the screenshot border by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -2900,7 +2904,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -2930,7 +2934,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.25000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.25000] and later | @@ -2953,7 +2957,7 @@ This policy setting specifies whether Windows apps can access the human presence | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2990,7 +2994,7 @@ This policy setting specifies whether Windows apps can access the human presence | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.25000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.25000] and later | @@ -3013,7 +3017,7 @@ List of semi-colon delimited Package Family Names of Microsoft Store Apps. Liste | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -3040,7 +3044,7 @@ List of semi-colon delimited Package Family Names of Microsoft Store Apps. Liste | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.25000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.25000] and later | @@ -3063,7 +3067,7 @@ List of semi-colon delimited Package Family Names of Microsoft Store Apps. Liste | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -3090,7 +3094,7 @@ List of semi-colon delimited Package Family Names of Microsoft Store Apps. Liste | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.25000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.25000] and later | @@ -3113,7 +3117,7 @@ List of semi-colon delimited Package Family Names of Microsoft Store Apps. The u | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -3140,7 +3144,7 @@ List of semi-colon delimited Package Family Names of Microsoft Store Apps. The u | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -3157,11 +3161,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access location by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access location and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access location and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access location and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access location and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access location by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access location by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -3177,7 +3181,7 @@ The most restrictive value is `2` to deny apps access to the device's location. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -3218,7 +3222,7 @@ The most restrictive value is `2` to deny apps access to the device's location. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -3235,11 +3239,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access location by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access location and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access location and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access location and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access location and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access location by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access location by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -3253,7 +3257,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -3283,7 +3287,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -3300,11 +3304,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access location by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access location and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access location and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access location and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access location and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access location by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access location by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -3318,7 +3322,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -3348,7 +3352,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -3365,11 +3369,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access location by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access location and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access location and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access location and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access location and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access location by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access location by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -3383,7 +3387,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -3413,7 +3417,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -3430,11 +3434,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can read or send messages by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps can read or send messages and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps can read or send messages and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps cannot read or send messages and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps can't read or send messages and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can read or send messages by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can read or send messages by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -3450,7 +3454,7 @@ The most restrictive value is `2` to deny apps access to messaging. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -3491,7 +3495,7 @@ The most restrictive value is `2` to deny apps access to messaging. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -3508,11 +3512,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can read or send messages by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps can read or send messages and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps can read or send messages and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps cannot read or send messages and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps can't read or send messages and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can read or send messages by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can read or send messages by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -3526,7 +3530,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -3556,7 +3560,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -3573,11 +3577,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can read or send messages by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps can read or send messages and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps can read or send messages and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps cannot read or send messages and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps can't read or send messages and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can read or send messages by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can read or send messages by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -3591,7 +3595,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -3621,7 +3625,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -3638,11 +3642,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can read or send messages by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps can read or send messages and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps can read or send messages and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps cannot read or send messages and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps can't read or send messages and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can read or send messages by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can read or send messages by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -3656,7 +3660,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -3686,7 +3690,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -3703,11 +3707,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access the microphone by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access the microphone and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access the microphone and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access the microphone and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access the microphone and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access the microphone by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access the microphone by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -3723,7 +3727,7 @@ The most restrictive value is `2` to deny apps access to the microphone. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -3764,7 +3768,7 @@ The most restrictive value is `2` to deny apps access to the microphone. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -3781,11 +3785,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access the microphone by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access the microphone and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access the microphone and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access the microphone and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access the microphone and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access the microphone by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access the microphone by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -3799,7 +3803,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -3829,7 +3833,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -3846,11 +3850,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access the microphone by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access the microphone and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access the microphone and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access the microphone and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access the microphone and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access the microphone by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access the microphone by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -3864,7 +3868,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -3894,7 +3898,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -3911,11 +3915,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access the microphone by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access the microphone and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access the microphone and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access the microphone and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access the microphone and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access the microphone by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access the microphone by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -3929,7 +3933,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -3959,7 +3963,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -3976,11 +3980,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access motion data by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access motion data and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access motion data and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access motion data and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access motion data and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access motion data by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access motion data by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -3996,7 +4000,7 @@ The most restrictive value is `2` to deny apps access to motion data. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -4037,7 +4041,7 @@ The most restrictive value is `2` to deny apps access to motion data. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -4054,11 +4058,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access motion data by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access motion data and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access motion data and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access motion data and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access motion data and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access motion data by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access motion data by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -4072,7 +4076,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -4102,7 +4106,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -4119,11 +4123,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access motion data by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access motion data and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access motion data and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access motion data and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access motion data and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access motion data by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access motion data by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -4137,7 +4141,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -4167,7 +4171,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -4184,11 +4188,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access motion data by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access motion data and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access motion data and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access motion data and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access motion data and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access motion data by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access motion data by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -4202,7 +4206,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -4232,7 +4236,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -4249,11 +4253,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access notifications by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access notifications and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access notifications and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access notifications and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access notifications and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access notifications by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access notifications by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -4269,7 +4273,7 @@ The most restrictive value is `2` to deny apps access to notifications. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -4310,7 +4314,7 @@ The most restrictive value is `2` to deny apps access to notifications. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -4327,11 +4331,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access notifications by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access notifications and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access notifications and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access notifications and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access notifications and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access notifications by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access notifications by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -4345,7 +4349,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -4375,7 +4379,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -4392,11 +4396,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access notifications by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access notifications and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access notifications and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access notifications and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access notifications and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access notifications by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access notifications by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -4410,7 +4414,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -4440,7 +4444,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -4457,11 +4461,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access notifications by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access notifications and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access notifications and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access notifications and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access notifications and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access notifications by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access notifications by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -4475,7 +4479,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -4505,7 +4509,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -4522,11 +4526,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can make phone calls by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to make phone calls and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to make phone calls and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to make phone calls and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to make phone calls and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can make phone calls by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can make phone calls by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -4542,7 +4546,7 @@ The most restrictive value is `2` to deny apps access to make phone calls. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -4583,7 +4587,7 @@ The most restrictive value is `2` to deny apps access to make phone calls. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -4600,11 +4604,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can make phone calls by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to make phone calls and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to make phone calls and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to make phone calls and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to make phone calls and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can make phone calls by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can make phone calls by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -4618,7 +4622,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -4648,7 +4652,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -4665,11 +4669,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can make phone calls by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to make phone calls and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to make phone calls and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to make phone calls and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to make phone calls and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can make phone calls by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can make phone calls by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -4683,7 +4687,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -4713,7 +4717,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -4730,11 +4734,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can make phone calls by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to make phone calls and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to make phone calls and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to make phone calls and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to make phone calls and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can make phone calls by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can make phone calls by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -4748,7 +4752,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -4778,7 +4782,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -4795,11 +4799,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps have access to control radios by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps will have access to control radios and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps will have access to control radios and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps will not have access to control radios and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps won't have access to control radios and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps have access to control radios by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps have access to control radios by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -4815,7 +4819,7 @@ The most restrictive value is `2` to deny apps access to control radios. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -4856,7 +4860,7 @@ The most restrictive value is `2` to deny apps access to control radios. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -4873,11 +4877,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps have access to control radios by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps will have access to control radios and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps will have access to control radios and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps will not have access to control radios and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps won't have access to control radios and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps have access to control radios by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps have access to control radios by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -4891,7 +4895,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -4921,7 +4925,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -4938,11 +4942,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps have access to control radios by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps will have access to control radios and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps will have access to control radios and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps will not have access to control radios and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps won't have access to control radios and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps have access to control radios by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps have access to control radios by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -4956,7 +4960,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -4986,7 +4990,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -5003,11 +5007,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps have access to control radios by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps will have access to control radios and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps will have access to control radios and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps will not have access to control radios and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps won't have access to control radios and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps have access to control radios by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps have access to control radios by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -5021,7 +5025,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -5051,7 +5055,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -5068,11 +5072,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access tasks by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access tasks and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access tasks and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access tasks and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access tasks and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access tasks by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access tasks by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -5086,7 +5090,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-2]` | | Default Value | 0 | @@ -5118,7 +5122,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -5135,11 +5139,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access tasks by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access tasks and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access tasks and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access tasks and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access tasks and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access tasks by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access tasks by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -5153,7 +5157,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -5183,7 +5187,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -5200,11 +5204,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access tasks by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access tasks and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access tasks and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access tasks and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access tasks and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access tasks by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access tasks by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -5218,7 +5222,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -5248,7 +5252,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -5265,11 +5269,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access tasks by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access tasks and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access tasks and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access tasks and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access tasks and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access tasks by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access tasks by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -5283,7 +5287,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -5313,7 +5317,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -5330,11 +5334,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access trusted devices by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access trusted devices and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access trusted devices and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access trusted devices and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access trusted devices and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access trusted devices by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access trusted devices by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -5350,7 +5354,7 @@ The most restrictive value is `2` to deny apps access trusted devices. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -5391,7 +5395,7 @@ The most restrictive value is `2` to deny apps access trusted devices. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -5408,11 +5412,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access trusted devices by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access trusted devices and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access trusted devices and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access trusted devices and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access trusted devices and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access trusted devices by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access trusted devices by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -5426,7 +5430,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -5456,7 +5460,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -5473,11 +5477,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access trusted devices by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access trusted devices and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access trusted devices and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access trusted devices and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access trusted devices and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access trusted devices by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access trusted devices by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -5491,7 +5495,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -5521,7 +5525,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -5538,11 +5542,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can access trusted devices by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to access trusted devices and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to access trusted devices and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to access trusted devices and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to access trusted devices and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can access trusted devices by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can access trusted devices by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -5556,7 +5560,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -5586,7 +5590,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -5601,11 +5605,11 @@ This policy setting specifies whether Windows apps can be activated by voice. If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can be activated with a voice keyword by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to be activated with a voice keyword and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to be activated with a voice keyword and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to be activated with a voice keyword and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to be activated with a voice keyword and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can be activated with a voice keyword by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can be activated with a voice keyword by using Settings > Privacy on the device. This policy is applied to Windows apps and Cortana. @@ -5619,7 +5623,7 @@ This policy is applied to Windows apps and Cortana. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -5630,8 +5634,8 @@ This policy is applied to Windows apps and Cortana. | Value | Description | |:--|:--| | 0 (Default) | User in control. Users can decide if Windows apps can be activated by voice using Settings > Privacy options on the device. | -| 1 | Force allow. Windows apps can be activated by voice and users cannot change it. | -| 2 | Force deny. Windows apps cannot be activated by voice and users cannot change it. | +| 1 | Force allow. Windows apps can be activated by voice and users can't change it. | +| 2 | Force deny. Windows apps can't be activated by voice and users can't change it. | @@ -5660,7 +5664,7 @@ This policy is applied to Windows apps and Cortana. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -5675,11 +5679,11 @@ This policy setting specifies whether Windows apps can be activated by voice whi If you choose the "User is in control" option, employees in your organization can decide whether users can interact with applications using speech while the system is locked by using Settings > Privacy on the device. -If you choose the "Force Allow" option, users can interact with applications using speech while the system is locked and employees in your organization cannot change it. +If you choose the "Force Allow" option, users can interact with applications using speech while the system is locked and employees in your organization can't change it. -If you choose the "Force Deny" option, users cannot interact with applications using speech while the system is locked and employees in your organization cannot change it. +If you choose the "Force Deny" option, users can't interact with applications using speech while the system is locked and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether users can interact with applications using speech while the system is locked by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether users can interact with applications using speech while the system is locked by using Settings > Privacy on the device. This policy is applied to Windows apps and Cortana. It takes precedence of the "Allow Cortana above lock" policy. This policy is applicable only when "Allow voice activation" policy is configured to allow applications to be activated with voice. @@ -5693,7 +5697,7 @@ This policy is applied to Windows apps and Cortana. It takes precedence of the " | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -5704,8 +5708,8 @@ This policy is applied to Windows apps and Cortana. It takes precedence of the " | Value | Description | |:--|:--| | 0 (Default) | User in control. Users can decide if Windows apps can be activated by voice while the screen is locked using Settings > Privacy options on the device. | -| 1 | Force allow. Windows apps can be activated by voice while the screen is locked, and users cannot change it. | -| 2 | Force deny. Windows apps cannot be activated by voice while the screen is locked, and users cannot change it. | +| 1 | Force allow. Windows apps can be activated by voice while the screen is locked, and users can't change it. | +| 2 | Force deny. Windows apps can't be activated by voice while the screen is locked, and users can't change it. | @@ -5734,7 +5738,7 @@ This policy is applied to Windows apps and Cortana. It takes precedence of the " | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -5751,11 +5755,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can get diagnostic information about other apps using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to get diagnostic information about other apps and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to get diagnostic information about other apps and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to get diagnostic information about other apps and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to get diagnostic information about other apps and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can get diagnostic information about other apps by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can get diagnostic information about other apps by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -5771,7 +5775,7 @@ The most restrictive value is `2` to deny apps access to diagnostic data. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -5812,7 +5816,7 @@ The most restrictive value is `2` to deny apps access to diagnostic data. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -5829,11 +5833,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can get diagnostic information about other apps using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to get diagnostic information about other apps and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to get diagnostic information about other apps and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to get diagnostic information about other apps and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to get diagnostic information about other apps and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can get diagnostic information about other apps by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can get diagnostic information about other apps by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -5847,7 +5851,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -5877,7 +5881,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -5894,11 +5898,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can get diagnostic information about other apps using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to get diagnostic information about other apps and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to get diagnostic information about other apps and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to get diagnostic information about other apps and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to get diagnostic information about other apps and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can get diagnostic information about other apps by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can get diagnostic information about other apps by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -5912,7 +5916,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -5942,7 +5946,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -5959,11 +5963,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can get diagnostic information about other apps using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to get diagnostic information about other apps and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to get diagnostic information about other apps and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to get diagnostic information about other apps and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to get diagnostic information about other apps and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can get diagnostic information about other apps by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can get diagnostic information about other apps by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -5977,7 +5981,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -6007,7 +6011,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -6024,11 +6028,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can run in the background by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to run in the background and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to run in the background and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to run in the background and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to run in the background and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can run in the background by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can run in the background by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -6046,7 +6050,7 @@ The most restrictive value is `2` to deny apps from running in the background. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -6087,7 +6091,7 @@ The most restrictive value is `2` to deny apps from running in the background. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -6104,11 +6108,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can run in the background by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to run in the background and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to run in the background and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to run in the background and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to run in the background and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can run in the background by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can run in the background by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -6122,7 +6126,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -6152,7 +6156,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -6169,11 +6173,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can run in the background by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to run in the background and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to run in the background and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to run in the background and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to run in the background and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can run in the background by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can run in the background by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -6187,7 +6191,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -6217,7 +6221,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -6234,11 +6238,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can run in the background by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to run in the background and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to run in the background and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to run in the background and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to run in the background and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can run in the background by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can run in the background by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -6252,7 +6256,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -6282,7 +6286,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -6299,11 +6303,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can communicate with unpaired wireless devices by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to communicate with unpaired wireless devices and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to communicate with unpaired wireless devices and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to communicate with unpaired wireless devices and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to communicate with unpaired wireless devices and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can communicate with unpaired wireless devices by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can communicate with unpaired wireless devices by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -6319,7 +6323,7 @@ The most restrictive value is `2` to deny apps syncing with devices. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -6360,7 +6364,7 @@ The most restrictive value is `2` to deny apps syncing with devices. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -6377,11 +6381,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can communicate with unpaired wireless devices by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to communicate with unpaired wireless devices and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to communicate with unpaired wireless devices and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to communicate with unpaired wireless devices and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to communicate with unpaired wireless devices and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can communicate with unpaired wireless devices by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can communicate with unpaired wireless devices by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -6395,7 +6399,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -6425,7 +6429,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -6442,11 +6446,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can communicate with unpaired wireless devices by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to communicate with unpaired wireless devices and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to communicate with unpaired wireless devices and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to communicate with unpaired wireless devices and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to communicate with unpaired wireless devices and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can communicate with unpaired wireless devices by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can communicate with unpaired wireless devices by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -6460,7 +6464,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -6490,7 +6494,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -6507,11 +6511,11 @@ You can specify either a default setting for all apps or a per-app setting by sp If you choose the "User is in control" option, employees in your organization can decide whether Windows apps can communicate with unpaired wireless devices by using Settings > Privacy on the device. -If you choose the "Force Allow" option, Windows apps are allowed to communicate with unpaired wireless devices and employees in your organization cannot change it. +If you choose the "Force Allow" option, Windows apps are allowed to communicate with unpaired wireless devices and employees in your organization can't change it. -If you choose the "Force Deny" option, Windows apps are not allowed to communicate with unpaired wireless devices and employees in your organization cannot change it. +If you choose the "Force Deny" option, Windows apps aren't allowed to communicate with unpaired wireless devices and employees in your organization can't change it. -If you disable or do not configure this policy setting, employees in your organization can decide whether Windows apps can communicate with unpaired wireless devices by using Settings > Privacy on the device. +If you disable or don't configure this policy setting, employees in your organization can decide whether Windows apps can communicate with unpaired wireless devices by using Settings > Privacy on the device. If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app. @@ -6525,7 +6529,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `;`) | @@ -6555,7 +6559,7 @@ If an app is open when this Group Policy object is applied on a device, employee | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -6569,7 +6573,9 @@ If an app is open when this Group Policy object is applied on a device, employee This policy setting determines whether User Activities can be published. - If you enable this policy setting, activities of type User Activity are allowed to be published. -- If you disable this policy setting, activities of type User Activity are not allowed to be published. + +- If you disable this policy setting, activities of type User Activity aren't allowed to be published. + Policy change takes effect immediately. @@ -6584,7 +6590,7 @@ For more information, see [Windows activity history and your privacy](https://su | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -6624,7 +6630,7 @@ For more information, see [Windows activity history and your privacy](https://su | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -6638,8 +6644,11 @@ For more information, see [Windows activity history and your privacy](https://su This policy setting determines whether published User Activities can be uploaded. - If you enable this policy setting, activities of type User Activity are allowed to be uploaded. -- If you disable this policy setting, activities of type User Activity are not allowed to be uploaded. + +- If you disable this policy setting, activities of type User Activity aren't allowed to be uploaded. + Deletion of activities of type User Activity are independent of this setting. + Policy change takes effect immediately. @@ -6654,7 +6663,7 @@ For more information, see [Windows activity history and your privacy](https://su | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | diff --git a/windows/client-management/mdm/policy-csp-remoteassistance.md b/windows/client-management/mdm/policy-csp-remoteassistance.md index 247dadacdb..e241740d64 100644 --- a/windows/client-management/mdm/policy-csp-remoteassistance.md +++ b/windows/client-management/mdm/policy-csp-remoteassistance.md @@ -4,7 +4,7 @@ description: Learn more about the RemoteAssistance Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - RemoteAssistance -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -48,11 +45,11 @@ The "Display warning message before sharing control" policy setting allows you t The "Display warning message before connecting" policy setting allows you to specify a custom message to display before a user allows a connection to his or her computer. -- If you enable this policy setting, the warning message you specify overrides the default message that is seen by the novice. +- If you enable this policy setting, the warning message you specify overrides the default message that's seen by the novice. - If you disable this policy setting, the user sees the default warning message. -- If you do not configure this policy setting, the user sees the default warning message. +- If you don't configure this policy setting, the user sees the default warning message. @@ -64,13 +61,12 @@ The "Display warning message before connecting" policy setting allows you to spe | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -97,7 +93,7 @@ The "Display warning message before connecting" policy setting allows you to spe | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -112,9 +108,9 @@ This policy setting allows you to turn logging on or off. Log files are located - If you enable this policy setting, log files are generated. -- If you disable this policy setting, log files are not generated. +- If you disable this policy setting, log files aren't generated. -- If you do not configure this setting, application-based settings are used. +- If you don't configure this setting, application-based settings are used. @@ -126,13 +122,12 @@ This policy setting allows you to turn logging on or off. Log files are located | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -159,7 +154,7 @@ This policy setting allows you to turn logging on or off. Log files are located | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -174,15 +169,15 @@ This policy setting allows you to turn on or turn off Solicited (Ask for) Remote - If you enable this policy setting, users on this computer can use email or file transfer to ask someone for help. Also, users can use instant messaging programs to allow connections to this computer, and you can configure additional Remote Assistance settings. -- If you disable this policy setting, users on this computer cannot use email or file transfer to ask someone for help. Also, users cannot use instant messaging programs to allow connections to this computer. +- If you disable this policy setting, users on this computer can't use email or file transfer to ask someone for help. Also, users can't use instant messaging programs to allow connections to this computer. -- If you do not configure this policy setting, users can turn on or turn off Solicited (Ask for) Remote Assistance themselves in System Properties in Control Panel. Users can also configure Remote Assistance settings. +- If you don't configure this policy setting, users can turn on or turn off Solicited (Ask for) Remote Assistance themselves in System Properties in Control Panel. Users can also configure Remote Assistance settings. -- If you enable this policy setting, you have two ways to allow helpers to provide Remote Assistance: "Allow helpers to only view the computer" or "Allow helpers to remotely control the computer." +- If you enable this policy setting, you have two ways to allow helpers to provide Remote Assistance: "Allow helpers to only view the computer" or "Allow helpers to remotely control the computer". The "Maximum ticket time" policy setting sets a limit on the amount of time that a Remote Assistance invitation created by using email or file transfer can remain open. -The "Select the method for sending email invitations" setting specifies which email standard to use to send Remote Assistance invitations. Depending on your email program, you can use either the Mailto standard (the invitation recipient connects through an Internet link) or the SMAPI (Simple MAPI) standard (the invitation is attached to your email message). This policy setting is not available in Windows Vista since SMAPI is the only method supported. +The "Select the method for sending email invitations" setting specifies which email standard to use to send Remote Assistance invitations. Depending on your email program, you can use either the Mailto standard (the invitation recipient connects through an Internet link) or the SMAPI (Simple MAPI) standard (the invitation is attached to your email message). This policy setting isn't available in Windows Vista since SMAPI is the only method supported. - If you enable this policy setting you should also enable appropriate firewall exceptions to allow Remote Assistance communications. @@ -196,13 +191,12 @@ The "Select the method for sending email invitations" setting specifies which em | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -229,7 +223,7 @@ The "Select the method for sending email invitations" setting specifies which em | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -244,39 +238,41 @@ This policy setting allows you to turn on or turn off Offer (Unsolicited) Remote - If you enable this policy setting, users on this computer can get help from their corporate technical support staff using Offer (Unsolicited) Remote Assistance. -- If you disable this policy setting, users on this computer cannot get help from their corporate technical support staff using Offer (Unsolicited) Remote Assistance. +- If you disable this policy setting, users on this computer can't get help from their corporate technical support staff using Offer (Unsolicited) Remote Assistance. -- If you do not configure this policy setting, users on this computer cannot get help from their corporate technical support staff using Offer (Unsolicited) Remote Assistance. +- If you don't configure this policy setting, users on this computer can't get help from their corporate technical support staff using Offer (Unsolicited) Remote Assistance. -- If you enable this policy setting, you have two ways to allow helpers to provide Remote Assistance: "Allow helpers to only view the computer" or "Allow helpers to remotely control the computer." When you configure this policy setting, you also specify the list of users or user groups that are allowed to offer remote assistance. +- If you enable this policy setting, you have two ways to allow helpers to provide Remote Assistance: "Allow helpers to only view the computer" or "Allow helpers to remotely control the computer". When you configure this policy setting, you also specify the list of users or user groups that are allowed to offer remote assistance. -To configure the list of helpers, click "Show." In the window that opens, you can enter the names of the helpers. Add each user or group one by one. When you enter the name of the helper user or user groups, use the following format: +To configure the list of helpers, click "Show". In the window that opens, you can enter the names of the helpers. Add each user or group one by one. When you enter the name of the helper user or user groups, use the following format: -``\\`` or +``\\`` or. ``\\`` - If you enable this policy setting, you should also enable firewall exceptions to allow Remote Assistance communications. The firewall exceptions required for Offer (Unsolicited) Remote Assistance depend on the version of Windows you are running. -Windows Vista and later +Windows Vista and later. Enable the Remote Assistance exception for the domain profile. The exception must contain: + Port 135:TCP %WINDIR%\System32\msra.exe -%WINDIR%\System32\raserver.exe +%WINDIR%\System32\raserver.exe. Windows XP with Service Pack 2 (SP2) and Windows XP Professional x64 Edition with Service Pack 1 (SP1) Port 135:TCP %WINDIR%\PCHealth\HelpCtr\Binaries\Helpsvc.exe %WINDIR%\PCHealth\HelpCtr\Binaries\Helpctr.exe -%WINDIR%\System32\Sessmgr.exe +%WINDIR%\System32\Sessmgr.exe. For computers running Windows Server 2003 with Service Pack 1 (SP1) Port 135:TCP %WINDIR%\PCHealth\HelpCtr\Binaries\Helpsvc.exe -%WINDIR%\PCHealth\HelpCtr\Binaries\Helpctr.exe +%WINDIR%\PCHealth\HelpCtr\Binaries\Helpctr.exe. + Allow Remote Desktop Exception. @@ -289,13 +285,12 @@ Allow Remote Desktop Exception. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-remotedesktop.md b/windows/client-management/mdm/policy-csp-remotedesktop.md index 6144dbef4f..de30e58549 100644 --- a/windows/client-management/mdm/policy-csp-remotedesktop.md +++ b/windows/client-management/mdm/policy-csp-remotedesktop.md @@ -4,7 +4,7 @@ description: Learn more about the RemoteDesktop Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1370] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1370] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1370] and later
    :heavy_check_mark: Windows 10, version 21H2 [10.0.19044.1370] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1370] and later
    ✅ Windows 10, version 2009 [10.0.19042.1370] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1370] and later
    ✅ Windows 10, version 21H2 [10.0.19044.1370] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -53,7 +53,7 @@ To automatically subscribe to [Azure Virtual Desktop](/azure/virtual-desktop/ove | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `|`) | @@ -84,7 +84,7 @@ To automatically subscribe to [Azure Virtual Desktop](/azure/virtual-desktop/ove | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -109,7 +109,7 @@ This policy allows the user to load the data protection API (DPAPI) cred key fro | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | diff --git a/windows/client-management/mdm/policy-csp-remotedesktopservices.md b/windows/client-management/mdm/policy-csp-remotedesktopservices.md index 2a7bf33c7f..44e7a1f931 100644 --- a/windows/client-management/mdm/policy-csp-remotedesktopservices.md +++ b/windows/client-management/mdm/policy-csp-remotedesktopservices.md @@ -4,7 +4,7 @@ description: Learn more about the RemoteDesktopServices Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - RemoteDesktopServices -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -46,9 +43,9 @@ This policy setting allows you to configure remote access to computers by using - If you enable this policy setting, users who are members of the Remote Desktop Users group on the target computer can connect remotely to the target computer by using Remote Desktop Services. -- If you disable this policy setting, users cannot connect remotely to the target computer by using Remote Desktop Services. The target computer will maintain any current connections, but will not accept any new incoming connections. +- If you disable this policy setting, users can't connect remotely to the target computer by using Remote Desktop Services. The target computer will maintain any current connections, but won't accept any new incoming connections. -- If you do not configure this policy setting, Remote Desktop Services uses the Remote Desktop setting on the target computer to determine whether the remote connection is allowed. This setting is found on the Remote tab in the System properties sheet. By default, remote connections are not allowed. +- If you don't configure this policy setting, Remote Desktop Services uses the Remote Desktop setting on the target computer to determine whether the remote connection is allowed. This setting is found on the Remote tab in the System properties sheet. By default, remote connections aren't allowed. > [!NOTE] > You can limit which clients are able to connect remotely by using Remote Desktop Services by configuring the policy setting at Computer Configuration\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Security\Require user authentication for remote connections by using Network Level Authentication. @@ -65,13 +62,12 @@ You can limit the number of users who can connect simultaneously by configuring | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -97,7 +93,7 @@ You can limit the number of users who can connect simultaneously by configuring | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -108,21 +104,21 @@ You can limit the number of users who can connect simultaneously by configuring -Specifies whether to require the use of a specific encryption level to secure communications between client computers and RD Session Host servers during Remote Desktop Protocol (RDP) connections. This policy only applies when you are using native RDP encryption. However, native RDP encryption (as opposed to SSL encryption) is not recommended. This policy does not apply to SSL encryption. +Specifies whether to require the use of a specific encryption level to secure communications between client computers and RD Session Host servers during Remote Desktop Protocol (RDP) connections. This policy only applies when you are using native RDP encryption. However, native RDP encryption (as opposed to SSL encryption) isn't recommended. This policy doesn't apply to SSL encryption. - If you enable this policy setting, all communications between clients and RD Session Host servers during remote connections must use the encryption method specified in this setting. By default, the encryption level is set to High. The following encryption methods are available: -* High: The High setting encrypts data sent from the client to the server and from the server to the client by using strong 128-bit encryption. Use this encryption level in environments that contain only 128-bit clients (for example, clients that run Remote Desktop Connection). Clients that do not support this encryption level cannot connect to RD Session Host servers. +* High: The High setting encrypts data sent from the client to the server and from the server to the client by using strong 128-bit encryption. Use this encryption level in environments that contain only 128-bit clients (for example, clients that run Remote Desktop Connection). Clients that don't support this encryption level can't connect to RD Session Host servers. -* Client Compatible: The Client Compatible setting encrypts data sent between the client and the server at the maximum key strength supported by the client. Use this encryption level in environments that include clients that do not support 128-bit encryption. +* Client Compatible: The Client Compatible setting encrypts data sent between the client and the server at the maximum key strength supported by the client. Use this encryption level in environments that include clients that don't support 128-bit encryption. * Low: The Low setting encrypts only data sent from the client to the server by using 56-bit encryption. -- If you disable or do not configure this setting, the encryption level to be used for remote connections to RD Session Host servers is not enforced through Group Policy. +- If you disable or don't configure this setting, the encryption level to be used for remote connections to RD Session Host servers isn't enforced through Group Policy. -**Important** +Important. -FIPS compliance can be configured through the System cryptography. Use FIPS compliant algorithms for encryption, hashing, and signing settings in Group Policy (under Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options.) The FIPS compliant setting encrypts and decrypts data sent from the client to the server and from the server to the client, with the Federal Information Processing Standard (FIPS) 140 encryption algorithms, by using Microsoft cryptographic modules. Use this encryption level when communications between clients and RD Session Host servers requires the highest level of encryption. +FIPS compliance can be configured through the System cryptography. Use FIPS compliant algorithms for encryption, hashing, and signing settings in Group Policy (under Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options). The FIPS compliant setting encrypts and decrypts data sent from the client to the server and from the server to the client, with the Federal Information Processing Standard (FIPS) 140 encryption algorithms, by using Microsoft cryptographic modules. Use this encryption level when communications between clients and RD Session Host servers requires the highest level of encryption. @@ -134,13 +130,12 @@ FIPS compliance can be configured through the System cryptography. Use FIPS comp | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -166,7 +161,7 @@ FIPS compliance can be configured through the System cryptography. Use FIPS comp | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -181,11 +176,11 @@ This policy setting specifies whether to prevent the mapping of client drives in By default, an RD Session Host server maps client drives automatically upon connection. Mapped drives appear in the session folder tree in File Explorer or Computer in the format `` on ``. You can use this policy setting to override this behavior. -- If you enable this policy setting, client drive redirection is not allowed in Remote Desktop Services sessions, and Clipboard file copy redirection is not allowed on computers running Windows XP, Windows Server 2003, Windows Server 2012 (and later) or Windows 8 (and later). +- If you enable this policy setting, client drive redirection isn't allowed in Remote Desktop Services sessions, and Clipboard file copy redirection isn't allowed on computers running Windows XP, Windows Server 2003, Windows Server 2012 (and later) or Windows 8 (and later). - If you disable this policy setting, client drive redirection is always allowed. In addition, Clipboard file copy redirection is always allowed if Clipboard redirection is allowed. -- If you do not configure this policy setting, client drive redirection and Clipboard file copy redirection are not specified at the Group Policy level. +- If you don't configure this policy setting, client drive redirection and Clipboard file copy redirection aren't specified at the Group Policy level. @@ -197,13 +192,12 @@ By default, an RD Session Host server maps client drives automatically upon conn | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -230,7 +224,7 @@ By default, an RD Session Host server maps client drives automatically upon conn | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -257,13 +251,12 @@ Controls whether passwords can be saved on this computer from Remote Desktop Con | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -290,7 +283,7 @@ Controls whether passwords can be saved on this computer from Remote Desktop Con | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -307,7 +300,7 @@ By default, Remote Desktop allows redirection of WebAuthn requests. - If you enable this policy setting, users can't use their local authenticator inside the Remote Desktop session. -- If you disable or do not configure this policy setting, users can use local authenticators inside the Remote Desktop session. +- If you disable or don't configure this policy setting, users can use local authenticators inside the Remote Desktop session. @@ -319,13 +312,12 @@ By default, Remote Desktop allows redirection of WebAuthn requests. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -352,7 +344,7 @@ By default, Remote Desktop allows redirection of WebAuthn requests. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -369,11 +361,11 @@ You can use this setting to enforce a password prompt for users logging on to Re By default, Remote Desktop Services allows users to automatically log on by entering a password in the Remote Desktop Connection client. -- If you enable this policy setting, users cannot automatically log on to Remote Desktop Services by supplying their passwords in the Remote Desktop Connection client. They are prompted for a password to log on. +- If you enable this policy setting, users can't automatically log on to Remote Desktop Services by supplying their passwords in the Remote Desktop Connection client. They are prompted for a password to log on. - If you disable this policy setting, users can always log on to Remote Desktop Services automatically by supplying their passwords in the Remote Desktop Connection client. -- If you do not configure this policy setting, automatic logon is not specified at the Group Policy level. +- If you don't configure this policy setting, automatic logon isn't specified at the Group Policy level. @@ -385,13 +377,12 @@ By default, Remote Desktop Services allows users to automatically log on by ente | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -418,7 +409,7 @@ By default, Remote Desktop Services allows users to automatically log on by ente | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -433,9 +424,9 @@ Specifies whether a Remote Desktop Session Host server requires secure RPC commu You can use this setting to strengthen the security of RPC communication with clients by allowing only authenticated and encrypted requests. -If the status is set to Enabled, Remote Desktop Services accepts requests from RPC clients that support secure requests, and does not allow unsecured communication with untrusted clients. +If the status is set to Enabled, Remote Desktop Services accepts requests from RPC clients that support secure requests, and doesn't allow unsecured communication with untrusted clients. -If the status is set to Disabled, Remote Desktop Services always requests security for all RPC traffic. However, unsecured communication is allowed for RPC clients that do not respond to the request. +If the status is set to Disabled, Remote Desktop Services always requests security for all RPC traffic. However, unsecured communication is allowed for RPC clients that don't respond to the request. If the status is set to Not Configured, unsecured communication is allowed. @@ -452,13 +443,12 @@ If the status is set to Not Configured, unsecured communication is allowed. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-remotemanagement.md b/windows/client-management/mdm/policy-csp-remotemanagement.md index 1025e2c4b0..f4e0321dcb 100644 --- a/windows/client-management/mdm/policy-csp-remotemanagement.md +++ b/windows/client-management/mdm/policy-csp-remotemanagement.md @@ -4,7 +4,7 @@ description: Learn more about the RemoteManagement Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - RemoteManagement -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -46,7 +43,7 @@ This policy setting allows you to manage whether the Windows Remote Management ( - If you enable this policy setting, the WinRM client uses Basic authentication. If WinRM is configured to use HTTP transport, the user name and password are sent over the network as clear text. -- If you disable or do not configure this policy setting, the WinRM client does not use Basic authentication. +- If you disable or don't configure this policy setting, the WinRM client doesn't use Basic authentication. @@ -58,13 +55,12 @@ This policy setting allows you to manage whether the Windows Remote Management ( | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -91,7 +87,7 @@ This policy setting allows you to manage whether the Windows Remote Management ( | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -106,7 +102,7 @@ This policy setting allows you to manage whether the Windows Remote Management ( - If you enable this policy setting, the WinRM service accepts Basic authentication from a remote client. -- If you disable or do not configure this policy setting, the WinRM service does not accept Basic authentication from a remote client. +- If you disable or don't configure this policy setting, the WinRM service doesn't accept Basic authentication from a remote client. @@ -118,13 +114,12 @@ This policy setting allows you to manage whether the Windows Remote Management ( | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -151,7 +146,7 @@ This policy setting allows you to manage whether the Windows Remote Management ( | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -166,7 +161,7 @@ This policy setting allows you to manage whether the Windows Remote Management ( - If you enable this policy setting, the WinRM client uses CredSSP authentication. -- If you disable or do not configure this policy setting, the WinRM client does not use CredSSP authentication. +- If you disable or don't configure this policy setting, the WinRM client doesn't use CredSSP authentication. @@ -178,13 +173,12 @@ This policy setting allows you to manage whether the Windows Remote Management ( | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -211,7 +205,7 @@ This policy setting allows you to manage whether the Windows Remote Management ( | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -226,7 +220,7 @@ This policy setting allows you to manage whether the Windows Remote Management ( - If you enable this policy setting, the WinRM service accepts CredSSP authentication from a remote client. -- If you disable or do not configure this policy setting, the WinRM service does not accept CredSSP authentication from a remote client. +- If you disable or don't configure this policy setting, the WinRM service doesn't accept CredSSP authentication from a remote client. @@ -238,13 +232,12 @@ This policy setting allows you to manage whether the Windows Remote Management ( | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -271,7 +264,7 @@ This policy setting allows you to manage whether the Windows Remote Management ( | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -288,11 +281,11 @@ This policy setting allows you to manage whether the Windows Remote Management ( To allow WinRM service to receive requests over the network, configure the Windows Firewall policy setting with exceptions for Port 5985 (default port for HTTP). -- If you disable or do not configure this policy setting, the WinRM service will not respond to requests from a remote computer, regardless of whether or not any WinRM listeners are configured. +- If you disable or don't configure this policy setting, the WinRM service won't respond to requests from a remote computer, regardless of whether or not any WinRM listeners are configured. The service listens on the addresses specified by the IPv4 and IPv6 filters. The IPv4 filter specifies one or more ranges of IPv4 addresses, and the IPv6 filter specifies one or more ranges of IPv6addresses. If specified, the service enumerates the available IP addresses on the computer and uses only addresses that fall within one of the filter ranges. -You should use an asterisk (*) to indicate that the service listens on all available IP addresses on the computer. When * is used, other ranges in the filter are ignored. If the filter is left blank, the service does not listen on any addresses. +You should use an asterisk (*) to indicate that the service listens on all available IP addresses on the computer. When * is used, other ranges in the filter are ignored. If the filter is left blank, the service doesn't listen on any addresses. For example, if you want the service to listen only on IPv4 addresses, leave the IPv6 filter empty. @@ -311,13 +304,12 @@ Example IPv6 filters:\n3FFE:FFFF:7654:FEDA:1245:BA98:0000:0000-3. FFE:FFFF:7654: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -344,7 +336,7 @@ Example IPv6 filters:\n3FFE:FFFF:7654:FEDA:1245:BA98:0000:0000-3. FFE:FFFF:7654: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -359,7 +351,7 @@ This policy setting allows you to manage whether the Windows Remote Management ( - If you enable this policy setting, the WinRM client sends and receives unencrypted messages over the network. -- If you disable or do not configure this policy setting, the WinRM client sends or receives only encrypted messages over the network. +- If you disable or don't configure this policy setting, the WinRM client sends or receives only encrypted messages over the network. @@ -371,13 +363,12 @@ This policy setting allows you to manage whether the Windows Remote Management ( | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -404,7 +395,7 @@ This policy setting allows you to manage whether the Windows Remote Management ( | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -419,7 +410,7 @@ This policy setting allows you to manage whether the Windows Remote Management ( - If you enable this policy setting, the WinRM client sends and receives unencrypted messages over the network. -- If you disable or do not configure this policy setting, the WinRM client sends or receives only encrypted messages over the network. +- If you disable or don't configure this policy setting, the WinRM client sends or receives only encrypted messages over the network. @@ -431,13 +422,12 @@ This policy setting allows you to manage whether the Windows Remote Management ( | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -464,7 +454,7 @@ This policy setting allows you to manage whether the Windows Remote Management ( | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -477,9 +467,9 @@ This policy setting allows you to manage whether the Windows Remote Management ( This policy setting allows you to manage whether the Windows Remote Management (WinRM) client uses Digest authentication. -- If you enable this policy setting, the WinRM client does not use Digest authentication. +- If you enable this policy setting, the WinRM client doesn't use Digest authentication. -- If you disable or do not configure this policy setting, the WinRM client uses Digest authentication. +- If you disable or don't configure this policy setting, the WinRM client uses Digest authentication. @@ -491,13 +481,12 @@ This policy setting allows you to manage whether the Windows Remote Management ( | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -524,7 +513,7 @@ This policy setting allows you to manage whether the Windows Remote Management ( | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -537,9 +526,9 @@ This policy setting allows you to manage whether the Windows Remote Management ( This policy setting allows you to manage whether the Windows Remote Management (WinRM) client uses Negotiate authentication. -- If you enable this policy setting, the WinRM client does not use Negotiate authentication. +- If you enable this policy setting, the WinRM client doesn't use Negotiate authentication. -- If you disable or do not configure this policy setting, the WinRM client uses Negotiate authentication. +- If you disable or don't configure this policy setting, the WinRM client uses Negotiate authentication. @@ -551,13 +540,12 @@ This policy setting allows you to manage whether the Windows Remote Management ( | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -584,7 +572,7 @@ This policy setting allows you to manage whether the Windows Remote Management ( | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -597,9 +585,9 @@ This policy setting allows you to manage whether the Windows Remote Management ( This policy setting allows you to manage whether the Windows Remote Management (WinRM) service accepts Negotiate authentication from a remote client. -- If you enable this policy setting, the WinRM service does not accept Negotiate authentication from a remote client. +- If you enable this policy setting, the WinRM service doesn't accept Negotiate authentication from a remote client. -- If you disable or do not configure this policy setting, the WinRM service accepts Negotiate authentication from a remote client. +- If you disable or don't configure this policy setting, the WinRM service accepts Negotiate authentication from a remote client. @@ -611,13 +599,12 @@ This policy setting allows you to manage whether the Windows Remote Management ( | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -644,7 +631,7 @@ This policy setting allows you to manage whether the Windows Remote Management ( | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -655,11 +642,11 @@ This policy setting allows you to manage whether the Windows Remote Management ( -This policy setting allows you to manage whether the Windows Remote Management (WinRM) service will not allow RunAs credentials to be stored for any plug-ins. +This policy setting allows you to manage whether the Windows Remote Management (WinRM) service won't allow RunAs credentials to be stored for any plug-ins. -- If you enable this policy setting, the WinRM service will not allow the RunAsUser or RunAsPassword configuration values to be set for any plug-ins. If a plug-in has already set the RunAsUser and RunAsPassword configuration values, the RunAsPassword configuration value will be erased from the credential store on this computer. +- If you enable this policy setting, the WinRM service won't allow the RunAsUser or RunAsPassword configuration values to be set for any plug-ins. If a plug-in has already set the RunAsUser and RunAsPassword configuration values, the RunAsPassword configuration value will be erased from the credential store on this computer. -- If you disable or do not configure this policy setting, the WinRM service will allow the RunAsUser and RunAsPassword configuration values to be set for plug-ins and the RunAsPassword value will be stored securely. +- If you disable or don't configure this policy setting, the WinRM service will allow the RunAsUser and RunAsPassword configuration values to be set for plug-ins and the RunAsPassword value will be stored securely. If you enable and then disable this policy setting,any values that were previously configured for RunAsPassword will need to be reset. @@ -673,13 +660,12 @@ If you enable and then disable this policy setting,any values that were previous | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -706,7 +692,7 @@ If you enable and then disable this policy setting,any values that were previous | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -721,13 +707,13 @@ This policy setting allows you to set the hardening level of the Windows Remote - If you enable this policy setting, the WinRM service uses the level specified in HardeningLevel to determine whether or not to accept a received request, based on a supplied channel binding token. -- If you disable or do not configure this policy setting, you can configure the hardening level locally on each computer. +- If you disable or don't configure this policy setting, you can configure the hardening level locally on each computer. If HardeningLevel is set to Strict, any request not containing a valid channel binding token is rejected. -If HardeningLevel is set to Relaxed (default value), any request containing an invalid channel binding token is rejected. However, a request that does not contain a channel binding token is accepted (though it is not protected from credential-forwarding attacks). +If HardeningLevel is set to Relaxed (default value), any request containing an invalid channel binding token is rejected. However, a request that doesn't contain a channel binding token is accepted (though it isn't protected from credential-forwarding attacks). -If HardeningLevel is set to None, all requests are accepted (though they are not protected from credential-forwarding attacks). +If HardeningLevel is set to None, all requests are accepted (though they aren't protected from credential-forwarding attacks). @@ -739,13 +725,12 @@ If HardeningLevel is set to None, all requests are accepted (though they are not | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -772,7 +757,7 @@ If HardeningLevel is set to None, all requests are accepted (though they are not | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -787,7 +772,7 @@ This policy setting allows you to manage whether the Windows Remote Management ( - If you enable this policy setting, the WinRM client uses the list specified in TrustedHostsList to determine if the destination host is a trusted entity. The WinRM client uses this list when neither HTTPS nor Kerberos are used to authenticate the identity of the host. -- If you disable or do not configure this policy setting and the WinRM client needs to use the list of trusted hosts, you must configure the list of trusted hosts locally on each computer. +- If you disable or don't configure this policy setting and the WinRM client needs to use the list of trusted hosts, you must configure the list of trusted hosts locally on each computer. @@ -799,13 +784,12 @@ This policy setting allows you to manage whether the Windows Remote Management ( | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -832,7 +816,7 @@ This policy setting allows you to manage whether the Windows Remote Management ( | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -847,7 +831,7 @@ This policy setting turns on or turns off an HTTP listener created for backward - If you enable this policy setting, the HTTP listener always appears. -- If you disable or do not configure this policy setting, the HTTP listener never appears. +- If you disable or don't configure this policy setting, the HTTP listener never appears. When certain port 80 listeners are migrated to WinRM 2.0, the listener port number changes to 5985. @@ -863,13 +847,12 @@ A listener might be automatically created on port 80 to ensure backward compatib | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -896,7 +879,7 @@ A listener might be automatically created on port 80 to ensure backward compatib | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -911,7 +894,7 @@ This policy setting turns on or turns off an HTTPS listener created for backward - If you enable this policy setting, the HTTPS listener always appears. -- If you disable or do not configure this policy setting, the HTTPS listener never appears. +- If you disable or don't configure this policy setting, the HTTPS listener never appears. When certain port 443 listeners are migrated to WinRM 2.0, the listener port number changes to 5986. @@ -927,13 +910,12 @@ A listener might be automatically created on port 443 to ensure backward compati | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-remoteprocedurecall.md b/windows/client-management/mdm/policy-csp-remoteprocedurecall.md index fc904f741b..80c58897c8 100644 --- a/windows/client-management/mdm/policy-csp-remoteprocedurecall.md +++ b/windows/client-management/mdm/policy-csp-remoteprocedurecall.md @@ -4,7 +4,7 @@ description: Learn more about the RemoteProcedureCall Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - RemoteProcedureCall -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -48,7 +45,7 @@ This policy setting impacts all RPC applications. In a domain environment this p - If you disable this policy setting, the RPC server runtime uses the value of "Authenticated" on Windows Client, and the value of "None" on Windows Server versions that support this policy setting. -- If you do not configure this policy setting, it remains disabled. The RPC server runtime will behave as though it was enabled with the value of "Authenticated" used for Windows Client and the value of "None" used for Server SKUs that support this policy setting. +- If you don't configure this policy setting, it remains disabled. The RPC server runtime will behave as though it was enabled with the value of "Authenticated" used for Windows Client and the value of "None" used for Server SKUs that support this policy setting. - If you enable this policy setting, it directs the RPC server runtime to restrict unauthenticated RPC clients connecting to RPC servers running on a machine. A client will be considered an authenticated client if it uses a named pipe to communicate with the server or if it uses RPC Security. RPC Interfaces that have specifically requested to be accessible by unauthenticated clients may be exempt from this restriction, depending on the selected value for this policy setting. @@ -59,7 +56,7 @@ This policy setting impacts all RPC applications. In a domain environment this p - "Authenticated without exceptions" allows only authenticated RPC Clients (per the definition above) to connect to RPC Servers running on the machine on which the policy setting is applied. No exceptions are allowed. > [!NOTE] -> This policy setting will not be applied until the system is rebooted. +> This policy setting won't be applied until the system is rebooted. @@ -71,13 +68,12 @@ This policy setting impacts all RPC applications. In a domain environment this p | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -103,7 +99,7 @@ This policy setting impacts all RPC applications. In a domain environment this p | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -114,16 +110,16 @@ This policy setting impacts all RPC applications. In a domain environment this p -This policy setting controls whether RPC clients authenticate with the Endpoint Mapper Service when the call they are making contains authentication information. The Endpoint Mapper Service on computers running Windows NT4 (all service packs) cannot process authentication information supplied in this manner. +This policy setting controls whether RPC clients authenticate with the Endpoint Mapper Service when the call they're making contains authentication information. The Endpoint Mapper Service on computers running Windows NT4 (all service packs) can't process authentication information supplied in this manner. -- If you disable this policy setting, RPC clients will not authenticate to the Endpoint Mapper Service, but they will be able to communicate with the Endpoint Mapper Service on Windows NT4 Server. +- If you disable this policy setting, RPC clients won't authenticate to the Endpoint Mapper Service, but they will be able to communicate with the Endpoint Mapper Service on Windows NT4 Server. -- If you enable this policy setting, RPC clients will authenticate to the Endpoint Mapper Service for calls that contain authentication information. Clients making such calls will not be able to communicate with the Windows NT4 Server Endpoint Mapper Service. +- If you enable this policy setting, RPC clients will authenticate to the Endpoint Mapper Service for calls that contain authentication information. Clients making such calls won't be able to communicate with the Windows NT4 Server Endpoint Mapper Service. -- If you do not configure this policy setting, it remains disabled. RPC clients will not authenticate to the Endpoint Mapper Service, but they will be able to communicate with the Windows NT4 Server Endpoint Mapper Service. +- If you don't configure this policy setting, it remains disabled. RPC clients won't authenticate to the Endpoint Mapper Service, but they will be able to communicate with the Windows NT4 Server Endpoint Mapper Service. > [!NOTE] -> This policy will not be applied until the system is rebooted. +> This policy won't be applied until the system is rebooted. @@ -135,13 +131,12 @@ This policy setting controls whether RPC clients authenticate with the Endpoint | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-remoteshell.md b/windows/client-management/mdm/policy-csp-remoteshell.md index f0153f08b7..44a9a553c4 100644 --- a/windows/client-management/mdm/policy-csp-remoteshell.md +++ b/windows/client-management/mdm/policy-csp-remoteshell.md @@ -4,7 +4,7 @@ description: Learn more about the RemoteShell Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - RemoteShell -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -44,7 +41,7 @@ ms.topic: reference This policy setting configures access to remote shells. -If you enable or do not configure this policy setting, new remote shell connections are accepted by the server. +If you enable or don't configure this policy setting, new remote shell connections are accepted by the server. If you set this policy to 'disabled', new remote shell connections are rejected by the server. @@ -58,13 +55,12 @@ If you set this policy to 'disabled', new remote shell connections are rejected | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -91,7 +87,7 @@ If you set this policy to 'disabled', new remote shell connections are rejected | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -108,7 +104,7 @@ The value can be any number from 1 to 100. - If you enable this policy setting, the new shell connections are rejected if they exceed the specified limit. -- If you disable or do not configure this policy setting, the default number is five users. +- If you disable or don't configure this policy setting, the default number is five users. @@ -120,13 +116,12 @@ The value can be any number from 1 to 100. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -152,7 +147,7 @@ The value can be any number from 1 to 100. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -163,13 +158,13 @@ The value can be any number from 1 to 100. -This policy setting configures the maximum time in milliseconds remote shell will stay open without any user activity until it is automatically deleted. +This policy setting configures the maximum time in milliseconds remote shell will stay open without any user activity until it's automatically deleted. Any value from 0 to 0x7FFFFFFF can be set. A minimum of 60000 milliseconds (1 minute) is used for smaller values. - If you enable this policy setting, the server will wait for the specified amount of time since the last received message from the client before terminating the open shell. -- If you do not configure or disable this policy setting, the default value of 900000 or 15 min will be used. +- If you don't configure or disable this policy setting, the default value of 900000 or 15 min will be used. @@ -181,13 +176,12 @@ Any value from 0 to 0x7FFFFFFF can be set. A minimum of 60000 milliseconds (1 mi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -213,7 +207,7 @@ Any value from 0 to 0x7FFFFFFF can be set. A minimum of 60000 milliseconds (1 mi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -230,7 +224,7 @@ Any value from 0 to 0x7FFFFFFF can be set, where 0 equals unlimited memory, whic - If you enable this policy setting, the remote operation is terminated when a new allocation exceeds the specified quota. -- If you disable or do not configure this policy setting, the value 150 is used by default. +- If you disable or don't configure this policy setting, the value 150 is used by default. @@ -242,13 +236,12 @@ Any value from 0 to 0x7FFFFFFF can be set, where 0 equals unlimited memory, whic | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -274,7 +267,7 @@ Any value from 0 to 0x7FFFFFFF can be set, where 0 equals unlimited memory, whic | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -289,7 +282,7 @@ This policy setting configures the maximum number of processes a remote shell is - If you enable this policy setting, you can specify any number from 0 to 0x7FFFFFFF to set the maximum number of process per shell. Zero (0) means unlimited number of processes. -- If you disable or do not configure this policy setting, the limit is five processes per shell. +- If you disable or don't configure this policy setting, the limit's five processes per shell. @@ -301,13 +294,12 @@ This policy setting configures the maximum number of processes a remote shell is | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -333,7 +325,7 @@ This policy setting configures the maximum number of processes a remote shell is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -348,9 +340,9 @@ This policy setting configures the maximum number of concurrent shells any user Any number from 0 to 0x7FFFFFFF cand be set, where 0 means unlimited number of shells. -- If you enable this policy setting, the user cannot open new remote shells if the count exceeds the specified limit. +- If you enable this policy setting, the user can't open new remote shells if the count exceeds the specified limit. -- If you disable or do not configure this policy setting, by default the limit is set to two remote shells per user. +- If you disable or don't configure this policy setting, by default the limit's set to two remote shells per user. @@ -362,13 +354,12 @@ Any number from 0 to 0x7FFFFFFF cand be set, where 0 means unlimited number of s | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -394,7 +385,7 @@ Any number from 0 to 0x7FFFFFFF cand be set, where 0 means unlimited number of s | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -417,13 +408,12 @@ This policy setting is deprecated and has no effect when set to any state: Enabl | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-restrictedgroups.md b/windows/client-management/mdm/policy-csp-restrictedgroups.md index f148ceb767..2cdf2bb1cc 100644 --- a/windows/client-management/mdm/policy-csp-restrictedgroups.md +++ b/windows/client-management/mdm/policy-csp-restrictedgroups.md @@ -4,7 +4,7 @@ description: Learn more about the RestrictedGroups Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -31,7 +31,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -42,7 +42,7 @@ ms.topic: reference -This security setting allows an administrator to define the members of a security-sensitive (restricted) group. When a Restricted Groups Policy is enforced, any current member of a restricted group that is not on the Members list is removed. Any user on the Members list who is not currently a member of the restricted group is added. You can use Restricted Groups policy to control group membership. Using the policy, you can specify what members are part of a group. Any members that are not specified in the policy are removed during configuration or refresh. For example, you can create a Restricted Groups policy to only allow specified users (for example, Alice and John) to be members of the Administrators group. When policy is refreshed, only Alice and John will remain as members of the Administrators group. +This security setting allows an administrator to define the members of a security-sensitive (restricted) group. When a Restricted Groups Policy is enforced, any current member of a restricted group that isn't on the Members list is removed. Any user on the Members list who isn't currently a member of the restricted group is added. You can use Restricted Groups policy to control group membership. Using the policy, you can specify what members are part of a group. Any members that aren't specified in the policy are removed during configuration or refresh. For example, you can create a Restricted Groups policy to only allow specified users (for example, Alice and John) to be members of the Administrators group. When policy is refreshed, only Alice and John will remain as members of the Administrators group. > [!CAUTION] > If a Restricted Groups policy is applied, any current member not on the Restricted Groups policy members list is removed. This can include default members, such as administrators. Restricted Groups should be used primarily to configure membership of local groups on workstation or member servers. An empty Members list means that the restricted group has no members. @@ -63,7 +63,7 @@ This security setting allows an administrator to define the members of a securit | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | diff --git a/windows/client-management/mdm/policy-csp-search.md b/windows/client-management/mdm/policy-csp-search.md index dc4d67697d..550fbeae03 100644 --- a/windows/client-management/mdm/policy-csp-search.md +++ b/windows/client-management/mdm/policy-csp-search.md @@ -4,7 +4,7 @@ description: Learn more about the Search Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,8 +16,7 @@ ms.topic: reference # Policy CSP - Search -> [!IMPORTANT] -> This CSP contains preview policies that are under development and only applicable for [Windows Insider Preview builds](/windows-insider/). These policies are subject to change and may have dependencies on other features or services in preview. +[!INCLUDE [Windows Insider tip](includes/mdm-insider-csp-note.md)] @@ -29,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -52,7 +51,7 @@ Allow search and Cortana to search cloud sources like OneDrive and SharePoint. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -92,7 +91,7 @@ Allow search and Cortana to search cloud sources like OneDrive and SharePoint. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -115,7 +114,7 @@ Allow the cortana opt-in page during windows setup out of the box experience. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -125,7 +124,7 @@ Allow the cortana opt-in page during windows setup out of the box experience. | Value | Description | |:--|:--| -| 0 (Default) | Not allowed. The Cortana consent page will not appear in AAD OOBE during setup. | +| 0 (Default) | Not allowed. The Cortana consent page won't appear in AAD OOBE during setup. | | 1 | Allowed. The Cortana consent page will appear in Azure AAD OOBE during setup. | @@ -155,7 +154,7 @@ Allow the cortana opt-in page during windows setup out of the box experience. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -180,7 +179,7 @@ This policy controls whether the user can configure search to *Find My Files* mo | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -215,7 +214,7 @@ This policy controls whether the user can configure search to *Find My Files* mo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -229,8 +228,10 @@ This policy controls whether the user can configure search to *Find My Files* mo This policy setting allows encrypted items to be indexed. - If you enable this policy setting, indexing will attempt to decrypt and index the content (access restrictions will still apply). -- If you disable this policy setting, the search service components (including non-Microsoft components) are expected not to index encrypted items or encrypted stores. This policy setting is not configured by default. -- If you do not configure this policy setting, the local setting, configured through Control Panel, will be used. By default, the Control Panel setting is set to not index encrypted content. + +- If you disable this policy setting, the search service components (including non-Microsoft components) are expected not to index encrypted items or encrypted stores. This policy setting isn't configured by default. + +- If you don't configure this policy setting, the local setting, configured through Control Panel, will be used. By default, the Control Panel setting is set to not index encrypted content. When this setting is enabled or disabled, the index is rebuilt completely. @@ -252,7 +253,7 @@ The most restrictive value is `0` to not allow indexing of encrypted items. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -292,7 +293,7 @@ The most restrictive value is `0` to not allow indexing of encrypted items. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | | @@ -322,7 +323,7 @@ Disabling this setting turns off search highlights in the start menu search box | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-1]` | | Default Value | 1 | @@ -354,7 +355,7 @@ Disabling this setting turns off search highlights in the start menu search box | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -381,7 +382,7 @@ The most restrictive value is `0` to not allow search to use location. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -421,7 +422,7 @@ The most restrictive value is `0` to not allow search to use location. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -444,7 +445,7 @@ This policy has been deprecated. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -470,7 +471,7 @@ This policy has been deprecated. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -484,8 +485,10 @@ This policy has been deprecated. This policy setting allows words that contain diacritic characters to be treated as separate words. - If you enable this policy setting, words that only differ in diacritics are treated as different words. -- If you disable this policy setting, words with diacritics and words without diacritics are treated as identical words. This policy setting is not configured by default. -- If you do not configure this policy setting, the local setting, configured through Control Panel, will be used. + +- If you disable this policy setting, words with diacritics and words without diacritics are treated as identical words. This policy setting isn't configured by default. + +- If you don't configure this policy setting, the local setting, configured through Control Panel, will be used. > [!NOTE] > By default, the Control Panel setting is set to treat words that differ only because of diacritics as the same word. @@ -502,7 +505,7 @@ The most restrictive value is `0` to not allow the use of diacritics. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -542,7 +545,7 @@ The most restrictive value is `0` to not allow the use of diacritics. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -565,7 +568,7 @@ Allow Windows indexer. Value type is integer. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-3]` | | Default Value | 3 | @@ -583,7 +586,7 @@ Allow Windows indexer. Value type is integer. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -597,7 +600,8 @@ Allow Windows indexer. Value type is integer. This policy setting determines when Windows uses automatic language detection results, and when it relies on indexing history. - If you enable this policy setting, Windows will always use automatic language detection to index (as it did in Windows 7). Using automatic language detection can increase memory usage. We recommend enabling this policy setting only on PCs where documents are stored in many languages. -- If you disable or do not configure this policy setting, Windows will use automatic language detection only when it can determine the language of a document with high confidence. + +- If you disable or don't configure this policy setting, Windows will use automatic language detection only when it can determine the language of a document with high confidence. @@ -611,7 +615,7 @@ The most restrictive value is `0` to now allow automatic language detection. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -651,7 +655,7 @@ The most restrictive value is `0` to now allow automatic language detection. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -664,15 +668,15 @@ The most restrictive value is `0` to now allow automatic language detection. This policy setting allows you to configure search on the taskbar. -- If you enable this policy setting and set it to hide, search on taskbar will be hidden by default. Users cannot change it in Settings. +- If you enable this policy setting and set it to hide, search on taskbar will be hidden by default. Users can't change it in Settings. -- If you enable this policy setting and set it to search icon only, the search icon will be displayed on the taskbar by default. Users cannot change it in Settings. +- If you enable this policy setting and set it to search icon only, the search icon will be displayed on the taskbar by default. Users can't change it in Settings. -- If you enable this policy setting and set it to search icon and label, the search icon and label will be displayed on the taskbar by default. Users cannot change it in Settings. +- If you enable this policy setting and set it to search icon and label, the search icon and label will be displayed on the taskbar by default. Users can't change it in Settings. -- If you enable this policy setting and set it to search box, the search box will be displayed on the taskbar by default. Users cannot change it in Settings. +- If you enable this policy setting and set it to search box, the search box will be displayed on the taskbar by default. Users can't change it in Settings. -- If you disable or do not configure this policy setting, search on taskbar will be configured according to the defaults for your Windows edition. Users will be able to change search on taskbar in Settings. +- If you disable or don't configure this policy setting, search on taskbar will be configured according to the defaults for your Windows edition. Users will be able to change search on taskbar in Settings. @@ -684,7 +688,7 @@ This policy setting allows you to configure search on the taskbar. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 3 | @@ -726,7 +730,7 @@ This policy setting allows you to configure search on the taskbar. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -749,7 +753,7 @@ If enabled, the search indexer backoff feature will be disabled. Indexing will c | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -789,7 +793,7 @@ If enabled, the search indexer backoff feature will be disabled. Indexing will c | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -802,9 +806,9 @@ If enabled, the search indexer backoff feature will be disabled. Indexing will c This policy setting configures whether or not locations on removable drives can be added to libraries. -- If you enable this policy setting, locations on removable drives cannot be added to libraries. In addition, locations on removable drives cannot be indexed. +- If you enable this policy setting, locations on removable drives can't be added to libraries. In addition, locations on removable drives can't be indexed. -- If you disable or do not configure this policy setting, locations on removable drives can be added to libraries. In addition, locations on removable drives can be indexed. +- If you disable or don't configure this policy setting, locations on removable drives can be added to libraries. In addition, locations on removable drives can be indexed. @@ -816,7 +820,7 @@ This policy setting configures whether or not locations on removable drives can | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -856,7 +860,7 @@ This policy setting configures whether or not locations on removable drives can | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -882,7 +886,7 @@ This policy setting configures whether or not locations on removable drives can | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -892,7 +896,7 @@ This policy setting configures whether or not locations on removable drives can | Value | Description | |:--|:--| -| 0 (Default) | Do not disable. | +| 0 (Default) | Don't disable. | | 1 | Disable. | @@ -922,7 +926,7 @@ This policy setting configures whether or not locations on removable drives can | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -935,7 +939,7 @@ This policy setting configures whether or not locations on removable drives can This policy setting allows you to control whether or not Search can perform queries on the web, if web results are displayed in Search, and if search highlights are shown in the search box and in search home. -- If you enable this policy setting, queries won't be performed on the web, web results won't be displayed when a user performs a query in Search, and search highlights will not be shown in the search box and in search home. +- If you enable this policy setting, queries won't be performed on the web, web results won't be displayed when a user performs a query in Search, and search highlights won't be shown in the search box and in search home. - If you disable this policy setting, queries will be performed on the web, web results will be displayed when a user performs a query in Search, and search highlights will be shown in the search box and in search home. @@ -951,7 +955,7 @@ This policy setting allows you to control whether or not Search can perform quer | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -991,7 +995,7 @@ This policy setting allows you to control whether or not Search can perform quer | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1014,7 +1018,7 @@ Enabling this policy prevents indexing from continuing after less than the speci | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1053,7 +1057,7 @@ Enabling this policy prevents indexing from continuing after less than the speci | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1064,7 +1068,7 @@ Enabling this policy prevents indexing from continuing after less than the speci -If enabled, clients will be unable to query this computer's index remotely. Thus, when they are browsing network shares that are stored on this computer, they will not search them using the index. If disabled, client search requests will use this computer's index. . +If enabled, clients will be unable to query this computer's index remotely. Thus, when they're browsing network shares that are stored on this computer, they won't search them using the index. If disabled, client search requests will use this computer's index. . @@ -1076,7 +1080,7 @@ If enabled, clients will be unable to query this computer's index remotely. Thus | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1119,7 +1123,7 @@ If enabled, clients will be unable to query this computer's index remotely. Thus | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1142,7 +1146,7 @@ This policy is deprecated. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | diff --git a/windows/client-management/mdm/policy-csp-security.md b/windows/client-management/mdm/policy-csp-security.md index da0b3fb337..e4f0dfb401 100644 --- a/windows/client-management/mdm/policy-csp-security.md +++ b/windows/client-management/mdm/policy-csp-security.md @@ -4,7 +4,7 @@ description: Learn more about the Security Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -49,7 +49,7 @@ Specifies whether to allow the runtime configuration agent to install provisioni | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -78,7 +78,7 @@ Specifies whether to allow the runtime configuration agent to install provisioni | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -101,7 +101,7 @@ This policy is deprecated. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -127,7 +127,7 @@ This policy is deprecated. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -150,7 +150,7 @@ Specifies whether to allow the runtime configuration agent to remove provisionin | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -179,7 +179,7 @@ Specifies whether to allow the runtime configuration agent to remove provisionin | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -202,7 +202,7 @@ This policy is deprecated. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -228,7 +228,7 @@ This policy is deprecated. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -251,7 +251,7 @@ This policy setting configures the system to prompt the user to clear the TPM if | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -291,7 +291,7 @@ This policy setting configures the system to prompt the user to clear the TPM if | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -316,7 +316,7 @@ Configures the use of passwords for Windows features. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 2 | @@ -343,7 +343,7 @@ Configures the use of passwords for Windows features. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -368,7 +368,7 @@ For more information, see [BitLocker Device Encryption](/windows/security/inform | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -394,7 +394,7 @@ For more information, see [BitLocker Device Encryption](/windows/security/inform | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -442,7 +442,7 @@ The following table shows what behavior is expected for the policy settings with | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -454,7 +454,7 @@ The following table shows what behavior is expected for the policy settings with |:--|:--| | 0 (Default) | Current) behavior. | | 1 | RequireAuthentication: Admin Authentication is always required for components in RecoveryEnvironment. | -| 2 | NoRequireAuthentication: Admin Authentication is not required for components in RecoveryEnvironment. | +| 2 | NoRequireAuthentication: Admin Authentication isn't required for components in RecoveryEnvironment. | @@ -469,7 +469,7 @@ The following table shows what behavior is expected for the policy settings with | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -480,7 +480,7 @@ The following table shows what behavior is expected for the policy settings with -Allows enterprise to turn on internal storage encryption. Most restricted value is 1. Important. If encryption has been enabled, it cannot be turned off by using this policy. +Allows enterprise to turn on internal storage encryption. Most restricted value is 1. Important. If encryption has been enabled, it can't be turned off by using this policy. @@ -492,7 +492,7 @@ Allows enterprise to turn on internal storage encryption. Most restricted value | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -502,7 +502,7 @@ Allows enterprise to turn on internal storage encryption. Most restricted value | Value | Description | |:--|:--| -| 0 (Default) | Encryption is not required. | +| 0 (Default) | Encryption isn't required. | | 1 | Encryption is required. | @@ -518,7 +518,7 @@ Allows enterprise to turn on internal storage encryption. Most restricted value | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -541,7 +541,7 @@ Specifies whether provisioning packages must have a certificate signed by a devi | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -567,7 +567,7 @@ Specifies whether provisioning packages must have a certificate signed by a devi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -593,7 +593,7 @@ Specifies whether to retrieve and post TCG Boot logs, and get or cache an encryp | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | diff --git a/windows/client-management/mdm/policy-csp-servicecontrolmanager.md b/windows/client-management/mdm/policy-csp-servicecontrolmanager.md index bec3edbcd6..9154d2d243 100644 --- a/windows/client-management/mdm/policy-csp-servicecontrolmanager.md +++ b/windows/client-management/mdm/policy-csp-servicecontrolmanager.md @@ -4,7 +4,7 @@ description: Learn more about the ServiceControlManager Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - ServiceControlManager -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -48,7 +45,7 @@ This policy setting enables process mitigation options on svchost.exe processes. This includes a policy requiring all binaries loaded in these processes to be signed by microsoft, as well as a policy disallowing dynamically-generated code. -- If you disable or do not configure this policy setting, these stricter security settings will not be applied. +- If you disable or don't configure this policy setting, these stricter security settings won't be applied. @@ -65,13 +62,12 @@ If you enable this policy, it adds code integrity guard (CIG) and arbitrary code | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-settings.md b/windows/client-management/mdm/policy-csp-settings.md index 4102db4c23..8ed5d9c722 100644 --- a/windows/client-management/mdm/policy-csp-settings.md +++ b/windows/client-management/mdm/policy-csp-settings.md @@ -4,7 +4,7 @@ description: Learn more about the Settings Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -40,7 +40,7 @@ ms.topic: reference Allows the user to change Auto Play settings. > [!NOTE] -> Setting this policy to 0 (Not allowed) does not affect the autoplay dialog box that appears when a device is connected. +> Setting this policy to 0 (Not allowed) doesn't affect the autoplay dialog box that appears when a device is connected. @@ -52,7 +52,7 @@ Allows the user to change Auto Play settings. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -78,7 +78,7 @@ Allows the user to change Auto Play settings. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -104,7 +104,7 @@ Allows the user to change Data Sense settings. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -130,7 +130,7 @@ Allows the user to change Data Sense settings. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -153,7 +153,7 @@ Allows the user to change date and time settings. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -179,7 +179,7 @@ Allows the user to change date and time settings. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -202,7 +202,7 @@ Allows the user to edit the device name. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -228,7 +228,7 @@ Allows the user to edit the device name. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -251,7 +251,7 @@ Allows the user to change the language settings. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -277,7 +277,7 @@ Allows the user to change the language settings. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -290,7 +290,7 @@ Allows the user to change the language settings. Enables or disables the retrieval of online tips and help for the Settings app. -If disabled, Settings will not contact Microsoft content services to retrieve tips and help content. +If disabled, Settings won't contact Microsoft content services to retrieve tips and help content. @@ -302,7 +302,7 @@ If disabled, Settings will not contact Microsoft content services to retrieve ti | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -342,7 +342,7 @@ If disabled, Settings will not contact Microsoft content services to retrieve ti | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -365,7 +365,7 @@ Allows the user to change power and sleep settings. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -391,7 +391,7 @@ Allows the user to change power and sleep settings. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -414,7 +414,7 @@ Allows the user to change the region settings. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -440,7 +440,7 @@ Allows the user to change the region settings. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -463,7 +463,7 @@ Allows the user to change sign-in options. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -489,7 +489,7 @@ Allows the user to change sign-in options. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -512,7 +512,7 @@ Allows the user to change VPN settings. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -538,7 +538,7 @@ Allows the user to change VPN settings. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -561,7 +561,7 @@ Allows user to change workplace settings. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -587,7 +587,7 @@ Allows user to change workplace settings. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -610,7 +610,7 @@ Allows user to change account settings. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -636,7 +636,7 @@ Allows user to change account settings. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -651,9 +651,9 @@ By default, the calendar is set according to the locale of the operating system, - If you enable this policy setting, users can show an additional calendar in either Simplified Chinese (Lunar) or Traditional Chinese (Lunar), regardless of the locale. -- If you disable this policy setting, users cannot show an additional calendar, regardless of the locale. +- If you disable this policy setting, users can't show an additional calendar, regardless of the locale. -- If you do not configure this policy setting, the calendar will be set according to the default logic. +- If you don't configure this policy setting, the calendar will be set according to the default logic. @@ -665,7 +665,7 @@ By default, the calendar is set according to the locale of the operating system, | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -707,7 +707,7 @@ By default, the calendar is set according to the locale of the operating system, | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -724,17 +724,17 @@ By default, the calendar is set according to the locale of the operating system, Specifies the list of pages to show or hide from the System Settings app. -This policy allows an administrator to block a given set of pages from the System Settings app. Blocked pages will not be visible in the app, and if all pages in a category are blocked the category will be hidden as well. Direct navigation to a blocked page via URI, context menu in Explorer or other means will result in the front page of Settings being shown instead. +This policy allows an administrator to block a given set of pages from the System Settings app. Blocked pages won't be visible in the app, and if all pages in a category are blocked the category will be hidden as well. Direct navigation to a blocked page via URI, context menu in Explorer or other means will result in the front page of Settings being shown instead. -This policy has two modes: it can either specify a list of settings pages to show or a list of pages to hide. To specify a list of pages to show, the policy string must begin with "showonly:" (without quotes), and to specify a list of pages to hide, it must begin with "hide:". If a page in a showonly list would normally be hidden for other reasons (such as a missing hardware device), this policy will not force that page to appear. After this, the policy string must contain a semicolon-delimited list of settings page identifiers. The identifier for any given settings page is the published URI for that page, minus the "ms-settings:" protocol part. +This policy has two modes: it can either specify a list of settings pages to show or a list of pages to hide. To specify a list of pages to show, the policy string must begin with "showonly:" (without quotes), and to specify a list of pages to hide, it must begin with "hide:". If a page in a showonly list would normally be hidden for other reasons (such as a missing hardware device), this policy won't force that page to appear. After this, the policy string must contain a semicolon-delimited list of settings page identifiers. The identifier for any given settings page is the published URI for that page, minus the "ms-settings:" protocol part. Example: to specify that only the About and Bluetooth pages should be shown (their respective URIs are ms-settings:about and ms-settings:bluetooth) and all other pages hidden: -showonly:about;bluetooth +showonly:about;bluetooth. Example: to specify that only the Bluetooth page (which has URI ms-settings:bluetooth) should be hidden: -hide:bluetooth +hide:bluetooth. The availability of per-user support is documented here: @@ -756,7 +756,7 @@ To validate this policy, use the following steps: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | diff --git a/windows/client-management/mdm/policy-csp-settingssync.md b/windows/client-management/mdm/policy-csp-settingssync.md index c879d37038..af01fa3e6c 100644 --- a/windows/client-management/mdm/policy-csp-settingssync.md +++ b/windows/client-management/mdm/policy-csp-settingssync.md @@ -4,7 +4,7 @@ description: Learn more about the SettingsSync Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,13 +16,9 @@ ms.topic: reference # Policy CSP - SettingsSync -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] -> [!IMPORTANT] -> This CSP contains preview policies that are under development and only applicable for [Windows Insider Preview builds](/windows-insider/). These policies are subject to change and may have dependencies on other features or services in preview. +[!INCLUDE [Windows Insider tip](includes/mdm-insider-csp-note.md)] @@ -34,7 +30,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -47,11 +43,11 @@ ms.topic: reference Prevent the "accessibility" group from syncing to and from this PC. This turns off and disables the "accessibility" group on the "Windows backup" settings page in PC settings. -If you enable this policy setting, the "accessibility", group will not be synced. +If you enable this policy setting, the "accessibility", group won't be synced. Use the option "Allow users to turn accessibility syncing on" so that syncing is turned off by default but not disabled. -If you do not set or disable this setting, syncing of the "accessibility" group is on by default and configurable by the user. +If you don't set or disable this setting, syncing of the "accessibility" group is on by default and configurable by the user. @@ -63,13 +59,12 @@ If you do not set or disable this setting, syncing of the "accessibility" group | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -96,7 +91,7 @@ If you do not set or disable this setting, syncing of the "accessibility" group | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -118,14 +113,13 @@ If you do not set or disable this setting, syncing of the "accessibility" group | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-smartscreen.md b/windows/client-management/mdm/policy-csp-smartscreen.md index 8c3978aae7..65fcee902c 100644 --- a/windows/client-management/mdm/policy-csp-smartscreen.md +++ b/windows/client-management/mdm/policy-csp-smartscreen.md @@ -4,7 +4,7 @@ description: Learn more about the SmartScreen Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -41,13 +41,13 @@ App Install Control is a feature of Windows Defender SmartScreen that helps prot - If you enable this setting, you must choose from the following behaviors: -- Turn off app recommendations +- Turn off app recommendations. -- Show me app recommendations +- Show me app recommendations. -- Warn me before installing apps from outside the Store +- Warn me before installing apps from outside the Store. -- Allow apps from Store only +- Allow apps from Store only. - If you disable or don't configure this setting, users will be able to install apps from anywhere, including files downloaded from the Internet. @@ -65,7 +65,7 @@ App Install Control is a feature of Windows Defender SmartScreen that helps prot | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -105,7 +105,7 @@ App Install Control is a feature of Windows Defender SmartScreen that helps prot | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -116,22 +116,22 @@ App Install Control is a feature of Windows Defender SmartScreen that helps prot -This policy allows you to turn Windows Defender SmartScreen on or off. SmartScreen helps protect PCs by warning users before running potentially malicious programs downloaded from the Internet. This warning is presented as an interstitial dialog shown before running an app that has been downloaded from the Internet and is unrecognized or known to be malicious. No dialog is shown for apps that do not appear to be suspicious. +This policy allows you to turn Windows Defender SmartScreen on or off. SmartScreen helps protect PCs by warning users before running potentially malicious programs downloaded from the Internet. This warning is presented as an interstitial dialog shown before running an app that has been downloaded from the Internet and is unrecognized or known to be malicious. No dialog is shown for apps that don't appear to be suspicious. Some information is sent to Microsoft about files and programs run on PCs with this feature enabled. - If you enable this policy, SmartScreen will be turned on for all users. Its behavior can be controlled by the following options: - Warn and prevent bypass -- Warn +- Warn. -- If you enable this policy with the "Warn and prevent bypass" option, SmartScreen's dialogs will not present the user with the option to disregard the warning and run the app. SmartScreen will continue to show the warning on subsequent attempts to run the app. +- If you enable this policy with the "Warn and prevent bypass" option, SmartScreen's dialogs won't present the user with the option to disregard the warning and run the app. SmartScreen will continue to show the warning on subsequent attempts to run the app. -- If you enable this policy with the "Warn" option, SmartScreen's dialogs will warn the user that the app appears suspicious, but will permit the user to disregard the warning and run the app anyway. SmartScreen will not warn the user again for that app if the user tells SmartScreen to run the app. +- If you enable this policy with the "Warn" option, SmartScreen's dialogs will warn the user that the app appears suspicious, but will permit the user to disregard the warning and run the app anyway. SmartScreen won't warn the user again for that app if the user tells SmartScreen to run the app. -- If you disable this policy, SmartScreen will be turned off for all users. Users will not be warned if they try to run suspicious apps from the Internet. +- If you disable this policy, SmartScreen will be turned off for all users. Users won't be warned if they try to run suspicious apps from the Internet. -- If you do not configure this policy, SmartScreen will be enabled by default, but users may change their settings. +- If you don't configure this policy, SmartScreen will be enabled by default, but users may change their settings. @@ -143,7 +143,7 @@ Some information is sent to Microsoft about files and programs run on PCs with t | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -183,7 +183,7 @@ Some information is sent to Microsoft about files and programs run on PCs with t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -194,22 +194,22 @@ Some information is sent to Microsoft about files and programs run on PCs with t -This policy allows you to turn Windows Defender SmartScreen on or off. SmartScreen helps protect PCs by warning users before running potentially malicious programs downloaded from the Internet. This warning is presented as an interstitial dialog shown before running an app that has been downloaded from the Internet and is unrecognized or known to be malicious. No dialog is shown for apps that do not appear to be suspicious. +This policy allows you to turn Windows Defender SmartScreen on or off. SmartScreen helps protect PCs by warning users before running potentially malicious programs downloaded from the Internet. This warning is presented as an interstitial dialog shown before running an app that has been downloaded from the Internet and is unrecognized or known to be malicious. No dialog is shown for apps that don't appear to be suspicious. Some information is sent to Microsoft about files and programs run on PCs with this feature enabled. - If you enable this policy, SmartScreen will be turned on for all users. Its behavior can be controlled by the following options: - Warn and prevent bypass -- Warn +- Warn. -- If you enable this policy with the "Warn and prevent bypass" option, SmartScreen's dialogs will not present the user with the option to disregard the warning and run the app. SmartScreen will continue to show the warning on subsequent attempts to run the app. +- If you enable this policy with the "Warn and prevent bypass" option, SmartScreen's dialogs won't present the user with the option to disregard the warning and run the app. SmartScreen will continue to show the warning on subsequent attempts to run the app. -- If you enable this policy with the "Warn" option, SmartScreen's dialogs will warn the user that the app appears suspicious, but will permit the user to disregard the warning and run the app anyway. SmartScreen will not warn the user again for that app if the user tells SmartScreen to run the app. +- If you enable this policy with the "Warn" option, SmartScreen's dialogs will warn the user that the app appears suspicious, but will permit the user to disregard the warning and run the app anyway. SmartScreen won't warn the user again for that app if the user tells SmartScreen to run the app. -- If you disable this policy, SmartScreen will be turned off for all users. Users will not be warned if they try to run suspicious apps from the Internet. +- If you disable this policy, SmartScreen will be turned off for all users. Users won't be warned if they try to run suspicious apps from the Internet. -- If you do not configure this policy, SmartScreen will be enabled by default, but users may change their settings. +- If you don't configure this policy, SmartScreen will be enabled by default, but users may change their settings. @@ -221,7 +221,7 @@ Some information is sent to Microsoft about files and programs run on PCs with t | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -231,7 +231,7 @@ Some information is sent to Microsoft about files and programs run on PCs with t | Value | Description | |:--|:--| -| 0 (Default) | Do not prevent override. | +| 0 (Default) | Don't prevent override. | | 1 | Prevent override. | diff --git a/windows/client-management/mdm/policy-csp-speech.md b/windows/client-management/mdm/policy-csp-speech.md index 967b68b67e..58eef7e770 100644 --- a/windows/client-management/mdm/policy-csp-speech.md +++ b/windows/client-management/mdm/policy-csp-speech.md @@ -4,7 +4,7 @@ description: Learn more about the Speech Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -53,7 +53,7 @@ If enabled (default), the device will periodically check for updated speech mode | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | diff --git a/windows/client-management/mdm/policy-csp-start.md b/windows/client-management/mdm/policy-csp-start.md index 040fb1fed2..a4e21ea68d 100644 --- a/windows/client-management/mdm/policy-csp-start.md +++ b/windows/client-management/mdm/policy-csp-start.md @@ -4,7 +4,7 @@ description: Learn more about the Start Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 05/01/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -49,7 +49,7 @@ This policy controls the visibility of the Documents shortcut on the Start menu. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 65535 | @@ -76,7 +76,7 @@ This policy controls the visibility of the Documents shortcut on the Start menu. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -99,7 +99,7 @@ This policy controls the visibility of the Downloads shortcut on the Start menu. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 65535 | @@ -126,7 +126,7 @@ This policy controls the visibility of the Downloads shortcut on the Start menu. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -149,7 +149,7 @@ This policy controls the visibility of the File Explorer shortcut on the Start m | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 65535 | @@ -176,7 +176,7 @@ This policy controls the visibility of the File Explorer shortcut on the Start m | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -199,7 +199,7 @@ This policy controls the visibility of the HomeGroup shortcut on the Start menu. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 65535 | @@ -226,7 +226,7 @@ This policy controls the visibility of the HomeGroup shortcut on the Start menu. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -249,7 +249,7 @@ This policy controls the visibility of the Music shortcut on the Start menu. The | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 65535 | @@ -276,7 +276,7 @@ This policy controls the visibility of the Music shortcut on the Start menu. The | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -299,7 +299,7 @@ This policy controls the visibility of the Network shortcut on the Start menu. T | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 65535 | @@ -326,7 +326,7 @@ This policy controls the visibility of the Network shortcut on the Start menu. T | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -349,7 +349,7 @@ This policy controls the visibility of the PersonalFolder shortcut on the Start | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 65535 | @@ -376,7 +376,7 @@ This policy controls the visibility of the PersonalFolder shortcut on the Start | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -399,7 +399,7 @@ This policy controls the visibility of the Pictures shortcut on the Start menu. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 65535 | @@ -426,7 +426,7 @@ This policy controls the visibility of the Pictures shortcut on the Start menu. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -449,7 +449,7 @@ This policy controls the visibility of the Settings shortcut on the Start menu. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 65535 | @@ -476,7 +476,7 @@ This policy controls the visibility of the Settings shortcut on the Start menu. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -499,7 +499,7 @@ This policy controls the visibility of the Videos shortcut on the Start menu. Th | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 65535 | @@ -526,7 +526,7 @@ This policy controls the visibility of the Videos shortcut on the Start menu. Th | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -559,7 +559,7 @@ This string policy takes a JSON file named `LayoutModification.json`. The file e | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -584,7 +584,7 @@ This string policy takes a JSON file named `LayoutModification.json`. The file e | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -613,7 +613,7 @@ If you enable this policy, then invocations of context menus within the Start Me | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -623,7 +623,7 @@ If you enable this policy, then invocations of context menus within the Start Me | Value | Description | |:--|:--| -| 0 (Default) | Do not disable. | +| 0 (Default) | Don't disable. | | 1 | Disable. | @@ -653,7 +653,7 @@ If you enable this policy, then invocations of context menus within the Start Me | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -668,7 +668,7 @@ This policy setting removes Quick Settings from the bottom right area on the tas The quick settings area is located at the left of the clock in the taskbar and includes icons for current network and volume. -If this setting is enabled, Quick Settings is not displayed in the quick settings area. +If this setting is enabled, Quick Settings isn't displayed in the quick settings area. A reboot is required for this policy setting to take effect. @@ -682,7 +682,7 @@ A reboot is required for this policy setting to take effect. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -721,7 +721,7 @@ A reboot is required for this policy setting to take effect. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -747,7 +747,7 @@ A reboot is required for this policy setting to take effect. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -787,7 +787,7 @@ A reboot is required for this policy setting to take effect. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -819,7 +819,7 @@ If there's a policy configuration conflict, the latest configuration request is | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -829,7 +829,7 @@ If there's a policy configuration conflict, the latest configuration request is | Value | Description | |:--|:--| -| 0 (Default) | Do not force size of Start. | +| 0 (Default) | Don't force size of Start. | | 1 | Force non-fullscreen size of Start. | | 2 | Force a fullscreen size of Start. | @@ -859,7 +859,7 @@ If there's a policy configuration conflict, the latest configuration request is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -903,7 +903,7 @@ To validate this policy, do the following steps: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -931,7 +931,7 @@ To validate this policy, do the following steps: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -954,7 +954,7 @@ Enabling this policy hides "Change account settings" from appearing in the user | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -964,7 +964,7 @@ Enabling this policy hides "Change account settings" from appearing in the user | Value | Description | |:--|:--| -| 0 (Default) | Do not hide. | +| 0 (Default) | Don't hide. | | 1 | Hide. | @@ -980,7 +980,7 @@ Enabling this policy hides "Change account settings" from appearing in the user | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -998,7 +998,7 @@ Enabling this policy hides "Change account settings" from appearing in the user - If you enable this setting, the frequently used programs list is removed from the Start menu. -- If you disable this setting or do not configure it, the frequently used programs list remains on the simple Start menu. +- If you disable this setting or don't configure it, the frequently used programs list remains on the simple Start menu. @@ -1022,7 +1022,7 @@ To validate this policy, do the following steps: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1032,7 +1032,7 @@ To validate this policy, do the following steps: | Value | Description | |:--|:--| -| 0 (Default) | Do not hide. | +| 0 (Default) | Don't hide. | | 1 | Hide. | @@ -1062,7 +1062,7 @@ To validate this policy, do the following steps: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1088,7 +1088,7 @@ Enabling this policy hides "Hibernate" from appearing in the power button in the | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1098,7 +1098,7 @@ Enabling this policy hides "Hibernate" from appearing in the power button in the | Value | Description | |:--|:--| -| 0 (Default) | Do not hide. | +| 0 (Default) | Don't hide. | | 1 | Hide. | @@ -1114,7 +1114,7 @@ Enabling this policy hides "Hibernate" from appearing in the power button in the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1137,7 +1137,7 @@ Enabling this policy hides "Lock" from appearing in the user tile in the start m | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | | Dependency [Start_HideLock_DependencyGroup] | Dependency Type: `DependsOn`
    Dependency URI: `Device/Vendor/MSFT/Policy/Config/Start/HideUserTile`
    Dependency Allowed Value: `[0]`
    Dependency Allowed Value Type: `Range`
    | @@ -1148,7 +1148,7 @@ Enabling this policy hides "Lock" from appearing in the user tile in the start m | Value | Description | |:--|:--| -| 0 (Default) | Do not hide. | +| 0 (Default) | Don't hide. | | 1 | Hide. | @@ -1164,7 +1164,7 @@ Enabling this policy hides "Lock" from appearing in the user tile in the start m | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1177,7 +1177,7 @@ Enabling this policy hides "Lock" from appearing in the user tile in the start m This policy allows you to remove the People Bar from the taskbar and disables the My People experience. -If you enable this policy the people icon will be removed from the taskbar, the corresponding settings toggle is removed from the taskbar settings page, and users will not be able to pin people to the taskbar. +If you enable this policy the people icon will be removed from the taskbar, the corresponding settings toggle is removed from the taskbar settings page, and users won't be able to pin people to the taskbar. @@ -1189,7 +1189,7 @@ If you enable this policy the people icon will be removed from the taskbar, the | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1199,7 +1199,7 @@ If you enable this policy the people icon will be removed from the taskbar, the | Value | Description | |:--|:--| -| 0 (Default) | Do not hide. | +| 0 (Default) | Don't hide. | | 1 | Hide. | @@ -1229,7 +1229,7 @@ If you enable this policy the people icon will be removed from the taskbar, the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1255,7 +1255,7 @@ Enabling this policy hides the power button from appearing in the start menu. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1265,7 +1265,7 @@ Enabling this policy hides the power button from appearing in the start menu. | Value | Description | |:--|:--| -| 0 (Default) | Do not hide. | +| 0 (Default) | Don't hide. | | 1 | Hide. | @@ -1281,7 +1281,7 @@ Enabling this policy hides the power button from appearing in the start menu. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1323,7 +1323,7 @@ To validate this policy, do the following steps: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1333,7 +1333,7 @@ To validate this policy, do the following steps: | Value | Description | |:--|:--| -| 0 (Default) | Do not hide. | +| 0 (Default) | Don't hide. | | 1 | Hide. | @@ -1349,7 +1349,7 @@ To validate this policy, do the following steps: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1390,7 +1390,7 @@ To validate this policy, do the following steps: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1400,7 +1400,7 @@ To validate this policy, do the following steps: | Value | Description | |:--|:--| -| 0 (Default) | Do not hide. | +| 0 (Default) | Don't hide. | | 1 | Hide. | @@ -1430,7 +1430,7 @@ To validate this policy, do the following steps: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | | @@ -1457,7 +1457,7 @@ This policy setting allows you to hide the personalized websites in the recommen | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1492,7 +1492,7 @@ This policy setting allows you to hide the personalized websites in the recommen | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -1521,7 +1521,7 @@ If you enable this policy setting, the Start Menu will no longer show the sectio | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1561,7 +1561,7 @@ If you enable this policy setting, the Start Menu will no longer show the sectio | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1584,7 +1584,7 @@ Enabling this policy hides "Restart/Update and restart" from appearing in the po | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1594,7 +1594,7 @@ Enabling this policy hides "Restart/Update and restart" from appearing in the po | Value | Description | |:--|:--| -| 0 (Default) | Do not hide. | +| 0 (Default) | Don't hide. | | 1 | Hide. | @@ -1610,7 +1610,7 @@ Enabling this policy hides "Restart/Update and restart" from appearing in the po | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1633,7 +1633,7 @@ Enabling this policy hides "Shut down/Update and shut down" from appearing in th | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1643,7 +1643,7 @@ Enabling this policy hides "Shut down/Update and shut down" from appearing in th | Value | Description | |:--|:--| -| 0 (Default) | Do not hide. | +| 0 (Default) | Don't hide. | | 1 | Hide. | @@ -1659,7 +1659,7 @@ Enabling this policy hides "Shut down/Update and shut down" from appearing in th | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1682,7 +1682,7 @@ Enabling this policy hides "Sign out" from appearing in the user tile in the sta | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | | Dependency [Start_HideSignOut_DependencyGroup] | Dependency Type: `DependsOn`
    Dependency URI: `Device/Vendor/MSFT/Policy/Config/Start/HideUserTile`
    Dependency Allowed Value: `[0]`
    Dependency Allowed Value Type: `Range`
    | @@ -1693,7 +1693,7 @@ Enabling this policy hides "Sign out" from appearing in the user tile in the sta | Value | Description | |:--|:--| -| 0 (Default) | Do not hide. | +| 0 (Default) | Don't hide. | | 1 | Hide. | @@ -1709,7 +1709,7 @@ Enabling this policy hides "Sign out" from appearing in the user tile in the sta | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1732,7 +1732,7 @@ Enabling this policy hides "Sleep" from appearing in the power button in the sta | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1742,7 +1742,7 @@ Enabling this policy hides "Sleep" from appearing in the power button in the sta | Value | Description | |:--|:--| -| 0 (Default) | Do not hide. | +| 0 (Default) | Don't hide. | | 1 | Hide. | @@ -1758,7 +1758,7 @@ Enabling this policy hides "Sleep" from appearing in the power button in the sta | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1781,7 +1781,7 @@ Enabling this policy hides "Switch account" from appearing in the user tile in t | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1791,7 +1791,7 @@ Enabling this policy hides "Switch account" from appearing in the user tile in t | Value | Description | |:--|:--| -| 0 (Default) | Do not hide. | +| 0 (Default) | Don't hide. | | 1 | Hide. | @@ -1807,7 +1807,7 @@ Enabling this policy hides "Switch account" from appearing in the user tile in t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -1836,7 +1836,7 @@ If you enable this policy setting, the TaskView button will be hidden and the Se | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1876,7 +1876,7 @@ If you enable this policy setting, the TaskView button will be hidden and the Se | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1902,7 +1902,7 @@ Enabling this policy hides the user tile from appearing in the start menu. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1912,7 +1912,7 @@ Enabling this policy hides the user tile from appearing in the start menu. | Value | Description | |:--|:--| -| 0 (Default) | Do not hide. | +| 0 (Default) | Don't hide. | | 1 | Hide. | @@ -1928,7 +1928,7 @@ Enabling this policy hides the user tile from appearing in the start menu. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1939,7 +1939,7 @@ Enabling this policy hides the user tile from appearing in the start menu. -This policy setting allows you to import Edge assets to be used with StartLayout policy. Start layout can contain secondary tile from Edge app which looks for Edge local asset file. Edge local asset would not exist and cause Edge secondary tile to appear empty in this case. This policy only gets applied when StartLayout policy is modified. +This policy setting allows you to import Edge assets to be used with StartLayout policy. Start layout can contain secondary tile from Edge app which looks for Edge local asset file. Edge local asset wouldn't exist and cause Edge secondary tile to appear empty in this case. This policy only gets applied when StartLayout policy is modified. @@ -1968,7 +1968,7 @@ To validate this policy, do the following steps: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1984,7 +1984,7 @@ To validate this policy, do the following steps: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1997,8 +1997,9 @@ To validate this policy, do the following steps: This policy setting allows you to control pinning programs to the Taskbar. -- If you enable this policy setting, users cannot change the programs currently pinned to the Taskbar. If any programs are already pinned to the Taskbar, these programs continue to show in the Taskbar. However, users cannot unpin these programs already pinned to the Taskbar, and they cannot pin new programs to the Taskbar. -- If you disable or do not configure this policy setting, users can change the programs currently pinned to the Taskbar. +- If you enable this policy setting, users can't change the programs currently pinned to the Taskbar. If any programs are already pinned to the Taskbar, these programs continue to show in the Taskbar. However, users can't unpin these programs already pinned to the Taskbar, and they can't pin new programs to the Taskbar. + +- If you disable or don't configure this policy setting, users can change the programs currently pinned to the Taskbar. @@ -2018,7 +2019,7 @@ To validate this policy, do the following steps: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2044,7 +2045,7 @@ To validate this policy, do the following steps: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2059,16 +2060,15 @@ To validate this policy, do the following steps: +If you enable this policy setting, you can configure Start menu to show or hide the list of user's most used apps, regardless of user settings. -- If you enable this policy setting, you can configure Start menu to show or hide the list of user's most used apps, regardless of user settings. +Selecting "Show" will force the "Most used" list to be shown, and user can't change to hide it using the Settings app. -Selecting "Show" will force the "Most used" list to be shown, and user cannot change to hide it using the Settings app. +Selecting "Hide" will force the "Most used" list to be hidden, and user can't change to show it using the Settings app. -Selecting "Hide" will force the "Most used" list to be hidden, and user cannot change to show it using the Settings app. +Selecting "Not Configured", or if you disable or don't configure this policy setting, all will allow users to turn on or off the display of "Most used" list using the Settings app. This is default behavior. -Selecting "Not Configured", or if you disable or do not configure this policy setting, all will allow users to turn on or off the display of "Most used" list using the Settings app. This is default behavior. - -**Note** configuring this policy to "Show" or "Hide" on supported versions of Windows 10 will supercede any policy setting of "Remove frequent programs list from the Start Menu" (which manages same part of Start menu but with fewer options). +Note configuring this policy to "Show" or "Hide" on supported versions of Windows 10 will supercede any policy setting of "Remove frequent programs list from the Start Menu" (which manages same part of Start menu but with fewer options). @@ -2080,7 +2080,7 @@ Selecting "Not Configured", or if you disable or do not configure this policy se | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2090,7 +2090,7 @@ Selecting "Not Configured", or if you disable or do not configure this policy se | Value | Description | |:--|:--| -| 0 (Default) | Do not enforce visibility of list of most used apps in Start; user can control via Settings app (default behavior equivalent to not configuring this policy). | +| 0 (Default) | Don't enforce visibility of list of most used apps in Start; user can control via Settings app (default behavior equivalent to not configuring this policy). | | 1 | Force showing of list of most used apps in Start; corresponding toggle in Setting app is disabled. | | 2 | Force hiding of list of most used apps in Start; corresponding toggle in Setting app is disabled. | @@ -2120,7 +2120,7 @@ Selecting "Not Configured", or if you disable or do not configure this policy se | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -2146,7 +2146,7 @@ Selecting "Not Configured", or if you disable or do not configure this policy se | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2186,7 +2186,7 @@ Selecting "Not Configured", or if you disable or do not configure this policy se | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -2204,11 +2204,12 @@ Selecting "Not Configured", or if you disable or do not configure this policy se Specifies the Start layout for users. This setting lets you specify the Start layout for users and prevents them from changing its configuration. The Start layout you specify must be stored in an XML file that was generated by the Export-StartLayout PowerShell cmdlet. + To use this setting, you must first manually configure a device's Start layout to the desired look and feel. Once you are done, run the Export-StartLayout PowerShell cmdlet on that same device. The cmdlet will generate an XML file representing the layout you configured. -Once the XML file is generated and moved to the desired file path, type the fully qualified path and name of the XML file. You can type a local path, such as C:\StartLayouts\myLayout.xml or a UNC path, such as \\Server\Share\Layout.xml. If the specified file is not available when the user logs on, the layout won't be changed. Users cannot customize their Start screen while this setting is enabled. +Once the XML file is generated and moved to the desired file path, type the fully qualified path and name of the XML file. You can type a local path, such as C:\StartLayouts\myLayout.xml or a UNC path, such as \\Server\Share\Layout.xml. If the specified file isn't available when the user logs on, the layout won't be changed. Users can't customize their Start screen while this setting is enabled. -If you disable this setting or do not configure it, the Start screen layout won't be changed and users will be able to customize it. +If you disable this setting or don't configure it, the Start screen layout won't be changed and users will be able to customize it. @@ -2224,7 +2225,7 @@ For more information on how to customize the Start layout, see [Customize the St | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | diff --git a/windows/client-management/mdm/policy-csp-stickers.md b/windows/client-management/mdm/policy-csp-stickers.md index d57c186ddb..204d831614 100644 --- a/windows/client-management/mdm/policy-csp-stickers.md +++ b/windows/client-management/mdm/policy-csp-stickers.md @@ -4,7 +4,7 @@ description: Learn more about the Stickers Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 05/01/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -49,7 +49,7 @@ This policy setting allows you to control whether you want to allow stickers to | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | diff --git a/windows/client-management/mdm/policy-csp-storage.md b/windows/client-management/mdm/policy-csp-storage.md index bbf0efadb7..18fc7fc7db 100644 --- a/windows/client-management/mdm/policy-csp-storage.md +++ b/windows/client-management/mdm/policy-csp-storage.md @@ -4,7 +4,7 @@ description: Learn more about the Storage Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - Storage -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -45,12 +42,15 @@ ms.topic: reference Allows downloading new updates to ML Model parameters for predicting storage disk failure. Enabled: + Updates would be downloaded for the Disk Failure Prediction Failure Model. Disabled: -Updates would not be downloaded for the Disk Failure Prediction Failure Model. + +Updates wouldn't be downloaded for the Disk Failure Prediction Failure Model. Not configured: + Same as Enabled. @@ -63,7 +63,7 @@ Same as Enabled. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -73,7 +73,7 @@ Same as Enabled. | Value | Description | |:--|:--| -| 0 | Do not allow. | +| 0 | Don't allow. | | 1 (Default) | Allow. | @@ -103,7 +103,7 @@ Same as Enabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -117,12 +117,15 @@ Same as Enabled. Storage Sense can automatically clean some of the user's files to free up disk space. By default, Storage Sense is automatically turned on when the machine runs into low disk space and is set to run whenever the machine runs into storage pressure. This cadence can be changed in Storage settings or set with the "Configure Storage Sense cadence" group policy. Enabled: -Storage Sense is turned on for the machine, with the default cadence as 'during low free disk space'. Users cannot disable Storage Sense, but they can adjust the cadence (unless you also configure the "Configure Storage Sense cadence" group policy). + +Storage Sense is turned on for the machine, with the default cadence as 'during low free disk space'. Users can't disable Storage Sense, but they can adjust the cadence (unless you also configure the "Configure Storage Sense cadence" group policy). Disabled: -Storage Sense is turned off the machine. Users cannot enable Storage Sense. + +Storage Sense is turned off the machine. Users can't enable Storage Sense. Not Configured: + By default, Storage Sense is turned off until the user runs into low disk space or the user enables it manually. Users can configure this setting in Storage settings. @@ -135,7 +138,7 @@ By default, Storage Sense is turned off until the user runs into low disk space | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -175,7 +178,7 @@ By default, Storage Sense is turned off until the user runs into low disk space | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -186,17 +189,20 @@ By default, Storage Sense is turned off until the user runs into low disk space -When Storage Sense runs, it can delete the user's temporary files that are not in use. +When Storage Sense runs, it can delete the user's temporary files that aren't in use. -If the group policy "Allow Storage Sense" is disabled, then this policy does not have any effect. +If the group policy "Allow Storage Sense" is disabled, then this policy doesn't have any effect. Enabled: -Storage Sense will delete the user's temporary files that are not in use. Users cannot disable this setting in Storage settings. + +Storage Sense will delete the user's temporary files that aren't in use. Users can't disable this setting in Storage settings. Disabled: -Storage Sense will not delete the user's temporary files. Users cannot enable this setting in Storage settings. + +Storage Sense won't delete the user's temporary files. Users can't enable this setting in Storage settings. Not Configured: + By default, Storage Sense will delete the user's temporary files. Users can configure this setting in Storage settings. @@ -209,7 +215,7 @@ By default, Storage Sense will delete the user's temporary files. Users can conf | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -249,7 +255,7 @@ By default, Storage Sense will delete the user's temporary files. Users can conf | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -262,14 +268,17 @@ By default, Storage Sense will delete the user's temporary files. Users can conf When Storage Sense runs, it can dehydrate cloud-backed content that hasn't been opened in a certain amount of days. -If the group policy "Allow Storage Sense" is disabled, then this policy does not have any effect. +If the group policy "Allow Storage Sense" is disabled, then this policy doesn't have any effect. Enabled: + You must provide the minimum number of days a cloud-backed file can remain unopened before Storage Sense dehydrates it from the sync root. Supported values are: 0 - 365. -If you set this value to zero, Storage Sense will not dehydrate any cloud-backed content. The default value is 0, or never dehydrating cloud-backed content. + +If you set this value to zero, Storage Sense won't dehydrate any cloud-backed content. The default value is 0, or never dehydrating cloud-backed content. Disabled or Not Configured: -By default, Storage Sense will not dehydrate any cloud-backed content. Users can configure this setting in Storage settings. + +By default, Storage Sense won't dehydrate any cloud-backed content. Users can configure this setting in Storage settings. @@ -281,7 +290,7 @@ By default, Storage Sense will not dehydrate any cloud-backed content. Users can | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-365]` | | Default Value | 0 | @@ -312,7 +321,7 @@ By default, Storage Sense will not dehydrate any cloud-backed content. Users can | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -325,14 +334,17 @@ By default, Storage Sense will not dehydrate any cloud-backed content. Users can When Storage Sense runs, it can delete files in the user's Downloads folder if they haven't been opened for more than a certain number of days. -If the group policy "Allow Storage Sense" is disabled, then this policy does not have any effect. +If the group policy "Allow Storage Sense" is disabled, then this policy doesn't have any effect. Enabled: + You must provide the minimum number of days a file can remain unopened before Storage Sense deletes it from Downloads folder. Supported values are: 0 - 365. -If you set this value to zero, Storage Sense will not delete files in the user's Downloads folder. The default is 0, or never deleting files in the Downloads folder. + +If you set this value to zero, Storage Sense won't delete files in the user's Downloads folder. The default is 0, or never deleting files in the Downloads folder. Disabled or Not Configured: -By default, Storage Sense will not delete files in the user's Downloads folder. Users can configure this setting in Storage settings. + +By default, Storage Sense won't delete files in the user's Downloads folder. Users can configure this setting in Storage settings. @@ -344,7 +356,7 @@ By default, Storage Sense will not delete files in the user's Downloads folder. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-365]` | | Default Value | 0 | @@ -375,7 +387,7 @@ By default, Storage Sense will not delete files in the user's Downloads folder. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -388,12 +400,14 @@ By default, Storage Sense will not delete files in the user's Downloads folder. Storage Sense can automatically clean some of the user's files to free up disk space. -If the group policy "Allow Storage Sense" is disabled, then this policy does not have any effect. +If the group policy "Allow Storage Sense" is disabled, then this policy doesn't have any effect. Enabled: + You must provide the desired Storage Sense cadence. Supported options are: daily, weekly, monthly, and during low free disk space. The default is 0 (during low free disk space). Disabled or Not Configured: + By default, the Storage Sense cadence is set to "during low free disk space". Users can configure this setting in Storage settings. @@ -413,7 +427,7 @@ Use the following integer values for the supported options: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-4294967295]` | | Default Value | 0 | @@ -444,7 +458,7 @@ Use the following integer values for the supported options: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -455,15 +469,18 @@ Use the following integer values for the supported options: -When Storage Sense runs, it can delete files in the user's Recycle Bin if they have been there for over a certain amount of days. +When Storage Sense runs, it can delete files in the user's Recycle Bin if they've been there for over a certain amount of days. -If the group policy "Allow Storage Sense" is disabled, then this policy does not have any effect. +If the group policy "Allow Storage Sense" is disabled, then this policy doesn't have any effect. Enabled: + You must provide the minimum age threshold (in days) of a file in the Recycle Bin before Storage Sense will delete it. Supported values are: 0 - 365. -If you set this value to zero, Storage Sense will not delete files in the user's Recycle Bin. The default is 30 days. + +If you set this value to zero, Storage Sense won't delete files in the user's Recycle Bin. The default is 30 days. Disabled or Not Configured: + By default, Storage Sense will delete files in the user's Recycle Bin that have been there for over 30 days. Users can configure this setting in Storage settings. @@ -476,7 +493,7 @@ By default, Storage Sense will delete files in the user's Recycle Bin that have | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-365]` | | Default Value | 30 | @@ -507,7 +524,7 @@ By default, Storage Sense will delete files in the user's Recycle Bin that have | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -520,9 +537,9 @@ By default, Storage Sense will delete files in the user's Recycle Bin that have This policy setting configures whether or not Windows will activate an Enhanced Storage device. -- If you enable this policy setting, Windows will not activate unactivated Enhanced Storage devices. +- If you enable this policy setting, Windows won't activate unactivated Enhanced Storage devices. -- If you disable or do not configure this policy setting, Windows will activate unactivated Enhanced Storage devices. +- If you disable or don't configure this policy setting, Windows will activate unactivated Enhanced Storage devices. @@ -534,13 +551,12 @@ This policy setting configures whether or not Windows will activate an Enhanced | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -567,7 +583,7 @@ This policy setting configures whether or not Windows will activate an Enhanced | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -582,10 +598,10 @@ This policy setting denies write access to removable disks. - If you enable this policy setting, write access is denied to this removable storage class. -- If you disable or do not configure this policy setting, write access is allowed to this removable storage class. +- If you disable or don't configure this policy setting, write access is allowed to this removable storage class. > [!NOTE] -> To require that users write data to BitLocker-protected storage, enable the policy setting "Deny write access to drives not protected by BitLocker," which is located in "Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Removable Data Drives." +> To require that users write data to BitLocker-protected storage, enable the policy setting "Deny write access to drives not protected by BitLocker," which is located in "Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Removable Data Drives". @@ -597,7 +613,7 @@ This policy setting denies write access to removable disks. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -636,7 +652,7 @@ This policy setting denies write access to removable disks. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -651,7 +667,7 @@ This policy setting denies read access to removable disks, which may include med - If you enable this policy setting, read access is denied to this removable storage class. -- If you disable or do not configure this policy setting, read access is allowed to this removable storage class. +- If you disable or don't configure this policy setting, read access is allowed to this removable storage class. @@ -674,13 +690,12 @@ To enable this policy, the minimum OS requirement is Windows 10, version 1809 an | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -707,7 +722,7 @@ To enable this policy, the minimum OS requirement is Windows 10, version 1809 an | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -722,7 +737,7 @@ This policy setting denies read access to removable disks, which may include med - If you enable this policy setting, read access is denied to this removable storage class. -- If you disable or do not configure this policy setting, read access is allowed to this removable storage class. +- If you disable or don't configure this policy setting, read access is allowed to this removable storage class. @@ -745,13 +760,12 @@ To enable this policy, the minimum OS requirement is Windows 10, version 1809 an | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -778,7 +792,7 @@ To enable this policy, the minimum OS requirement is Windows 10, version 1809 an | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -793,7 +807,7 @@ This policy setting denies write access to removable disks, which may include me - If you enable this policy setting, write access is denied to this removable storage class. -- If you disable or do not configure this policy setting, write access is allowed to this removable storage class. +- If you disable or don't configure this policy setting, write access is allowed to this removable storage class. @@ -816,13 +830,12 @@ To enable this policy, the minimum OS requirement is Windows 10, version 1809 an | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -849,7 +862,7 @@ To enable this policy, the minimum OS requirement is Windows 10, version 1809 an | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -864,7 +877,7 @@ This policy setting denies write access to removable disks, which may include me - If you enable this policy setting, write access is denied to this removable storage class. -- If you disable or do not configure this policy setting, write access is allowed to this removable storage class. +- If you disable or don't configure this policy setting, write access is allowed to this removable storage class. @@ -887,13 +900,12 @@ To enable this policy, the minimum OS requirement is Windows 10, version 1809 an | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-system.md b/windows/client-management/mdm/policy-csp-system.md index 3af6abb66f..3675d15cfb 100644 --- a/windows/client-management/mdm/policy-csp-system.md +++ b/windows/client-management/mdm/policy-csp-system.md @@ -4,7 +4,7 @@ description: Learn more about the System Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,13 +16,9 @@ ms.topic: reference # Policy CSP - System -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] -> [!IMPORTANT] -> This CSP contains preview policies that are under development and only applicable for [Windows Insider Preview builds](/windows-insider/). These policies are subject to change and may have dependencies on other features or services in preview. +[!INCLUDE [Windows Insider tip](includes/mdm-insider-csp-note.md)] @@ -34,7 +30,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -47,7 +43,7 @@ ms.topic: reference This policy setting determines whether users can get preview builds of Windows, by configuring controls in Settings > Update and security > Windows Insider Program. -- If you enable or do not configure this policy setting, users can download and install preview builds of Windows by configuring Windows Insider Program settings. +- If you enable or don't configure this policy setting, users can download and install preview builds of Windows by configuring Windows Insider Program settings. - If you disable this policy setting, Windows Insider Program settings will be unavailable to users through the Settings app. @@ -63,7 +59,7 @@ This policy is only supported up to Windows 10, Version 1703. Please use 'Manage | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 2 | @@ -104,7 +100,7 @@ This policy is only supported up to Windows 10, Version 1703. Please use 'Manage | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -116,13 +112,16 @@ This policy is only supported up to Windows 10, Version 1703. Please use 'Manage AllowCommercialDataPipeline configures an Azure Active Directory joined device so that Microsoft is the processor of the Windows diagnostic data collected from the device, subject to the Product Terms at< https://go.microsoft.com/fwlink/?linkid=2185086>. + To enable this behavior: 1. Enable this policy setting -2. Join an Azure Active Directory account to the device +2. Join an Azure Active Directory account to the device. + +Windows diagnostic data is collected when the Allow Telemetry policy setting is set to value 1 - Required or above. Configuring this setting doesn't change the Windows diagnostic data collection level set for the device. + +If you disable or don't configure this setting, Microsoft will be the controller of the Windows diagnostic data collected from the device and processed in accordance with Microsoft's privacy statement at unless you have enabled policies like 'Allow Update Compliance Processing' or 'Allow Desktop Analytics Processing". -Windows diagnostic data is collected when the Allow Telemetry policy setting is set to value 1 - Required or above. Configuring this setting does not change the Windows diagnostic data collection level set for the device -If you disable or do not configure this setting, Microsoft will be the controller of the Windows diagnostic data collected from the device and processed in accordance with Microsoft's privacy statement at unless you have enabled policies like 'Allow Update Compliance Processing' or 'Allow Desktop Analytics Processing". See the documentation at for information on this and other policies that will result in Microsoft being the processor of Windows diagnostic data. @@ -140,7 +139,7 @@ See the documentation at for i | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -179,7 +178,7 @@ See the documentation at for i | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763.1217] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.836] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763.1217] and later
    ✅ Windows 10, version 1903 [10.0.18362.836] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -191,16 +190,18 @@ See the documentation at for i This policy setting, in combination with the Allow Telemetry and Configure the Commercial ID, enables organizations to configure the device so that Microsoft is the processor for Windows diagnostic data collected from the device, subject to the Product Terms at< https://go.microsoft.com/fwlink/?linkid=2185086>. + To enable this behavior: 1. Enable this policy setting -2. Join an Azure Active Directory account to the device +2. Join an Azure Active Directory account to the device. 3. Set Allow Telemetry to value 1 - Required, or higher -4. Set the Configure the Commercial ID setting for your Desktop Analytics workspace +4. Set the Configure the Commercial ID setting for your Desktop Analytics workspace. When these policies are configured, Windows diagnostic data collected from the device will be subject to Microsoft processor commitments. -This setting has no effect on devices unless they are properly enrolled in Desktop Analytics. If you disable this policy setting, devices will not appear in Desktop Analytics. + +This setting has no effect on devices unless they're properly enrolled in Desktop Analytics. If you disable this policy setting, devices won't appear in Desktop Analytics. @@ -214,7 +215,7 @@ This setting has no effect on devices unless they are properly enrolled in Deskt | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -253,7 +254,7 @@ This setting has no effect on devices unless they are properly enrolled in Deskt | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -266,7 +267,7 @@ This setting has no effect on devices unless they are properly enrolled in Deskt This policy allows the device name to be sent to Microsoft as part of Windows diagnostic data. -If you disable or do not configure this policy setting, then device name will not be sent to Microsoft as part of Windows diagnostic data. +If you disable or don't configure this policy setting, then device name won't be sent to Microsoft as part of Windows diagnostic data. @@ -278,7 +279,7 @@ If you disable or do not configure this policy setting, then device name will no | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -317,7 +318,7 @@ If you disable or do not configure this policy setting, then device name will no | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -340,7 +341,7 @@ Specifies whether set general purpose device to be in embedded mode. Most restri | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -366,7 +367,7 @@ Specifies whether set general purpose device to be in embedded mode. Most restri | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -379,7 +380,7 @@ Specifies whether set general purpose device to be in embedded mode. Most restri > [!NOTE] -> This policy is not supported in Windows 10, version 1607. This policy setting determines the level that Microsoft can experiment with the product to study user preferences or device behavior. Most restricted value is 0. +> This policy isn't supported in Windows 10, version 1607. This policy setting determines the level that Microsoft can experiment with the product to study user preferences or device behavior. Most restricted value is 0. @@ -391,7 +392,7 @@ Specifies whether set general purpose device to be in embedded mode. Most restri | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -418,7 +419,7 @@ Specifies whether set general purpose device to be in embedded mode. Most restri | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -433,9 +434,9 @@ This policy setting determines whether Windows is allowed to download fonts and - If you enable this policy setting, Windows periodically queries an online font provider to determine whether a new font catalog is available. Windows may also download font data if needed to format or render text. -- If you disable this policy setting, Windows does not connect to an online font provider and only enumerates locally-installed fonts. +- If you disable this policy setting, Windows doesn't connect to an online font provider and only enumerates locally-installed fonts. -- If you do not configure this policy setting, the default behavior depends on the Windows edition. Changes to this policy take effect on reboot. +- If you don't configure this policy setting, the default behavior depends on the Windows edition. Changes to this policy take effect on reboot. @@ -453,7 +454,7 @@ This setting is used by lower-level components for text display and fond handlin | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -493,7 +494,7 @@ This setting is used by lower-level components for text display and fond handlin | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -516,7 +517,7 @@ Specifies whether to allow app access to the Location service. Most restricted v | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -526,9 +527,9 @@ Specifies whether to allow app access to the Location service. Most restricted v | Value | Description | |:--|:--| -| 0 | Force Location Off. All Location Privacy settings are toggled off and grayed out. Users cannot change the settings, and no apps are allowed access to the Location service, including Cortana and Search. | +| 0 | Force Location Off. All Location Privacy settings are toggled off and grayed out. Users can't change the settings, and no apps are allowed access to the Location service, including Cortana and Search. | | 1 (Default) | Location service is allowed. The user has control and can change Location Privacy settings on or off. | -| 2 | Force Location On. All Location Privacy settings are toggled on and grayed out. Users cannot change the settings and all consent permissions will be automatically suppressed. | +| 2 | Force Location On. All Location Privacy settings are toggled on and grayed out. Users can't change the settings and all consent permissions will be automatically suppressed. | @@ -557,7 +558,7 @@ Specifies whether to allow app access to the Location service. Most restricted v | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763.1217] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.836] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763.1217] and later
    ✅ Windows 10, version 1903 [10.0.18362.836] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -572,7 +573,7 @@ This policy is deprecated and will only work on Windows 10 version 1809. Setting This policy setting configures an Azure Active Directory joined device so that Microsoft is the processor of the Windows diagnostic data collected from the device, subject to the Product Terms at< https://go.microsoft.com/fwlink/?linkid=2185086>. For customers who enroll into the Microsoft Managed Desktop service, enabling this policy is required to allow Microsoft to process data for operational and analytic needs. See for more information. hen these policies are configured, Windows diagnostic data collected from the device will be subject to Microsoft processor commitments. -This setting has no effect on devices unless they are properly enrolled in Microsoft Managed Desktop. If you disable this policy setting, devices may not appear in Microsoft Managed Desktop. +This setting has no effect on devices unless they're properly enrolled in Microsoft Managed Desktop. If you disable this policy setting, devices may not appear in Microsoft Managed Desktop. @@ -586,7 +587,7 @@ This setting has no effect on devices unless they are properly enrolled in Micro | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -612,7 +613,7 @@ This setting has no effect on devices unless they are properly enrolled in Micro | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -635,7 +636,7 @@ Controls whether the user is allowed to use the storage card for device storage. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -645,7 +646,7 @@ Controls whether the user is allowed to use the storage card for device storage. | Value | Description | |:--|:--| -| 0 | SD card use is not allowed and USB drives are disabled. This setting does not prevent programmatic access to the storage card. | +| 0 | SD card use isn't allowed and USB drives are disabled. This setting doesn't prevent programmatic access to the storage card. | | 1 (Default) | Allow a storage card. | @@ -661,7 +662,7 @@ Controls whether the user is allowed to use the storage card for device storage. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -676,15 +677,18 @@ Controls whether the user is allowed to use the storage card for device storage. -By configuring this policy setting you can adjust what diagnostic data is collected from Windows. This policy setting also restricts the user from increasing the amount of diagnostic data collection via the Settings app. The diagnostic data collected under this policy impacts the operating system and apps that are considered part of Windows and does not apply to any additional apps installed by your organization. +By configuring this policy setting you can adjust what diagnostic data is collected from Windows. This policy setting also restricts the user from increasing the amount of diagnostic data collection via the Settings app. The diagnostic data collected under this policy impacts the operating system and apps that are considered part of Windows and doesn't apply to any additional apps installed by your organization. - Diagnostic data off (not recommended). Using this value, no diagnostic data is sent from the device. This value is only supported on Enterprise, Education, and Server editions. + - Send required diagnostic data. This is the minimum diagnostic data necessary to keep Windows secure, up to date, and performing as expected. Using this value disables the "Optional diagnostic data" control in the Settings app. + - Send optional diagnostic data. Additional diagnostic data is collected that helps us to detect, diagnose and fix issues, as well as make product improvements. Required diagnostic data will always be included when you choose to send optional diagnostic data. Optional diagnostic data can also include diagnostic log files and crash dumps. Use the "Limit Dump Collection" and the "Limit Diagnostic Log Collection" policies for more granular control of what optional diagnostic data is sent. -If you disable or do not configure this policy setting, the device will send required diagnostic data and the end user can choose whether to send optional diagnostic data from the Settings app. +If you disable or don't configure this policy setting, the device will send required diagnostic data and the end user can choose whether to send optional diagnostic data from the Settings app. + +Note: -**Note**: The "Configure diagnostic data opt-in settings user interface" group policy can be used to prevent end users from changing their data collection settings. @@ -697,7 +701,7 @@ The "Configure diagnostic data opt-in settings user interface" group policy can | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -707,7 +711,7 @@ The "Configure diagnostic data opt-in settings user interface" group policy can | Value | Description | |:--|:--| -| 0 | Security. Information that is required to help keep Windows more secure, including data about the Connected User Experience and Telemetry component settings, the Malicious Software Removal Tool, and Windows Defender.
    Note: This value is only applicable to Windows 10 Enterprise, Windows 10 Education, Windows 10 Mobile Enterprise, Windows 10 IoT Core (IoT Core), and Windows Server 2016. Using this setting on other devices is equivalent to setting the value of 1. | +| 0 | Security. Information that's required to help keep Windows more secure, including data about the Connected User Experience and Telemetry component settings, the Malicious Software Removal Tool, and Windows Defender.
    Note: This value is only applicable to Windows 10 Enterprise, Windows 10 Education, Windows 10 Mobile Enterprise, Windows 10 IoT Core (IoT Core), and Windows Server 2016. Using this setting on other devices is equivalent to setting the value of 1. | | 1 (Default) | Basic. Basic device info, including: quality-related data, app compatibility, app usage data, and data from the Security level. | | 3 | Full. All data necessary to identify and help to fix problems, plus data from the Security, Basic, and Enhanced levels. | @@ -737,7 +741,7 @@ The "Configure diagnostic data opt-in settings user interface" group policy can | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763.1217] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.836] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763.1217] and later
    ✅ Windows 10, version 1903 [10.0.18362.836] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -749,16 +753,18 @@ The "Configure diagnostic data opt-in settings user interface" group policy can This policy setting, in combination with the Allow Telemetry and Configure the Commercial ID, enables organizations to configure the device so that Microsoft is the processor of the Windows diagnostic data collected from the device, subject to the Product Terms at< https://go.microsoft.com/fwlink/?linkid=2185086>. + To enable this behavior: 1. Enable this policy setting -2. Join an Azure Active Directory account to the device +2. Join an Azure Active Directory account to the device. 3. Set Allow Telemetry to value 1 - Required, or higher -4. Set the Configure the Commercial ID setting for your Update Compliance workspace +4. Set the Configure the Commercial ID setting for your Update Compliance workspace. When these policies are configured, Windows diagnostic data collected from the device will be subject to Microsoft processor commitments. -If you disable or do not configure this policy setting, devices will not appear in Update Compliance. + +If you disable or don't configure this policy setting, devices won't appear in Update Compliance. @@ -772,7 +778,7 @@ If you disable or do not configure this policy setting, devices will not appear | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -811,7 +817,7 @@ If you disable or do not configure this policy setting, devices will not appear | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -834,7 +840,7 @@ Specifies whether to allow the user to factory reset the device by using control | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -860,7 +866,7 @@ Specifies whether to allow the user to factory reset the device by using control | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763.1217] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.836] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763.1217] and later
    ✅ Windows 10, version 1903 [10.0.18362.836] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -872,15 +878,17 @@ Specifies whether to allow the user to factory reset the device by using control This policy setting configures an Azure Active Directory joined device so that Microsoft is the processor of the Windows diagnostic data collected from the device, subject to the Product Terms at< https://go.microsoft.com/fwlink/?linkid=2185086>. + To enable this behavior: 1. Enable this policy setting -2. Join an Azure Active Directory account to the device +2. Join an Azure Active Directory account to the device. -3. Set Allow Telemetry to value 1 - Required, or higher +3. Set Allow Telemetry to value 1 - Required, or higher. When these policies are configured, Windows diagnostic data collected from the device will be subject to Microsoft processor commitments. -If you disable or do not configure this policy setting, devices enrolled to the Windows Update for Business deployment service will not be able to take advantage of some deployment service features. + +If you disable or don't configure this policy setting, devices enrolled to the Windows Update for Business deployment service won't be able to take advantage of some deployment service features. @@ -894,7 +902,7 @@ If you disable or do not configure this policy setting, devices enrolled to the | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -933,7 +941,7 @@ If you disable or do not configure this policy setting, devices enrolled to the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -945,16 +953,20 @@ If you disable or do not configure this policy setting, devices enrolled to the This policy setting allows you to specify which boot-start drivers are initialized based on a classification determined by an Early Launch Antimalware boot-start driver. The Early Launch Antimalware boot-start driver can return the following classifications for each boot-start driver: - - Good: The driver has been signed and has not been tampered with. - - Bad: The driver has been identified as malware. It is recommended that you do not allow known bad drivers to be initialized. - - Bad, but required for boot: The driver has been identified as malware, but the computer cannot successfully boot without loading this driver. - - Unknown: This driver has not been attested to by your malware detection application and has not been classified by the Early Launch Antimalware boot-start driver. -- If you enable this policy setting you will be able to choose which boot-start drivers to initialize the next time the computer is started. +- Good: The driver has been signed and hasn't been tampered with. -- If you disable or do not configure this policy setting, the boot start drivers determined to be Good, Unknown or Bad but Boot Critical are initialized and the initialization of drivers determined to be Bad is skipped. +- Bad: The driver has been identified as malware. It's recommended that you don't allow known bad drivers to be initialized. -If your malware detection application does not include an Early Launch Antimalware boot-start driver or if your Early Launch Antimalware boot-start driver has been disabled, this setting has no effect and all boot-start drivers are initialized. +- Bad, but required for boot: The driver has been identified as malware, but the computer can't successfully boot without loading this driver. + +- Unknown: This driver hasn't been attested to by your malware detection application and hasn't been classified by the Early Launch Antimalware boot-start driver. + +- If you enable this policy setting you'll be able to choose which boot-start drivers to initialize the next time the computer is started. + +- If you disable or don't configure this policy setting, the boot start drivers determined to be Good, Unknown or Bad but Boot Critical are initialized and the initialization of drivers determined to be Bad is skipped. + +If your malware detection application doesn't include an Early Launch Antimalware boot-start driver or if your Early Launch Antimalware boot-start driver has been disabled, this setting has no effect and all boot-start drivers are initialized. @@ -966,13 +978,12 @@ If your malware detection application does not include an Early Launch Antimalwa | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -999,7 +1010,7 @@ If your malware detection application does not include an Early Launch Antimalwa | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -1013,6 +1024,7 @@ If your malware detection application does not include an Early Launch Antimalwa This policy sets the upload endpoint for this device's diagnostic data as part of the Desktop Analytics program. If your organization is participating in the program and has been instructed to configure a custom upload endpoint, then use this setting to define that endpoint. + The value for this setting will be provided by Microsoft as part of the onboarding process for the program. @@ -1025,7 +1037,7 @@ The value for this setting will be provided by Microsoft as part of the onboardi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1055,7 +1067,7 @@ The value for this setting will be provided by Microsoft as part of the onboardi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1068,7 +1080,7 @@ The value for this setting will be provided by Microsoft as part of the onboardi This policy setting controls whether notifications are shown, following a change to diagnostic data opt-in settings, on first logon and when the changes occur in settings. -If you set this policy setting to "Disable diagnostic data change notifications", diagnostic data opt-in change notifications will not appear. +If you set this policy setting to "Disable diagnostic data change notifications", diagnostic data opt-in change notifications won't appear. If you set this policy setting to "Enable diagnostic data change notifications" or don't configure this policy setting, diagnostic data opt-in change notifications appear at first logon and when the changes occur in Settings. @@ -1082,7 +1094,7 @@ If you set this policy setting to "Enable diagnostic data change notifications" | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1121,7 +1133,7 @@ If you set this policy setting to "Enable diagnostic data change notifications" | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1138,8 +1150,9 @@ If you set this policy setting to "Disable diagnostic data opt-in settings", dia If you don't configure this policy setting, or you set it to "Enable diagnostic data opt-in settings", end users can change the device diagnostic settings in the Settings app. -**Note**: -To set a limit on the amount of diagnostic data that is sent to Microsoft by your organization, use the "Allow Diagnostic Data" policy setting. +Note: + +To set a limit on the amount of diagnostic data that's sent to Microsoft by your organization, use the "Allow Diagnostic Data" policy setting. @@ -1151,7 +1164,7 @@ To set a limit on the amount of diagnostic data that is sent to Microsoft by you | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1190,7 +1203,7 @@ To set a limit on the amount of diagnostic data that is sent to Microsoft by you | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -1217,7 +1230,7 @@ This policy setting controls whether the Delete diagnostic data button is enable | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1256,7 +1269,7 @@ This policy setting controls whether the Delete diagnostic data button is enable | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -1269,7 +1282,7 @@ This policy setting controls whether the Delete diagnostic data button is enable This policy setting controls whether users can enable and launch the Diagnostic Data Viewer from the Diagnostic & feedback Settings page. -- If you enable this policy setting, the Diagnostic Data Viewer will not be enabled in Settings page, and it will prevent the viewer from showing diagnostic data collected by Microsoft from the device. +- If you enable this policy setting, the Diagnostic Data Viewer won't be enabled in Settings page, and it will prevent the viewer from showing diagnostic data collected by Microsoft from the device. - If you disable or don't configure this policy setting, the Diagnostic Data Viewer will be enabled in Settings page. @@ -1283,7 +1296,7 @@ This policy setting controls whether users can enable and launch the Diagnostic | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1322,7 +1335,7 @@ This policy setting controls whether users can enable and launch the Diagnostic | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -1345,7 +1358,7 @@ This group policy allows control over whether the DirectX Database Updater task | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1380,7 +1393,7 @@ This group policy allows control over whether the DirectX Database Updater task | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1391,7 +1404,7 @@ This group policy allows control over whether the DirectX Database Updater task -This policy setting blocks the Connected User Experience and Telemetry service from automatically using an authenticated proxy to send data back to Microsoft on Windows 10. If you disable or do not configure this policy setting, the Connected User Experience and Telemetry service will automatically use an authenticated proxy to send data back to Microsoft. Enabling this policy will block the Connected User Experience and Telemetry service from automatically using an authenticated proxy. +This policy setting blocks the Connected User Experience and Telemetry service from automatically using an authenticated proxy to send data back to Microsoft on Windows 10. If you disable or don't configure this policy setting, the Connected User Experience and Telemetry service will automatically use an authenticated proxy to send data back to Microsoft. Enabling this policy will block the Connected User Experience and Telemetry service from automatically using an authenticated proxy. @@ -1403,7 +1416,7 @@ This policy setting blocks the Connected User Experience and Telemetry service f | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1442,7 +1455,7 @@ This policy setting blocks the Connected User Experience and Telemetry service f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1458,12 +1471,16 @@ This policy setting lets you prevent apps and features from working with files o - If you enable this policy setting: * Users can't access OneDrive from the OneDrive app and file picker. + * Windows Store apps can't access OneDrive using the WinRT API. + * OneDrive doesn't appear in the navigation pane in File Explorer. + * OneDrive files aren't kept in sync with the cloud. + * Users can't automatically upload photos and videos from the camera roll folder. -- If you disable or do not configure this policy setting, apps and features can work with OneDrive file storage. +- If you disable or don't configure this policy setting, apps and features can work with OneDrive file storage. @@ -1475,7 +1492,7 @@ This policy setting lets you prevent apps and features from working with files o | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1515,7 +1532,7 @@ This policy setting lets you prevent apps and features from working with files o | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1528,7 +1545,7 @@ This policy setting lets you prevent apps and features from working with files o This policy setting controls whether Windows attempts to connect with the OneSettings service. -- If you enable this policy, Windows will not attempt to connect with the OneSettings Service. +- If you enable this policy, Windows won't attempt to connect with the OneSettings Service. - If you disable or don't configure this policy setting, Windows will periodically attempt to connect with the OneSettings service to download configuration settings. @@ -1542,7 +1559,7 @@ This policy setting controls whether Windows attempts to connect with the OneSet | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1581,7 +1598,7 @@ This policy setting controls whether Windows attempts to connect with the OneSet | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1598,9 +1615,9 @@ This policy setting allows you to turn off System Restore. System Restore enables users, in the event of a problem, to restore their computers to a previous state without losing personal data files. By default, System Restore is turned on for the boot volume. -- If you enable this policy setting, System Restore is turned off, and the System Restore Wizard cannot be accessed. The option to configure System Restore or create a restore point through System Protection is also disabled. +- If you enable this policy setting, System Restore is turned off, and the System Restore Wizard can't be accessed. The option to configure System Restore or create a restore point through System Protection is also disabled. -- If you disable or do not configure this policy setting, users can perform System Restore and configure System Restore settings through System Protection. +- If you disable or don't configure this policy setting, users can perform System Restore and configure System Restore settings through System Protection. Also, see the "Turn off System Restore configuration" policy setting. If the "Turn off System Restore" policy setting is disabled or not configured, the "Turn off System Restore configuration" policy setting is used to determine whether the option to configure System Restore is available. @@ -1614,13 +1631,12 @@ Also, see the "Turn off System Restore configuration" policy setting. If the "Tu | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -1647,7 +1663,7 @@ Also, see the "Turn off System Restore configuration" policy setting. If the "Tu | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1662,7 +1678,7 @@ This policy setting controls whether Windows records attempts to connect with th - If you enable this policy, Windows will record attempts to connect with the OneSettings service to the Microsoft\Windows\Privacy-Auditing\Operational EventLog channel. -- If you disable or don't configure this policy setting, Windows will not record attempts to connect with the OneSettings service to the EventLog. +- If you disable or don't configure this policy setting, Windows won't record attempts to connect with the OneSettings service to the EventLog. @@ -1674,7 +1690,7 @@ This policy setting controls whether Windows records attempts to connect with th | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1713,7 +1729,7 @@ This policy setting controls whether Windows records attempts to connect with th | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1724,7 +1740,7 @@ This policy setting controls whether Windows records attempts to connect with th -Diagnostic files created when a feedback is filed in the Feedback Hub app will always be saved locally. If this policy is not present or set to false, users will be presented with the option to save locally. The default is to not save locally. +Diagnostic files created when a feedback is filed in the Feedback Hub app will always be saved locally. If this policy isn't present or set to false, users will be presented with the option to save locally. The default is to not save locally. @@ -1736,7 +1752,7 @@ Diagnostic files created when a feedback is filed in the Feedback Hub app will a | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1746,7 +1762,7 @@ Diagnostic files created when a feedback is filed in the Feedback Hub app will a | Value | Description | |:--|:--| -| 0 (Default) | False. The Feedback Hub will not always save a local copy of diagnostics that may be created when a feedback is submitted. The user will have the option to do so. | +| 0 (Default) | False. The Feedback Hub won't always save a local copy of diagnostics that may be created when a feedback is submitted. The user will have the option to do so. | | 1 | True. The Feedback Hub should always save a local copy of diagnostics that may be created when a feedback is submitted. | @@ -1762,7 +1778,7 @@ Diagnostic files created when a feedback is filed in the Feedback Hub app will a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -1773,11 +1789,11 @@ Diagnostic files created when a feedback is filed in the Feedback Hub app will a -This policy controls messages which are shown when Windows is running on a device that does not meet the minimum system requirements for this OS version. +This policy controls messages which are shown when Windows is running on a device that doesn't meet the minimum system requirements for this OS version. - If you enable this policy setting, these messages will never appear on desktop or in the Settings app. -- If you disable or do not configure this policy setting, these messages will appear on desktop and in the Settings app when Windows is running on a device that does not meet the minimum system requirements for this OS version. +- If you disable or don't configure this policy setting, these messages will appear on desktop and in the Settings app when Windows is running on a device that doesn't meet the minimum system requirements for this OS version. @@ -1789,7 +1805,7 @@ This policy controls messages which are shown when Windows is running on a devic | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1829,7 +1845,7 @@ This policy controls messages which are shown when Windows is running on a devic | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1842,9 +1858,9 @@ This policy controls messages which are shown when Windows is running on a devic This policy setting controls whether additional diagnostic logs are collected when more information is needed to troubleshoot a problem on the device. Diagnostic logs are only sent when the device has been configured to send optional diagnostic data. -By enabling this policy setting, diagnostic logs will not be collected. +By enabling this policy setting, diagnostic logs won't be collected. -If you disable or do not configure this policy setting, we may occasionally collect diagnostic logs if the device has been configured to send optional diagnostic data. +If you disable or don't configure this policy setting, we may occasionally collect diagnostic logs if the device has been configured to send optional diagnostic data. @@ -1856,7 +1872,7 @@ If you disable or do not configure this policy setting, we may occasionally coll | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1895,7 +1911,7 @@ If you disable or do not configure this policy setting, we may occasionally coll | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1910,7 +1926,7 @@ This policy setting limits the type of dumps that can be collected when more inf By enabling this setting, Windows Error Reporting is limited to sending kernel mini dumps and user mode triage dumps. -If you disable or do not configure this policy setting, we may occasionally collect full or heap dumps if the user has opted to send optional diagnostic data. +If you disable or don't configure this policy setting, we may occasionally collect full or heap dumps if the user has opted to send optional diagnostic data. @@ -1922,7 +1938,7 @@ If you disable or do not configure this policy setting, we may occasionally coll | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1961,7 +1977,7 @@ If you disable or do not configure this policy setting, we may occasionally coll | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1977,14 +1993,14 @@ This policy setting, in combination with the "Allow Diagnostic Data" policy sett To enable the behavior described above, complete the following steps: 1. Enable this policy setting -2. Set the "Allow Diagnostic Data" policy to "Send optional diagnostic data" +2. Set the "Allow Diagnostic Data" policy to "Send optional diagnostic data". 3. Enable the "Limit Dump Collection" policy -4. Enable the "Limit Diagnostic Log Collection" policy +4. Enable the "Limit Diagnostic Log Collection" policy. When these policies are configured, Microsoft will collect only required diagnostic data and the events required by Desktop Analytics, which can be viewed at< https://go.microsoft.com/fwlink/?linkid=2116020>. -If you disable or do not configure this policy setting, diagnostic data collection is determined by the "Allow Diagnostic Data" policy setting or by the end user from the Settings app. +If you disable or don't configure this policy setting, diagnostic data collection is determined by the "Allow Diagnostic Data" policy setting or by the end user from the Settings app. @@ -1996,7 +2012,7 @@ If you disable or do not configure this policy setting, diagnostic data collecti | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2035,7 +2051,7 @@ If you disable or do not configure this policy setting, diagnostic data collecti | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -2048,7 +2064,7 @@ If you disable or do not configure this policy setting, diagnostic data collecti With this policy setting, you can forward Connected User Experience and Telemetry requests to a proxy server. -- If you enable this policy setting, you can specify the FQDN or IP address of the destination device within your organization's network (and optionally a port number, if desired). The connection will be made over a Secure Sockets Layer (SSL) connection. If the named proxy fails, or if you disable or do not configure this policy setting, Connected User Experience and Telemetry data will be sent to Microsoft using the default proxy configuration. +If you enable this policy setting, you can specify the FQDN or IP address of the destination device within your organization's network (and optionally a port number, if desired). The connection will be made over a Secure Sockets Layer (SSL) connection. If the named proxy fails, or if you disable or don't configure this policy setting, Connected User Experience and Telemetry data will be sent to Microsoft using the default proxy configuration. The format for this setting is ``:`` @@ -2062,7 +2078,7 @@ The format for this setting is ``:`` | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2092,7 +2108,7 @@ The format for this setting is ``:`` | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -2105,9 +2121,9 @@ The format for this setting is ``:`` This policy setting allows you to turn off File History. -- If you enable this policy setting, File History cannot be activated to create regular, automatic backups. +- If you enable this policy setting, File History can't be activated to create regular, automatic backups. -- If you disable or do not configure this policy setting, File History can be activated to create regular, automatic backups. +- If you disable or don't configure this policy setting, File History can be activated to create regular, automatic backups. @@ -2119,7 +2135,7 @@ This policy setting allows you to turn off File History. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | diff --git a/windows/client-management/mdm/policy-csp-systemservices.md b/windows/client-management/mdm/policy-csp-systemservices.md index 7cfbd6b1fa..86d77f042f 100644 --- a/windows/client-management/mdm/policy-csp-systemservices.md +++ b/windows/client-management/mdm/policy-csp-systemservices.md @@ -4,7 +4,7 @@ description: Learn more about the SystemServices Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -49,7 +49,7 @@ This setting determines whether the service's start type is Automatic(2), Manual | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[2-4]` | | Default Value | 3 | @@ -76,7 +76,7 @@ This setting determines whether the service's start type is Automatic(2), Manual | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -99,7 +99,7 @@ This setting determines whether the service's start type is Automatic(2), Manual | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[2-4]` | | Default Value | 3 | @@ -126,7 +126,7 @@ This setting determines whether the service's start type is Automatic(2), Manual | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -149,7 +149,7 @@ This setting determines whether the service's start type is Automatic(2), Manual | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 3 | @@ -185,7 +185,7 @@ This setting determines whether the service's start type is Automatic(2), Manual | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -208,7 +208,7 @@ This setting determines whether the service's start type is Automatic(2), Manual | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 3 | @@ -244,7 +244,7 @@ This setting determines whether the service's start type is Automatic(2), Manual | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -267,7 +267,7 @@ This setting determines whether the service's start type is Automatic(2), Manual | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 3 | @@ -303,7 +303,7 @@ This setting determines whether the service's start type is Automatic(2), Manual | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -326,7 +326,7 @@ This setting determines whether the service's start type is Automatic(2), Manual | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 3 | diff --git a/windows/client-management/mdm/policy-csp-taskmanager.md b/windows/client-management/mdm/policy-csp-taskmanager.md index 398334874d..e98120e09d 100644 --- a/windows/client-management/mdm/policy-csp-taskmanager.md +++ b/windows/client-management/mdm/policy-csp-taskmanager.md @@ -4,7 +4,7 @@ description: Learn more about the TaskManager Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -49,7 +49,7 @@ This setting determines whether non-administrators can use Task Manager to end t | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | diff --git a/windows/client-management/mdm/policy-csp-taskscheduler.md b/windows/client-management/mdm/policy-csp-taskscheduler.md index 855e816358..04de59a638 100644 --- a/windows/client-management/mdm/policy-csp-taskscheduler.md +++ b/windows/client-management/mdm/policy-csp-taskscheduler.md @@ -4,7 +4,7 @@ description: Learn more about the TaskScheduler Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -49,7 +49,7 @@ This setting determines whether the specific task is enabled (1) or disabled (0) | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | diff --git a/windows/client-management/mdm/policy-csp-tenantdefinedtelemetry.md b/windows/client-management/mdm/policy-csp-tenantdefinedtelemetry.md index a3d3f7355e..d5880e8a2f 100644 --- a/windows/client-management/mdm/policy-csp-tenantdefinedtelemetry.md +++ b/windows/client-management/mdm/policy-csp-tenantdefinedtelemetry.md @@ -4,7 +4,7 @@ description: Learn more about the TenantDefinedTelemetry Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -49,7 +49,7 @@ This policy is used to let mission control what type of Edition we are currently | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | diff --git a/windows/client-management/mdm/policy-csp-tenantrestrictions.md b/windows/client-management/mdm/policy-csp-tenantrestrictions.md index 96f488a077..423c7eb410 100644 --- a/windows/client-management/mdm/policy-csp-tenantrestrictions.md +++ b/windows/client-management/mdm/policy-csp-tenantrestrictions.md @@ -4,7 +4,7 @@ description: Learn more about the TenantRestrictions Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 04/26/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - TenantRestrictions -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20348.320] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1320] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1320] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1320] and later
    :heavy_check_mark: Windows 10, version 21H2 [10.0.19044] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20348.320] and later
    ✅ Windows 10, version 2004 [10.0.19041.1320] and later
    ✅ Windows 10, version 2009 [10.0.19042.1320] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1320] and later
    ✅ Windows 10, version 21H2 [10.0.19044] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -51,7 +48,8 @@ When you enable this setting, compliant applications will be prevented from acce -Before enabling firewall protection, ensure that a Windows Defender Application Control (WDAC) policy that correctly tags applications has been applied to the target devices. Enabling firewall protection without a corresponding WDAC policy will prevent all applications from reaching Microsoft endpoints. This firewall setting is not supported on all versions of Windows - see the following link for more information. +Before enabling firewall protection, ensure that a Windows Defender Application Control (WDAC) policy that correctly tags applications has been applied to the target devices. Enabling firewall protection without a corresponding WDAC policy will prevent all applications from reaching Microsoft endpoints. This firewall setting isn't supported on all versions of Windows - see the following link for more information. + For details about setting up WDAC with tenant restrictions, see @@ -64,13 +62,12 @@ For details about setting up WDAC with tenant restrictions, see -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-textinput.md b/windows/client-management/mdm/policy-csp-textinput.md index 7832fbfb73..7e5bd5f9ea 100644 --- a/windows/client-management/mdm/policy-csp-textinput.md +++ b/windows/client-management/mdm/policy-csp-textinput.md @@ -4,7 +4,7 @@ description: Learn more about the TextInput Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 05/01/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -37,7 +37,7 @@ ms.topic: reference -Placeholder only. Do not use in production environment. +Placeholder only. Don't use in production environment. @@ -49,7 +49,7 @@ Placeholder only. Do not use in production environment. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -75,7 +75,7 @@ Placeholder only. Do not use in production environment. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -98,7 +98,7 @@ Allows the user to turn on and off the logging for incorrect conversion and savi | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -124,7 +124,7 @@ Allows the user to turn on and off the logging for incorrect conversion and savi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -135,7 +135,7 @@ Allows the user to turn on and off the logging for incorrect conversion and savi -Allows the user to turn on Open Extended Dictionary, Internet search integration, or cloud candidate features to provide input suggestions that do not exist in the device's local dictionary. Most restricted value is 0. In Windows 10, version 1803, we introduced new suggestion services in Japanese IME in addition to cloud suggestion. When AllowIMENetworkAccess is set to 1, all suggestion services are available as predictive input. +Allows the user to turn on Open Extended Dictionary, Internet search integration, or cloud candidate features to provide input suggestions that don't exist in the device's local dictionary. Most restricted value is 0. In Windows 10, version 1803, we introduced new suggestion services in Japanese IME in addition to cloud suggestion. When AllowIMENetworkAccess is set to 1, all suggestion services are available as predictive input. @@ -147,7 +147,7 @@ Allows the user to turn on Open Extended Dictionary, Internet search integration | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -173,7 +173,7 @@ Allows the user to turn on Open Extended Dictionary, Internet search integration | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -196,7 +196,7 @@ Allows the IT admin to disable the touch/handwriting keyboard on Windows. Most r | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -222,7 +222,7 @@ Allows the IT admin to disable the touch/handwriting keyboard on Windows. Most r | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -245,7 +245,7 @@ Allows the Japanese IME surrogate pair characters. Most restricted value is 0. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -271,7 +271,7 @@ Allows the Japanese IME surrogate pair characters. Most restricted value is 0. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -294,7 +294,7 @@ Allows Japanese Ideographic Variation Sequence (IVS) characters. Most restricted | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -320,7 +320,7 @@ Allows Japanese Ideographic Variation Sequence (IVS) characters. Most restricted | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -343,7 +343,7 @@ Allows the Japanese non-publishing standard glyph. Most restricted value is 0. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -369,7 +369,7 @@ Allows the Japanese non-publishing standard glyph. Most restricted value is 0. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -392,7 +392,7 @@ Allows the Japanese user dictionary. Most restricted value is 0. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -418,7 +418,7 @@ Allows the Japanese user dictionary. Most restricted value is 0. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -429,7 +429,7 @@ Allows the Japanese user dictionary. Most restricted value is 0. -Specifies whether text prediction is enabled or disabled for the on-screen keyboard, touch keyboard, and handwriting recognition tool. When this policy is set to disabled, text prediction is disabled. Most restricted value is 0. + Specifies whether text prediction is enabled or disabled for the on-screen keyboard, touch keyboard, and handwriting recognition tool. When this policy is set to disabled, text prediction is disabled. Most restricted value is 0. @@ -446,7 +446,7 @@ To validate that text prediction is disabled on Windows 10 for desktop, do the f | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -472,7 +472,7 @@ To validate that text prediction is disabled on Windows 10 for desktop, do the f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -495,7 +495,7 @@ When this policy setting is enabled, some language features (such as handwriting | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -535,7 +535,7 @@ When this policy setting is enabled, some language features (such as handwriting | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -558,7 +558,7 @@ This policy setting controls the ability to send inking and typing data to Micro | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -598,7 +598,7 @@ This policy setting controls the ability to send inking and typing data to Micro | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -609,7 +609,7 @@ This policy setting controls the ability to send inking and typing data to Micro -Allows the user to turn on or off the automatic downloading of newer versions of the Expressive Input UI. When downloading is not allowed the Expressive Input panel will always display the initial UI included with the base Windows image. Most restricted value is 0. The following list shows the supported values: 0 - Not allowed. 1 (default) - Allowed. +Allows the user to turn on or off the automatic downloading of newer versions of the Expressive Input UI. When downloading isn't allowed the Expressive Input panel will always display the initial UI included with the base Windows image. Most restricted value is 0. The following list shows the supported values: 0 - Not allowed. 1 (default) - Allowed. @@ -621,7 +621,7 @@ Allows the user to turn on or off the automatic downloading of newer versions of | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -647,7 +647,7 @@ Allows the user to turn on or off the automatic downloading of newer versions of | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -658,18 +658,18 @@ Allows the user to turn on or off the automatic downloading of newer versions of -This policy setting controls the version of Microsoft IME. +This policy setting controls the version of Microsoft IME. -- If you don't configure this policy setting, user can control IME version to use. The new Microsoft IME is on by default. +- If you don't configure this policy setting, user can control IME version to use. The new Microsoft IME is on by default. -- If you enable this, user is not allowed to control IME version to use. The previous version of Microsoft IME is always selected. +- If you enable this, user isn't allowed to control IME version to use. The previous version of Microsoft IME is always selected. -- If you disable this, user is not allowed to control IME version to use. The new Microsoft IME is always selected. +- If you disable this, user isn't allowed to control IME version to use. The new Microsoft IME is always selected. This Policy setting applies only to Microsoft Japanese IME. > [!NOTE] -> Changes to this setting will not take effect until the user logs off. +> Changes to this setting won't take effect until the user logs off. @@ -681,7 +681,7 @@ This Policy setting applies only to Microsoft Japanese IME. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -722,7 +722,7 @@ This Policy setting applies only to Microsoft Japanese IME. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -733,18 +733,18 @@ This Policy setting applies only to Microsoft Japanese IME. -This policy setting controls the version of Microsoft IME. +This policy setting controls the version of Microsoft IME. -- If you don't configure this policy setting, user can control IME version to use. The new Microsoft IME is on by default. +- If you don't configure this policy setting, user can control IME version to use. The new Microsoft IME is on by default. -- If you enable this, user is not allowed to control IME version to use. The previous version of Microsoft IME is always selected. +- If you enable this, user isn't allowed to control IME version to use. The previous version of Microsoft IME is always selected. -- If you disable this, user is not allowed to control IME version to use. The new Microsoft IME is always selected. +- If you disable this, user isn't allowed to control IME version to use. The new Microsoft IME is always selected. This Policy setting applies only to Microsoft Korean IME. > [!NOTE] -> Changes to this setting will not take effect until the user logs off. +> Changes to this setting won't take effect until the user logs off. @@ -756,7 +756,7 @@ This Policy setting applies only to Microsoft Korean IME. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-2]` | | Default Value | 0 | @@ -788,7 +788,7 @@ This Policy setting applies only to Microsoft Korean IME. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -799,18 +799,18 @@ This Policy setting applies only to Microsoft Korean IME. -This policy setting controls the version of Microsoft IME. +This policy setting controls the version of Microsoft IME. -- If you don't configure this policy setting, user can control IME version to use. The new Microsoft IME is on by default. +- If you don't configure this policy setting, user can control IME version to use. The new Microsoft IME is on by default. -- If you enable this, user is not allowed to control IME version to use. The previous version of Microsoft IME is always selected. +- If you enable this, user isn't allowed to control IME version to use. The previous version of Microsoft IME is always selected. -- If you disable this, user is not allowed to control IME version to use. The new Microsoft IME is always selected. +- If you disable this, user isn't allowed to control IME version to use. The new Microsoft IME is always selected. This Policy setting applies only to Microsoft Simplified Chinese IME. > [!NOTE] -> Changes to this setting will not take effect until the user logs off. +> Changes to this setting won't take effect until the user logs off. @@ -822,7 +822,7 @@ This Policy setting applies only to Microsoft Simplified Chinese IME. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -863,7 +863,7 @@ This Policy setting applies only to Microsoft Simplified Chinese IME. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -874,18 +874,18 @@ This Policy setting applies only to Microsoft Simplified Chinese IME. -This policy setting controls the version of Microsoft IME. +This policy setting controls the version of Microsoft IME. -- If you don't configure this policy setting, user can control IME version to use. The new Microsoft IME is on by default. +- If you don't configure this policy setting, user can control IME version to use. The new Microsoft IME is on by default. -- If you enable this, user is not allowed to control IME version to use. The previous version of Microsoft IME is always selected. +- If you enable this, user isn't allowed to control IME version to use. The previous version of Microsoft IME is always selected. -- If you disable this, user is not allowed to control IME version to use. The new Microsoft IME is always selected. +- If you disable this, user isn't allowed to control IME version to use. The new Microsoft IME is always selected. This Policy setting applies only to Microsoft Traditional Chinese IME. > [!NOTE] -> Changes to this setting will not take effect until the user logs off. +> Changes to this setting won't take effect until the user logs off. @@ -897,7 +897,7 @@ This Policy setting applies only to Microsoft Traditional Chinese IME. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -938,7 +938,7 @@ This Policy setting applies only to Microsoft Traditional Chinese IME. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -961,7 +961,7 @@ This policy allows the IT admin to control whether the touch keyboard should sho | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -988,7 +988,7 @@ This policy allows the IT admin to control whether the touch keyboard should sho | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1011,7 +1011,7 @@ Allows the users to restrict character code range of conversion by setting the c | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1037,7 +1037,7 @@ Allows the users to restrict character code range of conversion by setting the c | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1060,7 +1060,7 @@ Allows the users to restrict character code range of conversion by setting the c | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1086,7 +1086,7 @@ Allows the users to restrict character code range of conversion by setting the c | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1109,7 +1109,7 @@ Allows the users to restrict character code range of conversion by setting the c | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1135,7 +1135,7 @@ Allows the users to restrict character code range of conversion by setting the c | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1158,7 +1158,7 @@ Specifies the touch keyboard is always docked. When this policy is set to enable | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1185,7 +1185,7 @@ Specifies the touch keyboard is always docked. When this policy is set to enable | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1208,7 +1208,7 @@ Specifies whether the dictation input button is enabled or disabled for the touc | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1235,7 +1235,7 @@ Specifies whether the dictation input button is enabled or disabled for the touc | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1258,7 +1258,7 @@ Specifies whether the emoji button is enabled or disabled for the touch keyboard | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1285,7 +1285,7 @@ Specifies whether the emoji button is enabled or disabled for the touch keyboard | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1308,7 +1308,7 @@ Specifies whether the full keyboard mode is enabled or disabled for the touch ke | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1335,7 +1335,7 @@ Specifies whether the full keyboard mode is enabled or disabled for the touch ke | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1358,7 +1358,7 @@ Specifies whether the handwriting input panel is enabled or disabled. When this | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1385,7 +1385,7 @@ Specifies whether the handwriting input panel is enabled or disabled. When this | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1408,7 +1408,7 @@ Specifies whether the narrow keyboard mode is enabled or disabled for the touch | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1435,7 +1435,7 @@ Specifies whether the narrow keyboard mode is enabled or disabled for the touch | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1458,7 +1458,7 @@ Specifies whether the split keyboard mode is enabled or disabled for the touch k | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1485,7 +1485,7 @@ Specifies whether the split keyboard mode is enabled or disabled for the touch k | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1508,7 +1508,7 @@ Specifies whether the wide keyboard mode is enabled or disabled for the touch ke | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | diff --git a/windows/client-management/mdm/policy-csp-timelanguagesettings.md b/windows/client-management/mdm/policy-csp-timelanguagesettings.md index 7a3dfd08c5..1243feb131 100644 --- a/windows/client-management/mdm/policy-csp-timelanguagesettings.md +++ b/windows/client-management/mdm/policy-csp-timelanguagesettings.md @@ -4,7 +4,7 @@ description: Learn more about the TimeLanguageSettings Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -29,7 +29,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :x: Pro
    :x: Enterprise
    :x: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ❌ Pro
    ❌ Enterprise
    ❌ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -52,7 +52,7 @@ This policy is deprecated. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -78,7 +78,7 @@ This policy is deprecated. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -89,11 +89,11 @@ This policy is deprecated. -This policy setting controls whether the LPRemove task will run to clean up language packs installed on a machine but are not used by any users on that machine. +This policy setting controls whether the LPRemove task will run to clean up language packs installed on a machine but aren't used by any users on that machine. -- If you enable this policy setting, language packs that are installed as part of the system image will remain installed even if they are not used by any user on that system. +- If you enable this policy setting, language packs that are installed as part of the system image will remain installed even if they aren't used by any user on that system. -- If you disable or do not configure this policy setting, language packs that are installed as part of the system image but are not used by any user on that system will be removed as part of a scheduled clean up task. +- If you disable or don't configure this policy setting, language packs that are installed as part of the system image but aren't used by any user on that system will be removed as part of a scheduled clean up task. @@ -105,7 +105,7 @@ This policy setting controls whether the LPRemove task will run to clean up lang | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -145,7 +145,7 @@ This policy setting controls whether the LPRemove task will run to clean up lang | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -170,7 +170,7 @@ Specifies the time zone to be applied to the device. This is the standard Window | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -186,7 +186,7 @@ Specifies the time zone to be applied to the device. This is the standard Window | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -199,9 +199,9 @@ Specifies the time zone to be applied to the device. This is the standard Window This policy setting controls which UI language is used for computers with more than one UI language installed. -- If you enable this policy setting, the UI language of Windows menus and dialogs for systems with more than one language is restricted to a specified language. If the specified language is not installed on the target computer or you disable this policy setting, the language selection defaults to the language selected by the local administrator. +- If you enable this policy setting, the UI language of Windows menus and dialogs for systems with more than one language is restricted to a specified language. If the specified language isn't installed on the target computer or you disable this policy setting, the language selection defaults to the language selected by the local administrator. -- If you disable or do not configure this policy setting, there is no restriction of a specific language used for the Windows menus and dialogs. +- If you disable or don't configure this policy setting, there is no restriction of a specific language used for the Windows menus and dialogs. @@ -213,7 +213,7 @@ This policy setting controls which UI language is used for computers with more t | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -253,7 +253,7 @@ This policy setting controls which UI language is used for computers with more t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -280,7 +280,7 @@ This policy setting restricts the install of language packs and language feature | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | diff --git a/windows/client-management/mdm/policy-csp-troubleshooting.md b/windows/client-management/mdm/policy-csp-troubleshooting.md index ddcdb2743d..a2c178b25b 100644 --- a/windows/client-management/mdm/policy-csp-troubleshooting.md +++ b/windows/client-management/mdm/policy-csp-troubleshooting.md @@ -4,7 +4,7 @@ description: Learn more about the Troubleshooting Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -42,23 +42,31 @@ This policy setting configures how troubleshooting for known problems can be app Not configuring this policy setting will allow the user to configure how troubleshooting is applied. Enabling this policy allows you to configure how troubleshooting is applied on the user's device. You can select from one of the following values: -0 = Do not allow users, system features, or Microsoft to apply troubleshooting. + +0 = Don't allow users, system features, or Microsoft to apply troubleshooting. + 1 = Only automatically apply troubleshooting for critical problems by system features and Microsoft. + 2 = Automatically apply troubleshooting for critical problems by system features and Microsoft. Notify users when troubleshooting for other problems is available and allow users to choose to apply or ignore. + 3 = Automatically apply troubleshooting for critical and other problems by system features and Microsoft. Notify users when troubleshooting has solved a problem. -4 = Automatically apply troubleshooting for critical and other problems by system features and Microsoft. Do not notify users when troubleshooting has solved a problem. + +4 = Automatically apply troubleshooting for critical and other problems by system features and Microsoft. Don't notify users when troubleshooting has solved a problem. + 5 = Allow the user to choose their own troubleshooting settings. After setting this policy, you can use the following instructions to check devices in your domain for available troubleshooting from Microsoft: 1. Create a bat script with the following contents: -rem The following batch script triggers Recommended Troubleshooting -schtasks /run /TN "\Microsoft\Windows\Diagnosis\RecommendedTroubleshootingScanner" + +rem The following batch script triggers Recommended Troubleshooting schtasks /run /TN "\Microsoft\Windows\Diagnosis\RecommendedTroubleshootingScanner". 2. To create a new immediate task, navigate to the Group Policy Management Editor > Computer Configuration > Preferences and select Control Panel Settings. + 3. Under Control Panel settings, right-click on Scheduled Tasks and select New. Select Immediate Task (At least Windows 7). 4. Provide name and description as appropriate, then under Security Options set the user account to System and select the Run with highest privileges checkbox. + 5. In the Actions tab, create a new action, select Start a Program as its type, then enter the file created in step 1. 6. Configure the task to deploy to your domain. @@ -73,7 +81,7 @@ schtasks /run /TN "\Microsoft\Windows\Diagnosis\RecommendedTroubleshootingScanne | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -83,11 +91,11 @@ schtasks /run /TN "\Microsoft\Windows\Diagnosis\RecommendedTroubleshootingScanne | Value | Description | |:--|:--| -| 0 | Off - Do not allow users, system features, or Microsoft to apply troubleshooting. | -| 1 (Default) | Critical - Automatically apply troubleshooting for critical problems detected by system features and Microsoft. Do not notify users when troubleshooting has solved a problem. | +| 0 | Off - Don't allow users, system features, or Microsoft to apply troubleshooting. | +| 1 (Default) | Critical - Automatically apply troubleshooting for critical problems detected by system features and Microsoft. Don't notify users when troubleshooting has solved a problem. | | 2 | Prompt - Automatically apply troubleshooting for critical problems detected by system features and Microsoft. Prompt users when troubleshooting for other problems is available and allow the user to choose to apply or ignore. | | 3 | Notify - Automatically apply troubleshooting for critical and other problems detected by system features and Microsoft. Notify users when troubleshooting has solved a problem. | -| 4 | Silent - Automatically apply troubleshooting for critical and other problems detected by system features and Microsoft. Do not notify users when troubleshooting has solved a problem. | +| 4 | Silent - Automatically apply troubleshooting for critical and other problems detected by system features and Microsoft. Don't notify users when troubleshooting has solved a problem. | | 5 | Configurable - Allow the user to choose their own troubleshooting settings. | diff --git a/windows/client-management/mdm/policy-csp-update.md b/windows/client-management/mdm/policy-csp-update.md index a5d3afb700..c98ee3f492 100644 --- a/windows/client-management/mdm/policy-csp-update.md +++ b/windows/client-management/mdm/policy-csp-update.md @@ -4,7 +4,7 @@ description: Learn more about the Update Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 04/26/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,8 +16,7 @@ ms.topic: reference # Policy CSP - Update -> [!IMPORTANT] -> This CSP contains preview policies that are under development and only applicable for [Windows Insider Preview builds](/windows-insider/). These policies are subject to change and may have dependencies on other features or services in preview. +[!INCLUDE [Windows Insider tip](includes/mdm-insider-csp-note.md)] @@ -113,7 +112,7 @@ Update CSP policies are listed below based on the group policy area: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -124,7 +123,7 @@ Update CSP policies are listed below based on the group policy area: -When enabled, devices will not automatically restart outside of active hours until the deadline and grace period have expired for feature updates, even if an update is ready for restart. When disabled, an automatic restart may be attempted outside of active hours after update is ready for restart before the deadline is reached. Takes effect only if Update/ConfigureDeadlineForFeatureUpdates is configured. +When enabled, devices won't automatically restart outside of active hours until the deadline and grace period have expired for feature updates, even if an update is ready for restart. When disabled, an automatic restart may be attempted outside of active hours after update is ready for restart before the deadline is reached. Takes effect only if Update/ConfigureDeadlineForFeatureUpdates is configured. @@ -136,7 +135,7 @@ When enabled, devices will not automatically restart outside of active hours unt | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -172,7 +171,7 @@ When enabled, devices will not automatically restart outside of active hours unt | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -183,7 +182,7 @@ When enabled, devices will not automatically restart outside of active hours unt -When enabled, devices will not automatically restart outside of active hours until the deadline and grace period have expired for quality updates, even if an update is ready for restart. When disabled, an automatic restart may be attempted outside of active hours after update is ready for restart before the deadline is reached. Takes effect only if Update/ConfigureDeadlineForQualityUpdates is configured. +When enabled, devices won't automatically restart outside of active hours until the deadline and grace period have expired for quality updates, even if an update is ready for restart. When disabled, an automatic restart may be attempted outside of active hours after update is ready for restart before the deadline is reached. Takes effect only if Update/ConfigureDeadlineForQualityUpdates is configured. @@ -195,7 +194,7 @@ When enabled, devices will not automatically restart outside of active hours unt | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -233,7 +232,7 @@ When enabled, devices will not automatically restart outside of active hours unt | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -256,7 +255,7 @@ Allows the IT admin to manage whether Automatic Updates accepts updates signed b | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -267,7 +266,7 @@ Allows the IT admin to manage whether Automatic Updates accepts updates signed b | Value | Description | |:--|:--| | 0 | Not allowed or not configured. Updates from an intranet Microsoft update service location must be signed by Microsoft. | -| 1 (Default) | Allowed. Accepts updates received through an intranet Microsoft update service location, if they are signed by a certificate found in the 'Trusted Publishers' certificate store of the local computer. | +| 1 (Default) | Allowed. Accepts updates received through an intranet Microsoft update service location, if they're signed by a certificate found in the 'Trusted Publishers' certificate store of the local computer. | @@ -282,7 +281,7 @@ Allows the IT admin to manage whether Automatic Updates accepts updates signed b | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -299,7 +298,7 @@ The maintenance wakeup policy specifies if Automatic Maintenance should make a w - If you enable this policy setting, Automatic Maintenance will attempt to set OS wake policy and make a wake request for the daily scheduled time, if required. -- If you disable or do not configure this policy setting, the wake setting as specified in Security and Maintenance/Automatic Maintenance Control Panel will apply. +- If you disable or don't configure this policy setting, the wake setting as specified in Security and Maintenance/Automatic Maintenance Control Panel will apply. @@ -311,7 +310,7 @@ The maintenance wakeup policy specifies if Automatic Maintenance should make a w | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -351,7 +350,7 @@ The maintenance wakeup policy specifies if Automatic Maintenance should make a w | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -364,7 +363,7 @@ The maintenance wakeup policy specifies if Automatic Maintenance should make a w Enable this policy to specify when to receive Feature Updates. -Defer Updates | This enables devices to defer taking the next Feature Update available for their current product (or a new product if specified in the Select the target Feature Update version policy). You can defer a Feature Update for up to 14 days for all pre-release channels and up to 365 days for the General Availability Channel. To learn more about the current releases, please see aka.ms/WindowsTargetVersioninfo +Defer Updates | This enables devices to defer taking the next Feature Update available for their current product (or a new product if specified in the Select the target Feature Update version policy). You can defer a Feature Update for up to 14 days for all pre-release channels and up to 365 days for the General Availability Channel. To learn more about the current releases, please see aka.ms/WindowsTargetVersioninfo. Pause Updates | To prevent Feature Updates from being offered to the device, you can temporarily pause Feature Updates. This pause will remain in effect for 35 days from the specified start date or until the field is cleared. Note, Quality Updates will still be offered even if Feature Updates are paused. @@ -378,7 +377,7 @@ Pause Updates | To prevent Feature Updates from being offered to the device, you | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 16 | @@ -421,7 +420,7 @@ Pause Updates | To prevent Feature Updates from being offered to the device, you | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -434,7 +433,7 @@ Pause Updates | To prevent Feature Updates from being offered to the device, you Enable this policy to specify when to receive Feature Updates. -Defer Updates | This enables devices to defer taking the next Feature Update available for their current product (or a new product if specified in the Select the target Feature Update version policy). You can defer a Feature Update for up to 14 days for all pre-release channels and up to 365 days for the General Availability Channel. To learn more about the current releases, please see aka.ms/WindowsTargetVersioninfo +Defer Updates | This enables devices to defer taking the next Feature Update available for their current product (or a new product if specified in the Select the target Feature Update version policy). You can defer a Feature Update for up to 14 days for all pre-release channels and up to 365 days for the General Availability Channel. To learn more about the current releases, please see aka.ms/WindowsTargetVersioninfo. Pause Updates | To prevent Feature Updates from being offered to the device, you can temporarily pause Feature Updates. This pause will remain in effect for 35 days from the specified start date or until the field is cleared. Note, Quality Updates will still be offered even if Feature Updates are paused. @@ -448,7 +447,7 @@ Pause Updates | To prevent Feature Updates from being offered to the device, you | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-365]` | | Default Value | 0 | @@ -461,7 +460,7 @@ Pause Updates | To prevent Feature Updates from being offered to the device, you |:--|:--| | Name | DeferFeatureUpdates | | Friendly Name | Select when Preview Builds and Feature Updates are received | -| Element Name | How many days after a Feature Update is released would you like to defer the update before it is offered to the device? | +| Element Name | How many days after a Feature Update is released would you like to defer the update before it's offered to the device? | | Location | Computer Configuration | | Path | Windows Components > Windows Update > Manage updates offered from Windows Update | | Registry Key Name | Software\Policies\Microsoft\Windows\WindowsUpdate | @@ -480,7 +479,7 @@ Pause Updates | To prevent Feature Updates from being offered to the device, you | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -499,7 +498,7 @@ To prevent quality updates from being received on their scheduled time, you can To resume receiving Quality Updates which are paused, clear the start date field. -If you disable or do not configure this policy, Windows Update will not alter its behavior. +If you disable or don't configure this policy, Windows Update won't alter its behavior. @@ -511,7 +510,7 @@ If you disable or do not configure this policy, Windows Update will not alter it | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-30]` | | Default Value | 0 | @@ -543,7 +542,7 @@ If you disable or do not configure this policy, Windows Update will not alter it | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763.1490] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.1110] and later
    :heavy_check_mark: Windows 10, version 1909 [10.0.18363.1110] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041.546] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763.1490] and later
    ✅ Windows 10, version 1903 [10.0.18362.1110] and later
    ✅ Windows 10, version 1909 [10.0.18363.1110] and later
    ✅ Windows 10, version 2004 [10.0.19041.546] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -576,7 +575,7 @@ IT admins can, if necessary, opt devices out of safeguard protections using this | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -587,7 +586,7 @@ IT admins can, if necessary, opt devices out of safeguard protections using this | Value | Description | |:--|:--| | 0 (Default) | Safeguards are enabled and devices may be blocked for upgrades until the safeguard is cleared. | -| 1 | Safeguards are not enabled and upgrades will be deployed without blocking on safeguards. | +| 1 | Safeguards aren't enabled and upgrades will be deployed without blocking on safeguards. | @@ -602,7 +601,7 @@ IT admins can, if necessary, opt devices out of safeguard protections using this | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -615,7 +614,7 @@ IT admins can, if necessary, opt devices out of safeguard protections using this Enable this policy to not include drivers with Windows quality updates. -If you disable or do not configure this policy, Windows Update will include updates that have a Driver classification. +If you disable or don't configure this policy, Windows Update will include updates that have a Driver classification. @@ -627,7 +626,7 @@ If you disable or do not configure this policy, Windows Update will include upda | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -667,7 +666,7 @@ If you disable or do not configure this policy, Windows Update will include upda | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -680,22 +679,25 @@ If you disable or do not configure this policy, Windows Update will include upda Enable this policy to manage which updates you receive prior to the update being released to the world. -Dev Channel -Ideal for highly technical users. Insiders in the Dev Channel will receive builds from our active development branch that is earliest in a development cycle. These builds are not matched to a specific Windows 10 release. +Dev Channel. + +Ideal for highly technical users. Insiders in the Dev Channel will receive builds from our active development branch that's earliest in a development cycle. These builds aren't matched to a specific Windows 10 release. + +Beta Channel. -Beta Channel Ideal for feature explorers who want to see upcoming Windows 10 features. Your feedback will be especially important here as it will help our engineers ensure key issues are fixed before a major release. Release Preview Channel (default) Insiders in the Release Preview Channel will have access to the upcoming release of Windows 10 prior to it being released to the world. These builds are supported by Microsoft. The Release Preview Channel is where we recommend companies preview and validate upcoming Windows 10 releases before broad deployment within their organization. -Release Preview Channel, Quality Updates Only +Release Preview Channel, Quality Updates Only. + Ideal for those who want to validate the features and fixes coming soon to their current version. Note, released feature updates will continue to be offered in accordance with configured policies when this option is selected. > [!NOTE] > Preview Build enrollment requires a telemetry level setting of 2 or higher and your domain registered on insider.windows.com. For additional information on Preview Builds, see: -If you disable or do not configure this policy, Windows Update will not offer you any pre-release updates and you will receive such content once released to the world. Disabling this policy will cause any devices currently on a pre-release build to opt out and stay on the latest Feature Update once released. +If you disable or don't configure this policy, Windows Update won't offer you any pre-release updates and you'll receive such content once released to the world. Disabling this policy will cause any devices currently on a pre-release build to opt out and stay on the latest Feature Update once released. @@ -707,7 +709,7 @@ If you disable or do not configure this policy, Windows Update will not offer yo | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 3 | @@ -748,7 +750,7 @@ If you disable or do not configure this policy, Windows Update will not offer yo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -761,7 +763,7 @@ If you disable or do not configure this policy, Windows Update will not offer yo Enable this policy to specify when to receive Feature Updates. -Defer Updates | This enables devices to defer taking the next Feature Update available for their current product (or a new product if specified in the Select the target Feature Update version policy). You can defer a Feature Update for up to 14 days for all pre-release channels and up to 365 days for the General Availability Channel. To learn more about the current releases, please see aka.ms/WindowsTargetVersioninfo +Defer Updates | This enables devices to defer taking the next Feature Update available for their current product (or a new product if specified in the Select the target Feature Update version policy). You can defer a Feature Update for up to 14 days for all pre-release channels and up to 365 days for the General Availability Channel. To learn more about the current releases, please see aka.ms/WindowsTargetVersioninfo. Pause Updates | To prevent Feature Updates from being offered to the device, you can temporarily pause Feature Updates. This pause will remain in effect for 35 days from the specified start date or until the field is cleared. Note, Quality Updates will still be offered even if Feature Updates are paused. @@ -777,7 +779,7 @@ Pause Updates | To prevent Feature Updates from being offered to the device, you | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -787,7 +789,7 @@ Pause Updates | To prevent Feature Updates from being offered to the device, you | Value | Description | |:--|:--| -| 0 (Default) | Feature Updates are not paused. | +| 0 (Default) | Feature Updates aren't paused. | | 1 | Feature Updates are paused for 60 days or until value set to back to 0, whichever is sooner. | @@ -816,7 +818,7 @@ Pause Updates | To prevent Feature Updates from being offered to the device, you | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -839,7 +841,7 @@ Specifies the date and time when the IT admin wants to start pausing the Feature | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -869,7 +871,7 @@ Specifies the date and time when the IT admin wants to start pausing the Feature | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -888,7 +890,7 @@ To prevent quality updates from being received on their scheduled time, you can To resume receiving Quality Updates which are paused, clear the start date field. -If you disable or do not configure this policy, Windows Update will not alter its behavior. +If you disable or don't configure this policy, Windows Update won't alter its behavior. @@ -902,7 +904,7 @@ If you disable or do not configure this policy, Windows Update will not alter it | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -912,7 +914,7 @@ If you disable or do not configure this policy, Windows Update will not alter it | Value | Description | |:--|:--| -| 0 (Default) | Quality Updates are not paused. | +| 0 (Default) | Quality Updates aren't paused. | | 1 | Quality Updates are paused for 35 days or until value set back to 0, whichever is sooner. | @@ -941,7 +943,7 @@ If you disable or do not configure this policy, Windows Update will not alter it | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -966,7 +968,7 @@ Specifies the date and time when the IT admin wants to start pausing the Quality | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -996,7 +998,7 @@ Specifies the date and time when the IT admin wants to start pausing the Quality | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.1202] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1202] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1202] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.1202] and later
    ✅ Windows 10, version 2009 [10.0.19042.1202] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1202] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1009,13 +1011,13 @@ Specifies the date and time when the IT admin wants to start pausing the Quality Enter the product and version as listed on the Windows Update target version page: -aka.ms/WindowsTargetVersioninfo +aka.ms/WindowsTargetVersioninfo. The device will request that Windows Update product and version in subsequent scans. Entering a target product and clicking OK or Apply means I accept the Microsoft Software License Terms for it found at aka.ms/WindowsTargetVersioninfo. If an organization is licensing the software, I am authorized to bind the organization. -If you enter an invalid value, you will remain on your current version until you correct the values to a supported product and version. +If you enter an invalid value, you'll remain on your current version until you correct the values to a supported product and version. @@ -1034,7 +1036,7 @@ Supported value type is a string containing a Windows product. For example, "Win | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1064,7 +1066,7 @@ Supported value type is a string containing a Windows product. For example, "Win | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1488] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.1217] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.836] and later
    :heavy_check_mark: Windows 10, version 1909 [10.0.18363.836] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134.1488] and later
    ✅ Windows 10, version 1809 [10.0.17763.1217] and later
    ✅ Windows 10, version 1903 [10.0.18362.836] and later
    ✅ Windows 10, version 1909 [10.0.18363.836] and later
    ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -1077,13 +1079,13 @@ Supported value type is a string containing a Windows product. For example, "Win Enter the product and version as listed on the Windows Update target version page: -aka.ms/WindowsTargetVersioninfo +aka.ms/WindowsTargetVersioninfo. The device will request that Windows Update product and version in subsequent scans. Entering a target product and clicking OK or Apply means I accept the Microsoft Software License Terms for it found at aka.ms/WindowsTargetVersioninfo. If an organization is licensing the software, I am authorized to bind the organization. -If you enter an invalid value, you will remain on your current version until you correct the values to a supported product and version. +If you enter an invalid value, you'll remain on your current version until you correct the values to a supported product and version. @@ -1096,7 +1098,7 @@ Supported value type is a string containing Windows version number. For example, | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1128,7 +1130,7 @@ Supported value type is a string containing Windows version number. For example, | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1154,7 +1156,7 @@ Specifies whether the device could use Microsoft Update, Windows Server Update S | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1193,7 +1195,7 @@ Specifies whether the device could use Microsoft Update, Windows Server Update S | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1217,7 +1219,7 @@ If the status is set to Disabled or Not Configured, Windows will check for avail > If the "Configure Automatic Updates" policy is disabled, this policy has no effect. > [!NOTE] -> This policy is not supported on %WINDOWS_ARM_VERSION_6_2%. Setting this policy will not have any effect on %WINDOWS_ARM_VERSION_6_2% PCs. +> This policy isn't supported on %WINDOWS_ARM_VERSION_6_2%. Setting this policy won't have any effect on %WINDOWS_ARM_VERSION_6_2% PCs. @@ -1233,7 +1235,7 @@ This policy should be enabled only when [UpdateServiceUrl](#updateserviceurl) is | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[1-22]` | | Default Value | 22 | @@ -1265,7 +1267,7 @@ This policy should be enabled only when [UpdateServiceUrl](#updateserviceurl) is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240.18818] and later
    :heavy_check_mark: Windows 10, version 1607 [10.0.14393.4169] and later
    :heavy_check_mark: Windows 10, version 1703 [10.0.15063.2108] and later
    :heavy_check_mark: Windows 10, version 1709 [10.0.16299.2166] and later
    :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1967] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.1697] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.1316] and later
    :heavy_check_mark: Windows 10, version 1909 [10.0.18363.1316] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041.746] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.746] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240.18818] and later
    ✅ Windows 10, version 1607 [10.0.14393.4169] and later
    ✅ Windows 10, version 1703 [10.0.15063.2108] and later
    ✅ Windows 10, version 1709 [10.0.16299.2166] and later
    ✅ Windows 10, version 1803 [10.0.17134.1967] and later
    ✅ Windows 10, version 1809 [10.0.17763.1697] and later
    ✅ Windows 10, version 1903 [10.0.18362.1316] and later
    ✅ Windows 10, version 1909 [10.0.18363.1316] and later
    ✅ Windows 10, version 2004 [10.0.19041.746] and later
    ✅ Windows 10, version 2009 [10.0.19042.746] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1289,7 +1291,7 @@ This policy should be enabled only when [UpdateServiceUrl](#updateserviceurl) is | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1310,7 +1312,7 @@ This policy should be enabled only when [UpdateServiceUrl](#updateserviceurl) is |:--|:--| | Name | CorpWuURL | | Friendly Name | Specify intranet Microsoft update service location | -| Element Name | Do not enforce TLS certificate pinning for Windows Update client for detecting updates. | +| Element Name | Don't enforce TLS certificate pinning for Windows Update client for detecting updates. | | Location | Computer Configuration | | Path | Windows Components > Windows Update > Manage updates offered from Windows Server Update Service | | Registry Key Name | Software\Policies\Microsoft\Windows\WindowsUpdate | @@ -1329,7 +1331,7 @@ This policy should be enabled only when [UpdateServiceUrl](#updateserviceurl) is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1340,10 +1342,10 @@ This policy should be enabled only when [UpdateServiceUrl](#updateserviceurl) is -Allows Windows Update Agent to determine the download URL when it is missing from the metadata. This scenario will occur when intranet update service stores the metadata files but the download contents are stored in the ISV file cache (specified as the alternate download URL). +Allows Windows Update Agent to determine the download URL when it's missing from the metadata. This scenario will occur when intranet update service stores the metadata files but the download contents are stored in the ISV file cache (specified as the alternate download URL). > [!NOTE] -> This setting should only be used in combination with an alternate download URL and configured to use ISV file cache. This setting is used when the intranet update service does not provide download URLs in the update metadata for files which are available on the alternate download server. +> This setting should only be used in combination with an alternate download URL and configured to use ISV file cache. This setting is used when the intranet update service doesn't provide download URLs in the update metadata for files which are available on the alternate download server. @@ -1355,7 +1357,7 @@ Allows Windows Update Agent to determine the download URL when it is missing fro | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1395,7 +1397,7 @@ Allows Windows Update Agent to determine the download URL when it is missing fro | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1425,7 +1427,7 @@ Configure this policy to specify whether to receive **Windows Driver Updates** f | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1464,7 +1466,7 @@ Configure this policy to specify whether to receive **Windows Driver Updates** f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1494,7 +1496,7 @@ Configure this policy to specify whether to receive **Windows Feature Updates** | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1533,7 +1535,7 @@ Configure this policy to specify whether to receive **Windows Feature Updates** | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1563,7 +1565,7 @@ Configure this policy to specify whether to receive **Other Updates** from Windo | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1602,7 +1604,7 @@ Configure this policy to specify whether to receive **Other Updates** from Windo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1632,7 +1634,7 @@ Configure this policy to specify whether to receive **Windows Quality Updates** | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -1671,7 +1673,7 @@ Configure this policy to specify whether to receive **Windows Quality Updates** | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240.18696] and later
    :heavy_check_mark: Windows 10, version 1607 [10.0.14393.3930] and later
    :heavy_check_mark: Windows 10, version 1703 [10.0.15063.2500] and later
    :heavy_check_mark: Windows 10, version 1709 [10.0.16299.2107] and later
    :heavy_check_mark: Windows 10, version 1803 [10.0.17134.1726] and later
    :heavy_check_mark: Windows 10, version 1809 [10.0.17763.1457] and later
    :heavy_check_mark: Windows 10, version 1903 [10.0.18362.1082] and later
    :heavy_check_mark: Windows 10, version 1909 [10.0.18363.1082] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041.508] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240.18696] and later
    ✅ Windows 10, version 1607 [10.0.14393.3930] and later
    ✅ Windows 10, version 1703 [10.0.15063.2500] and later
    ✅ Windows 10, version 1709 [10.0.16299.2107] and later
    ✅ Windows 10, version 1803 [10.0.17134.1726] and later
    ✅ Windows 10, version 1809 [10.0.17763.1457] and later
    ✅ Windows 10, version 1903 [10.0.18362.1082] and later
    ✅ Windows 10, version 1909 [10.0.18363.1082] and later
    ✅ Windows 10, version 2004 [10.0.19041.508] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1699,7 +1701,7 @@ This policy setting doesn't impact those customers who have, per Microsoft recom | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1739,7 +1741,7 @@ This policy setting doesn't impact those customers who have, per Microsoft recom | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1750,7 +1752,7 @@ This policy setting doesn't impact those customers who have, per Microsoft recom -Allows the device to check for updates from a WSUS server instead of Microsoft Update. This is useful for on-premises MDMs that need to update devices that cannot connect to the Internet. +Allows the device to check for updates from a WSUS server instead of Microsoft Update. This is useful for on-premises MDMs that need to update devices that can't connect to the Internet. @@ -1766,7 +1768,7 @@ The following list shows the supported values: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Default Value | CorpWSUS | @@ -1814,7 +1816,7 @@ The following list shows the supported values: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1825,10 +1827,10 @@ The following list shows the supported values: -Specifies an alternate intranet server to host updates from Microsoft Update. You can then use this update service to automatically update computers on your network. This setting lets you specify a server on your network to function as an internal update service. The Automatic Updates client will search this service for updates that apply to the computers on your network. To use this setting, you must set two server name values: the server from which the Automatic Updates client detects and downloads updates, and the server to which updated workstations upload statistics. You can set both values to be the same server. An optional server name value can be specified to configure Windows Update agent, and download updates from an alternate download server instead of WSUS Server. Value type is string and the default value is an empty string, . If the setting is not configured, and if Automatic Updates is not disabled by policy or user preference, the Automatic Updates client connects directly to the Windows Update site on the Internet. +Specifies an alternate intranet server to host updates from Microsoft Update. You can then use this update service to automatically update computers on your network. This setting lets you specify a server on your network to function as an internal update service. The Automatic Updates client will search this service for updates that apply to the computers on your network. To use this setting, you must set two server name values: the server from which the Automatic Updates client detects and downloads updates, and the server to which updated workstations upload statistics. You can set both values to be the same server. An optional server name value can be specified to configure Windows Update agent, and download updates from an alternate download server instead of WSUS Server. Value type is string and the default value is an empty string, . If the setting isn't configured, and if Automatic Updates isn't disabled by policy or user preference, the Automatic Updates client connects directly to the Windows Update site on the Internet. > [!NOTE] -> If the Configure Automatic Updates Group Policy is disabled, then this policy has no effect. If the Alternate Download Server Group Policy is not set, it will use the WSUS server by default to download updates. This policy is not supported on Windows RT. Setting this policy will not have any effect on Windows RT PCs. +> If the Configure Automatic Updates Group Policy is disabled, then this policy has no effect. If the Alternate Download Server Group Policy isn't set, it will use the WSUS server by default to download updates. This policy isn't supported on Windows RT. Setting this policy won't have any effect on Windows RT PCs. @@ -1840,7 +1842,7 @@ Specifies an alternate intranet server to host updates from Microsoft Update. Yo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1872,7 +1874,7 @@ Specifies an alternate intranet server to host updates from Microsoft Update. Yo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1884,18 +1886,19 @@ Specifies an alternate intranet server to host updates from Microsoft Update. Yo -- If you enable this policy, the PC will not automatically restart after updates during active hours. The PC will attempt to restart outside of active hours. +- If you enable this policy, the PC won't automatically restart after updates during active hours. The PC will attempt to restart outside of active hours. -**Note** that the PC must restart for certain updates to take effect. +Note that the PC must restart for certain updates to take effect. -- If you disable or do not configure this policy and have no other reboot group policies, the user selected active hours will be in effect. +- If you disable or don't configure this policy and have no other reboot group policies, the user selected active hours will be in effect. If any of the following two policies are enabled, this policy has no effect: -1. No auto-restart with logged on users for scheduled automatic updates installations. +1. No auto-restart with logged-on users for scheduled automatic updates installations. + 2. Always automatically restart at scheduled time. -**Note** that the default max active hours range is 18 hours from the active hours start time unless otherwise configured via the Specify active hours range for auto-restarts policy. +Note that the default max active hours range is 18 hours from the active hours start time unless otherwise configured via the Specify active hours range for auto-restarts policy. @@ -1907,7 +1910,7 @@ If any of the following two policies are enabled, this policy has no effect: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-23]` | | Default Value | 17 | @@ -1939,7 +1942,7 @@ If any of the following two policies are enabled, this policy has no effect: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1954,7 +1957,7 @@ Enable this policy to specify the maximum number of hours from the start time th The max active hours range can be set between 8 and 18 hours. -If you disable or do not configure this policy, the default max active hours range will be used. +If you disable or don't configure this policy, the default max active hours range will be used. @@ -1966,7 +1969,7 @@ If you disable or do not configure this policy, the default max active hours ran | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[8-18]` | | Default Value | 18 | @@ -1998,7 +2001,7 @@ If you disable or do not configure this policy, the default max active hours ran | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -2010,18 +2013,19 @@ If you disable or do not configure this policy, the default max active hours ran -- If you enable this policy, the PC will not automatically restart after updates during active hours. The PC will attempt to restart outside of active hours. +- If you enable this policy, the PC won't automatically restart after updates during active hours. The PC will attempt to restart outside of active hours. -**Note** that the PC must restart for certain updates to take effect. +Note that the PC must restart for certain updates to take effect. -- If you disable or do not configure this policy and have no other reboot group policies, the user selected active hours will be in effect. +- If you disable or don't configure this policy and have no other reboot group policies, the user selected active hours will be in effect. If any of the following two policies are enabled, this policy has no effect: -1. No auto-restart with logged on users for scheduled automatic updates installations. +1. No auto-restart with logged-on users for scheduled automatic updates installations. + 2. Always automatically restart at scheduled time. -**Note** that the default max active hours range is 18 hours from the active hours start time unless otherwise configured via the Specify active hours range for auto-restarts policy. +Note that the default max active hours range is 18 hours from the active hours start time unless otherwise configured via the Specify active hours range for auto-restarts policy. @@ -2033,7 +2037,7 @@ If any of the following two policies are enabled, this policy has no effect: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-23]` | | Default Value | 8 | @@ -2065,7 +2069,7 @@ If any of the following two policies are enabled, this policy has no effect: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -2079,7 +2083,7 @@ If any of the following two policies are enabled, this policy has no effect: Specifies whether this computer will receive security updates and other important downloads through the Windows automatic updating service. > [!NOTE] -> This policy does not apply to %WINDOWS_ARM_VERSION_6_2%. +> This policy doesn't apply to %WINDOWS_ARM_VERSION_6_2%. This setting lets you specify whether automatic updates are enabled on this computer. If the service is enabled, you must select one of the four options in the Group Policy Setting: @@ -2087,21 +2091,21 @@ This setting lets you specify whether automatic updates are enabled on this comp When Windows finds updates that apply to this computer, users will be notified that updates are ready to be downloaded. After going to Windows Update, users can download and install any available updates. -3 = (Default setting) Download the updates automatically and notify when they are ready to be installed +3 = (Default setting) Download the updates automatically and notify when they're ready to be installed. -Windows finds updates that apply to the computer and downloads them in the background (the user is not notified or interrupted during this process). When the downloads are complete, users will be notified that they are ready to install. After going to Windows Update, users can install them. +Windows finds updates that apply to the computer and downloads them in the background (the user isn't notified or interrupted during this process). When the downloads are complete, users will be notified that they're ready to install. After going to Windows Update, users can install them. 4 = Automatically download updates and install them on the schedule specified below. When "Automatic" is selected as the scheduled install time, Windows will automatically check, download, and install updates. The device will reboot as per Windows default settings unless configured by group policy. (Applies to Windows 10, version 1809 and higher) -Specify the schedule using the options in the Group Policy Setting. For version 1709 and above, there is an additional choice of limiting updating to a weekly, bi-weekly, or monthly occurrence. If no schedule is specified, the default schedule for all installations will be every day at 3:00 AM. If any updates require a restart to complete the installation, Windows will restart the computer automatically. (If a user is signed in to the computer when Windows is ready to restart, the user will be notified and given the option to delay the restart.) +Specify the schedule using the options in the Group Policy Setting. For version 1709 and above, there is an additional choice of limiting updating to a weekly, bi-weekly, or monthly occurrence. If no schedule is specified, the default schedule for all installations will be every day at 3:00 AM. If any updates require a restart to complete the installation, Windows will restart the computer automatically. (If a user is signed in to the computer when Windows is ready to restart, the user will be notified and given the option to delay the restart). -On %WINDOWS_CLIENT_VERSION_6_2% and later, you can set updates to install during automatic maintenance instead of a specific schedule. Automatic maintenance will install updates when the computer is not in use and avoid doing so when the computer is running on battery power. If automatic maintenance is unable to install updates for 2 days, Windows Update will install updates right away. Users will then be notified about an upcoming restart, and that restart will only take place if there is no potential for accidental data loss. +On %WINDOWS_CLIENT_VERSION_6_2% and later, you can set updates to install during automatic maintenance instead of a specific schedule. Automatic maintenance will install updates when the computer isn't in use and avoid doing so when the computer is running on battery power. If automatic maintenance is unable to install updates for 2 days, Windows Update will install updates right away. Users will then be notified about an upcoming restart, and that restart will only take place if there is no potential for accidental data loss. -5 = Allow local administrators to select the configuration mode that Automatic Updates should notify and install updates. (This option has not been carried over to any Win 10 Versions) +5 = Allow local administrators to select the configuration mode that Automatic Updates should notify and install updates. (This option hasn't been carried over to any Win 10 Versions) -With this option, local administrators will be allowed to use the Windows Update control panel to select a configuration option of their choice. Local administrators will not be allowed to disable the configuration for Automatic Updates. +With this option, local administrators will be allowed to use the Windows Update control panel to select a configuration option of their choice. Local administrators won't be allowed to disable the configuration for Automatic Updates. 7 = Notify for install and notify for restart. (Windows Server only) @@ -2109,7 +2113,7 @@ With this option from Windows Server 2016, applicable only to Server SKU devices If the status for this policy is set to Disabled, any updates that are available on Windows Update must be downloaded and installed manually. To do this, search for Windows Update using Start. -If the status is set to Not Configured, use of Automatic Updates is not specified at the Group Policy level. However, an administrator can still configure Automatic Updates through Control Panel. +If the status is set to Not Configured, use of Automatic Updates isn't specified at the Group Policy level. However, an administrator can still configure Automatic Updates through Control Panel. @@ -2121,7 +2125,7 @@ If the status is set to Not Configured, use of Automatic Updates is not specifie | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 2 | @@ -2132,10 +2136,10 @@ If the status is set to Not Configured, use of Automatic Updates is not specifie | Value | Description | |:--|:--| | 0 | Notify the user before downloading the update. This policy is used by the enterprise who wants to enable the end-users to manage data usage. With this option users are notified when there are updates that apply to the device and are ready for download. Users can download and install the updates from the Windows Update control panel. | -| 1 | Auto install the update and then notify the user to schedule a device restart. Updates are downloaded automatically on non-metered networks and installed during "Automatic Maintenance" when the device is not in use and is not running on battery power. If automatic maintenance is unable to install updates for two days, Windows Update will install updates immediately. If the installation requires a restart, the end-user is prompted to schedule the restart time. The end-user has up to seven days to schedule the restart and after that, a restart of the device is forced. Enabling the end-user to control the start time reduces the risk of accidental data loss caused by applications that do not shutdown properly on restart. | -| 2 (Default) | Auto install and restart. Updates are downloaded automatically on non-metered networks and installed during "Automatic Maintenance" when the device is not in use and is not running on battery power. If automatic maintenance is unable to install updates for two days, Windows Update will install updates right away. If a restart is required, then the device is automatically restarted when the device is not actively being used. This is the default behavior for unmanaged devices. Devices are updated quickly, but it increases the risk of accidental data loss caused by an application that does not shutdown properly on restart. | +| 1 | Auto install the update and then notify the user to schedule a device restart. Updates are downloaded automatically on non-metered networks and installed during "Automatic Maintenance" when the device isn't in use and isn't running on battery power. If automatic maintenance is unable to install updates for two days, Windows Update will install updates immediately. If the installation requires a restart, the end-user is prompted to schedule the restart time. The end-user has up to seven days to schedule the restart and after that, a restart of the device is forced. Enabling the end-user to control the start time reduces the risk of accidental data loss caused by applications that don't shutdown properly on restart. | +| 2 (Default) | Auto install and restart. Updates are downloaded automatically on non-metered networks and installed during "Automatic Maintenance" when the device isn't in use and isn't running on battery power. If automatic maintenance is unable to install updates for two days, Windows Update will install updates right away. If a restart is required, then the device is automatically restarted when the device isn't actively being used. This is the default behavior for unmanaged devices. Devices are updated quickly, but it increases the risk of accidental data loss caused by an application that doesn't shutdown properly on restart. | | 3 | Auto install and restart at a specified time. The IT specifies the installation day and time. If no day and time are specified, the default is 3 AM daily. Automatic installation happens at this time and device restart happens after a 15-minute countdown. If the user is logged in when Windows is ready to restart, the user can interrupt the 15-minute countdown to delay the restart. | -| 4 | Auto install and restart without end-user control. Updates are downloaded automatically on non-metered networks and installed during "Automatic Maintenance" when the device is not in use and is not running on battery power. If automatic maintenance is unable to install updates for two days, Windows Update will install updates right away. If a restart is required, then the device is automatically restarted when the device is not actively being used. This setting option also sets the end-user control panel to read-only. | +| 4 | Auto install and restart without end-user control. Updates are downloaded automatically on non-metered networks and installed during "Automatic Maintenance" when the device isn't in use and isn't running on battery power. If automatic maintenance is unable to install updates for two days, Windows Update will install updates right away. If a restart is required, then the device is automatically restarted when the device isn't actively being used. This setting option also sets the end-user control panel to read-only. | | 5 | Turn off automatic updates. | @@ -2165,7 +2169,7 @@ If the status is set to Not Configured, use of Automatic Updates is not specifie | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2191,7 +2195,7 @@ This policy is accessible through the Update setting in the user interface or Gr | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2231,7 +2235,7 @@ This policy is accessible through the Update setting in the user interface or Gr | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -2245,7 +2249,7 @@ This policy is accessible through the Update setting in the user interface or Gr Specifies whether this computer will receive security updates and other important downloads through the Windows automatic updating service. > [!NOTE] -> This policy does not apply to %WINDOWS_ARM_VERSION_6_2%. +> This policy doesn't apply to %WINDOWS_ARM_VERSION_6_2%. This setting lets you specify whether automatic updates are enabled on this computer. If the service is enabled, you must select one of the four options in the Group Policy Setting: @@ -2253,21 +2257,21 @@ This setting lets you specify whether automatic updates are enabled on this comp When Windows finds updates that apply to this computer, users will be notified that updates are ready to be downloaded. After going to Windows Update, users can download and install any available updates. -3 = (Default setting) Download the updates automatically and notify when they are ready to be installed +3 = (Default setting) Download the updates automatically and notify when they're ready to be installed. -Windows finds updates that apply to the computer and downloads them in the background (the user is not notified or interrupted during this process). When the downloads are complete, users will be notified that they are ready to install. After going to Windows Update, users can install them. +Windows finds updates that apply to the computer and downloads them in the background (the user isn't notified or interrupted during this process). When the downloads are complete, users will be notified that they're ready to install. After going to Windows Update, users can install them. 4 = Automatically download updates and install them on the schedule specified below. When "Automatic" is selected as the scheduled install time, Windows will automatically check, download, and install updates. The device will reboot as per Windows default settings unless configured by group policy. (Applies to Windows 10, version 1809 and higher) -Specify the schedule using the options in the Group Policy Setting. For version 1709 and above, there is an additional choice of limiting updating to a weekly, bi-weekly, or monthly occurrence. If no schedule is specified, the default schedule for all installations will be every day at 3:00 AM. If any updates require a restart to complete the installation, Windows will restart the computer automatically. (If a user is signed in to the computer when Windows is ready to restart, the user will be notified and given the option to delay the restart.) +Specify the schedule using the options in the Group Policy Setting. For version 1709 and above, there is an additional choice of limiting updating to a weekly, bi-weekly, or monthly occurrence. If no schedule is specified, the default schedule for all installations will be every day at 3:00 AM. If any updates require a restart to complete the installation, Windows will restart the computer automatically. (If a user is signed in to the computer when Windows is ready to restart, the user will be notified and given the option to delay the restart). -On %WINDOWS_CLIENT_VERSION_6_2% and later, you can set updates to install during automatic maintenance instead of a specific schedule. Automatic maintenance will install updates when the computer is not in use and avoid doing so when the computer is running on battery power. If automatic maintenance is unable to install updates for 2 days, Windows Update will install updates right away. Users will then be notified about an upcoming restart, and that restart will only take place if there is no potential for accidental data loss. +On %WINDOWS_CLIENT_VERSION_6_2% and later, you can set updates to install during automatic maintenance instead of a specific schedule. Automatic maintenance will install updates when the computer isn't in use and avoid doing so when the computer is running on battery power. If automatic maintenance is unable to install updates for 2 days, Windows Update will install updates right away. Users will then be notified about an upcoming restart, and that restart will only take place if there is no potential for accidental data loss. -5 = Allow local administrators to select the configuration mode that Automatic Updates should notify and install updates. (This option has not been carried over to any Win 10 Versions) +5 = Allow local administrators to select the configuration mode that Automatic Updates should notify and install updates. (This option hasn't been carried over to any Win 10 Versions) -With this option, local administrators will be allowed to use the Windows Update control panel to select a configuration option of their choice. Local administrators will not be allowed to disable the configuration for Automatic Updates. +With this option, local administrators will be allowed to use the Windows Update control panel to select a configuration option of their choice. Local administrators won't be allowed to disable the configuration for Automatic Updates. 7 = Notify for install and notify for restart. (Windows Server only) @@ -2275,7 +2279,7 @@ With this option from Windows Server 2016, applicable only to Server SKU devices If the status for this policy is set to Disabled, any updates that are available on Windows Update must be downloaded and installed manually. To do this, search for Windows Update using Start. -If the status is set to Not Configured, use of Automatic Updates is not specified at the Group Policy level. However, an administrator can still configure Automatic Updates through Control Panel. +If the status is set to Not Configured, use of Automatic Updates isn't specified at the Group Policy level. However, an administrator can still configure Automatic Updates through Control Panel. @@ -2294,7 +2298,7 @@ If the status is set to Not Configured, use of Automatic Updates is not specifie | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2334,7 +2338,7 @@ If the status is set to Not Configured, use of Automatic Updates is not specifie | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621.1344] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621.1344] and later | @@ -2365,7 +2369,7 @@ Features introduced via servicing (outside of the annual feature update) are off | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2405,7 +2409,7 @@ Features introduced via servicing (outside of the annual feature update) are off | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -2430,7 +2434,7 @@ Number of days before feature updates are installed on devices automatically reg | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-30]` | | Default Value | 2 | @@ -2462,7 +2466,7 @@ Number of days before feature updates are installed on devices automatically reg | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -2487,7 +2491,7 @@ Number of days before quality updates are installed on devices automatically reg | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-30]` | | Default Value | 7 | @@ -2519,7 +2523,7 @@ Number of days before quality updates are installed on devices automatically reg | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -2542,7 +2546,7 @@ Minimum number of days from update installation until restarts occur automatical | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-7]` | | Default Value | 2 | @@ -2574,7 +2578,7 @@ Minimum number of days from update installation until restarts occur automatical | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763.1852] and later
    :heavy_check_mark: Windows 10, version 1909 [10.0.18363.1474] and later
    :heavy_check_mark: Windows 10, version 2004 [10.0.19041.906] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.906] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763.1852] and later
    ✅ Windows 10, version 1909 [10.0.18363.1474] and later
    ✅ Windows 10, version 2004 [10.0.19041.906] and later
    ✅ Windows 10, version 2009 [10.0.19042.906] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2597,7 +2601,7 @@ Minimum number of days from update installation until restarts occur automatical | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-7]` | | Default Value | 7 | @@ -2629,7 +2633,7 @@ Minimum number of days from update installation until restarts occur automatical | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -2640,7 +2644,7 @@ Minimum number of days from update installation until restarts occur automatical -When enabled, devices will not automatically restart outside of active hours until the deadline and grace period have expired, even if an update is ready for restart. When disabled, an automatic restart may be attempted outside of active hours after update is ready for restart before the deadline is reached. Takes effect only if Update/ConfigureDeadlineForQualityUpdates or Update/ConfigureDeadlineForFeatureUpdates is configured. +When enabled, devices won't automatically restart outside of active hours until the deadline and grace period have expired, even if an update is ready for restart. When disabled, an automatic restart may be attempted outside of active hours after update is ready for restart before the deadline is reached. Takes effect only if Update/ConfigureDeadlineForQualityUpdates or Update/ConfigureDeadlineForFeatureUpdates is configured. @@ -2652,7 +2656,7 @@ When enabled, devices will not automatically restart outside of active hours unt | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2692,7 +2696,7 @@ When enabled, devices will not automatically restart outside of active hours unt | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -2715,7 +2719,7 @@ Enable enterprises/IT admin to configure feature update uninstall period. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[2-60]` | | Default Value | 10 | @@ -2733,7 +2737,7 @@ Enable enterprises/IT admin to configure feature update uninstall period. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -2746,11 +2750,11 @@ Enable enterprises/IT admin to configure feature update uninstall period. 0 (default) - Use the default Windows Update notifications 1 - Turn off all notifications, excluding restart warnings -2 - Turn off all notifications, including restart warnings +2 - Turn off all notifications, including restart warnings. This policy allows you to define what Windows Update notifications users see. This policy doesn't control how and when updates are downloaded and installed. -**Important** if you choose not to get update notifications and also define other Group policy so that devices aren't automatically getting updates, neither you nor device users will be aware of critical security, quality, or feature updates, and your devices may be at risk. +Important if you choose not to get update notifications and also define other Group policy so that devices aren't automatically getting updates, neither you nor device users will be aware of critical security, quality, or feature updates, and your devices may be at risk. If you select "Apply only during active hours" in conjunction with Option 1 or 2, then notifications will only be disabled during active hours. You can set active hours by setting "Turn off auto-restart for updates during active hours" or allow the device to set active hours based on user behavior. To ensure that the device stays secure, a notification will still be shown if this option is selected once "Specify deadlines for automatic updates and restarts" deadline has been reached if configured, regardless of active hours. @@ -2766,7 +2770,7 @@ If you select "Apply only during active hours" in conjunction with Option 1 or 2 | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2806,7 +2810,7 @@ If you select "Apply only during active hours" in conjunction with Option 1 or 2 | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -2820,7 +2824,7 @@ If you select "Apply only during active hours" in conjunction with Option 1 or 2 Specifies whether this computer will receive security updates and other important downloads through the Windows automatic updating service. > [!NOTE] -> This policy does not apply to %WINDOWS_ARM_VERSION_6_2%. +> This policy doesn't apply to %WINDOWS_ARM_VERSION_6_2%. This setting lets you specify whether automatic updates are enabled on this computer. If the service is enabled, you must select one of the four options in the Group Policy Setting: @@ -2828,21 +2832,21 @@ This setting lets you specify whether automatic updates are enabled on this comp When Windows finds updates that apply to this computer, users will be notified that updates are ready to be downloaded. After going to Windows Update, users can download and install any available updates. -3 = (Default setting) Download the updates automatically and notify when they are ready to be installed +3 = (Default setting) Download the updates automatically and notify when they're ready to be installed. -Windows finds updates that apply to the computer and downloads them in the background (the user is not notified or interrupted during this process). When the downloads are complete, users will be notified that they are ready to install. After going to Windows Update, users can install them. +Windows finds updates that apply to the computer and downloads them in the background (the user isn't notified or interrupted during this process). When the downloads are complete, users will be notified that they're ready to install. After going to Windows Update, users can install them. 4 = Automatically download updates and install them on the schedule specified below. When "Automatic" is selected as the scheduled install time, Windows will automatically check, download, and install updates. The device will reboot as per Windows default settings unless configured by group policy. (Applies to Windows 10, version 1809 and higher) -Specify the schedule using the options in the Group Policy Setting. For version 1709 and above, there is an additional choice of limiting updating to a weekly, bi-weekly, or monthly occurrence. If no schedule is specified, the default schedule for all installations will be every day at 3:00 AM. If any updates require a restart to complete the installation, Windows will restart the computer automatically. (If a user is signed in to the computer when Windows is ready to restart, the user will be notified and given the option to delay the restart.) +Specify the schedule using the options in the Group Policy Setting. For version 1709 and above, there is an additional choice of limiting updating to a weekly, bi-weekly, or monthly occurrence. If no schedule is specified, the default schedule for all installations will be every day at 3:00 AM. If any updates require a restart to complete the installation, Windows will restart the computer automatically. (If a user is signed in to the computer when Windows is ready to restart, the user will be notified and given the option to delay the restart). -On %WINDOWS_CLIENT_VERSION_6_2% and later, you can set updates to install during automatic maintenance instead of a specific schedule. Automatic maintenance will install updates when the computer is not in use and avoid doing so when the computer is running on battery power. If automatic maintenance is unable to install updates for 2 days, Windows Update will install updates right away. Users will then be notified about an upcoming restart, and that restart will only take place if there is no potential for accidental data loss. +On %WINDOWS_CLIENT_VERSION_6_2% and later, you can set updates to install during automatic maintenance instead of a specific schedule. Automatic maintenance will install updates when the computer isn't in use and avoid doing so when the computer is running on battery power. If automatic maintenance is unable to install updates for 2 days, Windows Update will install updates right away. Users will then be notified about an upcoming restart, and that restart will only take place if there is no potential for accidental data loss. -5 = Allow local administrators to select the configuration mode that Automatic Updates should notify and install updates. (This option has not been carried over to any Win 10 Versions) +5 = Allow local administrators to select the configuration mode that Automatic Updates should notify and install updates. (This option hasn't been carried over to any Win 10 Versions) -With this option, local administrators will be allowed to use the Windows Update control panel to select a configuration option of their choice. Local administrators will not be allowed to disable the configuration for Automatic Updates. +With this option, local administrators will be allowed to use the Windows Update control panel to select a configuration option of their choice. Local administrators won't be allowed to disable the configuration for Automatic Updates. 7 = Notify for install and notify for restart. (Windows Server only) @@ -2850,7 +2854,7 @@ With this option from Windows Server 2016, applicable only to Server SKU devices If the status for this policy is set to Disabled, any updates that are available on Windows Update must be downloaded and installed manually. To do this, search for Windows Update using Start. -If the status is set to Not Configured, use of Automatic Updates is not specified at the Group Policy level. However, an administrator can still configure Automatic Updates through Control Panel. +If the status is set to Not Configured, use of Automatic Updates isn't specified at the Group Policy level. However, an administrator can still configure Automatic Updates through Control Panel. @@ -2864,7 +2868,7 @@ If the status is set to Not Configured, use of Automatic Updates is not specifie | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -2910,7 +2914,7 @@ If the status is set to Not Configured, use of Automatic Updates is not specifie | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -2924,7 +2928,7 @@ If the status is set to Not Configured, use of Automatic Updates is not specifie Specifies whether this computer will receive security updates and other important downloads through the Windows automatic updating service. > [!NOTE] -> This policy does not apply to %WINDOWS_ARM_VERSION_6_2%. +> This policy doesn't apply to %WINDOWS_ARM_VERSION_6_2%. This setting lets you specify whether automatic updates are enabled on this computer. If the service is enabled, you must select one of the four options in the Group Policy Setting: @@ -2932,21 +2936,21 @@ This setting lets you specify whether automatic updates are enabled on this comp When Windows finds updates that apply to this computer, users will be notified that updates are ready to be downloaded. After going to Windows Update, users can download and install any available updates. -3 = (Default setting) Download the updates automatically and notify when they are ready to be installed +3 = (Default setting) Download the updates automatically and notify when they're ready to be installed. -Windows finds updates that apply to the computer and downloads them in the background (the user is not notified or interrupted during this process). When the downloads are complete, users will be notified that they are ready to install. After going to Windows Update, users can install them. +Windows finds updates that apply to the computer and downloads them in the background (the user isn't notified or interrupted during this process). When the downloads are complete, users will be notified that they're ready to install. After going to Windows Update, users can install them. 4 = Automatically download updates and install them on the schedule specified below. When "Automatic" is selected as the scheduled install time, Windows will automatically check, download, and install updates. The device will reboot as per Windows default settings unless configured by group policy. (Applies to Windows 10, version 1809 and higher) -Specify the schedule using the options in the Group Policy Setting. For version 1709 and above, there is an additional choice of limiting updating to a weekly, bi-weekly, or monthly occurrence. If no schedule is specified, the default schedule for all installations will be every day at 3:00 AM. If any updates require a restart to complete the installation, Windows will restart the computer automatically. (If a user is signed in to the computer when Windows is ready to restart, the user will be notified and given the option to delay the restart.) +Specify the schedule using the options in the Group Policy Setting. For version 1709 and above, there is an additional choice of limiting updating to a weekly, bi-weekly, or monthly occurrence. If no schedule is specified, the default schedule for all installations will be every day at 3:00 AM. If any updates require a restart to complete the installation, Windows will restart the computer automatically. (If a user is signed in to the computer when Windows is ready to restart, the user will be notified and given the option to delay the restart). -On %WINDOWS_CLIENT_VERSION_6_2% and later, you can set updates to install during automatic maintenance instead of a specific schedule. Automatic maintenance will install updates when the computer is not in use and avoid doing so when the computer is running on battery power. If automatic maintenance is unable to install updates for 2 days, Windows Update will install updates right away. Users will then be notified about an upcoming restart, and that restart will only take place if there is no potential for accidental data loss. +On %WINDOWS_CLIENT_VERSION_6_2% and later, you can set updates to install during automatic maintenance instead of a specific schedule. Automatic maintenance will install updates when the computer isn't in use and avoid doing so when the computer is running on battery power. If automatic maintenance is unable to install updates for 2 days, Windows Update will install updates right away. Users will then be notified about an upcoming restart, and that restart will only take place if there is no potential for accidental data loss. -5 = Allow local administrators to select the configuration mode that Automatic Updates should notify and install updates. (This option has not been carried over to any Win 10 Versions) +5 = Allow local administrators to select the configuration mode that Automatic Updates should notify and install updates. (This option hasn't been carried over to any Win 10 Versions) -With this option, local administrators will be allowed to use the Windows Update control panel to select a configuration option of their choice. Local administrators will not be allowed to disable the configuration for Automatic Updates. +With this option, local administrators will be allowed to use the Windows Update control panel to select a configuration option of their choice. Local administrators won't be allowed to disable the configuration for Automatic Updates. 7 = Notify for install and notify for restart. (Windows Server only) @@ -2954,7 +2958,7 @@ With this option from Windows Server 2016, applicable only to Server SKU devices If the status for this policy is set to Disabled, any updates that are available on Windows Update must be downloaded and installed manually. To do this, search for Windows Update using Start. -If the status is set to Not Configured, use of Automatic Updates is not specified at the Group Policy level. However, an administrator can still configure Automatic Updates through Control Panel. +If the status is set to Not Configured, use of Automatic Updates isn't specified at the Group Policy level. However, an administrator can still configure Automatic Updates through Control Panel. @@ -2968,7 +2972,7 @@ If the status is set to Not Configured, use of Automatic Updates is not specifie | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -3008,7 +3012,7 @@ If the status is set to Not Configured, use of Automatic Updates is not specifie | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -3022,7 +3026,7 @@ If the status is set to Not Configured, use of Automatic Updates is not specifie Specifies whether this computer will receive security updates and other important downloads through the Windows automatic updating service. > [!NOTE] -> This policy does not apply to %WINDOWS_ARM_VERSION_6_2%. +> This policy doesn't apply to %WINDOWS_ARM_VERSION_6_2%. This setting lets you specify whether automatic updates are enabled on this computer. If the service is enabled, you must select one of the four options in the Group Policy Setting: @@ -3030,21 +3034,21 @@ This setting lets you specify whether automatic updates are enabled on this comp When Windows finds updates that apply to this computer, users will be notified that updates are ready to be downloaded. After going to Windows Update, users can download and install any available updates. -3 = (Default setting) Download the updates automatically and notify when they are ready to be installed +3 = (Default setting) Download the updates automatically and notify when they're ready to be installed. -Windows finds updates that apply to the computer and downloads them in the background (the user is not notified or interrupted during this process). When the downloads are complete, users will be notified that they are ready to install. After going to Windows Update, users can install them. +Windows finds updates that apply to the computer and downloads them in the background (the user isn't notified or interrupted during this process). When the downloads are complete, users will be notified that they're ready to install. After going to Windows Update, users can install them. 4 = Automatically download updates and install them on the schedule specified below. When "Automatic" is selected as the scheduled install time, Windows will automatically check, download, and install updates. The device will reboot as per Windows default settings unless configured by group policy. (Applies to Windows 10, version 1809 and higher) -Specify the schedule using the options in the Group Policy Setting. For version 1709 and above, there is an additional choice of limiting updating to a weekly, bi-weekly, or monthly occurrence. If no schedule is specified, the default schedule for all installations will be every day at 3:00 AM. If any updates require a restart to complete the installation, Windows will restart the computer automatically. (If a user is signed in to the computer when Windows is ready to restart, the user will be notified and given the option to delay the restart.) +Specify the schedule using the options in the Group Policy Setting. For version 1709 and above, there is an additional choice of limiting updating to a weekly, bi-weekly, or monthly occurrence. If no schedule is specified, the default schedule for all installations will be every day at 3:00 AM. If any updates require a restart to complete the installation, Windows will restart the computer automatically. (If a user is signed in to the computer when Windows is ready to restart, the user will be notified and given the option to delay the restart). -On %WINDOWS_CLIENT_VERSION_6_2% and later, you can set updates to install during automatic maintenance instead of a specific schedule. Automatic maintenance will install updates when the computer is not in use and avoid doing so when the computer is running on battery power. If automatic maintenance is unable to install updates for 2 days, Windows Update will install updates right away. Users will then be notified about an upcoming restart, and that restart will only take place if there is no potential for accidental data loss. +On %WINDOWS_CLIENT_VERSION_6_2% and later, you can set updates to install during automatic maintenance instead of a specific schedule. Automatic maintenance will install updates when the computer isn't in use and avoid doing so when the computer is running on battery power. If automatic maintenance is unable to install updates for 2 days, Windows Update will install updates right away. Users will then be notified about an upcoming restart, and that restart will only take place if there is no potential for accidental data loss. -5 = Allow local administrators to select the configuration mode that Automatic Updates should notify and install updates. (This option has not been carried over to any Win 10 Versions) +5 = Allow local administrators to select the configuration mode that Automatic Updates should notify and install updates. (This option hasn't been carried over to any Win 10 Versions) -With this option, local administrators will be allowed to use the Windows Update control panel to select a configuration option of their choice. Local administrators will not be allowed to disable the configuration for Automatic Updates. +With this option, local administrators will be allowed to use the Windows Update control panel to select a configuration option of their choice. Local administrators won't be allowed to disable the configuration for Automatic Updates. 7 = Notify for install and notify for restart. (Windows Server only) @@ -3052,7 +3056,7 @@ With this option from Windows Server 2016, applicable only to Server SKU devices If the status for this policy is set to Disabled, any updates that are available on Windows Update must be downloaded and installed manually. To do this, search for Windows Update using Start. -If the status is set to Not Configured, use of Automatic Updates is not specified at the Group Policy level. However, an administrator can still configure Automatic Updates through Control Panel. +If the status is set to Not Configured, use of Automatic Updates isn't specified at the Group Policy level. However, an administrator can still configure Automatic Updates through Control Panel. @@ -3075,7 +3079,7 @@ These policies are not exclusive and can be used in any combination. Together wi | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -3115,7 +3119,7 @@ These policies are not exclusive and can be used in any combination. Together wi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -3129,7 +3133,7 @@ These policies are not exclusive and can be used in any combination. Together wi Specifies whether this computer will receive security updates and other important downloads through the Windows automatic updating service. > [!NOTE] -> This policy does not apply to %WINDOWS_ARM_VERSION_6_2%. +> This policy doesn't apply to %WINDOWS_ARM_VERSION_6_2%. This setting lets you specify whether automatic updates are enabled on this computer. If the service is enabled, you must select one of the four options in the Group Policy Setting: @@ -3137,21 +3141,21 @@ This setting lets you specify whether automatic updates are enabled on this comp When Windows finds updates that apply to this computer, users will be notified that updates are ready to be downloaded. After going to Windows Update, users can download and install any available updates. -3 = (Default setting) Download the updates automatically and notify when they are ready to be installed +3 = (Default setting) Download the updates automatically and notify when they're ready to be installed. -Windows finds updates that apply to the computer and downloads them in the background (the user is not notified or interrupted during this process). When the downloads are complete, users will be notified that they are ready to install. After going to Windows Update, users can install them. +Windows finds updates that apply to the computer and downloads them in the background (the user isn't notified or interrupted during this process). When the downloads are complete, users will be notified that they're ready to install. After going to Windows Update, users can install them. 4 = Automatically download updates and install them on the schedule specified below. When "Automatic" is selected as the scheduled install time, Windows will automatically check, download, and install updates. The device will reboot as per Windows default settings unless configured by group policy. (Applies to Windows 10, version 1809 and higher) -Specify the schedule using the options in the Group Policy Setting. For version 1709 and above, there is an additional choice of limiting updating to a weekly, bi-weekly, or monthly occurrence. If no schedule is specified, the default schedule for all installations will be every day at 3:00 AM. If any updates require a restart to complete the installation, Windows will restart the computer automatically. (If a user is signed in to the computer when Windows is ready to restart, the user will be notified and given the option to delay the restart.) +Specify the schedule using the options in the Group Policy Setting. For version 1709 and above, there is an additional choice of limiting updating to a weekly, bi-weekly, or monthly occurrence. If no schedule is specified, the default schedule for all installations will be every day at 3:00 AM. If any updates require a restart to complete the installation, Windows will restart the computer automatically. (If a user is signed in to the computer when Windows is ready to restart, the user will be notified and given the option to delay the restart). -On %WINDOWS_CLIENT_VERSION_6_2% and later, you can set updates to install during automatic maintenance instead of a specific schedule. Automatic maintenance will install updates when the computer is not in use and avoid doing so when the computer is running on battery power. If automatic maintenance is unable to install updates for 2 days, Windows Update will install updates right away. Users will then be notified about an upcoming restart, and that restart will only take place if there is no potential for accidental data loss. +On %WINDOWS_CLIENT_VERSION_6_2% and later, you can set updates to install during automatic maintenance instead of a specific schedule. Automatic maintenance will install updates when the computer isn't in use and avoid doing so when the computer is running on battery power. If automatic maintenance is unable to install updates for 2 days, Windows Update will install updates right away. Users will then be notified about an upcoming restart, and that restart will only take place if there is no potential for accidental data loss. -5 = Allow local administrators to select the configuration mode that Automatic Updates should notify and install updates. (This option has not been carried over to any Win 10 Versions) +5 = Allow local administrators to select the configuration mode that Automatic Updates should notify and install updates. (This option hasn't been carried over to any Win 10 Versions) -With this option, local administrators will be allowed to use the Windows Update control panel to select a configuration option of their choice. Local administrators will not be allowed to disable the configuration for Automatic Updates. +With this option, local administrators will be allowed to use the Windows Update control panel to select a configuration option of their choice. Local administrators won't be allowed to disable the configuration for Automatic Updates. 7 = Notify for install and notify for restart. (Windows Server only) @@ -3159,7 +3163,7 @@ With this option from Windows Server 2016, applicable only to Server SKU devices If the status for this policy is set to Disabled, any updates that are available on Windows Update must be downloaded and installed manually. To do this, search for Windows Update using Start. -If the status is set to Not Configured, use of Automatic Updates is not specified at the Group Policy level. However, an administrator can still configure Automatic Updates through Control Panel. +If the status is set to Not Configured, use of Automatic Updates isn't specified at the Group Policy level. However, an administrator can still configure Automatic Updates through Control Panel. @@ -3182,7 +3186,7 @@ These policies are not exclusive and can be used in any combination. Together wi | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -3222,7 +3226,7 @@ These policies are not exclusive and can be used in any combination. Together wi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -3236,7 +3240,7 @@ These policies are not exclusive and can be used in any combination. Together wi Specifies whether this computer will receive security updates and other important downloads through the Windows automatic updating service. > [!NOTE] -> This policy does not apply to %WINDOWS_ARM_VERSION_6_2%. +> This policy doesn't apply to %WINDOWS_ARM_VERSION_6_2%. This setting lets you specify whether automatic updates are enabled on this computer. If the service is enabled, you must select one of the four options in the Group Policy Setting: @@ -3244,21 +3248,21 @@ This setting lets you specify whether automatic updates are enabled on this comp When Windows finds updates that apply to this computer, users will be notified that updates are ready to be downloaded. After going to Windows Update, users can download and install any available updates. -3 = (Default setting) Download the updates automatically and notify when they are ready to be installed +3 = (Default setting) Download the updates automatically and notify when they're ready to be installed. -Windows finds updates that apply to the computer and downloads them in the background (the user is not notified or interrupted during this process). When the downloads are complete, users will be notified that they are ready to install. After going to Windows Update, users can install them. +Windows finds updates that apply to the computer and downloads them in the background (the user isn't notified or interrupted during this process). When the downloads are complete, users will be notified that they're ready to install. After going to Windows Update, users can install them. 4 = Automatically download updates and install them on the schedule specified below. When "Automatic" is selected as the scheduled install time, Windows will automatically check, download, and install updates. The device will reboot as per Windows default settings unless configured by group policy. (Applies to Windows 10, version 1809 and higher) -Specify the schedule using the options in the Group Policy Setting. For version 1709 and above, there is an additional choice of limiting updating to a weekly, bi-weekly, or monthly occurrence. If no schedule is specified, the default schedule for all installations will be every day at 3:00 AM. If any updates require a restart to complete the installation, Windows will restart the computer automatically. (If a user is signed in to the computer when Windows is ready to restart, the user will be notified and given the option to delay the restart.) +Specify the schedule using the options in the Group Policy Setting. For version 1709 and above, there is an additional choice of limiting updating to a weekly, bi-weekly, or monthly occurrence. If no schedule is specified, the default schedule for all installations will be every day at 3:00 AM. If any updates require a restart to complete the installation, Windows will restart the computer automatically. (If a user is signed in to the computer when Windows is ready to restart, the user will be notified and given the option to delay the restart). -On %WINDOWS_CLIENT_VERSION_6_2% and later, you can set updates to install during automatic maintenance instead of a specific schedule. Automatic maintenance will install updates when the computer is not in use and avoid doing so when the computer is running on battery power. If automatic maintenance is unable to install updates for 2 days, Windows Update will install updates right away. Users will then be notified about an upcoming restart, and that restart will only take place if there is no potential for accidental data loss. +On %WINDOWS_CLIENT_VERSION_6_2% and later, you can set updates to install during automatic maintenance instead of a specific schedule. Automatic maintenance will install updates when the computer isn't in use and avoid doing so when the computer is running on battery power. If automatic maintenance is unable to install updates for 2 days, Windows Update will install updates right away. Users will then be notified about an upcoming restart, and that restart will only take place if there is no potential for accidental data loss. -5 = Allow local administrators to select the configuration mode that Automatic Updates should notify and install updates. (This option has not been carried over to any Win 10 Versions) +5 = Allow local administrators to select the configuration mode that Automatic Updates should notify and install updates. (This option hasn't been carried over to any Win 10 Versions) -With this option, local administrators will be allowed to use the Windows Update control panel to select a configuration option of their choice. Local administrators will not be allowed to disable the configuration for Automatic Updates. +With this option, local administrators will be allowed to use the Windows Update control panel to select a configuration option of their choice. Local administrators won't be allowed to disable the configuration for Automatic Updates. 7 = Notify for install and notify for restart. (Windows Server only) @@ -3266,7 +3270,7 @@ With this option from Windows Server 2016, applicable only to Server SKU devices If the status for this policy is set to Disabled, any updates that are available on Windows Update must be downloaded and installed manually. To do this, search for Windows Update using Start. -If the status is set to Not Configured, use of Automatic Updates is not specified at the Group Policy level. However, an administrator can still configure Automatic Updates through Control Panel. +If the status is set to Not Configured, use of Automatic Updates isn't specified at the Group Policy level. However, an administrator can still configure Automatic Updates through Control Panel. @@ -3289,7 +3293,7 @@ These policies are not exclusive and can be used in any combination. Together wi | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -3329,7 +3333,7 @@ These policies are not exclusive and can be used in any combination. Together wi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -3343,7 +3347,7 @@ These policies are not exclusive and can be used in any combination. Together wi Specifies whether this computer will receive security updates and other important downloads through the Windows automatic updating service. > [!NOTE] -> This policy does not apply to %WINDOWS_ARM_VERSION_6_2%. +> This policy doesn't apply to %WINDOWS_ARM_VERSION_6_2%. This setting lets you specify whether automatic updates are enabled on this computer. If the service is enabled, you must select one of the four options in the Group Policy Setting: @@ -3351,21 +3355,21 @@ This setting lets you specify whether automatic updates are enabled on this comp When Windows finds updates that apply to this computer, users will be notified that updates are ready to be downloaded. After going to Windows Update, users can download and install any available updates. -3 = (Default setting) Download the updates automatically and notify when they are ready to be installed +3 = (Default setting) Download the updates automatically and notify when they're ready to be installed. -Windows finds updates that apply to the computer and downloads them in the background (the user is not notified or interrupted during this process). When the downloads are complete, users will be notified that they are ready to install. After going to Windows Update, users can install them. +Windows finds updates that apply to the computer and downloads them in the background (the user isn't notified or interrupted during this process). When the downloads are complete, users will be notified that they're ready to install. After going to Windows Update, users can install them. 4 = Automatically download updates and install them on the schedule specified below. When "Automatic" is selected as the scheduled install time, Windows will automatically check, download, and install updates. The device will reboot as per Windows default settings unless configured by group policy. (Applies to Windows 10, version 1809 and higher) -Specify the schedule using the options in the Group Policy Setting. For version 1709 and above, there is an additional choice of limiting updating to a weekly, bi-weekly, or monthly occurrence. If no schedule is specified, the default schedule for all installations will be every day at 3:00 AM. If any updates require a restart to complete the installation, Windows will restart the computer automatically. (If a user is signed in to the computer when Windows is ready to restart, the user will be notified and given the option to delay the restart.) +Specify the schedule using the options in the Group Policy Setting. For version 1709 and above, there is an additional choice of limiting updating to a weekly, bi-weekly, or monthly occurrence. If no schedule is specified, the default schedule for all installations will be every day at 3:00 AM. If any updates require a restart to complete the installation, Windows will restart the computer automatically. (If a user is signed in to the computer when Windows is ready to restart, the user will be notified and given the option to delay the restart). -On %WINDOWS_CLIENT_VERSION_6_2% and later, you can set updates to install during automatic maintenance instead of a specific schedule. Automatic maintenance will install updates when the computer is not in use and avoid doing so when the computer is running on battery power. If automatic maintenance is unable to install updates for 2 days, Windows Update will install updates right away. Users will then be notified about an upcoming restart, and that restart will only take place if there is no potential for accidental data loss. +On %WINDOWS_CLIENT_VERSION_6_2% and later, you can set updates to install during automatic maintenance instead of a specific schedule. Automatic maintenance will install updates when the computer isn't in use and avoid doing so when the computer is running on battery power. If automatic maintenance is unable to install updates for 2 days, Windows Update will install updates right away. Users will then be notified about an upcoming restart, and that restart will only take place if there is no potential for accidental data loss. -5 = Allow local administrators to select the configuration mode that Automatic Updates should notify and install updates. (This option has not been carried over to any Win 10 Versions) +5 = Allow local administrators to select the configuration mode that Automatic Updates should notify and install updates. (This option hasn't been carried over to any Win 10 Versions) -With this option, local administrators will be allowed to use the Windows Update control panel to select a configuration option of their choice. Local administrators will not be allowed to disable the configuration for Automatic Updates. +With this option, local administrators will be allowed to use the Windows Update control panel to select a configuration option of their choice. Local administrators won't be allowed to disable the configuration for Automatic Updates. 7 = Notify for install and notify for restart. (Windows Server only) @@ -3373,7 +3377,7 @@ With this option from Windows Server 2016, applicable only to Server SKU devices If the status for this policy is set to Disabled, any updates that are available on Windows Update must be downloaded and installed manually. To do this, search for Windows Update using Start. -If the status is set to Not Configured, use of Automatic Updates is not specified at the Group Policy level. However, an administrator can still configure Automatic Updates through Control Panel. +If the status is set to Not Configured, use of Automatic Updates isn't specified at the Group Policy level. However, an administrator can still configure Automatic Updates through Control Panel. @@ -3396,7 +3400,7 @@ These policies are not exclusive and can be used in any combination. Together wi | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -3436,7 +3440,7 @@ These policies are not exclusive and can be used in any combination. Together wi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -3450,7 +3454,7 @@ These policies are not exclusive and can be used in any combination. Together wi Specifies whether this computer will receive security updates and other important downloads through the Windows automatic updating service. > [!NOTE] -> This policy does not apply to %WINDOWS_ARM_VERSION_6_2%. +> This policy doesn't apply to %WINDOWS_ARM_VERSION_6_2%. This setting lets you specify whether automatic updates are enabled on this computer. If the service is enabled, you must select one of the four options in the Group Policy Setting: @@ -3458,21 +3462,21 @@ This setting lets you specify whether automatic updates are enabled on this comp When Windows finds updates that apply to this computer, users will be notified that updates are ready to be downloaded. After going to Windows Update, users can download and install any available updates. -3 = (Default setting) Download the updates automatically and notify when they are ready to be installed +3 = (Default setting) Download the updates automatically and notify when they're ready to be installed. -Windows finds updates that apply to the computer and downloads them in the background (the user is not notified or interrupted during this process). When the downloads are complete, users will be notified that they are ready to install. After going to Windows Update, users can install them. +Windows finds updates that apply to the computer and downloads them in the background (the user isn't notified or interrupted during this process). When the downloads are complete, users will be notified that they're ready to install. After going to Windows Update, users can install them. 4 = Automatically download updates and install them on the schedule specified below. When "Automatic" is selected as the scheduled install time, Windows will automatically check, download, and install updates. The device will reboot as per Windows default settings unless configured by group policy. (Applies to Windows 10, version 1809 and higher) -Specify the schedule using the options in the Group Policy Setting. For version 1709 and above, there is an additional choice of limiting updating to a weekly, bi-weekly, or monthly occurrence. If no schedule is specified, the default schedule for all installations will be every day at 3:00 AM. If any updates require a restart to complete the installation, Windows will restart the computer automatically. (If a user is signed in to the computer when Windows is ready to restart, the user will be notified and given the option to delay the restart.) +Specify the schedule using the options in the Group Policy Setting. For version 1709 and above, there is an additional choice of limiting updating to a weekly, bi-weekly, or monthly occurrence. If no schedule is specified, the default schedule for all installations will be every day at 3:00 AM. If any updates require a restart to complete the installation, Windows will restart the computer automatically. (If a user is signed in to the computer when Windows is ready to restart, the user will be notified and given the option to delay the restart). -On %WINDOWS_CLIENT_VERSION_6_2% and later, you can set updates to install during automatic maintenance instead of a specific schedule. Automatic maintenance will install updates when the computer is not in use and avoid doing so when the computer is running on battery power. If automatic maintenance is unable to install updates for 2 days, Windows Update will install updates right away. Users will then be notified about an upcoming restart, and that restart will only take place if there is no potential for accidental data loss. +On %WINDOWS_CLIENT_VERSION_6_2% and later, you can set updates to install during automatic maintenance instead of a specific schedule. Automatic maintenance will install updates when the computer isn't in use and avoid doing so when the computer is running on battery power. If automatic maintenance is unable to install updates for 2 days, Windows Update will install updates right away. Users will then be notified about an upcoming restart, and that restart will only take place if there is no potential for accidental data loss. -5 = Allow local administrators to select the configuration mode that Automatic Updates should notify and install updates. (This option has not been carried over to any Win 10 Versions) +5 = Allow local administrators to select the configuration mode that Automatic Updates should notify and install updates. (This option hasn't been carried over to any Win 10 Versions) -With this option, local administrators will be allowed to use the Windows Update control panel to select a configuration option of their choice. Local administrators will not be allowed to disable the configuration for Automatic Updates. +With this option, local administrators will be allowed to use the Windows Update control panel to select a configuration option of their choice. Local administrators won't be allowed to disable the configuration for Automatic Updates. 7 = Notify for install and notify for restart. (Windows Server only) @@ -3480,7 +3484,7 @@ With this option from Windows Server 2016, applicable only to Server SKU devices If the status for this policy is set to Disabled, any updates that are available on Windows Update must be downloaded and installed manually. To do this, search for Windows Update using Start. -If the status is set to Not Configured, use of Automatic Updates is not specified at the Group Policy level. However, an administrator can still configure Automatic Updates through Control Panel. +If the status is set to Not Configured, use of Automatic Updates isn't specified at the Group Policy level. However, an administrator can still configure Automatic Updates through Control Panel. @@ -3496,7 +3500,7 @@ If the status is set to Not Configured, use of Automatic Updates is not specifie | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-23]` | | Default Value | 3 | @@ -3528,7 +3532,7 @@ If the status is set to Not Configured, use of Automatic Updates is not specifie | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -3553,7 +3557,7 @@ Once enabled user access to pause updates is removed. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -3593,7 +3597,7 @@ Once enabled user access to pause updates is removed. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -3618,7 +3622,7 @@ If you enable this setting user access to Windows Update scan, download and inst | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -3658,7 +3662,7 @@ If you enable this setting user access to Windows Update scan, download and inst | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -3691,7 +3695,7 @@ These settings are designed for education devices that remain in carts overnight | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -3731,7 +3735,7 @@ These settings are designed for education devices that remain in carts overnight | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -3744,11 +3748,11 @@ These settings are designed for education devices that remain in carts overnight 0 (default) - Use the default Windows Update notifications 1 - Turn off all notifications, excluding restart warnings -2 - Turn off all notifications, including restart warnings +2 - Turn off all notifications, including restart warnings. This policy allows you to define what Windows Update notifications users see. This policy doesn't control how and when updates are downloaded and installed. -**Important** if you choose not to get update notifications and also define other Group policy so that devices aren't automatically getting updates, neither you nor device users will be aware of critical security, quality, or feature updates, and your devices may be at risk. +Important if you choose not to get update notifications and also define other Group policy so that devices aren't automatically getting updates, neither you nor device users will be aware of critical security, quality, or feature updates, and your devices may be at risk. If you select "Apply only during active hours" in conjunction with Option 1 or 2, then notifications will only be disabled during active hours. You can set active hours by setting "Turn off auto-restart for updates during active hours" or allow the device to set active hours based on user behavior. To ensure that the device stays secure, a notification will still be shown if this option is selected once "Specify deadlines for automatic updates and restarts" deadline has been reached if configured, regardless of active hours. @@ -3762,7 +3766,7 @@ If you select "Apply only during active hours" in conjunction with Option 1 or 2 | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -3805,7 +3809,7 @@ If you select "Apply only during active hours" in conjunction with Option 1 or 2 | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -3820,11 +3824,12 @@ Specify the deadline before the PC will automatically restart to apply updates. The restart may happen inside active hours. -If you disable or do not configure this policy, the PC will restart according to the default schedule. +If you disable or don't configure this policy, the PC will restart according to the default schedule. Enabling either of the following two policies will override the above policy: -1. No auto-restart with logged on users for scheduled automatic updates installations. +1. No auto-restart with logged-on users for scheduled automatic updates installations. + 2. Always automatically restart at scheduled time. @@ -3837,7 +3842,7 @@ Enabling either of the following two policies will override the above policy: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[2-30]` | | Default Value | 7 | @@ -3869,7 +3874,7 @@ Enabling either of the following two policies will override the above policy: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -3884,11 +3889,12 @@ Specify the deadline before the PC will automatically restart to apply updates. The restart may happen inside active hours. -If you disable or do not configure this policy, the PC will restart according to the default schedule. +If you disable or don't configure this policy, the PC will restart according to the default schedule. Enabling either of the following two policies will override the above policy: -1. No auto-restart with logged on users for scheduled automatic updates installations. +1. No auto-restart with logged-on users for scheduled automatic updates installations. + 2. Always automatically restart at scheduled time. @@ -3901,7 +3907,7 @@ Enabling either of the following two policies will override the above policy: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[2-30]` | | Default Value | 7 | @@ -3933,7 +3939,7 @@ Enabling either of the following two policies will override the above policy: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -3948,7 +3954,7 @@ Enable this policy to specify when auto-restart reminders are displayed. You can specify the amount of time prior to a scheduled restart to notify the user. -If you disable or do not configure this policy, the default period will be used. +If you disable or don't configure this policy, the default period will be used. @@ -3960,7 +3966,7 @@ If you disable or do not configure this policy, the default period will be used. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 15 | @@ -4003,7 +4009,7 @@ If you disable or do not configure this policy, the default period will be used. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -4018,7 +4024,7 @@ Enable this policy to specify the method by which the auto-restart required noti The method can be set to require user action to dismiss the notification. -If you disable or do not configure this policy, the default method will be used. +If you disable or don't configure this policy, the default method will be used. @@ -4030,7 +4036,7 @@ If you disable or do not configure this policy, the default method will be used. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -4070,7 +4076,7 @@ If you disable or do not configure this policy, the default method will be used. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -4129,7 +4135,7 @@ Other/can't defer: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-4]` | | Default Value | 0 | @@ -4157,7 +4163,7 @@ Other/can't defer: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -4186,7 +4192,7 @@ Allows IT Admins to specify additional upgrade delays for up to 8 months. Suppor | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-8]` | | Default Value | 0 | @@ -4214,7 +4220,7 @@ Allows IT Admins to specify additional upgrade delays for up to 8 months. Suppor | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -4244,7 +4250,7 @@ If this policy is disabled or not configured, then the Windows Update client may | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -4255,7 +4261,7 @@ If this policy is disabled or not configured, then the Windows Update client may | Value | Description | |:--|:--| | 0 (Default) | Allow scan against Windows Update. | -| 1 | Do not allow update deferral policies to cause scans against Windows Update. | +| 1 | Don't allow update deferral policies to cause scans against Windows Update. | @@ -4284,7 +4290,7 @@ If this policy is disabled or not configured, then the Windows Update client may | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -4301,14 +4307,14 @@ You can specify the number of days a user can snooze Engaged restart reminder no You can specify the deadline in days before automatically scheduling and executing a pending restart regardless of active hours. The deadline can be set between 2 and 30 days from the time the restart becomes pending. If configured, the pending restart will transition from Auto-restart to Engaged restart (pending user schedule) to automatically executed, within the specified period. -If you do not specify a deadline or if the deadline is set to 0, the PC won't automatically restart and will require the person to schedule it prior to restart. +If you don't specify a deadline or if the deadline is set to 0, the PC won't automatically restart and will require the person to schedule it prior to restart. -If you disable or do not configure this policy, the PC will restart following the default schedule. +If you disable or don't configure this policy, the PC will restart following the default schedule. Enabling any of the following policies will override the above policy: -1. No auto-restart with logged on users for scheduled automatic updates installations -2. Always automatically restart at scheduled time +1. No auto-restart with logged-on users for scheduled automatic updates installations +2. Always automatically restart at scheduled time. 3. Specify deadline before auto-restart for update installation. @@ -4322,7 +4328,7 @@ Enabling any of the following policies will override the above policy: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[2-30]` | | Default Value | 14 | @@ -4335,7 +4341,7 @@ Enabling any of the following policies will override the above policy: |:--|:--| | Name | EngagedRestartTransitionSchedule | | Friendly Name | Specify Engaged restart transition and notification schedule for updates | -| Element Name | Deadline (days) | +| Element Name | Deadline (days) | | Location | Computer Configuration | | Path | Windows Components > Windows Update > Legacy Policies | | Registry Key Name | Software\Policies\Microsoft\Windows\WindowsUpdate | @@ -4354,7 +4360,7 @@ Enabling any of the following policies will override the above policy: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -4371,14 +4377,14 @@ You can specify the number of days a user can snooze Engaged restart reminder no You can specify the deadline in days before automatically scheduling and executing a pending restart regardless of active hours. The deadline can be set between 2 and 30 days from the time the restart becomes pending. If configured, the pending restart will transition from Auto-restart to Engaged restart (pending user schedule) to automatically executed, within the specified period. -If you do not specify a deadline or if the deadline is set to 0, the PC won't automatically restart and will require the person to schedule it prior to restart. +If you don't specify a deadline or if the deadline is set to 0, the PC won't automatically restart and will require the person to schedule it prior to restart. -If you disable or do not configure this policy, the PC will restart following the default schedule. +If you disable or don't configure this policy, the PC will restart following the default schedule. Enabling any of the following policies will override the above policy: -1. No auto-restart with logged on users for scheduled automatic updates installations -2. Always automatically restart at scheduled time +1. No auto-restart with logged-on users for scheduled automatic updates installations +2. Always automatically restart at scheduled time. 3. Specify deadline before auto-restart for update installation. @@ -4392,7 +4398,7 @@ Enabling any of the following policies will override the above policy: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[2-30]` | | Default Value | 14 | @@ -4405,7 +4411,7 @@ Enabling any of the following policies will override the above policy: |:--|:--| | Name | EngagedRestartTransitionSchedule | | Friendly Name | Specify Engaged restart transition and notification schedule for updates | -| Element Name | Deadline (days) | +| Element Name | Deadline (days) | | Location | Computer Configuration | | Path | Windows Components > Windows Update > Legacy Policies | | Registry Key Name | Software\Policies\Microsoft\Windows\WindowsUpdate | @@ -4424,7 +4430,7 @@ Enabling any of the following policies will override the above policy: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -4441,14 +4447,14 @@ You can specify the number of days a user can snooze Engaged restart reminder no You can specify the deadline in days before automatically scheduling and executing a pending restart regardless of active hours. The deadline can be set between 2 and 30 days from the time the restart becomes pending. If configured, the pending restart will transition from Auto-restart to Engaged restart (pending user schedule) to automatically executed, within the specified period. -If you do not specify a deadline or if the deadline is set to 0, the PC won't automatically restart and will require the person to schedule it prior to restart. +If you don't specify a deadline or if the deadline is set to 0, the PC won't automatically restart and will require the person to schedule it prior to restart. -If you disable or do not configure this policy, the PC will restart following the default schedule. +If you disable or don't configure this policy, the PC will restart following the default schedule. Enabling any of the following policies will override the above policy: -1. No auto-restart with logged on users for scheduled automatic updates installations -2. Always automatically restart at scheduled time +1. No auto-restart with logged-on users for scheduled automatic updates installations +2. Always automatically restart at scheduled time. 3. Specify deadline before auto-restart for update installation. @@ -4462,7 +4468,7 @@ Enabling any of the following policies will override the above policy: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[1-3]` | | Default Value | 3 | @@ -4475,7 +4481,7 @@ Enabling any of the following policies will override the above policy: |:--|:--| | Name | EngagedRestartTransitionSchedule | | Friendly Name | Specify Engaged restart transition and notification schedule for updates | -| Element Name | Snooze (days) | +| Element Name | Snooze (days) | | Location | Computer Configuration | | Path | Windows Components > Windows Update > Legacy Policies | | Registry Key Name | Software\Policies\Microsoft\Windows\WindowsUpdate | @@ -4494,7 +4500,7 @@ Enabling any of the following policies will override the above policy: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -4511,14 +4517,14 @@ You can specify the number of days a user can snooze Engaged restart reminder no You can specify the deadline in days before automatically scheduling and executing a pending restart regardless of active hours. The deadline can be set between 2 and 30 days from the time the restart becomes pending. If configured, the pending restart will transition from Auto-restart to Engaged restart (pending user schedule) to automatically executed, within the specified period. -If you do not specify a deadline or if the deadline is set to 0, the PC won't automatically restart and will require the person to schedule it prior to restart. +If you don't specify a deadline or if the deadline is set to 0, the PC won't automatically restart and will require the person to schedule it prior to restart. -If you disable or do not configure this policy, the PC will restart following the default schedule. +If you disable or don't configure this policy, the PC will restart following the default schedule. Enabling any of the following policies will override the above policy: -1. No auto-restart with logged on users for scheduled automatic updates installations -2. Always automatically restart at scheduled time +1. No auto-restart with logged-on users for scheduled automatic updates installations +2. Always automatically restart at scheduled time. 3. Specify deadline before auto-restart for update installation. @@ -4532,7 +4538,7 @@ Enabling any of the following policies will override the above policy: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[1-3]` | | Default Value | 3 | @@ -4545,7 +4551,7 @@ Enabling any of the following policies will override the above policy: |:--|:--| | Name | EngagedRestartTransitionSchedule | | Friendly Name | Specify Engaged restart transition and notification schedule for updates | -| Element Name | Snooze (days) | +| Element Name | Snooze (days) | | Location | Computer Configuration | | Path | Windows Components > Windows Update > Legacy Policies | | Registry Key Name | Software\Policies\Microsoft\Windows\WindowsUpdate | @@ -4564,7 +4570,7 @@ Enabling any of the following policies will override the above policy: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -4581,14 +4587,14 @@ You can specify the number of days a user can snooze Engaged restart reminder no You can specify the deadline in days before automatically scheduling and executing a pending restart regardless of active hours. The deadline can be set between 2 and 30 days from the time the restart becomes pending. If configured, the pending restart will transition from Auto-restart to Engaged restart (pending user schedule) to automatically executed, within the specified period. -If you do not specify a deadline or if the deadline is set to 0, the PC won't automatically restart and will require the person to schedule it prior to restart. +If you don't specify a deadline or if the deadline is set to 0, the PC won't automatically restart and will require the person to schedule it prior to restart. -If you disable or do not configure this policy, the PC will restart following the default schedule. +If you disable or don't configure this policy, the PC will restart following the default schedule. Enabling any of the following policies will override the above policy: -1. No auto-restart with logged on users for scheduled automatic updates installations -2. Always automatically restart at scheduled time +1. No auto-restart with logged-on users for scheduled automatic updates installations +2. Always automatically restart at scheduled time. 3. Specify deadline before auto-restart for update installation. @@ -4602,7 +4608,7 @@ Enabling any of the following policies will override the above policy: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-30]` | | Default Value | 7 | @@ -4615,7 +4621,7 @@ Enabling any of the following policies will override the above policy: |:--|:--| | Name | EngagedRestartTransitionSchedule | | Friendly Name | Specify Engaged restart transition and notification schedule for updates | -| Element Name | Transition (days) | +| Element Name | Transition (days) | | Location | Computer Configuration | | Path | Windows Components > Windows Update > Legacy Policies | | Registry Key Name | Software\Policies\Microsoft\Windows\WindowsUpdate | @@ -4634,7 +4640,7 @@ Enabling any of the following policies will override the above policy: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -4651,14 +4657,14 @@ You can specify the number of days a user can snooze Engaged restart reminder no You can specify the deadline in days before automatically scheduling and executing a pending restart regardless of active hours. The deadline can be set between 2 and 30 days from the time the restart becomes pending. If configured, the pending restart will transition from Auto-restart to Engaged restart (pending user schedule) to automatically executed, within the specified period. -If you do not specify a deadline or if the deadline is set to 0, the PC won't automatically restart and will require the person to schedule it prior to restart. +If you don't specify a deadline or if the deadline is set to 0, the PC won't automatically restart and will require the person to schedule it prior to restart. -If you disable or do not configure this policy, the PC will restart following the default schedule. +If you disable or don't configure this policy, the PC will restart following the default schedule. Enabling any of the following policies will override the above policy: -1. No auto-restart with logged on users for scheduled automatic updates installations -2. Always automatically restart at scheduled time +1. No auto-restart with logged-on users for scheduled automatic updates installations +2. Always automatically restart at scheduled time. 3. Specify deadline before auto-restart for update installation. @@ -4672,7 +4678,7 @@ Enabling any of the following policies will override the above policy: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-30]` | | Default Value | 7 | @@ -4685,7 +4691,7 @@ Enabling any of the following policies will override the above policy: |:--|:--| | Name | EngagedRestartTransitionSchedule | | Friendly Name | Specify Engaged restart transition and notification schedule for updates | -| Element Name | Transition (days) | +| Element Name | Transition (days) | | Location | Computer Configuration | | Path | Windows Components > Windows Update > Legacy Policies | | Registry Key Name | Software\Policies\Microsoft\Windows\WindowsUpdate | @@ -4704,7 +4710,7 @@ Enabling any of the following policies will override the above policy: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -4738,7 +4744,7 @@ To validate this policy: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -4748,7 +4754,7 @@ To validate this policy: | Value | Description | |:--|:--| -| 0 (Default) | Do not ignore MO download limit for apps and their updates. | +| 0 (Default) | Don't ignore MO download limit for apps and their updates. | | 1 | Ignore MO download limit (allow unlimited downloading) for apps and their updates. | @@ -4764,7 +4770,7 @@ To validate this policy: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -4798,7 +4804,7 @@ To validate this policy: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -4808,7 +4814,7 @@ To validate this policy: | Value | Description | |:--|:--| -| 0 (Default) | Do not ignore MO download limit for OS updates. | +| 0 (Default) | Don't ignore MO download limit for OS updates. | | 1 | Ignore MO download limit (allow unlimited downloading) for OS updates. | @@ -4824,7 +4830,7 @@ To validate this policy: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -4849,7 +4855,7 @@ To validate this policy: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -4859,7 +4865,7 @@ To validate this policy: | Value | Description | |:--|:--| -| 0 (Default) | Deferrals are not paused. | +| 0 (Default) | Deferrals aren't paused. | | 1 | Deferrals are paused. | @@ -4885,7 +4891,7 @@ To validate this policy: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -4908,7 +4914,7 @@ This policy is deprecated. Use Update/RequireUpdateApproval instead. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-4]` | | Default Value | 4 | @@ -4926,7 +4932,7 @@ This policy is deprecated. Use Update/RequireUpdateApproval instead. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -4951,7 +4957,7 @@ This policy is deprecated. Use Update/RequireUpdateApproval instead. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -4987,7 +4993,7 @@ This policy is deprecated. Use Update/RequireUpdateApproval instead. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -5012,7 +5018,7 @@ This policy is deprecated. Use Update/RequireUpdateApproval instead. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -5038,7 +5044,7 @@ This policy is deprecated. Use Update/RequireUpdateApproval instead. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -5049,13 +5055,13 @@ This policy is deprecated. Use Update/RequireUpdateApproval instead. -Enable this policy to control when notifications are displayed to warn users about a scheduled restart for the update installation deadline. Users are not able to postpone the scheduled restart once the deadline has been reached and the restart is automatically executed. +Enable this policy to control when notifications are displayed to warn users about a scheduled restart for the update installation deadline. Users aren't able to postpone the scheduled restart once the deadline has been reached and the restart is automatically executed. Specifies the amount of time prior to a scheduled restart to display the warning reminder to the user. You can specify the amount of time prior to a scheduled restart to notify the user that the auto restart is imminent to allow them time to save their work. -If you disable or do not configure this policy, the default notification behaviors will be used. +If you disable or don't configure this policy, the default notification behaviors will be used. @@ -5067,7 +5073,7 @@ If you disable or do not configure this policy, the default notification behavio | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 15 | @@ -5108,7 +5114,7 @@ If you disable or do not configure this policy, the default notification behavio | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -5119,13 +5125,13 @@ If you disable or do not configure this policy, the default notification behavio -Enable this policy to control when notifications are displayed to warn users about a scheduled restart for the update installation deadline. Users are not able to postpone the scheduled restart once the deadline has been reached and the restart is automatically executed. +Enable this policy to control when notifications are displayed to warn users about a scheduled restart for the update installation deadline. Users aren't able to postpone the scheduled restart once the deadline has been reached and the restart is automatically executed. Specifies the amount of time prior to a scheduled restart to display the warning reminder to the user. You can specify the amount of time prior to a scheduled restart to notify the user that the auto restart is imminent to allow them time to save their work. -If you disable or do not configure this policy, the default notification behaviors will be used. +If you disable or don't configure this policy, the default notification behaviors will be used. @@ -5137,7 +5143,7 @@ If you disable or do not configure this policy, the default notification behavio | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 4 | @@ -5180,7 +5186,7 @@ If you disable or do not configure this policy, the default notification behavio | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -5195,7 +5201,7 @@ This policy setting allows you to control whether users receive notifications fo Enable this policy to turn off all auto restart notifications. -If you disable or do not configure this policy, the default notification behaviors will be unchanged. +If you disable or don't configure this policy, the default notification behaviors will be unchanged. @@ -5207,7 +5213,7 @@ If you disable or do not configure this policy, the default notification behavio | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | diff --git a/windows/client-management/mdm/policy-csp-userrights.md b/windows/client-management/mdm/policy-csp-userrights.md index d901a34a02..a4df2c7458 100644 --- a/windows/client-management/mdm/policy-csp-userrights.md +++ b/windows/client-management/mdm/policy-csp-userrights.md @@ -4,7 +4,7 @@ description: Learn more about the UserRights Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 05/01/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,8 +16,7 @@ ms.topic: reference # Policy CSP - UserRights -> [!IMPORTANT] -> This CSP contains preview policies that are under development and only applicable for [Windows Insider Preview builds](/windows-insider/). These policies are subject to change and may have dependencies on other features or services in preview. +[!INCLUDE [Windows Insider tip](includes/mdm-insider-csp-note.md)] @@ -113,7 +112,7 @@ For example, the following syntax grants user rights to a specific user or group | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -124,7 +123,7 @@ For example, the following syntax grants user rights to a specific user or group -This user right is used by Credential Manager during Backup/Restore. No accounts should have this privilege, as it is only assigned to Winlogon. Users' saved credentials might be compromised if this privilege is given to other entities. +This user right is used by Credential Manager during Backup/Restore. No accounts should've this privilege, as it's only assigned to Winlogon. Users' saved credentials might be compromised if this privilege is given to other entities. @@ -136,7 +135,7 @@ This user right is used by Credential Manager during Backup/Restore. No accounts | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -162,7 +161,7 @@ This user right is used by Credential Manager during Backup/Restore. No accounts | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -173,7 +172,7 @@ This user right is used by Credential Manager during Backup/Restore. No accounts -This user right determines which users and groups are allowed to connect to the computer over the network. Remote Desktop Services are not affected by this user right. +This user right determines which users and groups are allowed to connect to the computer over the network. Remote Desktop Services aren't affected by this user right. > [!NOTE] > Remote Desktop Services was called Terminal Services in previous versions of Windows Server. @@ -188,7 +187,7 @@ This user right determines which users and groups are allowed to connect to the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -214,7 +213,7 @@ This user right determines which users and groups are allowed to connect to the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -240,7 +239,7 @@ This user right allows a process to impersonate any user without authentication. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -266,7 +265,7 @@ This user right allows a process to impersonate any user without authentication. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -292,7 +291,7 @@ This user right determines which users can log on to the computer. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -318,7 +317,7 @@ This user right determines which users can log on to the computer. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -344,7 +343,7 @@ This user right determines which users can bypass file, directory, registry, and | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -370,7 +369,7 @@ This user right determines which users can bypass file, directory, registry, and | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -381,7 +380,7 @@ This user right determines which users can bypass file, directory, registry, and -This user right determines which users can traverse directory trees even though the user may not have permissions on the traversed directory. This privilege does not allow the user to list the contents of a directory, only to traverse directories. +This user right determines which users can traverse directory trees even though the user may not have permissions on the traversed directory. This privilege doesn't allow the user to list the contents of a directory, only to traverse directories. @@ -393,7 +392,7 @@ This user right determines which users can traverse directory trees even though | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -419,7 +418,7 @@ This user right determines which users can traverse directory trees even though | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -451,7 +450,7 @@ This user right determines which users and groups can change the time and date o | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -477,7 +476,7 @@ This user right determines which users and groups can change the time and date o | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -488,7 +487,7 @@ This user right determines which users and groups can change the time and date o -This user right determines which users and groups can change the time zone used by the computer for displaying the local time, which is the computer's system time plus the time zone offset. System time itself is absolute and is not affected by a change in the time zone. +This user right determines which users and groups can change the time zone used by the computer for displaying the local time, which is the computer's system time plus the time zone offset. System time itself is absolute and isn't affected by a change in the time zone. @@ -500,7 +499,7 @@ This user right determines which users and groups can change the time zone used | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -526,7 +525,7 @@ This user right determines which users and groups can change the time zone used | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -537,7 +536,7 @@ This user right determines which users and groups can change the time zone used -This security setting determines whether users can create global objects that are available to all sessions. Users can still create objects that are specific to their own session if they do not have this user right. Users who can create global objects could affect processes that run under other users' sessions, which could lead to application failure or data corruption. +This security setting determines whether users can create global objects that are available to all sessions. Users can still create objects that are specific to their own session if they don't have this user right. Users who can create global objects could affect processes that run under other users' sessions, which could lead to application failure or data corruption. > [!CAUTION] > Assigning this user right can be a security risk. Assign this user right only to trusted users. @@ -552,7 +551,7 @@ This security setting determines whether users can create global objects that ar | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -578,7 +577,7 @@ This security setting determines whether users can create global objects that ar | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -589,7 +588,7 @@ This security setting determines whether users can create global objects that ar -This user right determines which users and groups can call an internal application programming interface (API) to create and change the size of a page file. This user right is used internally by the operating system and usually does not need to be assigned to any users. +This user right determines which users and groups can call an internal application programming interface (API) to create and change the size of a page file. This user right is used internally by the operating system and usually doesn't need to be assigned to any users. @@ -601,7 +600,7 @@ This user right determines which users and groups can call an internal applicati | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -627,7 +626,7 @@ This user right determines which users and groups can call an internal applicati | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -638,7 +637,7 @@ This user right determines which users and groups can call an internal applicati -This user right determines which accounts can be used by processes to create a directory object using the object manager. This user right is used internally by the operating system and is useful to kernel-mode components that extend the object namespace. Because components that are running in kernel mode already have this user right assigned to them, it is not necessary to specifically assign it. +This user right determines which accounts can be used by processes to create a directory object using the object manager. This user right is used internally by the operating system and is useful to kernel-mode components that extend the object namespace. Because components that are running in kernel mode already have this user right assigned to them, it isn't necessary to specifically assign it. @@ -650,7 +649,7 @@ This user right determines which accounts can be used by processes to create a d | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -676,7 +675,7 @@ This user right determines which accounts can be used by processes to create a d | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -687,7 +686,7 @@ This user right determines which accounts can be used by processes to create a d -This user right determines if the user can create a symbolic link from the computer he is logged on to. +This user right determines if the user can create a symbolic link from the computer he is logged-on to. > [!CAUTION] > This privilege should only be given to trusted users. Symbolic links can expose security vulnerabilities in applications that aren't designed to handle them. @@ -705,7 +704,7 @@ This user right determines if the user can create a symbolic link from the compu | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -731,7 +730,7 @@ This user right determines if the user can create a symbolic link from the compu | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -742,10 +741,10 @@ This user right determines if the user can create a symbolic link from the compu -This user right determines which accounts can be used by processes to create a token that can then be used to get access to any local resources when the process uses an internal application programming interface (API) to create an access token. This user right is used internally by the operating system. Unless it is necessary, do not assign this user right to a user, group, or process other than Local System. +This user right determines which accounts can be used by processes to create a token that can then be used to get access to any local resources when the process uses an internal application programming interface (API) to create an access token. This user right is used internally by the operating system. Unless it's necessary, don't assign this user right to a user, group, or process other than Local System. > [!CAUTION] -> Assigning this user right can be a security risk. Do not assign this user right to any user, group, or process that you do not want to take over the system. +> Assigning this user right can be a security risk. Don't assign this user right to any user, group, or process that you don't want to take over the system. @@ -757,7 +756,7 @@ This user right determines which accounts can be used by processes to create a t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -783,7 +782,7 @@ This user right determines which accounts can be used by processes to create a t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -794,7 +793,7 @@ This user right determines which accounts can be used by processes to create a t -This user right determines which users can attach a debugger to any process or to the kernel. Developers who are debugging their own applications do not need to be assigned this user right. Developers who are debugging new system components will need this user right to be able to do so. This user right provides complete access to sensitive and critical operating system components. +This user right determines which users can attach a debugger to any process or to the kernel. Developers who are debugging their own applications don't need to be assigned this user right. Developers who are debugging new system components will need this user right to be able to do so. This user right provides complete access to sensitive and critical operating system components. > [!CAUTION] > Assigning this user right can be a security risk. Only assign this user right to trusted users. @@ -809,7 +808,7 @@ This user right determines which users can attach a debugger to any process or t | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -835,7 +834,7 @@ This user right determines which users can attach a debugger to any process or t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -858,7 +857,7 @@ This user right determines which users are prevented from accessing a computer o | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -884,7 +883,7 @@ This user right determines which users are prevented from accessing a computer o | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -898,7 +897,7 @@ This user right determines which users are prevented from accessing a computer o This security setting determines which service accounts are prevented from registering a process as a service. > [!NOTE] -> This security setting does not apply to the System, Local Service, or Network Service accounts. +> This security setting doesn't apply to the System, Local Service, or Network Service accounts. @@ -911,7 +910,7 @@ This security setting determines which service accounts are prevented from regis | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -937,7 +936,7 @@ This security setting determines which service accounts are prevented from regis | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -960,7 +959,7 @@ This security setting determines which accounts are prevented from being able to | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -986,7 +985,7 @@ This security setting determines which accounts are prevented from being able to | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -1000,7 +999,7 @@ This security setting determines which accounts are prevented from being able to Deny log on as a service -This security setting determines which service accounts are prevented from registering a process as a service. This policy setting supersedes the Log on as a service policy setting if an account is subject to both policies. > [!NOTE] -> This security setting does not apply to the System, Local Service, or Network Service accounts. Default: None. +> This security setting doesn't apply to the System, Local Service, or Network Service accounts. Default: None. @@ -1012,7 +1011,7 @@ Deny log on as a service -This security setting determines which service account | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -1038,7 +1037,7 @@ Deny log on as a service -This security setting determines which service account | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1061,7 +1060,7 @@ This user right determines which users and groups are prohibited from logging on | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -1087,7 +1086,7 @@ This user right determines which users and groups are prohibited from logging on | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1098,7 +1097,7 @@ This user right determines which users and groups are prohibited from logging on -This user right determines which users can set the Trusted for Delegation setting on a user or computer object. The user or object that is granted this privilege must have write access to the account control flags on the user or computer object. A server process running on a computer (or under a user context) that is trusted for delegation can access resources on another computer using delegated credentials of a client, as long as the client account does not have the Account cannot be delegated account control flag set. +This user right determines which users can set the Trusted for Delegation setting on a user or computer object. The user or object that's granted this privilege must have write access to the account control flags on the user or computer object. A server process running on a computer (or under a user context) that's trusted for delegation can access resources on another computer using delegated credentials of a client, as long as the client account doesn't have the Account can't be delegated account control flag set. > [!CAUTION] > Misuse of this user right, or of the Trusted for Delegation setting, could make the network vulnerable to sophisticated attacks using Trojan horse programs that impersonate incoming clients and use their credentials to gain access to network resources. @@ -1113,7 +1112,7 @@ This user right determines which users can set the Trusted for Delegation settin | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -1139,7 +1138,7 @@ This user right determines which users can set the Trusted for Delegation settin | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1162,7 +1161,7 @@ This user right determines which accounts can be used by a process to add entrie | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -1188,7 +1187,7 @@ This user right determines which accounts can be used by a process to add entrie | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1199,13 +1198,13 @@ This user right determines which accounts can be used by a process to add entrie -Assigning this user right to a user allows programs running on behalf of that user to impersonate a client. Requiring this user right for this kind of impersonation prevents an unauthorized user from convincing a client to connect (for example, by remote procedure call (RPC) or named pipes) to a service that they have created and then impersonating that client, which can elevate the unauthorized user's permissions to administrative or system levels. +Assigning this user right to a user allows programs running on behalf of that user to impersonate a client. Requiring this user right for this kind of impersonation prevents an unauthorized user from convincing a client to connect (for example, by remote procedure call (RPC) or named pipes) to a service that they've created and then impersonating that client, which can elevate the unauthorized user's permissions to administrative or system levels. > [!CAUTION] > Assigning this user right can be a security risk. Only assign this user right to trusted users. > [!NOTE] -> By default, services that are started by the Service Control Manager have the built-in Service group added to their access tokens. Component Object Model (COM) servers that are started by the COM infrastructure and that are configured to run under a specific account also have the Service group added to their access tokens. As a result, these services get this user right when they are started. In addition, a user can also impersonate an access token if any of the following conditions exist. 1) The access token that is being impersonated is for this user. 2) The user, in this logon session, created the access token by logging on to the network with explicit credentials. 3) The requested level is less than Impersonate, such as Anonymous or Identify. Because of these factors, users do not usually need this user right. +> By default, services that are started by the Service Control Manager have the built-in Service group added to their access tokens. Component Object Model (COM) servers that are started by the COM infrastructure and that are configured to run under a specific account also have the Service group added to their access tokens. As a result, these services get this user right when they're started. In addition, a user can also impersonate an access token if any of the following conditions exist. 1) The access token that's being impersonated is for this user. 2) The user, in this logon session, created the access token by logging on to the network with explicit credentials. 3) The requested level is less than Impersonate, such as Anonymous or Identify. Because of these factors, users don't usually need this user right. > [!WARNING] > If you enable this setting, programs that previously had the Impersonate privilege may lose it, and they may not run. @@ -1220,7 +1219,7 @@ Assigning this user right to a user allows programs running on behalf of that us | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -1246,7 +1245,7 @@ Assigning this user right to a user allows programs running on behalf of that us | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -1272,7 +1271,7 @@ Increase a process working set. This privilege determines which user accounts ca | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -1298,7 +1297,7 @@ Increase a process working set. This privilege determines which user accounts ca | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1326,7 +1325,7 @@ This user right determines which accounts can use a process with Write Property | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -1352,7 +1351,7 @@ This user right determines which accounts can use a process with Write Property | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1363,10 +1362,10 @@ This user right determines which accounts can use a process with Write Property -This user right determines which users can dynamically load and unload device drivers or other code in to kernel mode. This user right does not apply to Plug and Play device drivers. It is recommended that you do not assign this privilege to other users. +This user right determines which users can dynamically load and unload device drivers or other code in to kernel mode. This user right doesn't apply to Plug and Play device drivers. It's recommended that you don't assign this privilege to other users. > [!CAUTION] -> Assigning this user right can be a security risk. Do not assign this user right to any user, group, or process that you do not want to take over the system. +> Assigning this user right can be a security risk. Don't assign this user right to any user, group, or process that you don't want to take over the system. @@ -1378,7 +1377,7 @@ This user right determines which users can dynamically load and unload device dr | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -1404,7 +1403,7 @@ This user right determines which users can dynamically load and unload device dr | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1427,7 +1426,7 @@ This user right determines which accounts can use a process to keep data in phys | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -1453,7 +1452,7 @@ This user right determines which accounts can use a process to keep data in phys | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -1464,7 +1463,7 @@ This user right determines which accounts can use a process to keep data in phys -This security setting allows a user to be logged on by means of a batch-queue facility and is provided only for compatibility with older versions of Windows. For example, when a user submits a job by means of the task scheduler, the task scheduler logs that user on as a batch user rather than as an interactive user. +This security setting allows a user to be logged-on by means of a batch-queue facility and is provided only for compatibility with older versions of Windows. For example, when a user submits a job by means of the task scheduler, the task scheduler logs that user on as a batch user rather than as an interactive user. @@ -1476,7 +1475,7 @@ This security setting allows a user to be logged on by means of a batch-queue fa | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -1502,7 +1501,7 @@ This security setting allows a user to be logged on by means of a batch-queue fa | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -1525,7 +1524,7 @@ This security setting allows a security principal to log on as a service. Servic | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -1551,7 +1550,7 @@ This security setting allows a security principal to log on as a service. Servic | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1562,7 +1561,7 @@ This security setting allows a security principal to log on as a service. Servic -This user right determines which users can specify object access auditing options for individual resources, such as files, Active Directory objects, and registry keys. This security setting does not allow a user to enable file and object access auditing in general. You can view audited events in the security log of the Event Viewer. A user with this privilege can also view and clear the security log. +This user right determines which users can specify object access auditing options for individual resources, such as files, Active Directory objects, and registry keys. This security setting doesn't allow a user to enable file and object access auditing in general. You can view audited events in the security log of the Event Viewer. A user with this privilege can also view and clear the security log. @@ -1574,7 +1573,7 @@ This user right determines which users can specify object access auditing option | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -1600,7 +1599,7 @@ This user right determines which users can specify object access auditing option | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1623,7 +1622,7 @@ This user right determines which users and groups can run maintenance tasks on a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -1649,7 +1648,7 @@ This user right determines which users and groups can run maintenance tasks on a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1663,7 +1662,7 @@ This user right determines which users and groups can run maintenance tasks on a This user right determines who can modify firmware environment values. Firmware environment variables are settings stored in the nonvolatile RAM of non-x86-based computers. The effect of the setting depends on the processor. On x86-based computers, the only firmware environment value that can be modified by assigning this user right is the Last Known Good Configuration setting, which should only be modified by the system. On Itanium-based computers, boot information is stored in nonvolatile RAM. Users must be assigned this user right to run bootcfg.exe and to change the Default Operating System setting on Startup and Recovery in System Properties. On all computers, this user right is required to install or upgrade Windows. > [!NOTE] -> This security setting does not affect who can modify the system environment variables and user environment variables that are displayed on the Advanced tab of System Properties. +> This security setting doesn't affect who can modify the system environment variables and user environment variables that are displayed on the Advanced tab of System Properties. @@ -1675,7 +1674,7 @@ This user right determines who can modify firmware environment values. Firmware | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -1701,7 +1700,7 @@ This user right determines who can modify firmware environment values. Firmware | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1724,7 +1723,7 @@ This user right determines which user accounts can modify the integrity label of | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -1750,7 +1749,7 @@ This user right determines which user accounts can modify the integrity label of | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1773,7 +1772,7 @@ This user right determines which users can use performance monitoring tools to m | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -1799,7 +1798,7 @@ This user right determines which users can use performance monitoring tools to m | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -1822,7 +1821,7 @@ This security setting determines which users can use performance monitoring tool | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -1848,7 +1847,7 @@ This security setting determines which users can use performance monitoring tool | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1871,7 +1870,7 @@ This user right determines which users are allowed to shut down a computer from | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -1897,7 +1896,7 @@ This user right determines which users are allowed to shut down a computer from | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -1920,7 +1919,7 @@ This security setting determines which user accounts can call the CreateProcessA | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -1946,7 +1945,7 @@ This security setting determines which user accounts can call the CreateProcessA | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1972,7 +1971,7 @@ This user right determines which users can bypass file, directory, registry, and | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -1998,7 +1997,7 @@ This user right determines which users can bypass file, directory, registry, and | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -2009,7 +2008,7 @@ This user right determines which users can bypass file, directory, registry, and -This security setting determines which users who are logged on locally to the computer can shut down the operating system using the Shut Down command. Misuse of this user right can result in a denial of service. +This security setting determines which users who are logged-on locally to the computer can shut down the operating system using the Shut Down command. Misuse of this user right can result in a denial of service. @@ -2021,7 +2020,7 @@ This security setting determines which users who are logged on locally to the co | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | @@ -2047,7 +2046,7 @@ This security setting determines which users who are logged on locally to the co | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -2073,7 +2072,7 @@ This user right determines which users can take ownership of any securable objec | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `0xF000`) | diff --git a/windows/client-management/mdm/policy-csp-virtualizationbasedtechnology.md b/windows/client-management/mdm/policy-csp-virtualizationbasedtechnology.md index c0ee21c83b..fe7a0912dd 100644 --- a/windows/client-management/mdm/policy-csp-virtualizationbasedtechnology.md +++ b/windows/client-management/mdm/policy-csp-virtualizationbasedtechnology.md @@ -4,7 +4,7 @@ description: Learn more about the VirtualizationBasedTechnology Area in Policy C author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -49,7 +49,7 @@ Hypervisor-Protected Code Integrity: 0 - Turns off Hypervisor-Protected Code Int | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -90,7 +90,7 @@ Hypervisor-Protected Code Integrity: 0 - Turns off Hypervisor-Protected Code Int | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -113,7 +113,7 @@ Require UEFI Memory Attributes Table. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -123,7 +123,7 @@ Require UEFI Memory Attributes Table. | Value | Description | |:--|:--| -| 0 (Default) | Do not require UEFI Memory Attributes Table. | +| 0 (Default) | Don't require UEFI Memory Attributes Table. | | 1 | Require UEFI Memory Attributes Table. | diff --git a/windows/client-management/mdm/policy-csp-webthreatdefense.md b/windows/client-management/mdm/policy-csp-webthreatdefense.md index d92837b542..6d04befd16 100644 --- a/windows/client-management/mdm/policy-csp-webthreatdefense.md +++ b/windows/client-management/mdm/policy-csp-webthreatdefense.md @@ -4,7 +4,7 @@ description: Learn more about the WebThreatDefense Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 05/01/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,8 +16,7 @@ ms.topic: reference # Policy CSP - WebThreatDefense -> [!IMPORTANT] -> This CSP contains preview policies that are under development and only applicable for [Windows Insider Preview builds](/windows-insider/). These policies are subject to change and may have dependencies on other features or services in preview. +[!INCLUDE [Windows Insider tip](includes/mdm-insider-csp-note.md)] @@ -31,7 +30,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -54,7 +53,7 @@ Automatically collect website or app content when additional analysis is needed | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -89,7 +88,7 @@ Automatically collect website or app content when additional analysis is needed | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -104,7 +103,7 @@ This policy setting determines whether Enhanced Phishing Protection in Microsoft - If you enable this policy setting, Enhanced Phishing Protection in Microsoft Defender SmartScreen warns your users if they type their work or school password into one of the malicious scenarios described above and encourages them to change their password. -- If you disable or don't configure this policy setting, Enhanced Phishing Protection in Microsoft Defender SmartScreen will not warn your users if they type their work or school password into one of the malicious scenarios described above. +- If you disable or don't configure this policy setting, Enhanced Phishing Protection in Microsoft Defender SmartScreen won't warn your users if they type their work or school password into one of the malicious scenarios described above. @@ -116,7 +115,7 @@ This policy setting determines whether Enhanced Phishing Protection in Microsoft | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -156,7 +155,7 @@ This policy setting determines whether Enhanced Phishing Protection in Microsoft | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -171,7 +170,7 @@ This policy setting determines whether Enhanced Phishing Protection in Microsoft - If you enable this policy setting, Enhanced Phishing Protection in Microsoft Defender SmartScreen warns users if they reuse their work or school password and encourages them to change it. -- If you disable or don't configure this policy setting, Enhanced Phishing Protection in Microsoft Defender SmartScreen will not warn users if they reuse their work or school password. +- If you disable or don't configure this policy setting, Enhanced Phishing Protection in Microsoft Defender SmartScreen won't warn users if they reuse their work or school password. @@ -183,7 +182,7 @@ This policy setting determines whether Enhanced Phishing Protection in Microsoft | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -223,7 +222,7 @@ This policy setting determines whether Enhanced Phishing Protection in Microsoft | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -238,7 +237,7 @@ This policy setting determines whether Enhanced Phishing Protection in Microsoft - If you enable this policy setting, Enhanced Phishing Protection in Microsoft Defender SmartScreen warns your users if they store their password in text editor apps. -- If you disable or don't configure this policy setting, Enhanced Phishing Protection in Microsoft Defender SmartScreen will not warn users if they store their password in text editor apps. +- If you disable or don't configure this policy setting, Enhanced Phishing Protection in Microsoft Defender SmartScreen won't warn users if they store their password in text editor apps. @@ -250,7 +249,7 @@ This policy setting determines whether Enhanced Phishing Protection in Microsoft | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -290,7 +289,7 @@ This policy setting determines whether Enhanced Phishing Protection in Microsoft | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -301,11 +300,11 @@ This policy setting determines whether Enhanced Phishing Protection in Microsoft -This policy setting determines whether Enhanced Phishing Protection in Microsoft Defender SmartScreen is in audit mode or off. Users do not see notifications for any protection scenarios when Enhanced Phishing Protection in Microsoft Defender is in audit mode. Audit mode captures unsafe password entry events and sends telemetry through Microsoft Defender. +This policy setting determines whether Enhanced Phishing Protection in Microsoft Defender SmartScreen is in audit mode or off. Users don't see notifications for any protection scenarios when Enhanced Phishing Protection in Microsoft Defender is in audit mode. Audit mode captures unsafe password entry events and sends telemetry through Microsoft Defender. - If you enable this policy setting, Enhanced Phishing Protection in Microsoft Defender SmartScreen is enabled in audit mode and your users are unable to turn it off. -- If you disable this policy setting, Enhanced Phishing Protection in Microsoft Defender SmartScreen is off and it will not capture events, send telemetry, or notify users. Additionally, your users are unable to turn it on. +- If you disable this policy setting, Enhanced Phishing Protection in Microsoft Defender SmartScreen is off and it won't capture events, send telemetry, or notify users. Additionally, your users are unable to turn it on. - If you don't configure this setting, users can decide whether or not they will enable Enhanced Phishing Protection in Microsoft Defender SmartScreen. @@ -319,7 +318,7 @@ This policy setting determines whether Enhanced Phishing Protection in Microsoft | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | diff --git a/windows/client-management/mdm/policy-csp-wifi.md b/windows/client-management/mdm/policy-csp-wifi.md index e538a7928c..91b3d31ed2 100644 --- a/windows/client-management/mdm/policy-csp-wifi.md +++ b/windows/client-management/mdm/policy-csp-wifi.md @@ -4,7 +4,7 @@ description: Learn more about the Wifi Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 05/01/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -47,7 +47,7 @@ This policy setting determines whether users can enable the following WLAN setti - If this policy setting is disabled, both "Connect to suggested open hotspots," "Connect to networks shared by my contacts," and "Enable paid services" will be turned off and users on this device will be prevented from enabling them. -- If this policy setting is not configured or is enabled, users can choose to enable or disable either "Connect to suggested open hotspots" or "Connect to networks shared by my contacts". +- If this policy setting isn't configured or is enabled, users can choose to enable or disable either "Connect to suggested open hotspots" or "Connect to networks shared by my contacts". @@ -59,7 +59,7 @@ This policy setting determines whether users can enable the following WLAN setti | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -99,7 +99,7 @@ This policy setting determines whether users can enable the following WLAN setti | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -114,9 +114,9 @@ Determines whether administrators can enable and configure the Internet Connecti ICS lets administrators configure their system as an Internet gateway for a small network and provides network services, such as name resolution and addressing through DHCP, to the local private network. -- If you enable this setting, ICS cannot be enabled or configured by administrators, and the ICS service cannot run on the computer. The Advanced tab in the Properties dialog box for a LAN or remote access connection is removed. The Internet Connection Sharing page is removed from the New Connection Wizard. The Network Setup Wizard is disabled. +- If you enable this setting, ICS can't be enabled or configured by administrators, and the ICS service can't run on the computer. The Advanced tab in the Properties dialog box for a LAN or remote access connection is removed. The Internet Connection Sharing page is removed from the New Connection Wizard. The Network Setup Wizard is disabled. -- If you disable this setting or do not configure it and have two or more connections, administrators can enable ICS. The Advanced tab in the properties dialog box for a LAN or remote access connection is available. In addition, the user is presented with the option to enable Internet Connection Sharing in the Network Setup Wizard and Make New Connection Wizard. (The Network Setup Wizard is available only in Windows XP Professional.) +- If you disable this setting or don't configure it and have two or more connections, administrators can enable ICS. The Advanced tab in the properties dialog box for a LAN or remote access connection is available. In addition, the user is presented with the option to enable Internet Connection Sharing in the Network Setup Wizard and Make New Connection Wizard. (The Network Setup Wizard is available only in Windows XP Professional). By default, ICS is disabled when you create a remote access connection, but administrators can use the Advanced tab to enable it. When running the New Connection Wizard or Network Setup Wizard, administrators can choose to enable ICS. @@ -130,7 +130,7 @@ By default, ICS is disabled when you create a remote access connection, but admi > Nonadministrators are already prohibited from configuring Internet Connection Sharing, regardless of this setting. > [!NOTE] -> Disabling this setting does not prevent Wireless Hosted Networking from using the ICS service for DHCP services. To prevent the ICS service from running, on the Network Permissions tab in the network's policy properties, select the "Don't use hosted networks" check box. +> Disabling this setting doesn't prevent Wireless Hosted Networking from using the ICS service for DHCP services. To prevent the ICS service from running, on the Network Permissions tab in the network's policy properties, select the "Do not use hosted networks" check box. @@ -142,7 +142,7 @@ By default, ICS is disabled when you create a remote access connection, but admi | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -182,7 +182,7 @@ By default, ICS is disabled when you create a remote access connection, but admi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -196,7 +196,7 @@ By default, ICS is disabled when you create a remote access connection, but admi Allow or disallow connecting to Wi-Fi outside of MDM server-installed networks. Most restricted value is 0. > [!NOTE] -> Setting this policy deletes any previously installed user-configured and Wi-Fi sense Wi-Fi profiles from the device. Certain Wi-Fi profiles that are not user configured nor Wi-Fi sense might not be deleted. In addition, not all non-MDM profiles are completely deleted. +> Setting this policy deletes any previously installed user-configured and Wi-Fi sense Wi-Fi profiles from the device. Certain Wi-Fi profiles that aren't user configured nor Wi-Fi sense might not be deleted. In addition, not all non-MDM profiles are completely deleted. @@ -208,7 +208,7 @@ Allow or disallow connecting to Wi-Fi outside of MDM server-installed networks. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -234,7 +234,7 @@ Allow or disallow connecting to Wi-Fi outside of MDM server-installed networks. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | | @@ -257,7 +257,7 @@ Allow or disallow the device to use the DSCP to UP Mapping feature from the Wi-F | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 2 | @@ -269,7 +269,7 @@ Allow or disallow the device to use the DSCP to UP Mapping feature from the Wi-F |:--|:--| | 0 | DSCP to UP Mapping will be disabled. | | 1 | DSCP to UP Mapping will be enabled. | -| 2 (Default) | DSCP to UP Mapping will be enabled only if it is enabled in the network profile. | +| 2 (Default) | DSCP to UP Mapping will be enabled only if it's enabled in the network profile. | @@ -284,7 +284,7 @@ Allow or disallow the device to use the DSCP to UP Mapping feature from the Wi-F | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | | @@ -307,7 +307,7 @@ Allow or disallow the device to automatically request to enable Mirrored Stream | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -317,7 +317,7 @@ Allow or disallow the device to automatically request to enable Mirrored Stream | Value | Description | |:--|:--| -| 0 | The device will not automatically request to enable MSCS when connecting to a MSCS capable network. | +| 0 | The device won't automatically request to enable MSCS when connecting to a MSCS capable network. | | 1 (Default) | The device will automatically request to enable MSCS when connecting to a MSCS capable network. | @@ -333,7 +333,7 @@ Allow or disallow the device to automatically request to enable Mirrored Stream | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -356,7 +356,7 @@ Allow or disallow WiFi connection. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -382,7 +382,7 @@ Allow or disallow WiFi connection. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -405,7 +405,7 @@ Allow WiFi Direct connection. . | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -431,7 +431,7 @@ Allow WiFi Direct connection. . | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -454,7 +454,7 @@ Allow an enterprise to control the WLAN scanning behavior and how aggressively d | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-500]` | | Default Value | 0 | diff --git a/windows/client-management/mdm/policy-csp-windowsautopilot.md b/windows/client-management/mdm/policy-csp-windowsautopilot.md index 1780b6b35e..6836a98ead 100644 --- a/windows/client-management/mdm/policy-csp-windowsautopilot.md +++ b/windows/client-management/mdm/policy-csp-windowsautopilot.md @@ -4,7 +4,7 @@ description: Learn more about the WindowsAutopilot Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -49,7 +49,7 @@ Specifies whether to check for Windows Autopilot updates after enrollment. Most | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | diff --git a/windows/client-management/mdm/policy-csp-windowsconnectionmanager.md b/windows/client-management/mdm/policy-csp-windowsconnectionmanager.md index 3b51c6bc44..0c20a2e6ea 100644 --- a/windows/client-management/mdm/policy-csp-windowsconnectionmanager.md +++ b/windows/client-management/mdm/policy-csp-windowsconnectionmanager.md @@ -4,7 +4,7 @@ description: Learn more about the WindowsConnectionManager Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - WindowsConnectionManager -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -48,13 +45,15 @@ This policy setting prevents computers from connecting to both a domain based ne Automatic connection attempts - When the computer is already connected to a domain based network, all automatic connection attempts to non-domain networks are blocked. + - When the computer is already connected to a non-domain based network, automatic connection attempts to domain based networks are blocked. Manual connection attempts - When the computer is already connected to either a non-domain based network or a domain based network over media other than Ethernet, and a user attempts to create a manual connection to an additional network in violation of this policy setting, the existing network connection is disconnected and the manual connection is allowed. + - When the computer is already connected to either a non-domain based network or a domain based network over Ethernet, and a user attempts to create a manual connection to an additional network in violation of this policy setting, the existing Ethernet connection is maintained and the manual connection attempt is blocked. -- If this policy setting is not configured or is disabled, computers are allowed to connect simultaneously to both domain and non-domain networks. +- If this policy setting isn't configured or is disabled, computers are allowed to connect simultaneously to both domain and non-domain networks. @@ -66,13 +65,12 @@ Manual connection attempts | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md b/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md index bbe80dfd19..9f244c43bf 100644 --- a/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md +++ b/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md @@ -4,7 +4,7 @@ description: Learn more about the WindowsDefenderSecurityCenter Area in Policy C author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -40,12 +40,15 @@ ms.topic: reference Specify the company name that will be displayed in Windows Security and associated notifications. This setting must be enabled for any contact information to appear. Enabled: + Enter the company name in the Options section. Disabled: -Company information will not be shown at all in either Windows Security or any notifications that it creates. + +Company information won't be shown at all in either Windows Security or any notifications that it creates. Not configured: + Same as Disabled. @@ -58,7 +61,7 @@ Same as Disabled. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -88,7 +91,7 @@ Same as Disabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -102,12 +105,15 @@ Same as Disabled. Hide the Account protection area in Windows Security. Enabled: + The Account protection area will be hidden. Disabled: + The Account protection area will be shown. Not configured: + Same as Disabled. @@ -120,7 +126,7 @@ Same as Disabled. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -131,7 +137,7 @@ Same as Disabled. | Value | Description | |:--|:--| | 0 (Default) | (Disable) The users can see the display of the Account protection area in Windows Defender Security Center. | -| 1 | (Enable) The users cannot see the display of the Account protection area in Windows Defender Security Center. | +| 1 | (Enable) The users can't see the display of the Account protection area in Windows Defender Security Center. | @@ -160,7 +166,7 @@ Same as Disabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -174,12 +180,15 @@ Same as Disabled. Hide the App and browser protection area in Windows Security. Enabled: + The App and browser protection area will be hidden. Disabled: + The App and browser protection area will be shown. Not configured: + Same as Disabled. @@ -192,7 +201,7 @@ Same as Disabled. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -203,7 +212,7 @@ Same as Disabled. | Value | Description | |:--|:--| | 0 (Default) | (Disable) The users can see the display of the app and browser protection area in Windows Defender Security Center. | -| 1 | (Enable) The users cannot see the display of the app and browser protection area in Windows Defender Security Center. | +| 1 | (Enable) The users can't see the display of the app and browser protection area in Windows Defender Security Center. | @@ -232,7 +241,7 @@ Same as Disabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -246,12 +255,15 @@ Same as Disabled. Disable the Clear TPM button in Windows Security. Enabled: + The Clear TPM button will be unavailable for use. Disabled: + The Clear TPM button will be available for use. Not configured: + Same as Disabled. @@ -264,7 +276,7 @@ Same as Disabled. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -275,7 +287,7 @@ Same as Disabled. | Value | Description | |:--|:--| | 0 (Default) | (Disabled or not configured) The security processor troubleshooting page shows a button that initiates the process to clear the security processor (TPM). | -| 1 | (Enabled) The security processor troubleshooting page will not show a button to initiate the process to clear the security processor (TPM). | +| 1 | (Enabled) The security processor troubleshooting page won't show a button to initiate the process to clear the security processor (TPM). | @@ -304,7 +316,7 @@ Same as Disabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -318,12 +330,15 @@ Same as Disabled. Hide the Device security area in Windows Security. Enabled: + The Device security area will be hidden. Disabled: + The Device security area will be shown. Not configured: + Same as Disabled. @@ -336,7 +351,7 @@ Same as Disabled. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -347,7 +362,7 @@ Same as Disabled. | Value | Description | |:--|:--| | 0 (Default) | (Disable) The users can see the display of the Device security area in Windows Defender Security Center. | -| 1 | (Enable) The users cannot see the display of the Device security area in Windows Defender Security Center. | +| 1 | (Enable) The users can't see the display of the Device security area in Windows Defender Security Center. | @@ -376,7 +391,7 @@ Same as Disabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -392,12 +407,15 @@ Only show critical notifications from Windows Security. If the Suppress all notifications GP setting has been enabled, this setting will have no effect. Enabled: -Local users will only see critical notifications from Windows Security. They will not see other types of notifications, such as regular PC or device health information. + +Local users will only see critical notifications from Windows Security. They won't see other types of notifications, such as regular PC or device health information. Disabled: + Local users will see all types of notifications from Windows Security. Not configured: + Same as Disabled. @@ -410,7 +428,7 @@ Same as Disabled. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -450,7 +468,7 @@ Same as Disabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -464,12 +482,15 @@ Same as Disabled. Hide the Family options area in Windows Security. Enabled: + The Family options area will be hidden. Disabled: + The Family options area will be shown. Not configured: + Same as Disabled. @@ -482,7 +503,7 @@ Same as Disabled. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -493,7 +514,7 @@ Same as Disabled. | Value | Description | |:--|:--| | 0 (Default) | (Disable) The users can see the display of the family options area in Windows Defender Security Center. | -| 1 | (Enable) The users cannot see the display of the family options area in Windows Defender Security Center. | +| 1 | (Enable) The users can't see the display of the family options area in Windows Defender Security Center. | @@ -522,7 +543,7 @@ Same as Disabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -536,12 +557,15 @@ Same as Disabled. Hide the Device performance and health area in Windows Security. Enabled: + The Device performance and health area will be hidden. Disabled: + The Device performance and health area will be shown. Not configured: + Same as Disabled. @@ -554,7 +578,7 @@ Same as Disabled. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -565,7 +589,7 @@ Same as Disabled. | Value | Description | |:--|:--| | 0 (Default) | (Disable) The users can see the display of the device performance and health area in Windows Defender Security Center. | -| 1 | (Enable) The users cannot see the display of the device performance and health area in Windows Defender Security Center. | +| 1 | (Enable) The users can't see the display of the device performance and health area in Windows Defender Security Center. | @@ -594,7 +618,7 @@ Same as Disabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -608,12 +632,15 @@ Same as Disabled. Hide the Firewall and network protection area in Windows Security. Enabled: + The Firewall and network protection area will be hidden. Disabled: + The Firewall and network protection area will be shown. Not configured: + Same as Disabled. @@ -626,7 +653,7 @@ Same as Disabled. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -637,7 +664,7 @@ Same as Disabled. | Value | Description | |:--|:--| | 0 (Default) | (Disable) The users can see the display of the firewall and network protection area in Windows Defender Security Center. | -| 1 | (Enable) The users cannot see the display of the firewall and network protection area in Windows Defender Security Center. | +| 1 | (Enable) The users can't see the display of the firewall and network protection area in Windows Defender Security Center. | @@ -666,7 +693,7 @@ Same as Disabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -680,12 +707,15 @@ Same as Disabled. Hide notifications from Windows Security. Enabled: -Local users will not see notifications from Windows Security. + +Local users won't see notifications from Windows Security. Disabled: + Local users can see notifications from Windows Security. Not configured: + Same as Disabled. @@ -698,7 +728,7 @@ Same as Disabled. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -709,7 +739,7 @@ Same as Disabled. | Value | Description | |:--|:--| | 0 (Default) | (Disable) The users can see the display of Windows Defender Security Center notifications. | -| 1 | (Enable) The users cannot see the display of Windows Defender Security Center notifications. | +| 1 | (Enable) The users can't see the display of Windows Defender Security Center notifications. | @@ -738,7 +768,7 @@ Same as Disabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -752,12 +782,15 @@ Same as Disabled. Hide the recommendation to update TPM Firmware when a vulnerable firmware is detected. Enabled: -Users will not be shown a recommendation to update their TPM Firmware. + +Users won't be shown a recommendation to update their TPM Firmware. Disabled: + Users will see a recommendation to update their TPM Firmware if Windows Security detects the system contains a TPM with vulnerable firmware. Not configured: + Same as Disabled. @@ -770,7 +803,7 @@ Same as Disabled. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -810,7 +843,7 @@ Same as Disabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -824,12 +857,15 @@ Same as Disabled. Hide the Virus and threat protection area in Windows Security. Enabled: + The Virus and threat protection area will be hidden. Disabled: + The Virus and threat protection area will be shown. Not configured: + Same as Disabled. @@ -842,7 +878,7 @@ Same as Disabled. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -853,7 +889,7 @@ Same as Disabled. | Value | Description | |:--|:--| | 0 (Default) | (Disable) The users can see the display of the virus and threat protection area in Windows Defender Security Center. | -| 1 | (Enable) The users cannot see the display of the virus and threat protection area in Windows Defender Security Center. | +| 1 | (Enable) The users can't see the display of the virus and threat protection area in Windows Defender Security Center. | @@ -882,7 +918,7 @@ Same as Disabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -896,12 +932,15 @@ Same as Disabled. Prevent users from making changes to the Exploit protection settings area in Windows Security. Enabled: -Local users can not make changes in the Exploit protection settings area. + +Local users can't make changes in the Exploit protection settings area. Disabled: + Local users are allowed to make changes in the Exploit protection settings area. Not configured: + Same as Disabled. @@ -914,7 +953,7 @@ Same as Disabled. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -925,7 +964,7 @@ Same as Disabled. | Value | Description | |:--|:--| | 0 (Default) | (Disable) Local users are allowed to make changes in the exploit protection settings area. | -| 1 | (Enable) Local users cannot make changes in the exploit protection settings area. | +| 1 | (Enable) Local users can't make changes in the exploit protection settings area. | @@ -954,7 +993,7 @@ Same as Disabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -970,12 +1009,15 @@ Specify the email address or email ID that will be displayed in Windows Security Users can click on the contact information to create an email that will be sent to the specified address. The default email application will be used. Enabled: + Enter the email address or email ID in the Options section. Disabled: -A contact email address or email ID will not be shown in either Windows Security or any notifications it creates. + +A contact email address or email ID won't be shown in either Windows Security or any notifications it creates. Not configured: + Same as Disabled. @@ -988,7 +1030,7 @@ Same as Disabled. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1018,7 +1060,7 @@ Same as Disabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1032,18 +1074,23 @@ Same as Disabled. Display specified contact information to local users in Windows Security notifications. Enabled: + Your company contact information will be displayed in notifications that come from Windows Security. After setting this to Enabled, you must configure the Specify contact company name GP setting and at least one of the following GP settings: + -Specify contact phone number or Skype ID -Specify contact email number or email ID --Specify contact website +-Specify contact website. + Please note that in some cases we will be limiting the contact options that are displayed based on the notification space available. Disabled: + No contact information will be shown on notifications. Not configured: + Same as Disabled. @@ -1056,7 +1103,7 @@ Same as Disabled. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1096,7 +1143,7 @@ Same as Disabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1107,20 +1154,24 @@ Same as Disabled. -Display specified contact information to local users in a contact card flyout menu in Windows Security +Display specified contact information to local users in a contact card flyout menu in Windows Security. Enabled: + Your company contact information will be displayed in a flyout menu in Windows Security. After setting this to Enabled, you must configure the Specify contact company name GP setting and at least one of the following GP settings: + -Specify contact phone number or Skype ID -Specify contact email number or email ID --Specify contact website +-Specify contact website. Disabled: + No contact information will be shown in Windows Security. Not configured: + Same as Disabled. @@ -1133,7 +1184,7 @@ Same as Disabled. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1143,7 +1194,7 @@ Same as Disabled. | Value | Description | |:--|:--| -| 0 (Default) | (Disable) Do not display the company name and contact options in the card fly out notification. | +| 0 (Default) | (Disable) Don't display the company name and contact options in the card fly out notification. | | 1 | (Enable) Display the company name and contact options in the card fly out notification. | @@ -1173,7 +1224,7 @@ Same as Disabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1187,12 +1238,15 @@ Same as Disabled. Hide the Ransomware data recovery area in Windows Security. Enabled: + The Ransomware data recovery area will be hidden. Disabled: + The Ransomware data recovery area will be shown. Not configured: + Same as Disabled. @@ -1205,7 +1259,7 @@ Same as Disabled. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1245,7 +1299,7 @@ Same as Disabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1259,12 +1313,15 @@ Same as Disabled. Hide the Secure boot area in Windows Security. Enabled: + The Secure boot area will be hidden. Disabled: + The Secure boot area will be shown. Not configured: + Same as Disabled. @@ -1277,7 +1334,7 @@ Same as Disabled. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1317,7 +1374,7 @@ Same as Disabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1331,12 +1388,15 @@ Same as Disabled. Hide the Security processor (TPM) troubleshooting area in Windows Security. Enabled: + The Security processor (TPM) troubleshooting area will be hidden. Disabled: + The Security processor (TPM) troubleshooting area will be shown. Not configured: + Same as Disabled. @@ -1349,7 +1409,7 @@ Same as Disabled. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1389,7 +1449,7 @@ Same as Disabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -1405,12 +1465,15 @@ This policy setting hides the Windows Security notification area control. The user needs to either sign out and sign in or reboot the computer for this setting to take effect. Enabled: + Windows Security notification area control will be hidden. Disabled: + Windows Security notification area control will be shown. Not configured: + Same as Disabled. @@ -1423,7 +1486,7 @@ Same as Disabled. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -1463,7 +1526,7 @@ Same as Disabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1479,12 +1542,15 @@ Specify the phone number or Skype ID that will be displayed in Windows Security Users can click on the contact information to automatically call the supplied number. Skype will be used to initiate the call. Enabled: + Enter the phone number or Skype ID in the Options section. Disabled: -A contact phone number or Skype ID will not be shown in either Windows Security or any notifications it creates. + +A contact phone number or Skype ID won't be shown in either Windows Security or any notifications it creates. Not configured: + Same as Disabled. @@ -1497,7 +1563,7 @@ Same as Disabled. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1527,7 +1593,7 @@ Same as Disabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1543,12 +1609,15 @@ Specify the URL that will be displayed in Windows Security and associated notifi Users can click on the contact information to visit the specified website. The default web browser will be used. Enabled: + Enter the URL in the Options section. Disabled: -A contact website URL will not be shown in either Windows Security or any notifications it creates. + +A contact website URL won't be shown in either Windows Security or any notifications it creates. Not configured: + Same as Disabled. @@ -1561,7 +1630,7 @@ Same as Disabled. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | diff --git a/windows/client-management/mdm/policy-csp-windowsinkworkspace.md b/windows/client-management/mdm/policy-csp-windowsinkworkspace.md index 3b22eda9a0..7f9cb85aff 100644 --- a/windows/client-management/mdm/policy-csp-windowsinkworkspace.md +++ b/windows/client-management/mdm/policy-csp-windowsinkworkspace.md @@ -4,7 +4,7 @@ description: Learn more about the WindowsInkWorkspace Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -49,7 +49,7 @@ Allow suggested apps in Windows Ink Workspace. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -89,7 +89,7 @@ Allow suggested apps in Windows Ink Workspace. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -112,7 +112,7 @@ Allow Windows Ink Workspace. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 2 | @@ -123,7 +123,7 @@ Allow Windows Ink Workspace. | Value | Description | |:--|:--| | 0 | Access to ink workspace is disabled. The feature is turned off. | -| 1 | Ink workspace is enabled (feature is turned on), but the user cannot access it above the lock screen. | +| 1 | Ink workspace is enabled (feature is turned on), but the user can't access it above the lock screen. | | 2 (Default) | Ink workspace is enabled (feature is turned on), and the user is allowed to use it above the lock screen. | diff --git a/windows/client-management/mdm/policy-csp-windowslogon.md b/windows/client-management/mdm/policy-csp-windowslogon.md index 3969e76da3..544703e41a 100644 --- a/windows/client-management/mdm/policy-csp-windowslogon.md +++ b/windows/client-management/mdm/policy-csp-windowslogon.md @@ -4,7 +4,7 @@ description: Learn more about the WindowsLogon Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,13 +16,9 @@ ms.topic: reference # Policy CSP - WindowsLogon -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] -> [!IMPORTANT] -> This CSP contains preview policies that are under development and only applicable for [Windows Insider Preview builds](/windows-insider/). These policies are subject to change and may have dependencies on other features or services in preview. +[!INCLUDE [Windows Insider tip](includes/mdm-insider-csp-note.md)] @@ -34,7 +30,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -49,13 +45,13 @@ This policy setting controls whether a device will automatically sign in and loc This only occurs if the last interactive user didn't sign out before the restart or shutdown. -If the device is joined to Active Directory or Azure Active Directory, this policy only applies to Windows Update restarts. Otherwise, this will apply to both Windows Update restarts and user-initiated restarts and shutdowns. +If the device is joined to Active Directory or Azure Active Directory, this policy only applies to Windows Update restarts. Otherwise, this will apply to both Windows Update restarts and user-initiated restarts and shutdowns. -- If you don't configure this policy setting, it is enabled by default. When the policy is enabled, the user is automatically signed in and the session is automatically locked with all lock screen apps configured for that user after the device boots. +- If you don't configure this policy setting, it's enabled by default. When the policy is enabled, the user is automatically signed in and the session is automatically locked with all lock screen apps configured for that user after the device boots. After enabling this policy, you can configure its settings through the ConfigAutomaticRestartSignOn policy, which configures the mode of automatically signing in and locking the last interactive user after a restart or cold boot . -- If you disable this policy setting, the device does not configure automatic sign in. The user's lock screen apps are not restarted after the system restarts. +- If you disable this policy setting, the device doesn't configure automatic sign in. The user's lock screen apps aren't restarted after the system restarts. @@ -67,13 +63,12 @@ After enabling this policy, you can configure its settings through the ConfigAut | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -100,7 +95,7 @@ After enabling this policy, you can configure its settings through the ConfigAut | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -111,16 +106,18 @@ After enabling this policy, you can configure its settings through the ConfigAut -This policy setting controls the configuration under which an automatic restart and sign on and lock occurs after a restart or cold boot. If you chose "Disabled" in the "Sign-in and lock last interactive user automatically after a restart" policy, then automatic sign on will not occur and this policy does not need to be configured. +This policy setting controls the configuration under which an automatic restart and sign on and lock occurs after a restart or cold boot. If you chose "Disabled" in the "Sign-in and lock last interactive user automatically after a restart" policy, then automatic sign on won't occur and this policy doesn't need to be configured. - If you enable this policy setting, you can choose one of the following two options: -1. "Enabled if BitLocker is on and not suspended" specifies that automatic sign on and lock will only occur if BitLocker is active and not suspended during the reboot or shutdown. Personal data can be accessed on the device's hard drive at this time if BitLocker is not on or suspended during an update. BitLocker suspension temporarily removes protection for system components and data but may be needed in certain circumstances to successfully update boot-critical components. -BitLocker is suspended during updates if: - - The device doesn't have TPM 2.0 and PCR7, or - - The device doesn't use a TPM-only protector +1. "Enabled if BitLocker is on and not suspended" specifies that automatic sign on and lock will only occur if BitLocker is active and not suspended during the reboot or shutdown. Personal data can be accessed on the device's hard drive at this time if BitLocker isn't on or suspended during an update. BitLocker suspension temporarily removes protection for system components and data but may be needed in certain circumstances to successfully update boot-critical components. -2. "Always Enabled" specifies that automatic sign on will happen even if BitLocker is off or suspended during reboot or shutdown. When BitLocker is not enabled, personal data is accessible on the hard drive. Automatic restart and sign on should only be run under this condition if you are confident that the configured device is in a secure physical location. +BitLocker is suspended during updates if: + +- The device doesn't have TPM 2.0 and PCR7, or +- The device doesn't use a TPM-only protector. + +2. "Always Enabled" specifies that automatic sign on will happen even if BitLocker is off or suspended during reboot or shutdown. When BitLocker isn't enabled, personal data is accessible on the hard drive. Automatic restart and sign on should only be run under this condition if you are confident that the configured device is in a secure physical location. - If you disable or don't configure this setting, automatic sign on will default to the "Enabled if BitLocker is on and not suspended" behavior. @@ -134,13 +131,12 @@ BitLocker is suspended during updates if: | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -166,7 +162,7 @@ BitLocker is suspended during updates if: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -181,7 +177,7 @@ This policy setting allows you to prevent app notifications from appearing on th - If you enable this policy setting, no app notifications are displayed on the lock screen. -- If you disable or do not configure this policy setting, users can choose which apps display notifications on the lock screen. +- If you disable or don't configure this policy setting, users can choose which apps display notifications on the lock screen. @@ -193,13 +189,12 @@ This policy setting allows you to prevent app notifications from appearing on th | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -226,7 +221,7 @@ This policy setting allows you to prevent app notifications from appearing on th | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -239,7 +234,7 @@ This policy setting allows you to prevent app notifications from appearing on th This policy setting allows you to control whether anyone can interact with available networks UI on the logon screen. -- If you enable this policy setting, the PC's network connectivity state cannot be changed without signing into Windows. +- If you enable this policy setting, the PC's network connectivity state can't be changed without signing into Windows. - If you disable or don't configure this policy setting, any user can disconnect the PC from the network or can connect the PC to other available networks without signing into Windows. @@ -253,13 +248,12 @@ This policy setting allows you to control whether anyone can interact with avail | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -312,7 +306,7 @@ Here's an example to enable this policy: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362] and later | @@ -327,12 +321,12 @@ This policy setting allows you to control whether users see the first sign-in an - If you enable this policy setting, Microsoft account users will see the opt-in prompt for services, and users with other accounts will see the sign-in animation. -- If you disable this policy setting, users will not see the animation and Microsoft account users will not see the opt-in prompt for services. +- If you disable this policy setting, users won't see the animation and Microsoft account users won't see the opt-in prompt for services. -- If you do not configure this policy setting, the user who completes the initial Windows setup will see the animation during their first sign-in. If the first user had already completed the initial setup and this policy setting is not configured, users new to this computer will not see the animation. +- If you don't configure this policy setting, the user who completes the initial Windows setup will see the animation during their first sign-in. If the first user had already completed the initial setup and this policy setting isn't configured, users new to this computer won't see the animation. > [!NOTE] -> The first sign-in animation will not be shown on Server, so this policy will have no effect. +> The first sign-in animation won't be shown on Server, so this policy will have no effect. @@ -344,7 +338,7 @@ This policy setting allows you to control whether users see the first sign-in an | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -384,7 +378,7 @@ This policy setting allows you to control whether users see the first sign-in an | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -397,9 +391,9 @@ This policy setting allows you to control whether users see the first sign-in an This policy controls the configuration under which winlogon sends MPR notifications in the system. -- If you enable this setting or do not configure it, winlogon sends MPR notifications if a credential manager is configured. +- If you enable this setting or don't configure it, winlogon sends MPR notifications if a credential manager is configured. -- If you disable this setting, winlogon does not send MPR notifications. +- If you disable this setting, winlogon doesn't send MPR notifications. @@ -411,13 +405,12 @@ This policy controls the configuration under which winlogon sends MPR notificati | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -444,7 +437,7 @@ This policy controls the configuration under which winlogon sends MPR notificati | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -459,7 +452,7 @@ This policy setting allows local users to be enumerated on domain-joined compute - If you enable this policy setting, Logon UI will enumerate all local users on domain-joined computers. -- If you disable or do not configure this policy setting, the Logon UI will not enumerate local users on domain-joined computers. +- If you disable or don't configure this policy setting, the Logon UI won't enumerate local users on domain-joined computers. @@ -471,13 +464,12 @@ This policy setting allows local users to be enumerated on domain-joined compute | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: @@ -504,7 +496,7 @@ This policy setting allows local users to be enumerated on domain-joined compute | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -517,11 +509,11 @@ This policy setting allows local users to be enumerated on domain-joined compute This policy setting allows you to hide the Switch User interface in the Logon UI, the Start menu and the Task Manager. -- If you enable this policy setting, the Switch User interface is hidden from the user who is attempting to log on or is logged on to the computer that has this policy applied. +- If you enable this policy setting, the Switch User interface is hidden from the user who is attempting to log on or is logged-on to the computer that has this policy applied. The locations that Switch User interface appear are in the Logon UI, the Start menu and the Task Manager. -- If you disable or do not configure this policy setting, the Switch User interface is accessible to the user in the three locations. +- If you disable or don't configure this policy setting, the Switch User interface is accessible to the user in the three locations. @@ -533,7 +525,7 @@ The locations that Switch User interface appear are in the Logon UI, the Start m | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -573,7 +565,7 @@ The locations that Switch User interface appear are in the Logon UI, the Start m | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows Insider Preview | @@ -584,7 +576,7 @@ The locations that Switch User interface appear are in the Logon UI, the Start m -OverrideShellProgram policy allows IT admin to configure the shell program for Windows OS on a device. This policy has the highest precedence over other ways of configuring the shell program. The policy currently supports below options: 1. Not Configured: Default shell will be launched. 2. Apply Lightweight Shell: Lightweight shell does not have a user interface and helps the device to achieve better performance as the shell consumes limited resources over default shell. Lightweight shell contains a limited set of features which could be consumed by applications. This configuration can be useful if the device needs to have a continuous running user interface application which would consume features offered by Lightweight shell. If you disable or do not configure this policy setting, then the default shell will be launched. +OverrideShellProgram policy allows IT admin to configure the shell program for Windows OS on a device. This policy has the highest precedence over other ways of configuring the shell program. The policy currently supports below options: 1. Not Configured: Default shell will be launched. 2. Apply Lightweight Shell: Lightweight shell doesn't have a user interface and helps the device to achieve better performance as the shell consumes limited resources over default shell. Lightweight shell contains a limited set of features which could be consumed by applications. This configuration can be useful if the device needs to have a continuous running user interface application which would consume features offered by Lightweight shell. If you disable or don't configure this policy setting, then the default shell will be launched. @@ -596,7 +588,7 @@ OverrideShellProgram policy allows IT admin to configure the shell program for W | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | | Dependency [BootToCloudModeDependencyGroup] | Dependency Type: `DependsOn`
    Dependency URI: `Device/Vendor/MSFT/Policy/Config/CloudDesktop/BootToCloudMode`
    Dependency Allowed Value: `[1]`
    Dependency Allowed Value Type: `Range`
    | diff --git a/windows/client-management/mdm/policy-csp-windowspowershell.md b/windows/client-management/mdm/policy-csp-windowspowershell.md index 982bf3c027..b885c37d1a 100644 --- a/windows/client-management/mdm/policy-csp-windowspowershell.md +++ b/windows/client-management/mdm/policy-csp-windowspowershell.md @@ -4,7 +4,7 @@ description: Learn more about the WindowsPowerShell Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,10 +16,7 @@ ms.topic: reference # Policy CSP - WindowsPowerShell -> [!TIP] -> This CSP contains ADMX-backed policies which require a special SyncML format to enable or disable. You must specify the data type in the SyncML as <Format>chr</Format>. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)] @@ -31,7 +28,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -48,13 +45,11 @@ ms.topic: reference This policy setting enables logging of all PowerShell script input to the Microsoft-Windows-PowerShell/Operational event log. -- If you enable this policy setting, -Windows PowerShell will log the processing of commands, script blocks, functions, and scripts - whether invoked interactively, or through automation. +- If you enable this policy setting, Windows PowerShell will log the processing of commands, script blocks, functions, and scripts - whether invoked interactively, or through automation. - If you disable this policy setting, logging of PowerShell script input is disabled. -If you enable the Script Block Invocation Logging, PowerShell additionally logs events when invocation of a command, script block, function, or script -starts or stops. Enabling Invocation Logging generates a high volume of event logs. +If you enable the Script Block Invocation Logging, PowerShell additionally logs events when invocation of a command, script block, function, or script starts or stops. Enabling Invocation Logging generates a high volume of event logs. > [!NOTE] > This policy setting exists under both Computer Configuration and User Configuration in the Group Policy Editor. The Computer Configuration policy setting takes precedence over the User Configuration policy setting. @@ -69,13 +64,12 @@ starts or stops. Enabling Invocation Logging generates a high volume of event lo | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | -> [!TIP] -> This is an ADMX-backed policy and requires SyncML format for configuration. For an example of SyncML format, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)] **ADMX mapping**: diff --git a/windows/client-management/mdm/policy-csp-windowssandbox.md b/windows/client-management/mdm/policy-csp-windowssandbox.md index 9dcfc90191..c8b375b284 100644 --- a/windows/client-management/mdm/policy-csp-windowssandbox.md +++ b/windows/client-management/mdm/policy-csp-windowssandbox.md @@ -4,7 +4,7 @@ description: Learn more about the WindowsSandbox Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -41,11 +41,11 @@ This policy setting enables or disables audio input to the Sandbox. - If you enable this policy setting, Windows Sandbox will be able to receive audio input from the user. Applications using a microphone may require this setting. -- If you disable this policy setting, Windows Sandbox will not be able to receive audio input from the user. Applications using a microphone may not function properly with this setting. +- If you disable this policy setting, Windows Sandbox won't be able to receive audio input from the user. Applications using a microphone may not function properly with this setting. -- If you do not configure this policy setting, audio input will be enabled. +- If you don't configure this policy setting, audio input will be enabled. -**Note** that there may be security implications of exposing host audio input to the container. +Note that there may be security implications of exposing host audio input to the container. @@ -59,7 +59,7 @@ This policy setting enables or disables audio input to the Sandbox. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-1]` | | Default Value | 1 | @@ -91,7 +91,7 @@ This policy setting enables or disables audio input to the Sandbox. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -108,7 +108,7 @@ This policy setting enables or disables clipboard sharing with the sandbox. - If you disable this policy setting, copy and paste in and out of Sandbox will be restricted. -- If you do not configure this policy setting, clipboard sharing will be enabled. +- If you don't configure this policy setting, clipboard sharing will be enabled. @@ -122,7 +122,7 @@ This policy setting enables or disables clipboard sharing with the sandbox. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-1]` | | Default Value | 1 | @@ -154,7 +154,7 @@ This policy setting enables or disables clipboard sharing with the sandbox. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -171,9 +171,9 @@ This policy setting enables or disables networking in the sandbox. You can disab - If you disable this policy setting, networking is disabled in Windows Sandbox. -- If you do not configure this policy setting, networking will be enabled. +- If you don't configure this policy setting, networking will be enabled. -**Note** that enabling networking can expose untrusted applications to the internal network. +Note that enabling networking can expose untrusted applications to the internal network. @@ -187,7 +187,7 @@ This policy setting enables or disables networking in the sandbox. You can disab | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-1]` | | Default Value | 1 | @@ -219,7 +219,7 @@ This policy setting enables or disables networking in the sandbox. You can disab | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -234,9 +234,9 @@ This policy setting enables or disables printer sharing from the host into the S - If you enable this policy setting, host printers will be shared into Windows Sandbox. -- If you disable this policy setting, Windows Sandbox will not be able to view printers from the host. +- If you disable this policy setting, Windows Sandbox won't be able to view printers from the host. -- If you do not configure this policy setting, printer redirection will be disabled. +- If you don't configure this policy setting, printer redirection will be disabled. @@ -250,7 +250,7 @@ This policy setting enables or disables printer sharing from the host into the S | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-1]` | | Default Value | 1 | @@ -282,7 +282,7 @@ This policy setting enables or disables printer sharing from the host into the S | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -299,9 +299,9 @@ This policy setting is to enable or disable the virtualized GPU. - If you disable this policy setting, Windows Sandbox will use software rendering, which can be slower than virtualized GPU. -- If you do not configure this policy setting, vGPU will be enabled. +- If you don't configure this policy setting, vGPU will be enabled. -**Note** that enabling virtualized GPU can potentially increase the attack surface of the sandbox. +Note that enabling virtualized GPU can potentially increase the attack surface of the sandbox. @@ -315,7 +315,7 @@ This policy setting is to enable or disable the virtualized GPU. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-1]` | | Default Value | 1 | @@ -347,7 +347,7 @@ This policy setting is to enable or disable the virtualized GPU. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -364,9 +364,9 @@ This policy setting enables or disables video input to the Sandbox. - If you disable this policy setting, video input is disabled in Windows Sandbox. Applications using video input may not function properly in Windows Sandbox. -- If you do not configure this policy setting, video input will be disabled. Applications that use video input may not function properly in Windows Sandbox. +- If you don't configure this policy setting, video input will be disabled. Applications that use video input may not function properly in Windows Sandbox. -**Note** that there may be security implications of exposing host video input to the container. +Note that there may be security implications of exposing host video input to the container. @@ -380,7 +380,7 @@ This policy setting enables or disables video input to the Sandbox. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-1]` | | Default Value | 1 | diff --git a/windows/client-management/mdm/policy-csp-wirelessdisplay.md b/windows/client-management/mdm/policy-csp-wirelessdisplay.md index 2bfc6d28b5..c60fc591ad 100644 --- a/windows/client-management/mdm/policy-csp-wirelessdisplay.md +++ b/windows/client-management/mdm/policy-csp-wirelessdisplay.md @@ -4,7 +4,7 @@ description: Learn more about the WirelessDisplay Area in Policy CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 01/09/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -26,7 +26,7 @@ ms.topic: reference | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -49,7 +49,7 @@ This policy setting allows you to turn off the Wireless Display multicast DNS se | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -75,7 +75,7 @@ This policy setting allows you to turn off the Wireless Display multicast DNS se | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -98,7 +98,7 @@ This policy setting allows you to turn off discovering the display service adver | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -124,7 +124,7 @@ This policy setting allows you to turn off discovering the display service adver | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -149,7 +149,7 @@ If you set it to 1, your PC will detect that you have moved and will automatical | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -175,7 +175,7 @@ If you set it to 1, your PC will detect that you have moved and will automatical | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -200,7 +200,7 @@ If you set it to 1, your PC may receive the incoming projection as a TCP server. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -226,7 +226,7 @@ If you set it to 1, your PC may receive the incoming projection as a TCP server. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -251,7 +251,7 @@ If you set it to 1, your PC may start an outgoing projection as a TCP client. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -277,7 +277,7 @@ If you set it to 1, your PC may start an outgoing projection as a TCP client. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -289,7 +289,7 @@ If you set it to 1, your PC may start an outgoing projection as a TCP client. This policy allows you to turn off projection from a PC. -If you set it to 0, your PC cannot discover or project to other devices. +If you set it to 0, your PC can't discover or project to other devices. If you set it to 1, your PC can discover and project to other devices. @@ -302,7 +302,7 @@ If you set it to 1, your PC can discover and project to other devices. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -312,7 +312,7 @@ If you set it to 1, your PC can discover and project to other devices. | Value | Description | |:--|:--| -| 0 | Your PC cannot discover or project to other devices. | +| 0 | Your PC can't discover or project to other devices. | | 1 (Default) | Your PC can discover and project to other devices. | @@ -328,7 +328,7 @@ If you set it to 1, your PC can discover and project to other devices. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -340,7 +340,7 @@ If you set it to 1, your PC can discover and project to other devices. This policy allows you to turn off projection from a PC over infrastructure. -If you set it to 0, your PC cannot discover or project to other infrastructure devices, though it may still be possible to discover and project over WiFi Direct. +If you set it to 0, your PC can't discover or project to other infrastructure devices, though it may still be possible to discover and project over WiFi Direct. If you set it to 1, your PC can discover and project to other devices over infrastructure. @@ -353,7 +353,7 @@ If you set it to 1, your PC can discover and project to other devices over infra | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -363,7 +363,7 @@ If you set it to 1, your PC can discover and project to other devices over infra | Value | Description | |:--|:--| -| 0 | Your PC cannot discover or project to other infrastructure devices, although it is possible to discover and project over WiFi Direct. | +| 0 | Your PC can't discover or project to other infrastructure devices, although it's possible to discover and project over WiFi Direct. | | 1 (Default) | Your PC can discover and project to other devices over infrastructure. | @@ -379,7 +379,7 @@ If you set it to 1, your PC can discover and project to other devices over infra | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -406,7 +406,7 @@ If you turn it off or don't configure it, your PC is discoverable and can be pro | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -416,7 +416,7 @@ If you turn it off or don't configure it, your PC is discoverable and can be pro | Value | Description | |:--|:--| -| 0 | Projection to PC is not allowed. Always off and the user cannot enable it. | +| 0 | Projection to PC isn't allowed. Always off and the user can't enable it. | | 1 (Default) | Projection to PC is allowed. Enabled only above the lock screen. | @@ -446,7 +446,7 @@ If you turn it off or don't configure it, your PC is discoverable and can be pro | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -458,7 +458,7 @@ If you turn it off or don't configure it, your PC is discoverable and can be pro This policy setting allows you to turn off projection to a PC over infrastructure. -If you set it to 0, your PC cannot be discoverable and can't be projected to over infrastructure, though it may still be possible to project over WiFi Direct. +If you set it to 0, your PC can't be discoverable and can't be projected to over infrastructure, though it may still be possible to project over WiFi Direct. If you set it to 1, your PC can be discoverable and can be projected to over infrastructure. @@ -471,7 +471,7 @@ If you set it to 1, your PC can be discoverable and can be projected to over inf | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -481,7 +481,7 @@ If you set it to 1, your PC can be discoverable and can be projected to over inf | Value | Description | |:--|:--| -| 0 | Your PC is not discoverable and other devices cannot project to it over infrastructure, although it is possible to project to it over WiFi Direct. | +| 0 | Your PC isn't discoverable and other devices can't project to it over infrastructure, although it's possible to project to it over WiFi Direct. | | 1 (Default) | Your PC is discoverable and other devices can project to it over infrastructure. | @@ -497,7 +497,7 @@ If you set it to 1, your PC can be discoverable and can be projected to over inf | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -520,7 +520,7 @@ Setting this policy controls whether or not the wireless display can send input- | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -546,7 +546,7 @@ Setting this policy controls whether or not the wireless display can send input- | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -575,7 +575,7 @@ If you set this to 'Always', all pairings will require PIN. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -585,7 +585,7 @@ If you set this to 'Always', all pairings will require PIN. | Value | Description | |:--|:--| -| 0 (Default) | PIN is not required. | +| 0 (Default) | PIN isn't required. | | 1 | Pairing ceremony for new devices will always require a PIN. | | 2 | All pairings will require PIN. | diff --git a/windows/client-management/mdm/printerprovisioning-csp.md b/windows/client-management/mdm/printerprovisioning-csp.md index ff490d38c4..5ab140e5fc 100644 --- a/windows/client-management/mdm/printerprovisioning-csp.md +++ b/windows/client-management/mdm/printerprovisioning-csp.md @@ -4,7 +4,7 @@ description: Learn more about the PrinterProvisioning CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 02/28/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -39,7 +39,7 @@ The following list shows the PrinterProvisioning configuration service provider | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1806] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1806] and later
    :heavy_check_mark: Windows 10, version 21H2 [10.0.19044.1806] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2009 [10.0.19042.1806] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1806] and later
    ✅ Windows 10, version 21H2 [10.0.19044.1806] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -62,7 +62,7 @@ This setting will take the action on the specified user account to install or un | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -78,7 +78,7 @@ This setting will take the action on the specified user account to install or un | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1806] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1806] and later
    :heavy_check_mark: Windows 10, version 21H2 [10.0.19044.1806] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2009 [10.0.19042.1806] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1806] and later
    ✅ Windows 10, version 21H2 [10.0.19044.1806] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -89,7 +89,7 @@ This setting will take the action on the specified user account to install or un -Identifies the Universal Print printer, by its Share ID, you wish to install on the targeted user account. The printer's Share ID can be found in the printer's properties via the Universal Print portal. **Note** the targeted user account must have access rights to both the printer and to the Universal Print service. +Identifies the Universal Print printer, by its Share ID, you wish to install on the targeted user account. The printer's Share ID can be found in the printer's properties via the Universal Print portal. Note the targeted user account must have access rights to both the printer and to the Universal Print service. @@ -101,7 +101,7 @@ Identifies the Universal Print printer, by its Share ID, you wish to install on | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | UniqueName: PrinterSharedID from the Universal Print system, which is used to discover and install Univeral Print printer | @@ -118,7 +118,7 @@ Identifies the Universal Print printer, by its Share ID, you wish to install on | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1806] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1806] and later
    :heavy_check_mark: Windows 10, version 21H2 [10.0.19044.1806] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2009 [10.0.19042.1806] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1806] and later
    ✅ Windows 10, version 21H2 [10.0.19044.1806] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -129,7 +129,7 @@ Identifies the Universal Print printer, by its Share ID, you wish to install on -Identifies the Universal Print printer, by its Printer ID, you wish to install on the targeted user account. The printer's Printer ID can be found in the printer's properties via the Universal Print portal. **Note** the targeted user account must have access rights to both the printer and to the Universal Print service. +Identifies the Universal Print printer, by its Printer ID, you wish to install on the targeted user account. The printer's Printer ID can be found in the printer's properties via the Universal Print portal. Note the targeted user account must have access rights to both the printer and to the Universal Print service. @@ -141,7 +141,7 @@ Identifies the Universal Print printer, by its Printer ID, you wish to install o | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -157,7 +157,7 @@ Identifies the Universal Print printer, by its Printer ID, you wish to install o | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1806] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1806] and later
    :heavy_check_mark: Windows 10, version 21H2 [10.0.19044.1806] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2009 [10.0.19042.1806] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1806] and later
    ✅ Windows 10, version 21H2 [10.0.19044.1806] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -180,7 +180,7 @@ HRESULT of the last installation returned code. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -196,7 +196,7 @@ HRESULT of the last installation returned code. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1806] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1806] and later
    :heavy_check_mark: Windows 10, version 21H2 [10.0.19044.1806] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2009 [10.0.19042.1806] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1806] and later
    ✅ Windows 10, version 21H2 [10.0.19044.1806] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -219,7 +219,7 @@ Support async execute. Install Universal Print printer. | Property name | Property value | |:--|:--| -| Format | null | +| Format | `null` | | Access Type | Exec, Get | @@ -235,7 +235,7 @@ Support async execute. Install Universal Print printer. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1806] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1806] and later
    :heavy_check_mark: Windows 10, version 21H2 [10.0.19044.1806] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2009 [10.0.19042.1806] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1806] and later
    ✅ Windows 10, version 21H2 [10.0.19044.1806] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -246,7 +246,7 @@ Support async execute. Install Universal Print printer. -Identifies the Universal Print printer, by its Share Name, you wish to install on the targeted user account. The printer's Share Name can be found in the printer's properties via the Universal Print portal. **Note** the targeted user account must have access rights to both the printer and to the Universal Print service. +Identifies the Universal Print printer, by its Share Name, you wish to install on the targeted user account. The printer's Share Name can be found in the printer's properties via the Universal Print portal. Note the targeted user account must have access rights to both the printer and to the Universal Print service. @@ -258,7 +258,7 @@ Identifies the Universal Print printer, by its Share Name, you wish to install o | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -274,7 +274,7 @@ Identifies the Universal Print printer, by its Share Name, you wish to install o | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2009 [10.0.19042.1806] and later
    :heavy_check_mark: Windows 10, version 21H1 [10.0.19043.1806] and later
    :heavy_check_mark: Windows 10, version 21H2 [10.0.19044.1806] and later
    :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2009 [10.0.19042.1806] and later
    ✅ Windows 10, version 21H1 [10.0.19043.1806] and later
    ✅ Windows 10, version 21H2 [10.0.19044.1806] and later
    ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -297,7 +297,7 @@ Identifies the Universal Print printer, by its Share Name, you wish to install o | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | diff --git a/windows/client-management/mdm/reboot-csp.md b/windows/client-management/mdm/reboot-csp.md index 32c31c0461..b2fdf60bb4 100644 --- a/windows/client-management/mdm/reboot-csp.md +++ b/windows/client-management/mdm/reboot-csp.md @@ -4,7 +4,7 @@ description: Learn more about the Reboot CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 05/01/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -38,7 +38,7 @@ The following list shows the Reboot configuration service provider nodes: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -61,7 +61,7 @@ This node executes a reboot of the device. RebootNow triggers a reboot within 5 | Property name | Property value | |:--|:--| -| Format | null | +| Format | `null` | | Access Type | Exec, Get | @@ -77,7 +77,7 @@ This node executes a reboot of the device. RebootNow triggers a reboot within 5 | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -100,7 +100,7 @@ The supported operation is Get. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -116,7 +116,7 @@ The supported operation is Get. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -139,7 +139,7 @@ Value in ISO8601, time is required. Either setting DailyRecurrent or WeeklyRecur | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -155,7 +155,7 @@ Value in ISO8601, time is required. Either setting DailyRecurrent or WeeklyRecur | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -178,7 +178,7 @@ Value in ISO8601, both the date and time are required. A reboot will be schedule | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -194,7 +194,7 @@ Value in ISO8601, both the date and time are required. A reboot will be schedule | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -217,7 +217,7 @@ Value in ISO8601, time is required. Either setting DailyRecurrent or WeeklyRecur | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | diff --git a/windows/client-management/mdm/remotewipe-csp.md b/windows/client-management/mdm/remotewipe-csp.md index 89cac77fc9..94ada2240d 100644 --- a/windows/client-management/mdm/remotewipe-csp.md +++ b/windows/client-management/mdm/remotewipe-csp.md @@ -4,7 +4,7 @@ description: Learn more about the RemoteWipe CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 02/28/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -19,6 +19,8 @@ ms.topic: reference The RemoteWipe configuration service provider can be used by mobile operators DM server or enterprise management server to remotely reset a device. The RemoteWipe configuration service provider can make the data stored in memory and hard disks difficult to recover if the device is remotely reset after being lost or stolen. Enterprise IT Professionals can update these settings by using the Exchange Server. + +[!INCLUDE [remote-wipe](../../../includes/licensing/remote-wipe.md)] @@ -44,7 +46,7 @@ The following list shows the RemoteWipe configuration service provider nodes: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -67,7 +69,7 @@ Node for the Autopilot Reset operation. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -83,7 +85,7 @@ Node for the Autopilot Reset operation. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -106,7 +108,7 @@ Exec on this node triggers Autopilot Reset operation. This works like PC Reset, | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Exec | @@ -122,7 +124,7 @@ Exec on this node triggers Autopilot Reset operation. This works like PC Reset, | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -145,7 +147,7 @@ Error value, if any, associated with Automatic Redeployment operation (typically | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | | Default Value | 0 | @@ -162,7 +164,7 @@ Error value, if any, associated with Automatic Redeployment operation (typically | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -185,7 +187,7 @@ Status value indicating current state of an Automatic Redeployment operation. 0: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | | Default Value | 0 | @@ -202,7 +204,7 @@ Status value indicating current state of an Automatic Redeployment operation. 0: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -226,7 +228,7 @@ A remote reset is equivalent to running **Reset this PC** > **Remove everything* | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Exec | @@ -242,7 +244,7 @@ A remote reset is equivalent to running **Reset this PC** > **Remove everything* | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -265,7 +267,7 @@ Exec on this node will perform a cloud-based remote wipe on the device. The retu | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Exec | @@ -281,7 +283,7 @@ Exec on this node will perform a cloud-based remote wipe on the device. The retu | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -304,7 +306,7 @@ Exec on this node will back up provisioning data to a persistent location and pe | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Exec | @@ -320,7 +322,7 @@ Exec on this node will back up provisioning data to a persistent location and pe | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -343,7 +345,7 @@ Exec on this node will perform a cloud-based remote reset on the device and pers | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Exec | @@ -359,7 +361,7 @@ Exec on this node will perform a cloud-based remote reset on the device and pers | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -383,7 +385,7 @@ Provisioning packages are persisted in `%SystemDrive%\ProgramData\Microsoft\Prov | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Exec | @@ -399,7 +401,7 @@ Provisioning packages are persisted in `%SystemDrive%\ProgramData\Microsoft\Prov | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -423,7 +425,7 @@ Exec on this node will perform a remote reset on the device and persist user acc | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Exec | @@ -439,7 +441,7 @@ Exec on this node will perform a remote reset on the device and persist user acc | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -464,7 +466,7 @@ Exec on this node will perform a remote wipe on the device and fully clean the i | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Exec | diff --git a/windows/client-management/mdm/rootcacertificates-csp.md b/windows/client-management/mdm/rootcacertificates-csp.md index 9da01ea478..44ad086f77 100644 --- a/windows/client-management/mdm/rootcacertificates-csp.md +++ b/windows/client-management/mdm/rootcacertificates-csp.md @@ -4,7 +4,7 @@ description: Learn more about the RootCATrustedCertificates CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/23/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -125,7 +125,7 @@ The following list shows the RootCATrustedCertificates configuration service pro | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -148,7 +148,7 @@ Node for CA certificates. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -164,7 +164,7 @@ Node for CA certificates. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -187,7 +187,7 @@ Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certifi | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Delete, Get | | Dynamic Node Naming | UniqueName: Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certificate hash is specified as a hexadecimal string value. | @@ -204,7 +204,7 @@ Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certifi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -215,7 +215,7 @@ Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certifi -Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string value cannot include extra formatting characters such as embedded linefeeds, etc. +Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string value can't include extra formatting characters such as embedded linefeeds, etc. @@ -227,7 +227,7 @@ Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string v | Property name | Property value | |:--|:--| -| Format | b64 | +| Format | `b64` | | Access Type | Add, Get, Replace | @@ -243,7 +243,7 @@ Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string v | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -266,7 +266,7 @@ Returns the name of the certificate issuer. This is equivalent to the Issuer mem | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -282,7 +282,7 @@ Returns the name of the certificate issuer. This is equivalent to the Issuer mem | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -305,7 +305,7 @@ Returns the name of the certificate subject. This is equivalent to the Subject m | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -321,7 +321,7 @@ Returns the name of the certificate subject. This is equivalent to the Subject m | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -344,7 +344,7 @@ Returns the certificate template name. Supported operation is Get. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -360,7 +360,7 @@ Returns the certificate template name. Supported operation is Get. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -383,7 +383,7 @@ Returns the starting date of the certificate's validity. Supported operation is | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -399,7 +399,7 @@ Returns the starting date of the certificate's validity. Supported operation is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -422,7 +422,7 @@ Returns the expiration date of the certificate. Supported operation is Get. This | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -438,7 +438,7 @@ Returns the expiration date of the certificate. Supported operation is Get. This | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -461,7 +461,7 @@ Node for OEM eSIM certificates. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -477,7 +477,7 @@ Node for OEM eSIM certificates. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -500,7 +500,7 @@ Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certifi | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Delete, Get | | Dynamic Node Naming | UniqueName: Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certificate hash is specified as a hexadecimal string value. | @@ -517,7 +517,7 @@ Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certifi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -528,7 +528,7 @@ Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certifi -Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string value cannot include extra formatting characters such as embedded linefeeds, etc. +Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string value can't include extra formatting characters such as embedded linefeeds, etc. @@ -540,7 +540,7 @@ Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string v | Property name | Property value | |:--|:--| -| Format | b64 | +| Format | `b64` | | Access Type | Add, Get, Replace | @@ -556,7 +556,7 @@ Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string v | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -579,7 +579,7 @@ Returns the name of the certificate issuer. This is equivalent to the Issuer mem | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -595,7 +595,7 @@ Returns the name of the certificate issuer. This is equivalent to the Issuer mem | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -618,7 +618,7 @@ Returns the name of the certificate subject. This is equivalent to the Subject m | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -634,7 +634,7 @@ Returns the name of the certificate subject. This is equivalent to the Subject m | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -657,7 +657,7 @@ Returns the certificate template name. Supported operation is Get. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -673,7 +673,7 @@ Returns the certificate template name. Supported operation is Get. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -696,7 +696,7 @@ Returns the starting date of the certificate's validity. Supported operation is | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -712,7 +712,7 @@ Returns the starting date of the certificate's validity. Supported operation is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -735,7 +735,7 @@ Returns the expiration date of the certificate. Supported operation is Get. This | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -751,7 +751,7 @@ Returns the expiration date of the certificate. Supported operation is Get. This | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -774,7 +774,7 @@ Defines the certificate store that contains root, or self-signed certificates, i | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -790,7 +790,7 @@ Defines the certificate store that contains root, or self-signed certificates, i | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -813,7 +813,7 @@ Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certifi | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Delete, Get | @@ -829,7 +829,7 @@ Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certifi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -840,7 +840,7 @@ Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certifi -Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string value cannot include extra formatting characters such as embedded linefeeds, etc. +Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string value can't include extra formatting characters such as embedded linefeeds, etc. @@ -852,7 +852,7 @@ Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string v | Property name | Property value | |:--|:--| -| Format | b64 | +| Format | `b64` | | Access Type | Add, Get, Replace | | Dynamic Node Naming | UniqueName: Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certificate hash is specified as a hexadecimal string value. | @@ -869,7 +869,7 @@ Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string v | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -892,7 +892,7 @@ Returns the name of the certificate issuer. This is equivalent to the Issuer mem | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -908,7 +908,7 @@ Returns the name of the certificate issuer. This is equivalent to the Issuer mem | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -931,7 +931,7 @@ Returns the name of the certificate subject. This is equivalent to the Subject m | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -947,7 +947,7 @@ Returns the name of the certificate subject. This is equivalent to the Subject m | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -970,7 +970,7 @@ Returns the certificate template name. Supported operation is Get. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -986,7 +986,7 @@ Returns the certificate template name. Supported operation is Get. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1009,7 +1009,7 @@ Returns the starting date of the certificate's validity. Supported operation is | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1025,7 +1025,7 @@ Returns the starting date of the certificate's validity. Supported operation is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1048,7 +1048,7 @@ Returns the expiration date of the certificate. Supported operation is Get. This | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1064,7 +1064,7 @@ Returns the expiration date of the certificate. Supported operation is Get. This | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1087,7 +1087,7 @@ Node for trusted people certificates. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1103,7 +1103,7 @@ Node for trusted people certificates. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1126,7 +1126,7 @@ Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certifi | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Delete, Get | | Dynamic Node Naming | UniqueName: Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certificate hash is specified as a hexadecimal string value. | @@ -1143,7 +1143,7 @@ Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certifi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1154,7 +1154,7 @@ Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certifi -Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string value cannot include extra formatting characters such as embedded linefeeds, etc. +Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string value can't include extra formatting characters such as embedded linefeeds, etc. @@ -1166,7 +1166,7 @@ Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string v | Property name | Property value | |:--|:--| -| Format | b64 | +| Format | `b64` | | Access Type | Add, Get, Replace | @@ -1182,7 +1182,7 @@ Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string v | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1205,7 +1205,7 @@ Returns the name of the certificate issuer. This is equivalent to the Issuer mem | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1221,7 +1221,7 @@ Returns the name of the certificate issuer. This is equivalent to the Issuer mem | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1244,7 +1244,7 @@ Returns the name of the certificate subject. This is equivalent to the Subject m | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1260,7 +1260,7 @@ Returns the name of the certificate subject. This is equivalent to the Subject m | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1283,7 +1283,7 @@ Returns the certificate template name. Supported operation is Get. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1299,7 +1299,7 @@ Returns the certificate template name. Supported operation is Get. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1322,7 +1322,7 @@ Returns the starting date of the certificate's validity. Supported operation is | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1338,7 +1338,7 @@ Returns the starting date of the certificate's validity. Supported operation is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1361,7 +1361,7 @@ Returns the expiration date of the certificate. Supported operation is Get. This | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1377,7 +1377,7 @@ Returns the expiration date of the certificate. Supported operation is Get. This | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1400,7 +1400,7 @@ Node for trusted publisher certificates. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1416,7 +1416,7 @@ Node for trusted publisher certificates. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1439,7 +1439,7 @@ Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certifi | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Delete, Get | | Dynamic Node Naming | UniqueName: Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certificate hash is specified as a hexadecimal string value. | @@ -1456,7 +1456,7 @@ Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certifi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1467,7 +1467,7 @@ Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certifi -Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string value cannot include extra formatting characters such as embedded linefeeds, etc. +Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string value can't include extra formatting characters such as embedded linefeeds, etc. @@ -1479,7 +1479,7 @@ Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string v | Property name | Property value | |:--|:--| -| Format | b64 | +| Format | `b64` | | Access Type | Add, Get, Replace | @@ -1495,7 +1495,7 @@ Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string v | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1518,7 +1518,7 @@ Returns the name of the certificate issuer. This is equivalent to the Issuer mem | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1534,7 +1534,7 @@ Returns the name of the certificate issuer. This is equivalent to the Issuer mem | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1557,7 +1557,7 @@ Returns the name of the certificate subject. This is equivalent to the Subject m | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1573,7 +1573,7 @@ Returns the name of the certificate subject. This is equivalent to the Subject m | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1596,7 +1596,7 @@ Returns the certificate template name. Supported operation is Get. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1612,7 +1612,7 @@ Returns the certificate template name. Supported operation is Get. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1635,7 +1635,7 @@ Returns the starting date of the certificate's validity. Supported operation is | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1651,7 +1651,7 @@ Returns the starting date of the certificate's validity. Supported operation is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1674,7 +1674,7 @@ Returns the expiration date of the certificate. Supported operation is Get. This | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1690,7 +1690,7 @@ Returns the expiration date of the certificate. Supported operation is Get. This | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1701,7 +1701,7 @@ Returns the expiration date of the certificate. Supported operation is Get. This -Node for certificates that are not trusted. IT admin can use this node to immediately flag certificates that have been compromised and no longer usable. +Node for certificates that aren't trusted. IT admin can use this node to immediately flag certificates that have been compromised and no longer usable. @@ -1713,7 +1713,7 @@ Node for certificates that are not trusted. IT admin can use this node to immedi | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1729,7 +1729,7 @@ Node for certificates that are not trusted. IT admin can use this node to immedi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1752,7 +1752,7 @@ Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certifi | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Delete, Get | | Dynamic Node Naming | UniqueName: Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certificate hash is specified as a hexadecimal string value. | @@ -1769,7 +1769,7 @@ Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certifi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1780,7 +1780,7 @@ Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certifi -Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string value cannot include extra formatting characters such as embedded linefeeds, etc. +Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string value can't include extra formatting characters such as embedded linefeeds, etc. @@ -1792,7 +1792,7 @@ Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string v | Property name | Property value | |:--|:--| -| Format | b64 | +| Format | `b64` | | Access Type | Add, Get, Replace | @@ -1808,7 +1808,7 @@ Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string v | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1831,7 +1831,7 @@ Returns the name of the certificate issuer. This is equivalent to the Issuer mem | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1847,7 +1847,7 @@ Returns the name of the certificate issuer. This is equivalent to the Issuer mem | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1870,7 +1870,7 @@ Returns the name of the certificate subject. This is equivalent to the Subject m | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1886,7 +1886,7 @@ Returns the name of the certificate subject. This is equivalent to the Subject m | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1909,7 +1909,7 @@ Returns the certificate template name. Supported operation is Get. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1925,7 +1925,7 @@ Returns the certificate template name. Supported operation is Get. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1948,7 +1948,7 @@ Returns the starting date of the certificate's validity. Supported operation is | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1964,7 +1964,7 @@ Returns the starting date of the certificate's validity. Supported operation is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -1987,7 +1987,7 @@ Returns the expiration date of the certificate. Supported operation is Get. This | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2003,7 +2003,7 @@ Returns the expiration date of the certificate. Supported operation is Get. This | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2026,7 +2026,7 @@ Node for CA certificates. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -2042,7 +2042,7 @@ Node for CA certificates. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2065,7 +2065,7 @@ Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certifi | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Delete, Get | | Dynamic Node Naming | UniqueName: Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certificate hash is specified as a hexadecimal string value. | @@ -2082,7 +2082,7 @@ Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certifi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2093,7 +2093,7 @@ Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certifi -Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string value cannot include extra formatting characters such as embedded linefeeds, etc. +Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string value can't include extra formatting characters such as embedded linefeeds, etc. @@ -2105,7 +2105,7 @@ Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string v | Property name | Property value | |:--|:--| -| Format | b64 | +| Format | `b64` | | Access Type | Add, Get, Replace | @@ -2121,7 +2121,7 @@ Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string v | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2144,7 +2144,7 @@ Returns the name of the certificate issuer. This is equivalent to the Issuer mem | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2160,7 +2160,7 @@ Returns the name of the certificate issuer. This is equivalent to the Issuer mem | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2183,7 +2183,7 @@ Returns the name of the certificate subject. This is equivalent to the Subject m | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2199,7 +2199,7 @@ Returns the name of the certificate subject. This is equivalent to the Subject m | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2222,7 +2222,7 @@ Returns the certificate template name. Supported operation is Get. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2238,7 +2238,7 @@ Returns the certificate template name. Supported operation is Get. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2261,7 +2261,7 @@ Returns the starting date of the certificate's validity. Supported operation is | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2277,7 +2277,7 @@ Returns the starting date of the certificate's validity. Supported operation is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2300,7 +2300,7 @@ Returns the expiration date of the certificate. Supported operation is Get. This | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2316,7 +2316,7 @@ Returns the expiration date of the certificate. Supported operation is Get. This | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2339,7 +2339,7 @@ Node for OEM eSIM certificates. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -2355,7 +2355,7 @@ Node for OEM eSIM certificates. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2378,7 +2378,7 @@ Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certifi | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Delete, Get | | Dynamic Node Naming | UniqueName: Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certificate hash is specified as a hexadecimal string value. | @@ -2395,7 +2395,7 @@ Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certifi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2406,7 +2406,7 @@ Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certifi -Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string value cannot include extra formatting characters such as embedded linefeeds, etc. +Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string value can't include extra formatting characters such as embedded linefeeds, etc. @@ -2418,7 +2418,7 @@ Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string v | Property name | Property value | |:--|:--| -| Format | b64 | +| Format | `b64` | | Access Type | Add, Get, Replace | @@ -2434,7 +2434,7 @@ Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string v | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2457,7 +2457,7 @@ Returns the name of the certificate issuer. This is equivalent to the Issuer mem | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2473,7 +2473,7 @@ Returns the name of the certificate issuer. This is equivalent to the Issuer mem | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2496,7 +2496,7 @@ Returns the name of the certificate subject. This is equivalent to the Subject m | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2512,7 +2512,7 @@ Returns the name of the certificate subject. This is equivalent to the Subject m | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2535,7 +2535,7 @@ Returns the certificate template name. Supported operation is Get. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2551,7 +2551,7 @@ Returns the certificate template name. Supported operation is Get. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2574,7 +2574,7 @@ Returns the starting date of the certificate's validity. Supported operation is | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2590,7 +2590,7 @@ Returns the starting date of the certificate's validity. Supported operation is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -2613,7 +2613,7 @@ Returns the expiration date of the certificate. Supported operation is Get. This | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2629,7 +2629,7 @@ Returns the expiration date of the certificate. Supported operation is Get. This | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2652,7 +2652,7 @@ Node for trusted people certificates. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -2668,7 +2668,7 @@ Node for trusted people certificates. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2691,7 +2691,7 @@ Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certifi | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Delete, Get | | Dynamic Node Naming | UniqueName: Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certificate hash is specified as a hexadecimal string value. | @@ -2708,7 +2708,7 @@ Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certifi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2719,7 +2719,7 @@ Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certifi -Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string value cannot include extra formatting characters such as embedded linefeeds, etc. +Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string value can't include extra formatting characters such as embedded linefeeds, etc. @@ -2731,7 +2731,7 @@ Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string v | Property name | Property value | |:--|:--| -| Format | b64 | +| Format | `b64` | | Access Type | Add, Get, Replace | @@ -2747,7 +2747,7 @@ Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string v | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2770,7 +2770,7 @@ Returns the name of the certificate issuer. This is equivalent to the Issuer mem | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2786,7 +2786,7 @@ Returns the name of the certificate issuer. This is equivalent to the Issuer mem | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2809,7 +2809,7 @@ Returns the name of the certificate subject. This is equivalent to the Subject m | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2825,7 +2825,7 @@ Returns the name of the certificate subject. This is equivalent to the Subject m | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2848,7 +2848,7 @@ Returns the certificate template name. Supported operation is Get. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2864,7 +2864,7 @@ Returns the certificate template name. Supported operation is Get. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2887,7 +2887,7 @@ Returns the starting date of the certificate's validity. Supported operation is | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2903,7 +2903,7 @@ Returns the starting date of the certificate's validity. Supported operation is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2926,7 +2926,7 @@ Returns the expiration date of the certificate. Supported operation is Get. This | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -2942,7 +2942,7 @@ Returns the expiration date of the certificate. Supported operation is Get. This | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2965,7 +2965,7 @@ Node for trusted publisher certificates. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -2981,7 +2981,7 @@ Node for trusted publisher certificates. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3004,7 +3004,7 @@ Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certifi | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Delete, Get | | Dynamic Node Naming | UniqueName: Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certificate hash is specified as a hexadecimal string value. | @@ -3021,7 +3021,7 @@ Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certifi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3032,7 +3032,7 @@ Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certifi -Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string value cannot include extra formatting characters such as embedded linefeeds, etc. +Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string value can't include extra formatting characters such as embedded linefeeds, etc. @@ -3044,7 +3044,7 @@ Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string v | Property name | Property value | |:--|:--| -| Format | b64 | +| Format | `b64` | | Access Type | Add, Get, Replace | @@ -3060,7 +3060,7 @@ Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string v | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3083,7 +3083,7 @@ Returns the name of the certificate issuer. This is equivalent to the Issuer mem | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -3099,7 +3099,7 @@ Returns the name of the certificate issuer. This is equivalent to the Issuer mem | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3122,7 +3122,7 @@ Returns the name of the certificate subject. This is equivalent to the Subject m | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -3138,7 +3138,7 @@ Returns the name of the certificate subject. This is equivalent to the Subject m | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3161,7 +3161,7 @@ Returns the certificate template name. Supported operation is Get. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -3177,7 +3177,7 @@ Returns the certificate template name. Supported operation is Get. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3200,7 +3200,7 @@ Returns the starting date of the certificate's validity. Supported operation is | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -3216,7 +3216,7 @@ Returns the starting date of the certificate's validity. Supported operation is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3239,7 +3239,7 @@ Returns the expiration date of the certificate. Supported operation is Get. This | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -3255,7 +3255,7 @@ Returns the expiration date of the certificate. Supported operation is Get. This | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -3266,7 +3266,7 @@ Returns the expiration date of the certificate. Supported operation is Get. This -Node for certificates that are not trusted. IT admin can use this node to immediately flag certificates that have been compromised and no longer usable. +Node for certificates that aren't trusted. IT admin can use this node to immediately flag certificates that have been compromised and no longer usable. @@ -3278,7 +3278,7 @@ Node for certificates that are not trusted. IT admin can use this node to immedi | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -3294,7 +3294,7 @@ Node for certificates that are not trusted. IT admin can use this node to immedi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -3317,7 +3317,7 @@ Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certifi | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Delete, Get | | Dynamic Node Naming | UniqueName: Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certificate hash is specified as a hexadecimal string value. | @@ -3334,7 +3334,7 @@ Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certifi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -3345,7 +3345,7 @@ Defines the SHA1 hash for the certificate. The 20-byte value of the SHA1 certifi -Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string value cannot include extra formatting characters such as embedded linefeeds, etc. +Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string value can't include extra formatting characters such as embedded linefeeds, etc. @@ -3357,7 +3357,7 @@ Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string v | Property name | Property value | |:--|:--| -| Format | b64 | +| Format | `b64` | | Access Type | Add, Get, Replace | @@ -3373,7 +3373,7 @@ Specifies the X.509 certificate as a Base64-encoded string. The Base-64 string v | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -3396,7 +3396,7 @@ Returns the name of the certificate issuer. This is equivalent to the Issuer mem | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -3412,7 +3412,7 @@ Returns the name of the certificate issuer. This is equivalent to the Issuer mem | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -3435,7 +3435,7 @@ Returns the name of the certificate subject. This is equivalent to the Subject m | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -3451,7 +3451,7 @@ Returns the name of the certificate subject. This is equivalent to the Subject m | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -3474,7 +3474,7 @@ Returns the certificate template name. Supported operation is Get. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -3490,7 +3490,7 @@ Returns the certificate template name. Supported operation is Get. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -3513,7 +3513,7 @@ Returns the starting date of the certificate's validity. Supported operation is | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -3529,7 +3529,7 @@ Returns the starting date of the certificate's validity. Supported operation is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -3552,7 +3552,7 @@ Returns the expiration date of the certificate. Supported operation is Get. This | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | diff --git a/windows/client-management/mdm/sharedpc-csp.md b/windows/client-management/mdm/sharedpc-csp.md index b899a7c5ee..efb7d39fed 100644 --- a/windows/client-management/mdm/sharedpc-csp.md +++ b/windows/client-management/mdm/sharedpc-csp.md @@ -4,7 +4,7 @@ description: Learn more about the SharedPC CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 02/28/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -51,7 +51,7 @@ The following list shows the SharedPC configuration service provider nodes: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -74,7 +74,7 @@ Configures which type of accounts are allowed to use the PC. Allowed values: 0 ( | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -101,7 +101,7 @@ Configures which type of accounts are allowed to use the PC. Allowed values: 0 ( | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -124,7 +124,7 @@ Configures when accounts will be deleted. Allowed values: 0 (delete immediately) | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -151,7 +151,7 @@ Configures when accounts will be deleted. Allowed values: 0 (delete immediately) | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -174,7 +174,7 @@ Stop deleting accounts when available disk space reaches this threshold, given a | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-100]` | | Default Value | 50 | @@ -192,7 +192,7 @@ Stop deleting accounts when available disk space reaches this threshold, given a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -216,7 +216,7 @@ For example, if the DiskLevelCaching is set to 50 and the DiskLevelDeletion is s | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-100]` | | Default Value | 25 | @@ -234,7 +234,7 @@ For example, if the DiskLevelCaching is set to 50 and the DiskLevelDeletion is s | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -257,7 +257,7 @@ Enable the account manager for shared PC mode. If used, this value must be set b | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | false | @@ -283,7 +283,7 @@ Enable the account manager for shared PC mode. If used, this value must be set b | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -306,7 +306,7 @@ Setting this node to "true" triggers the action to configure a device to Shared | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | false | @@ -332,7 +332,7 @@ Setting this node to "true" triggers the action to configure a device to Shared | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -355,7 +355,7 @@ Setting this node to "1" triggers the action to configure a device to Shared PC | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | false | @@ -381,7 +381,7 @@ Setting this node to "1" triggers the action to configure a device to Shared PC | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -404,7 +404,7 @@ Setting this node to "1" enables Windows Insider Preview flighting and the abili | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | false | @@ -430,7 +430,7 @@ Setting this node to "1" enables Windows Insider Preview flighting and the abili | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -441,7 +441,7 @@ Setting this node to "1" enables Windows Insider Preview flighting and the abili -Accounts will start being deleted when they have not been logged on during the specified period, given as number of days. +Accounts will start being deleted when they haven't been logged-on during the specified period, given as number of days. @@ -453,7 +453,7 @@ Accounts will start being deleted when they have not been logged on during the s | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-4294967295]` | | Default Value | 30 | @@ -471,7 +471,7 @@ Accounts will start being deleted when they have not been logged on during the s | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -494,7 +494,7 @@ Specifies the AUMID of the app to use with assigned access. If used, this value | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -510,7 +510,7 @@ Specifies the AUMID of the app to use with assigned access. If used, this value | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -533,7 +533,7 @@ Specifies the display text for the account shown on the sign-in screen which lau | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -549,7 +549,7 @@ Specifies the display text for the account shown on the sign-in screen which lau | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -572,7 +572,7 @@ Daily start time of maintenance hour. Given in minutes from midnight. Default is | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-1440]` | | Default Value | 0 | @@ -590,7 +590,7 @@ Daily start time of maintenance hour. Given in minutes from midnight. Default is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -613,7 +613,7 @@ Maximum size of the paging file in MB. Applies only to systems with less than 32 | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-32768]` | | Default Value | 1024 | @@ -631,7 +631,7 @@ Maximum size of the paging file in MB. Applies only to systems with less than 32 | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -654,7 +654,7 @@ Restricts the user from using local storage. This node is optional. If used, thi | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | false | @@ -680,7 +680,7 @@ Restricts the user from using local storage. This node is optional. If used, thi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -704,7 +704,7 @@ A boolean value that specifies whether the policies for education environment ar | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | false | @@ -730,7 +730,7 @@ A boolean value that specifies whether the policies for education environment ar | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -754,7 +754,7 @@ The default value is Not Configured and the effective power settings are determi | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | false | @@ -780,7 +780,7 @@ The default value is Not Configured and the effective power settings are determi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -803,7 +803,7 @@ Require signing in on waking up from sleep. If used, this value must be set befo | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | false | @@ -829,7 +829,7 @@ Require signing in on waking up from sleep. If used, this value must be set befo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -852,7 +852,7 @@ The amount of time before the PC sleeps, giving in seconds. 0 means the PC never | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-4294967295]` | | Default Value | 300 | diff --git a/windows/client-management/mdm/supl-csp.md b/windows/client-management/mdm/supl-csp.md index ddfda20a6b..26ba1214aa 100644 --- a/windows/client-management/mdm/supl-csp.md +++ b/windows/client-management/mdm/supl-csp.md @@ -4,7 +4,7 @@ description: Learn more about the SUPL CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 04/26/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -89,7 +89,7 @@ The following list shows the SUPL configuration service provider nodes: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -112,7 +112,7 @@ Required for SUPL. Defines the account for the SUPL Enabled Terminal (SET) node. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -128,7 +128,7 @@ Required for SUPL. Defines the account for the SUPL Enabled Terminal (SET) node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -154,7 +154,7 @@ For OMA DM, if the format for this node is incorrect the entry will be ignored a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -170,7 +170,7 @@ For OMA DM, if the format for this node is incorrect the entry will be ignored a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -193,7 +193,7 @@ Required. The AppID for SUPL is automatically set to "ap0004". This is a read-on | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -209,7 +209,7 @@ Required. The AppID for SUPL is automatically set to "ap0004". This is a read-on | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -231,7 +231,7 @@ Required. The AppID for SUPL is automatically set to "ap0004". This is a read-on | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -247,7 +247,7 @@ Required. The AppID for SUPL is automatically set to "ap0004". This is a read-on | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -269,7 +269,7 @@ Required. The AppID for SUPL is automatically set to "ap0004". This is a read-on | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -285,7 +285,7 @@ Required. The AppID for SUPL is automatically set to "ap0004". This is a read-on | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -308,7 +308,7 @@ Optional. Determines the full version (X. Y. Z where X, Y and Z are major versio | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | | Allowed Values | Regular Expression: `^(\d+\.)?(\d+\.)?(\*|\d+)$` | | Default Value | 1.0.0 | @@ -326,7 +326,7 @@ Optional. Determines the full version (X. Y. Z where X, Y and Z are major versio | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -351,7 +351,7 @@ Optional. Specifies the positioning method that the SUPL client will use for mob | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 0 | @@ -381,7 +381,7 @@ Optional. Specifies the positioning method that the SUPL client will use for mob | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -392,7 +392,7 @@ Optional. Specifies the positioning method that the SUPL client will use for mob -This setting is deprecated in Windows 10. Optional. Boolean. Specifies whether the location toggle on the location screen in Settings is also used to manage SUPL network-initiated (NI) requests for location. If the value is set to 0, the NI behavior is independent from the current location toggle setting. If the value is set to 1, the NI behavior follows the current location toggle setting. The default value is 1. **Note** that most clients do not support this behavior. This value manages the settings for both SUPL and v2 UPL. If a phone is configured for both SUPL and V2 UPL and these values differ, the SUPL setting will always be used. +This setting is deprecated in Windows 10. Optional. Boolean. Specifies whether the location toggle on the location screen in Settings is also used to manage SUPL network-initiated (NI) requests for location. If the value is set to 0, the NI behavior is independent from the current location toggle setting. If the value is set to 1, the NI behavior follows the current location toggle setting. The default value is 1. Note that most clients don't support this behavior. This value manages the settings for both SUPL and v2 UPL. If a phone is configured for both SUPL and V2 UPL and these values differ, the SUPL setting will always be used. @@ -423,7 +423,7 @@ For OMA DM, if the format for this node is incorrect then an entry will be ignor | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | true | @@ -449,7 +449,7 @@ For OMA DM, if the format for this node is incorrect then an entry will be ignor | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -460,7 +460,7 @@ For OMA DM, if the format for this node is incorrect then an entry will be ignor -Required. List all of the MCC and MNC pairs owned by the mobile operator. This list is used to verify that the UICC matches the network and SUPL can be used. When the UICC and network do not match, the phone uses the default location service and does not use SUPL. +Required. List all of the MCC and MNC pairs owned by the mobile operator. This list is used to verify that the UICC matches the network and SUPL can be used. When the UICC and network don't match, the phone uses the default location service and doesn't use SUPL. @@ -475,7 +475,7 @@ For OMA DM, if the format for this node is incorrect then an entry will be ignor | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -491,7 +491,7 @@ For OMA DM, if the format for this node is incorrect then an entry will be ignor | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -514,7 +514,7 @@ Optional. Time in seconds that the network-initiated location request is display | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 30 | @@ -531,7 +531,7 @@ Optional. Time in seconds that the network-initiated location request is display | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -542,7 +542,7 @@ Optional. Time in seconds that the network-initiated location request is display -Required. Specifies the root certificate for the H-SLP server. Windows does not support a non-secure mode. If this node is not included, the configuration service provider will fail but may not return a specific error. +Required. Specifies the root certificate for the H-SLP server. Windows doesn't support a non-secure mode. If this node isn't included, the configuration service provider will fail but may not return a specific error. @@ -554,7 +554,7 @@ Required. Specifies the root certificate for the H-SLP server. Windows does not | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -570,7 +570,7 @@ Required. Specifies the root certificate for the H-SLP server. Windows does not | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -593,7 +593,7 @@ The base 64 encoded blob of the H-SLP root certificate. | Property name | Property value | |:--|:--| -| Format | b64 | +| Format | `b64` | | Access Type | Get, Replace | @@ -609,7 +609,7 @@ The base 64 encoded blob of the H-SLP root certificate. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -632,7 +632,7 @@ Specifies the name of the H-SLP root certificate as a string, in the format name | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -648,7 +648,7 @@ Specifies the name of the H-SLP root certificate as a string, in the format name | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -671,7 +671,7 @@ Specifies the root certificate for the H-SLP server. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -687,7 +687,7 @@ Specifies the root certificate for the H-SLP server. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -710,7 +710,7 @@ The base 64 encoded blob of the H-SLP root certificate. | Property name | Property value | |:--|:--| -| Format | b64 | +| Format | `b64` | | Access Type | Get, Replace | @@ -726,7 +726,7 @@ The base 64 encoded blob of the H-SLP root certificate. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -749,7 +749,7 @@ Specifies the name of the H-SLP root certificate as a string, in the format name | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -765,7 +765,7 @@ Specifies the name of the H-SLP root certificate as a string, in the format name | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -788,7 +788,7 @@ Specifies the root certificate for the H-SLP server. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -804,7 +804,7 @@ Specifies the root certificate for the H-SLP server. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -827,7 +827,7 @@ The base 64 encoded blob of the H-SLP root certificate. | Property name | Property value | |:--|:--| -| Format | b64 | +| Format | `b64` | | Access Type | Get, Replace | @@ -843,7 +843,7 @@ The base 64 encoded blob of the H-SLP root certificate. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -866,7 +866,7 @@ Specifies the name of the H-SLP root certificate as a string, in the format name | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -882,7 +882,7 @@ Specifies the name of the H-SLP root certificate as a string, in the format name | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -905,7 +905,7 @@ Specifies the root certificate for the H-SLP server. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -921,7 +921,7 @@ Specifies the root certificate for the H-SLP server. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -944,7 +944,7 @@ The base 64 encoded blob of the H-SLP root certificate. | Property name | Property value | |:--|:--| -| Format | b64 | +| Format | `b64` | | Access Type | Get, Replace | @@ -960,7 +960,7 @@ The base 64 encoded blob of the H-SLP root certificate. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -983,7 +983,7 @@ Specifies the name of the H-SLP root certificate as a string, in the format name | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -999,7 +999,7 @@ Specifies the name of the H-SLP root certificate as a string, in the format name | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -1022,7 +1022,7 @@ Specifies the root certificate for the H-SLP server. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1038,7 +1038,7 @@ Specifies the root certificate for the H-SLP server. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -1061,7 +1061,7 @@ The base 64 encoded blob of the H-SLP root certificate. | Property name | Property value | |:--|:--| -| Format | b64 | +| Format | `b64` | | Access Type | Get, Replace | @@ -1077,7 +1077,7 @@ The base 64 encoded blob of the H-SLP root certificate. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -1100,7 +1100,7 @@ Specifies the name of the H-SLP root certificate as a string, in the format name | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -1116,7 +1116,7 @@ Specifies the name of the H-SLP root certificate as a string, in the format name | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -1139,7 +1139,7 @@ Specifies the root certificate for the H-SLP server. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1155,7 +1155,7 @@ Specifies the root certificate for the H-SLP server. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -1178,7 +1178,7 @@ The base 64 encoded blob of the H-SLP root certificate. | Property name | Property value | |:--|:--| -| Format | b64 | +| Format | `b64` | | Access Type | Get, Replace | @@ -1194,7 +1194,7 @@ The base 64 encoded blob of the H-SLP root certificate. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -1217,7 +1217,7 @@ Specifies the name of the H-SLP root certificate as a string, in the format name | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -1233,7 +1233,7 @@ Specifies the name of the H-SLP root certificate as a string, in the format name | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1256,7 +1256,7 @@ Optional. Integer. Defines the minimum interval of time in seconds between mobil | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 60 | @@ -1273,7 +1273,7 @@ Optional. Integer. Defines the minimum interval of time in seconds between mobil | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1296,7 +1296,7 @@ Optional. Determines the major version of the SUPL protocol to use. For SUPL 1.0 | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Allowed Values | Range: `[1-2]` | | Default Value | 1 | @@ -1314,7 +1314,7 @@ Optional. Determines the major version of the SUPL protocol to use. For SUPL 1.0 | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1337,7 +1337,7 @@ Required for V2 UPL for CDMA. Specifies the account settings for user plane loca | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1353,7 +1353,7 @@ Required for V2 UPL for CDMA. Specifies the account settings for user plane loca | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1376,7 +1376,7 @@ Required. This value must always be set to 00000011. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1392,7 +1392,7 @@ Required. This value must always be set to 00000011. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1415,7 +1415,7 @@ Optional. Boolean. Specifies whether the location toggle on the location screen | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | true | @@ -1441,7 +1441,7 @@ Optional. Boolean. Specifies whether the location toggle on the location screen | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1464,7 +1464,7 @@ Optional. The address of the mobile positioning center (MPC), in the format ipAd | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -1480,7 +1480,7 @@ Optional. The address of the mobile positioning center (MPC), in the format ipAd | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1503,7 +1503,7 @@ Optional. Time in seconds that the network-initiated location request is display | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 30 | @@ -1520,7 +1520,7 @@ Optional. Time in seconds that the network-initiated location request is display | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1543,7 +1543,7 @@ Optional. The address of the Position Determination Entity (PDE), in the format | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -1559,7 +1559,7 @@ Optional. The address of the Position Determination Entity (PDE), in the format | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1582,7 +1582,7 @@ Optional. Specifies the positioning method that the SUPL client will use for mob | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 0 | @@ -1611,7 +1611,7 @@ Optional. Specifies the positioning method that the SUPL client will use for mob | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1507 [10.0.10240] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1507 [10.0.10240] and later | @@ -1634,7 +1634,7 @@ Optional. Integer. Defines the minimum interval of time in seconds between mobil | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 60 | diff --git a/windows/client-management/mdm/surfacehub-csp.md b/windows/client-management/mdm/surfacehub-csp.md index 46e9609e96..dece9dcc5a 100644 --- a/windows/client-management/mdm/surfacehub-csp.md +++ b/windows/client-management/mdm/surfacehub-csp.md @@ -4,7 +4,7 @@ description: Learn more about the SurfaceHub CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 03/27/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -16,8 +16,7 @@ ms.topic: reference # SurfaceHub CSP -> [!IMPORTANT] -> This CSP contains preview policies that are under development and only applicable for [Windows Insider Preview builds](/windows-insider/). These policies are subject to change and may have dependencies on other features or services in preview. +[!INCLUDE [Windows Insider tip](includes/mdm-insider-csp-note.md)] @@ -95,7 +94,7 @@ The following list shows the SurfaceHub configuration service provider nodes: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -106,7 +105,7 @@ The following list shows the SurfaceHub configuration service provider nodes: -Node for setting device account information. A device account is a Microsoft Exchange account that is connected with Skype for Business, which allows people to join scheduled meetings, make Skype for Business calls, and share content from the device. See the [Surface Hub administrator guide](/surface-hub/) for more information about setting up a device account. To use a device account from Azure Active Directory: 1. Set the UserPrincipalName (for Azure AD). 2. Set a valid Password. 3. Execute ValidateAndCommit to validate the specified username and password combination against Azure AD. 4. Get the ErrorContext in case something goes wrong during validation. +Node for setting device account information. A device account is a Microsoft Exchange account that's connected with Skype for Business, which allows people to join scheduled meetings, make Skype for Business calls, and share content from the device. See the [Surface Hub administrator guide](/surface-hub/) for more information about setting up a device account. To use a device account from Azure Active Directory: 1. Set the UserPrincipalName (for Azure AD). 2. Set a valid Password. 3. Execute ValidateAndCommit to validate the specified username and password combination against Azure AD. 4. Get the ErrorContext in case something goes wrong during validation. @@ -120,7 +119,7 @@ Node for setting device account information. A device account is a Microsoft Exc | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | | Case Sensitive | True | @@ -186,7 +185,7 @@ Node for setting device account information. A device account is a Microsoft Exc | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -209,7 +208,7 @@ Specifies whether calendar sync and other Exchange server services is enabled. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | @@ -234,7 +233,7 @@ Specifies whether calendar sync and other Exchange server services is enabled. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -257,7 +256,7 @@ Domain of the device account when you are using Active Directory. To use a devic | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -273,7 +272,7 @@ Domain of the device account when you are using Active Directory. To use a devic | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -296,7 +295,7 @@ Email address of the device account. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -312,7 +311,7 @@ Email address of the device account. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -345,7 +344,7 @@ Possible error values: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -361,7 +360,7 @@ Possible error values: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.789] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042.789] and later
    :heavy_check_mark: Windows Insider Preview [99.9.9999] | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.789] and later
    ✅ Windows 10, version 2009 [10.0.19042.789] and later
    ✅ Windows Insider Preview [99.9.9999] | @@ -384,7 +383,7 @@ Specifies whether Device Account calendar sync will attempt to use token-based M | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | True | @@ -410,7 +409,7 @@ Specifies whether Device Account calendar sync will attempt to use token-based M | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -433,7 +432,7 @@ Exchange server of the device account. Normally, the device will try to auto-dis | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -449,7 +448,7 @@ Exchange server of the device account. Normally, the device will try to auto-dis | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -472,7 +471,7 @@ Password for the device account. Get is allowed here, but will always return a b | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -488,7 +487,7 @@ Password for the device account. Get is allowed here, but will always return a b | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -511,7 +510,7 @@ Specifies whether automatic password rotation is enabled. If you enforce a passw | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | @@ -536,7 +535,7 @@ Specifies whether automatic password rotation is enabled. If you enforce a passw | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -559,7 +558,7 @@ Session Initiation Protocol (SIP) address of the device account. Normally, the d | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -575,7 +574,7 @@ Session Initiation Protocol (SIP) address of the device account. Normally, the d | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -598,7 +597,7 @@ Username of the device account when you are using Active Directory. To use a dev | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -614,7 +613,7 @@ Username of the device account when you are using Active Directory. To use a dev | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -637,7 +636,7 @@ User principal name (UPN) of the device account. To use a device account from Az | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -653,7 +652,7 @@ User principal name (UPN) of the device account. To use a device account from Az | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -676,7 +675,7 @@ This method validates the data provided and then commits the changes. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Exec | @@ -692,7 +691,7 @@ This method validates the data provided and then commits the changes. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299.64] and later
    :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299.64] and later
    ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -715,7 +714,7 @@ Parent node. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -731,7 +730,7 @@ Parent node. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299.64] and later
    :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299.64] and later
    ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -754,7 +753,7 @@ Used to specify credentials to authenticate device to the network. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -770,7 +769,7 @@ Used to specify credentials to authenticate device to the network. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299.64] and later
    :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299.64] and later
    ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -793,7 +792,7 @@ Used to specify credentials to authenticate device to the network. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -809,7 +808,7 @@ Used to specify credentials to authenticate device to the network. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -832,7 +831,7 @@ Node for the in-box app settings. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -848,7 +847,7 @@ Node for the in-box app settings. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -871,7 +870,7 @@ Node for the Connect app. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -887,7 +886,7 @@ Node for the Connect app. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -910,7 +909,7 @@ Specifies whether to automatically launch the Connect app whenever a projection | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | @@ -935,7 +934,7 @@ Specifies whether to automatically launch the Connect app whenever a projection | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -958,7 +957,7 @@ Node for the Skype for Business settings. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -974,7 +973,7 @@ Node for the Skype for Business settings. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -997,7 +996,7 @@ Specifies the domain of the Skype for Business account when you are using Active | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -1013,7 +1012,7 @@ Specifies the domain of the Skype for Business account when you are using Active | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.450] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.450] and later
    ✅ Windows 10, version 2009 [10.0.19042] and later | @@ -1036,7 +1035,7 @@ This node controls policies specific to the Teams App on Surface Hub. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1052,7 +1051,7 @@ This node controls policies specific to the Teams App on Surface Hub. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041.450] and later
    :heavy_check_mark: Windows 10, version 2009 [10.0.19042] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041.450] and later
    ✅ Windows 10, version 2009 [10.0.19042] and later | @@ -1075,7 +1074,7 @@ String to contain Teams policy configs. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -1091,7 +1090,7 @@ String to contain Teams policy configs. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1114,7 +1113,7 @@ Node for the welcome screen. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1130,7 +1129,7 @@ Node for the welcome screen. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1153,7 +1152,7 @@ Setting for the screen to wake up and stay on with sensor activity. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | @@ -1178,7 +1177,7 @@ Setting for the screen to wake up and stay on with sensor activity. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1189,7 +1188,7 @@ Setting for the screen to wake up and stay on with sensor activity. -Background image for the welcome screen. To set this, specify an https URL to a PNG file (only PNGs are supported for security reasons). If any certificate authorities need to be trusted in order to access the URL, please ensure they are valid and installed on the Hub, otherwise it may not be able to load the image. +Background image for the welcome screen. To set this, specify an https URL to a PNG file (only PNGs are supported for security reasons). If any certificate authorities need to be trusted in order to access the URL, please ensure they're valid and installed on the Hub, otherwise it may not be able to load the image. @@ -1201,7 +1200,7 @@ Background image for the welcome screen. To set this, specify an https URL to a | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -1217,7 +1216,7 @@ Background image for the welcome screen. To set this, specify an https URL to a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1240,7 +1239,7 @@ Meeting information displayed on the welcome screen. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | @@ -1265,7 +1264,7 @@ Meeting information displayed on the welcome screen. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362.449] and later
    :heavy_check_mark: Windows 10, version 1909 [10.0.18363] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362.449] and later
    ✅ Windows 10, version 1909 [10.0.18363] and later | @@ -1288,7 +1287,7 @@ This node controls policies specific to the Whiteboard App on Surface Hub. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1304,7 +1303,7 @@ This node controls policies specific to the Whiteboard App on Surface Hub. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362.449] and later
    :heavy_check_mark: Windows 10, version 1909 [10.0.18363] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362.449] and later
    ✅ Windows 10, version 1909 [10.0.18363] and later | @@ -1327,7 +1326,7 @@ When enabled, prevents a user from initiating a collaborative session on the dev | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | @@ -1352,7 +1351,7 @@ When enabled, prevents a user from initiating a collaborative session on the dev | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362.449] and later
    :heavy_check_mark: Windows 10, version 1909 [10.0.18363] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362.449] and later
    ✅ Windows 10, version 1909 [10.0.18363] and later | @@ -1375,7 +1374,7 @@ When enabled, prevents a user from Signing into Whiteboard on the device. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | False | @@ -1401,7 +1400,7 @@ When enabled, prevents a user from Signing into Whiteboard on the device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1903 [10.0.18362.449] and later
    :heavy_check_mark: Windows 10, version 1909 [10.0.18363] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1903 [10.0.18362.449] and later
    ✅ Windows 10, version 1909 [10.0.18363] and later | @@ -1424,7 +1423,7 @@ When enabled, prevents Whiteboard from sending telemetry from the device. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | False | @@ -1450,7 +1449,7 @@ When enabled, prevents Whiteboard from sending telemetry from the device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1473,7 +1472,7 @@ Node for the wireless projector app settings. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1489,7 +1488,7 @@ Node for the wireless projector app settings. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1519,7 +1518,7 @@ Outside of regulatory concerns, if the channel is configured incorrectly, the dr | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 255 | @@ -1536,7 +1535,7 @@ Outside of regulatory concerns, if the channel is configured incorrectly, the dr | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1559,7 +1558,7 @@ Enables wireless projection to the device. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | @@ -1584,7 +1583,7 @@ Enables wireless projection to the device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1607,7 +1606,7 @@ Users must enter a PIN to wirelessly project to the device. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | @@ -1632,7 +1631,7 @@ Users must enter a PIN to wirelessly project to the device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1655,7 +1654,7 @@ Node for maintenance schedule. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1671,7 +1670,7 @@ Node for maintenance schedule. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1694,7 +1693,7 @@ Node for maintenance schedule. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1710,7 +1709,7 @@ Node for maintenance schedule. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1733,7 +1732,7 @@ Specifies the duration of maintenance window in minutes. For example, to set a 3 | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Allowed Values | Range: `[0-1439]` | @@ -1750,7 +1749,7 @@ Specifies the duration of maintenance window in minutes. For example, to set a 3 | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1773,7 +1772,7 @@ Specifies the start time for maintenance hours in minutes from midnight. For exa | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Allowed Values | Range: `[0-1439]` | @@ -1790,7 +1789,7 @@ Specifies the start time for maintenance hours in minutes from midnight. For exa | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393.969] and later
    :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393.969] and later
    ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1813,7 +1812,7 @@ Not a supported scenario. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1829,7 +1828,7 @@ Not a supported scenario. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393.969] and later
    :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393.969] and later
    ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1852,7 +1851,7 @@ The name of the domain admin group to add to the administrators group on the dev | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -1868,7 +1867,7 @@ The name of the domain admin group to add to the administrators group on the dev | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393.969] and later
    :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393.969] and later
    ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -1891,7 +1890,7 @@ The sid of the domain admin group to add to the administrators group on the devi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -1907,7 +1906,7 @@ The sid of the domain admin group to add to the administrators group on the devi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1930,7 +1929,7 @@ Node for the Microsoft Operations Management Suite. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1946,7 +1945,7 @@ Node for the Microsoft Operations Management Suite. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1969,7 +1968,7 @@ GUID identifying the Microsoft Operations Management Suite workspace ID to colle | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -1985,7 +1984,7 @@ GUID identifying the Microsoft Operations Management Suite workspace ID to colle | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2008,7 +2007,7 @@ Primary key for authenticating with workspace. Will always return an empty strin | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -2024,7 +2023,7 @@ Primary key for authenticating with workspace. Will always return an empty strin | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2047,7 +2046,7 @@ Node for the device properties. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -2063,7 +2062,7 @@ Node for the device properties. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -2086,7 +2085,7 @@ Specifies whether to use the device account for proxy authentication. If this se | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | true | @@ -2112,7 +2111,7 @@ Specifies whether to use the device account for proxy authentication. If this se | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -2135,7 +2134,7 @@ Specifies whether to allow the ability to resume a session when the session time | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | true | @@ -2161,7 +2160,7 @@ Specifies whether to allow the ability to resume a session when the session time | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -2184,7 +2183,7 @@ Specifies the default volume value for a new session. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Allowed Values | Range: `[0-100]` | | Default Value | 45 | @@ -2202,7 +2201,7 @@ Specifies the default volume value for a new session. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -2213,7 +2212,7 @@ Specifies the default volume value for a new session. -Specifies whether to disable auto-populating of the sign-in dialog with invitees from scheduled meetings. If this setting is true, the sign-in dialog will not be populated. If false, the dialog will auto-populate. +Specifies whether to disable auto-populating of the sign-in dialog with invitees from scheduled meetings. If this setting is true, the sign-in dialog won't be populated. If false, the dialog will auto-populate. @@ -2225,7 +2224,7 @@ Specifies whether to disable auto-populating of the sign-in dialog with invitees | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | false | @@ -2236,7 +2235,7 @@ Specifies whether to disable auto-populating of the sign-in dialog with invitees | Value | Description | |:--|:--| | false (Default) | Dialog will auto-populate. | -| true | Sign-in dialog will not be populated. | +| true | Sign-in dialog won't be populated. | @@ -2251,7 +2250,7 @@ Specifies whether to disable auto-populating of the sign-in dialog with invitees | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -2262,7 +2261,7 @@ Specifies whether to disable auto-populating of the sign-in dialog with invitees -Specifies whether to disable the "My meetings and files" feature in the Start menu, which shows the signed-in user's meetings and files from Office 365. If this setting is true, the "My meetings and files" feature will not be shown. When false, the "My meetings and files" feature will be shown. +Specifies whether to disable the "My meetings and files" feature in the Start menu, which shows the signed-in user's meetings and files from Office 365. If this setting is true, the "My meetings and files" feature won't be shown. When false, the "My meetings and files" feature will be shown. @@ -2274,7 +2273,7 @@ Specifies whether to disable the "My meetings and files" feature in the Start me | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Get, Replace | | Default Value | false | @@ -2284,7 +2283,7 @@ Specifies whether to disable the "My meetings and files" feature in the Start me | Value | Description | |:--|:--| -| true | "My meetings and files" feature will not be shown. | +| true | "My meetings and files" feature won't be shown. | | false (Default) | The "My meetings and files" feature will be shown. | @@ -2300,7 +2299,7 @@ Specifies whether to disable the "My meetings and files" feature in the Start me | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2323,7 +2322,7 @@ Friendly name of the device. Specifies the name that users see when they want to | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get, Replace | @@ -2339,7 +2338,7 @@ Friendly name of the device. Specifies the name that users see when they want to | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2363,7 +2362,7 @@ Specifies hostnames of proxy servers to automatically provide device account cre | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Delete, Get, Replace | @@ -2379,7 +2378,7 @@ Specifies hostnames of proxy servers to automatically provide device account cre | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -2402,7 +2401,7 @@ Specifies the number of minutes until the Hub screen turns off. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 5 | @@ -2437,7 +2436,7 @@ Specifies the number of minutes until the Hub screen turns off. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -2460,7 +2459,7 @@ Specifies the number of minutes until the session times out. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 1 | @@ -2495,7 +2494,7 @@ Specifies the number of minutes until the session times out. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -2518,7 +2517,7 @@ Specifies the type of sleep mode for the Surface Hub. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 0 | @@ -2544,7 +2543,7 @@ Specifies the type of sleep mode for the Surface Hub. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -2567,7 +2566,7 @@ Specifies the number of minutes until the Hub enters sleep mode. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 5 | @@ -2602,7 +2601,7 @@ Specifies the number of minutes until the Hub enters sleep mode. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393.969] and later
    :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393.969] and later
    ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -2625,7 +2624,7 @@ Teams mode. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Delete, Get, Replace | | Allowed Values | Range: `[0-2]` | | Default Value | 0 | @@ -2643,7 +2642,7 @@ Teams mode. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393.969] and later
    :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393.969] and later
    ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -2666,7 +2665,7 @@ App name. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Delete, Get, Replace | diff --git a/windows/client-management/mdm/vpnv2-csp.md b/windows/client-management/mdm/vpnv2-csp.md index 84b7a6c4ec..1c089a6ce5 100644 --- a/windows/client-management/mdm/vpnv2-csp.md +++ b/windows/client-management/mdm/vpnv2-csp.md @@ -4,7 +4,7 @@ description: Learn more about the VPNv2 CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 04/26/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -250,7 +250,7 @@ The following list shows the VPNv2 configuration service provider nodes: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -261,7 +261,7 @@ The following list shows the VPNv2 configuration service provider nodes: -Unique alpha numeric identifier for the profile. The profile name must not include a forward slash (/). If the profile name has a space or other non-alphanumeric character, it must be properly escaped according to the URL encoding standard. +Unique alpha numeric identifier for the profile. The profile name mustn't include a forward slash (/). If the profile name has a space or other non-alphanumeric character, it must be properly escaped according to the URL encoding standard. @@ -273,7 +273,7 @@ Unique alpha numeric identifier for the profile. The profile name must not inclu | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | | Atomic Required | True | | Dynamic Node Naming | ServerGeneratedUniqueIdentifier | @@ -292,7 +292,7 @@ Unique alpha numeric identifier for the profile. The profile name must not inclu | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -315,7 +315,7 @@ An optional flag to enable Always On mode. This will automatically connect the V | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | false | @@ -341,7 +341,7 @@ An optional flag to enable Always On mode. This will automatically connect the V | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -364,7 +364,7 @@ An optional flag to activate Always On mode. This is true by default if AlwaysOn | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -390,7 +390,7 @@ An optional flag to activate Always On mode. This is true by default if AlwaysOn | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -413,7 +413,7 @@ Reserved for future use. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -429,7 +429,7 @@ Reserved for future use. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -452,7 +452,7 @@ Reserved for future use. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -468,7 +468,7 @@ Reserved for future use. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -491,7 +491,7 @@ Reserved for future use. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -507,7 +507,7 @@ Reserved for future use. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -530,7 +530,7 @@ Reserved for future use. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | @@ -546,7 +546,7 @@ Reserved for future use. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -569,7 +569,7 @@ Reserved for future use. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -585,7 +585,7 @@ Reserved for future use. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -608,7 +608,7 @@ Reserved for future use. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -624,7 +624,7 @@ Reserved for future use. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -647,7 +647,7 @@ Reserved for future use. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -663,7 +663,7 @@ Reserved for future use. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -686,7 +686,7 @@ List of applications set to trigger the VPN. If any of these apps are launched a | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -702,7 +702,7 @@ List of applications set to trigger the VPN. If any of these apps are launched a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -713,7 +713,7 @@ List of applications set to trigger the VPN. If any of these apps are launched a -A sequential integer identifier which allows the ability to specify multiple apps for App Trigger. Sequencing must start at 0 and you should not skip numbers. +A sequential integer identifier which allows the ability to specify multiple apps for App Trigger. Sequencing must start at 0 and you shouldn't skip numbers. @@ -725,7 +725,7 @@ A sequential integer identifier which allows the ability to specify multiple app | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | UniqueName: A sequential integer identifier which allows the ability to specify multiple apps for App Trigger. Sequencing must start at 0 and you should not skip numbers. | @@ -742,7 +742,7 @@ A sequential integer identifier which allows the ability to specify multiple app | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -765,7 +765,7 @@ App Node under the Row Id. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -781,7 +781,7 @@ App Node under the Row Id. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -804,7 +804,7 @@ App Identity. Specified, based on the Type Field. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -820,7 +820,7 @@ App Identity. Specified, based on the Type Field. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -843,7 +843,7 @@ Returns the type of App/Id. This value can be either of the following: PackageFa | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -859,7 +859,7 @@ Returns the type of App/Id. This value can be either of the following: PackageFa | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -870,8 +870,9 @@ Returns the type of App/Id. This value can be either of the following: PackageFa -False : Do not Bypass for Local traffic -True : ByPass VPN Interface for Local Traffic +False: Don't Bypass for Local traffic. + +True: ByPass VPN Interface for Local Traffic. Optional. When this setting is True, requests to local resources that are available on the same Wi-Fi network as the VPN client can bypass the VPN. For example, if enterprise policy for VPN requires force tunnel for VPN, but enterprise intends to allow the remote user to connect locally to media center in their home, then this option should be set to True. The user can bypass VPN for local subnet traffic. When this is set to False, the setting is disabled and no subnet exceptions are allowed. @@ -885,7 +886,7 @@ Optional. When this setting is True, requests to local resources that are availa | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | @@ -901,7 +902,7 @@ Optional. When this setting is True, requests to local resources that are availa | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -924,7 +925,7 @@ Determines the level of data encryption required for the connection. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Default Value | Require | @@ -952,7 +953,7 @@ Determines the level of data encryption required for the connection. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -975,7 +976,7 @@ Nodes under DeviceCompliance can be used to enable AAD based Conditional Access | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Get | @@ -991,7 +992,7 @@ Nodes under DeviceCompliance can be used to enable AAD based Conditional Access | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1014,7 +1015,7 @@ Enables the Device Compliance flow from the client. If marked as True, the VPN C | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | @@ -1039,7 +1040,7 @@ Enables the Device Compliance flow from the client. If marked as True, the VPN C | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1062,7 +1063,7 @@ Nodes under SSO can be used to choose a certificate different from the VPN Authe | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Get | @@ -1078,7 +1079,7 @@ Nodes under SSO can be used to choose a certificate different from the VPN Authe | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1101,7 +1102,7 @@ Comma Separated list of EKU's for the VPN Client to look for the correct certifi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1117,7 +1118,7 @@ Comma Separated list of EKU's for the VPN Client to look for the correct certifi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1140,7 +1141,7 @@ If this field is set to True the VPN Client will look for a separate certificate | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | @@ -1165,7 +1166,7 @@ If this field is set to True the VPN Client will look for a separate certificate | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1188,7 +1189,7 @@ Comma Separated list of Issuer Hashes for the VPN Client to look for the correct | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1204,7 +1205,7 @@ Comma Separated list of Issuer Hashes for the VPN Client to look for the correct | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -1216,9 +1217,13 @@ Comma Separated list of Issuer Hashes for the VPN Client to look for the correct If turned on a device tunnel profile does four things. + First, it automatically becomes an always on profile. -Second, it does not require the presence or logging in of any user to the machine in order for it to connect. + +Second, it doesn't require the presence or logging in of any user to the machine in order for it to connect. + Third, no other Device Tunnel profile maybe be present on the same machine. + A device tunnel profile must be deleted before another device tunnel profile can be added, removed, or connected. @@ -1231,7 +1236,7 @@ A device tunnel profile must be deleted before another device tunnel profile can | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | false | @@ -1241,7 +1246,7 @@ A device tunnel profile must be deleted before another device tunnel profile can | Value | Description | |:--|:--| -| false (Default) | This is not a device tunnel profile. | +| false (Default) | This isn't a device tunnel profile. | | true | This is a device tunnel profile. | @@ -1257,7 +1262,7 @@ A device tunnel profile must be deleted before another device tunnel profile can | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1280,7 +1285,7 @@ Optional. When this setting is True, the Advanced Options page will have its edi | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | @@ -1305,7 +1310,7 @@ Optional. When this setting is True, the Advanced Options page will have its edi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1316,7 +1321,7 @@ Optional. When this setting is True, the Advanced Options page will have its edi -Optional. When this setting is True, the Disconnect button will not be visible for connected profiles. +Optional. When this setting is True, the Disconnect button won't be visible for connected profiles. @@ -1328,7 +1333,7 @@ Optional. When this setting is True, the Disconnect button will not be visible f | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | @@ -1338,7 +1343,7 @@ Optional. When this setting is True, the Disconnect button will not be visible f | Value | Description | |:--|:--| | false | Disconnect Button is visible. | -| true | Disconnect Button is not visible. | +| true | Disconnect Button isn't visible. | @@ -1353,7 +1358,7 @@ Optional. When this setting is True, the Disconnect button will not be visible f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1376,7 +1381,7 @@ Set to disable IKEv2 Fragmentation. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | false | @@ -1386,7 +1391,7 @@ Set to disable IKEv2 Fragmentation. | Value | Description | |:--|:--| -| true | IKEv2 Fragmentation will not be used. | +| true | IKEv2 Fragmentation won't be used. | | false (Default) | IKEv2 Fragmentation is used as normal. | @@ -1402,7 +1407,7 @@ Set to disable IKEv2 Fragmentation. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1425,7 +1430,7 @@ Specifies one or more comma separated DNS suffixes. The first in the list is als | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1441,7 +1446,7 @@ Specifies one or more comma separated DNS suffixes. The first in the list is als | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1466,7 +1471,7 @@ NRPT ([Name Resolution Policy Table](/previous-versions/windows/it-pro/windows-s | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1482,7 +1487,7 @@ NRPT ([Name Resolution Policy Table](/previous-versions/windows/it-pro/windows-s | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1505,7 +1510,7 @@ A sequential integer identifier for the Domain Name information. Sequencing must | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | UniqueName: A sequential integer identifier for the Domain Name information. Sequencing must start at 0. | @@ -1522,7 +1527,7 @@ A sequential integer identifier for the Domain Name information. Sequencing must | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1545,7 +1550,7 @@ Boolean to determine whether this domain name rule will trigger the VPN. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | false | @@ -1555,7 +1560,7 @@ Boolean to determine whether this domain name rule will trigger the VPN. | Value | Description | |:--|:--| -| false (Default) | This DomainName rule will not trigger the VPN. | +| false (Default) | This DomainName rule won't trigger the VPN. | | true | This DomainName rule will trigger the VPN. | @@ -1571,7 +1576,7 @@ Boolean to determine whether this domain name rule will trigger the VPN. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1594,7 +1599,7 @@ Comma Seperated list of IP addresses for the DNS Servers to use for the domain n | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1610,7 +1615,7 @@ Comma Seperated list of IP addresses for the DNS Servers to use for the domain n | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1633,7 +1638,7 @@ Used to indicate the namespace to which the policy applies. When a Name query is | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1649,7 +1654,7 @@ Used to indicate the namespace to which the policy applies. When a Name query is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1660,7 +1665,7 @@ Used to indicate the namespace to which the policy applies. When a Name query is -Returns the namespace type. This value can be one of the following: FQDN - If the DomainName was not prepended with a . and applies only to the fully qualified domain name (FQDN) of a specified host. Suffix - If the DomainName was prepended with a . and applies to the specified namespace, all records in that namespace, and all subdomains. +Returns the namespace type. This value can be one of the following: FQDN - If the DomainName wasn't prepended with a . and applies only to the fully qualified domain name (FQDN) of a specified host. Suffix - If the DomainName was prepended with a . and applies to the specified namespace, all records in that namespace, and all subdomains. @@ -1672,7 +1677,7 @@ Returns the namespace type. This value can be one of the following: FQDN - If th | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1688,7 +1693,7 @@ Returns the namespace type. This value can be one of the following: FQDN - If th | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1699,7 +1704,7 @@ Returns the namespace type. This value can be one of the following: FQDN - If th -A boolean value that specifies if the rule being added should persist even when the VPN is not connected. +A boolean value that specifies if the rule being added should persist even when the VPN isn't connected. @@ -1711,7 +1716,7 @@ A boolean value that specifies if the rule being added should persist even when | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | false | @@ -1737,7 +1742,7 @@ A boolean value that specifies if the rule being added should persist even when | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1760,7 +1765,7 @@ Web Proxy Server IP address if you are redirecting traffic through your intranet | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1776,7 +1781,7 @@ Web Proxy Server IP address if you are redirecting traffic through your intranet | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1799,7 +1804,7 @@ Enterprise ID, which is required for connecting this VPN profile with an WIP pol | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -1815,7 +1820,7 @@ Enterprise ID, which is required for connecting this VPN profile with an WIP pol | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1838,7 +1843,7 @@ The metric for the IPv4 interface. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[1-9999]` | @@ -1855,7 +1860,7 @@ The metric for the IPv4 interface. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -1878,7 +1883,7 @@ The metric for the IPv6 interface. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[1-9999]` | @@ -1895,7 +1900,7 @@ The metric for the IPv6 interface. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1918,7 +1923,7 @@ Nodes under NativeProfile are required when using a Windows Inbox VPN Protocol ( | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Get | @@ -1934,7 +1939,7 @@ Nodes under NativeProfile are required when using a Windows Inbox VPN Protocol ( | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1957,7 +1962,7 @@ Required node for native profile. It contains authentication information for the | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -1973,7 +1978,7 @@ Required node for native profile. It contains authentication information for the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1996,7 +2001,7 @@ Reserved for future use. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -2012,7 +2017,7 @@ Reserved for future use. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2035,7 +2040,7 @@ Reserved for future use. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2051,7 +2056,7 @@ Reserved for future use. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2074,7 +2079,7 @@ Reserved for future use. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2090,7 +2095,7 @@ Reserved for future use. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2113,7 +2118,7 @@ Required when the native profile specifies EAP authentication. EAP configuration | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -2129,7 +2134,7 @@ Required when the native profile specifies EAP authentication. EAP configuration | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2152,7 +2157,7 @@ HTML encoded XML of the EAP configuration. For more information,see [EAP configu | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2168,7 +2173,7 @@ HTML encoded XML of the EAP configuration. For more information,see [EAP configu | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2194,7 +2199,7 @@ Required node for EAP profiles. This specifies the EAP Type ID | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -2210,7 +2215,7 @@ Required node for EAP profiles. This specifies the EAP Type ID | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2233,7 +2238,7 @@ This is only supported in IKEv2. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2257,7 +2262,7 @@ This is only supported in IKEv2. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2280,7 +2285,7 @@ Type of user authentication. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2290,7 +2295,7 @@ Type of user authentication. | Value | Description | |:--|:--| | EAP | EAP. | -| MSChapv2 | MSChapv2: This is not supported for IKEv2. | +| MSChapv2 | MSChapv2: This isn't supported for IKEv2. | @@ -2305,7 +2310,7 @@ Type of user authentication. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -2328,7 +2333,7 @@ Properties of IPSec tunnels. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -2344,7 +2349,7 @@ Properties of IPSec tunnels. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -2367,7 +2372,7 @@ Type of authentication transform constant. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2396,7 +2401,7 @@ Type of authentication transform constant. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -2419,7 +2424,7 @@ Type of Cipher transform constant. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2450,7 +2455,7 @@ Type of Cipher transform constant. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -2473,7 +2478,7 @@ Group used for DH (Diffie-Hellman). | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2503,7 +2508,7 @@ Group used for DH (Diffie-Hellman). | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -2526,7 +2531,7 @@ Type of encryption method. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2556,7 +2561,7 @@ Type of encryption method. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -2579,7 +2584,7 @@ Type of integrity check. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2606,7 +2611,7 @@ Type of integrity check. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -2629,7 +2634,7 @@ Group used for PFS (Perfect Forward Secrecy). | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2660,7 +2665,7 @@ Group used for PFS (Perfect Forward Secrecy). | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -2683,7 +2688,7 @@ Specifies the class based default routes. For example, if the interface IP begin | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | @@ -2708,7 +2713,7 @@ Specifies the class based default routes. For example, if the interface IP begin | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -2731,7 +2736,7 @@ The preshared key used for an L2TP connection. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2747,7 +2752,7 @@ The preshared key used for an L2TP connection. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -2763,6 +2768,8 @@ Required for native profiles. Type of tunneling protocol used. +> [!NOTE] +> Using NativeProtocolType requires additional configuration of the NativeProfile/ProtocolList parameter. @@ -2770,7 +2777,7 @@ Required for native profiles. Type of tunneling protocol used. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -2799,7 +2806,7 @@ Required for native profiles. Type of tunneling protocol used. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -2810,7 +2817,7 @@ Required for native profiles. Type of tunneling protocol used. -True: Plumb traffic selectors as routes onto VPN interface, False: Do not plumb traffic selectors as routes. +True: Plumb traffic selectors as routes onto VPN interface, False: Don't plumb traffic selectors as routes. @@ -2822,7 +2829,7 @@ True: Plumb traffic selectors as routes onto VPN interface, False: Do not plumb | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | @@ -2838,7 +2845,7 @@ True: Plumb traffic selectors as routes onto VPN interface, False: Do not plumb | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20207] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20207] and later | @@ -2860,7 +2867,7 @@ True: Plumb traffic selectors as routes onto VPN interface, False: Do not plumb | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -2876,7 +2883,7 @@ True: Plumb traffic selectors as routes onto VPN interface, False: Do not plumb | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20207] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20207] and later | @@ -2892,6 +2899,8 @@ List of inbox VPN protocols in priority order. +> [!NOTE] +> Up to 4 VPN protocols are supported. A separate entry is needed for every VPN protocol. For a sample format, see [Examples](#examples). @@ -2899,7 +2908,7 @@ List of inbox VPN protocols in priority order. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -2915,7 +2924,7 @@ List of inbox VPN protocols in priority order. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20207] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20207] and later | @@ -2930,6 +2939,8 @@ List of inbox VPN protocols in priority order. +> [!NOTE] +> A separate entry is needed for every VPN protocol. For a sample format, see [Examples](#examples). @@ -2937,7 +2948,7 @@ List of inbox VPN protocols in priority order. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | @@ -2953,7 +2964,7 @@ List of inbox VPN protocols in priority order. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20207] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20207] and later | @@ -2969,6 +2980,8 @@ Inbox VPN protocols type. +> [!NOTE] +> A separate entry is needed for every VPN protocol. For a sample format, see [Examples](#examples). @@ -2976,7 +2989,7 @@ Inbox VPN protocols type. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -3003,7 +3016,7 @@ Inbox VPN protocols type. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20207] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20207] and later | @@ -3019,6 +3032,7 @@ Default 168, max 500000. +RetryTimeInHours specifies the length of time Windows tries to use the last succesful protocol when making a new connection. Setting this value to 0 disables remembering the last successful protocol. @@ -3026,7 +3040,7 @@ Default 168, max 500000. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -3042,7 +3056,7 @@ Default 168, max 500000. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3065,7 +3079,7 @@ Type of routing policy. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -3090,7 +3104,7 @@ Type of routing policy. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3101,7 +3115,7 @@ Type of routing policy. -Required for native profiles. Public or routable IP address or DNS name for the VPN gateway. It can point to the external IP of a gateway or a virtual IP for a server farm. Examples, 208.147.66.130 or vpn.contoso.com. The name can be a server name plus a friendly name separated with a semi-colon. For example, server2.example.com;server2FriendlyName. When you get the value, the return will include both the server name and the friendly name; if no friendly name had been supplied it will default to the server name. You can make a list of server by making a list of server names (with optional friendly names) seperated by commas. For example, server1.example.com,server2.example.com. +Required for native profiles. Public or routable IP address or DNS name for the VPN gateway. It can point to the external IP of a gateway or a virtual IP for a server farm. Examples, 208.147.66.130 or vpn.contoso.com The name can be a server name plus a friendly name separated with a semi-colon. For example, server2.example.com;server2FriendlyName. When you get the value, the return will include both the server name and the friendly name; if no friendly name had been supplied it will default to the server name. You can make a list of server by making a list of server names (with optional friendly names) seperated by commas. For example, server1.example.com,server2.example.com. @@ -3113,7 +3127,7 @@ Required for native profiles. Public or routable IP address or DNS name for the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -3129,7 +3143,7 @@ Required for native profiles. Public or routable IP address or DNS name for the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3152,7 +3166,7 @@ The amount of time in seconds the network is allowed to idle. 0 means no limit. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-4294967295]` | @@ -3169,7 +3183,7 @@ The amount of time in seconds the network is allowed to idle. 0 means no limit. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3192,7 +3206,7 @@ Nodes under the PluginProfile are required when using a Microsoft Store based VP | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Get | @@ -3208,7 +3222,7 @@ Nodes under the PluginProfile are required when using a Microsoft Store based VP | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3219,7 +3233,7 @@ Nodes under the PluginProfile are required when using a Microsoft Store based VP -Optional. This is an HTML encoded XML blob for SSL-VPN plug-in specific configuration including authentication information that is deployed to the device to make it available for SSL-VPN plug-ins. Contact the plugin provider for format and other details. Most plugins can also configure values based on the server negotiations as well as defaults. +Optional. This is an HTML encoded XML blob for SSL-VPN plug-in specific configuration including authentication information that's deployed to the device to make it available for SSL-VPN plug-ins. Contact the plugin provider for format and other details. Most plugins can also configure values based on the server negotiations as well as defaults. @@ -3231,7 +3245,7 @@ Optional. This is an HTML encoded XML blob for SSL-VPN plug-in specific configur | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -3247,7 +3261,7 @@ Optional. This is an HTML encoded XML blob for SSL-VPN plug-in specific configur | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3270,7 +3284,7 @@ Required for Plugin Profiles. This node specifies the Package Family Name of the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -3286,7 +3300,7 @@ Required for Plugin Profiles. This node specifies the Package Family Name of the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3309,7 +3323,7 @@ Required for plug-in profiles. Semicolon-separated list of servers in URL, hostn | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -3325,7 +3339,7 @@ Required for plug-in profiles. Semicolon-separated list of servers in URL, hostn | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -3348,7 +3362,7 @@ Determines whether the VPN connection is public or private. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | true | @@ -3374,7 +3388,7 @@ Determines whether the VPN connection is public or private. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -3397,7 +3411,7 @@ The XML schema for provisioning all the fields of a VPN. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | See [ProfileXML XSD Schema](#profilexml-xsd-schema) | @@ -3414,7 +3428,7 @@ The XML schema for provisioning all the fields of a VPN. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3437,7 +3451,7 @@ A collection of configuration objects to enable a post-connect proxy support for | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -3453,7 +3467,7 @@ A collection of configuration objects to enable a post-connect proxy support for | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3476,7 +3490,7 @@ Optional. Set a URL to automatically retrieve the proxy settings. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -3492,7 +3506,7 @@ Optional. Set a URL to automatically retrieve the proxy settings. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3515,7 +3529,7 @@ Optional node containing the manual server settings. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -3531,7 +3545,7 @@ Optional node containing the manual server settings. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3554,7 +3568,7 @@ Optional. The value is the proxy server address as a fully qualified hostname or | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -3570,7 +3584,7 @@ Optional. The value is the proxy server address as a fully qualified hostname or | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -3593,7 +3607,7 @@ Allows registration of the connection's address in DNS. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | false | @@ -3603,7 +3617,7 @@ Allows registration of the connection's address in DNS. | Value | Description | |:--|:--| -| false (Default) | Do not register the connection's address in DNS. | +| false (Default) | Don't register the connection's address in DNS. | | true | Register the connection's addresses in DNS. | @@ -3619,7 +3633,7 @@ Allows registration of the connection's address in DNS. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3642,7 +3656,7 @@ Boolean value (true or false) for caching credentials. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | false | @@ -3652,7 +3666,7 @@ Boolean value (true or false) for caching credentials. | Value | Description | |:--|:--| -| false (Default) | Do not cache credentials. | +| false (Default) | Don't cache credentials. | | true | Credentials are cached whenever possible. | @@ -3668,7 +3682,7 @@ Boolean value (true or false) for caching credentials. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3691,7 +3705,7 @@ List of routes to be added to the Routing table for the VPN Interface. Required | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -3707,7 +3721,7 @@ List of routes to be added to the Routing table for the VPN Interface. Required | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3730,7 +3744,7 @@ A sequential integer identifier for the RouteList. This is required if you are a | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | UniqueName: A sequential integer identifier for the RouteList. This is required if you are adding routes. Sequencing must start at 0. | @@ -3747,7 +3761,7 @@ A sequential integer identifier for the RouteList. This is required if you are a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3770,7 +3784,7 @@ Subnet address in IPv4/v6 address format which, along with the prefix will be us | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -3786,7 +3800,7 @@ Subnet address in IPv4/v6 address format which, along with the prefix will be us | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -3809,7 +3823,7 @@ A boolean value that specifies if the route being added should point to the VPN | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | false | @@ -3835,7 +3849,7 @@ A boolean value that specifies if the route being added should point to the VPN | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -3858,7 +3872,7 @@ The route's metric. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -3874,7 +3888,7 @@ The route's metric. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3897,7 +3911,7 @@ The subnet prefix size part of the destination prefix for the route entry. This, | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-4294967295]` | @@ -3914,7 +3928,7 @@ The subnet prefix size part of the destination prefix for the route entry. This, | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3939,7 +3953,7 @@ A list of rules allowing traffic over the VPN Interface. Each Rule ID is OR'ed. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -3955,7 +3969,7 @@ A list of rules allowing traffic over the VPN Interface. Each Rule ID is OR'ed. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -3978,7 +3992,7 @@ A sequential integer identifier for the Traffic Filter rules. Sequencing must st | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | UniqueName: A sequential integer identifier for the Traffic Filter rules. Sequencing must start at 0. | @@ -3995,7 +4009,7 @@ A sequential integer identifier for the Traffic Filter rules. Sequencing must st | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -4018,7 +4032,7 @@ Per App VPN Rule. This will Allow only the Apps specified to be allowed over VPN | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -4034,7 +4048,7 @@ Per App VPN Rule. This will Allow only the Apps specified to be allowed over VPN | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -4057,7 +4071,7 @@ App identity for the app-based traffic filter. The value for this node can be on | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -4073,7 +4087,7 @@ App identity for the app-based traffic filter. The value for this node can be on | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -4096,7 +4110,7 @@ Returns the type of ID of the App/Id. Either PackageFamilyName, FilePath, or Sys | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -4112,7 +4126,7 @@ Returns the type of ID of the App/Id. Either PackageFamilyName, FilePath, or Sys | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -4135,7 +4149,7 @@ Specifies a rule in Security Descriptor Definition Language (SDDL) format to che | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -4151,7 +4165,7 @@ Specifies a rule in Security Descriptor Definition Language (SDDL) format to che | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -4163,6 +4177,7 @@ Specifies a rule in Security Descriptor Definition Language (SDDL) format to che Outbound - The traffic filter allows traffic to reach destinations matching this rule. This is the default. + Inbound - The traffic filter allows traffic coming from external locations matching this rule. @@ -4175,7 +4190,7 @@ Inbound - The traffic filter allows traffic coming from external locations match | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -4191,7 +4206,7 @@ Inbound - The traffic filter allows traffic coming from external locations match | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -4214,7 +4229,7 @@ A list of comma separated values specifying local IP address ranges to allow. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -4230,7 +4245,7 @@ A list of comma separated values specifying local IP address ranges to allow. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -4253,7 +4268,7 @@ Comma Separated list of ranges for eg. 100-120,200,300-320. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Regular Expression: `^[\d]*$` | | Dependency [ProtocolDependency] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/VPNv2/[ProfileName]/TrafficFilterList/[trafficFilterId]/Protocol`
    Dependency Allowed Value: `[6,17]`
    Dependency Allowed Value Type: `Range`
    | @@ -4271,7 +4286,7 @@ Comma Separated list of ranges for eg. 100-120,200,300-320. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -4294,7 +4309,7 @@ Comma Separated list of ranges for eg. 100-120,200,300-320. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-255]` | @@ -4311,7 +4326,7 @@ Comma Separated list of ranges for eg. 100-120,200,300-320. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -4334,7 +4349,7 @@ A list of comma separated values specifying remote IP address ranges to allow. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -4350,7 +4365,7 @@ A list of comma separated values specifying remote IP address ranges to allow. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -4373,7 +4388,7 @@ A list of comma separated values specifying remote port ranges to allow. For exa | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Regular Expression: `^[\d]*$` | | Dependency [ProtocolDependency] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/VPNv2/[ProfileName]/TrafficFilterList/[trafficFilterId]/Protocol`
    Dependency Allowed Value: `[6,17]`
    Dependency Allowed Value Type: `Range`
    | @@ -4391,7 +4406,7 @@ A list of comma separated values specifying remote port ranges to allow. For exa | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -4414,7 +4429,7 @@ Specifies the routing policy if an App or Claims type is used in the traffic fil | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -4439,7 +4454,7 @@ Specifies the routing policy if an App or Claims type is used in the traffic fil | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -4450,7 +4465,7 @@ Specifies the routing policy if an App or Claims type is used in the traffic fil -Comma separated string to identify the trusted network. VPN will not connect automatically when the user is on their corporate wireless network where protected resources are directly accessible to the device. +Comma separated string to identify the trusted network. VPN won't connect automatically when the user is on their corporate wireless network where protected resources are directly accessible to the device. @@ -4462,7 +4477,7 @@ Comma separated string to identify the trusted network. VPN will not connect aut | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | `,` | @@ -4479,7 +4494,7 @@ Comma separated string to identify the trusted network. VPN will not connect aut | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -4502,7 +4517,7 @@ Determines whether the credential manager will save ras credentials after a conn | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | true | @@ -4512,7 +4527,7 @@ Determines whether the credential manager will save ras credentials after a conn | Value | Description | |:--|:--| -| false | Ras Credentials are not saved. | +| false | Ras Credentials aren't saved. | | true (Default) | Ras Credentials are saved. | @@ -4528,7 +4543,7 @@ Determines whether the credential manager will save ras credentials after a conn | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -4539,7 +4554,7 @@ Determines whether the credential manager will save ras credentials after a conn -Unique alpha numeric identifier for the profile. The profile name must not include a forward slash (/). If the profile name has a space or other non-alphanumeric character, it must be properly escaped according to the URL encoding standard. +Unique alpha numeric identifier for the profile. The profile name mustn't include a forward slash (/). If the profile name has a space or other non-alphanumeric character, it must be properly escaped according to the URL encoding standard. @@ -4551,7 +4566,7 @@ Unique alpha numeric identifier for the profile. The profile name must not inclu | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | | Atomic Required | True | | Dynamic Node Naming | ServerGeneratedUniqueIdentifier | @@ -4570,7 +4585,7 @@ Unique alpha numeric identifier for the profile. The profile name must not inclu | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -4593,7 +4608,7 @@ An optional flag to enable Always On mode. This will automatically connect the V | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | false | @@ -4619,7 +4634,7 @@ An optional flag to enable Always On mode. This will automatically connect the V | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -4642,7 +4657,7 @@ An optional flag to activate Always On mode. This is true by default if AlwaysOn | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -4668,7 +4683,7 @@ An optional flag to activate Always On mode. This is true by default if AlwaysOn | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -4691,7 +4706,7 @@ Reserved for future use. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -4707,7 +4722,7 @@ Reserved for future use. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -4730,7 +4745,7 @@ Reserved for future use. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -4746,7 +4761,7 @@ Reserved for future use. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -4769,7 +4784,7 @@ Reserved for future use. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -4785,7 +4800,7 @@ Reserved for future use. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -4808,7 +4823,7 @@ Reserved for future use. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | @@ -4824,7 +4839,7 @@ Reserved for future use. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -4847,7 +4862,7 @@ Reserved for future use. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -4863,7 +4878,7 @@ Reserved for future use. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -4886,7 +4901,7 @@ Reserved for future use. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -4902,7 +4917,7 @@ Reserved for future use. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -4925,7 +4940,7 @@ Reserved for future use. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -4941,7 +4956,7 @@ Reserved for future use. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -4964,7 +4979,7 @@ List of applications set to trigger the VPN. If any of these apps are launched a | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -4980,7 +4995,7 @@ List of applications set to trigger the VPN. If any of these apps are launched a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -4991,7 +5006,7 @@ List of applications set to trigger the VPN. If any of these apps are launched a -A sequential integer identifier which allows the ability to specify multiple apps for App Trigger. Sequencing must start at 0 and you should not skip numbers. +A sequential integer identifier which allows the ability to specify multiple apps for App Trigger. Sequencing must start at 0 and you shouldn't skip numbers. @@ -5003,7 +5018,7 @@ A sequential integer identifier which allows the ability to specify multiple app | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | UniqueName: A sequential integer identifier which allows the ability to specify multiple apps for App Trigger. Sequencing must start at 0 and you should not skip numbers. | @@ -5020,7 +5035,7 @@ A sequential integer identifier which allows the ability to specify multiple app | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5043,7 +5058,7 @@ App Node under the Row Id. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -5059,7 +5074,7 @@ App Node under the Row Id. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5082,7 +5097,7 @@ App Identity. Specified, based on the Type Field. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -5098,7 +5113,7 @@ App Identity. Specified, based on the Type Field. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5121,7 +5136,7 @@ Returns the type of App/Id. This value can be either of the following: PackageFa | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -5137,7 +5152,7 @@ Returns the type of App/Id. This value can be either of the following: PackageFa | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5148,8 +5163,9 @@ Returns the type of App/Id. This value can be either of the following: PackageFa -False : Do not Bypass for Local traffic -True : ByPass VPN Interface for Local Traffic +False: Don't Bypass for Local traffic. + +True: ByPass VPN Interface for Local Traffic. Optional. When this setting is True, requests to local resources that are available on the same Wi-Fi network as the VPN client can bypass the VPN. For example, if enterprise policy for VPN requires force tunnel for VPN, but enterprise intends to allow the remote user to connect locally to media center in their home, then this option should be set to True. The user can bypass VPN for local subnet traffic. When this is set to False, the setting is disabled and no subnet exceptions are allowed. @@ -5163,7 +5179,7 @@ Optional. When this setting is True, requests to local resources that are availa | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | @@ -5179,7 +5195,7 @@ Optional. When this setting is True, requests to local resources that are availa | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5202,7 +5218,7 @@ Determines the level of data encryption required for the connection. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Default Value | Require | @@ -5230,7 +5246,7 @@ Determines the level of data encryption required for the connection. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -5253,7 +5269,7 @@ Nodes under DeviceCompliance can be used to enable AAD based Conditional Access | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Get | @@ -5269,7 +5285,7 @@ Nodes under DeviceCompliance can be used to enable AAD based Conditional Access | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -5292,7 +5308,7 @@ Enables the Device Compliance flow from the client. If marked as True, the VPN C | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | @@ -5317,7 +5333,7 @@ Enables the Device Compliance flow from the client. If marked as True, the VPN C | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -5340,7 +5356,7 @@ Nodes under SSO can be used to choose a certificate different from the VPN Authe | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Get | @@ -5356,7 +5372,7 @@ Nodes under SSO can be used to choose a certificate different from the VPN Authe | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -5379,7 +5395,7 @@ Comma Separated list of EKU's for the VPN Client to look for the correct certifi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -5395,7 +5411,7 @@ Comma Separated list of EKU's for the VPN Client to look for the correct certifi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -5418,7 +5434,7 @@ If this field is set to True the VPN Client will look for a separate certificate | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | @@ -5443,7 +5459,7 @@ If this field is set to True the VPN Client will look for a separate certificate | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -5466,7 +5482,7 @@ Comma Separated list of Issuer Hashes for the VPN Client to look for the correct | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -5482,7 +5498,7 @@ Comma Separated list of Issuer Hashes for the VPN Client to look for the correct | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5505,7 +5521,7 @@ Optional. When this setting is True, the Advanced Options page will have its edi | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | @@ -5530,7 +5546,7 @@ Optional. When this setting is True, the Advanced Options page will have its edi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5541,7 +5557,7 @@ Optional. When this setting is True, the Advanced Options page will have its edi -Optional. When this setting is True, the Disconnect button will not be visible for connected profiles. +Optional. When this setting is True, the Disconnect button won't be visible for connected profiles. @@ -5553,7 +5569,7 @@ Optional. When this setting is True, the Disconnect button will not be visible f | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | @@ -5563,7 +5579,7 @@ Optional. When this setting is True, the Disconnect button will not be visible f | Value | Description | |:--|:--| | false | Disconnect Button is visible. | -| true | Disconnect Button is not visible. | +| true | Disconnect Button isn't visible. | @@ -5578,7 +5594,7 @@ Optional. When this setting is True, the Disconnect button will not be visible f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -5601,7 +5617,7 @@ Set to disable IKEv2 Fragmentation. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | false | @@ -5611,7 +5627,7 @@ Set to disable IKEv2 Fragmentation. | Value | Description | |:--|:--| -| true | IKEv2 Fragmentation will not be used. | +| true | IKEv2 Fragmentation won't be used. | | false (Default) | IKEv2 Fragmentation is used as normal. | @@ -5627,7 +5643,7 @@ Set to disable IKEv2 Fragmentation. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5650,7 +5666,7 @@ Specifies one or more comma separated DNS suffixes. The first in the list is als | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -5666,7 +5682,7 @@ Specifies one or more comma separated DNS suffixes. The first in the list is als | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5691,7 +5707,7 @@ NRPT ([Name Resolution Policy Table](/previous-versions/windows/it-pro/windows-s | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -5707,7 +5723,7 @@ NRPT ([Name Resolution Policy Table](/previous-versions/windows/it-pro/windows-s | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5730,7 +5746,7 @@ A sequential integer identifier for the Domain Name information. Sequencing must | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | UniqueName: A sequential integer identifier for the Domain Name information. Sequencing must start at 0. | @@ -5747,7 +5763,7 @@ A sequential integer identifier for the Domain Name information. Sequencing must | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -5770,7 +5786,7 @@ Boolean to determine whether this domain name rule will trigger the VPN. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | false | @@ -5780,7 +5796,7 @@ Boolean to determine whether this domain name rule will trigger the VPN. | Value | Description | |:--|:--| -| false (Default) | This DomainName rule will not trigger the VPN. | +| false (Default) | This DomainName rule won't trigger the VPN. | | true | This DomainName rule will trigger the VPN. | @@ -5796,7 +5812,7 @@ Boolean to determine whether this domain name rule will trigger the VPN. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5819,7 +5835,7 @@ Comma Seperated list of IP addresses for the DNS Servers to use for the domain n | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -5835,7 +5851,7 @@ Comma Seperated list of IP addresses for the DNS Servers to use for the domain n | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5858,7 +5874,7 @@ Used to indicate the namespace to which the policy applies. When a Name query is | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -5874,7 +5890,7 @@ Used to indicate the namespace to which the policy applies. When a Name query is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5885,7 +5901,7 @@ Used to indicate the namespace to which the policy applies. When a Name query is -Returns the namespace type. This value can be one of the following: FQDN - If the DomainName was not prepended with a . and applies only to the fully qualified domain name (FQDN) of a specified host. Suffix - If the DomainName was prepended with a . and applies to the specified namespace, all records in that namespace, and all subdomains. +Returns the namespace type. This value can be one of the following: FQDN - If the DomainName wasn't prepended with a . and applies only to the fully qualified domain name (FQDN) of a specified host. Suffix - If the DomainName was prepended with a . and applies to the specified namespace, all records in that namespace, and all subdomains. @@ -5897,7 +5913,7 @@ Returns the namespace type. This value can be one of the following: FQDN - If th | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -5913,7 +5929,7 @@ Returns the namespace type. This value can be one of the following: FQDN - If th | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -5924,7 +5940,7 @@ Returns the namespace type. This value can be one of the following: FQDN - If th -A boolean value that specifies if the rule being added should persist even when the VPN is not connected. +A boolean value that specifies if the rule being added should persist even when the VPN isn't connected. @@ -5936,7 +5952,7 @@ A boolean value that specifies if the rule being added should persist even when | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | false | @@ -5962,7 +5978,7 @@ A boolean value that specifies if the rule being added should persist even when | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -5985,7 +6001,7 @@ Web Proxy Server IP address if you are redirecting traffic through your intranet | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -6001,7 +6017,7 @@ Web Proxy Server IP address if you are redirecting traffic through your intranet | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6024,7 +6040,7 @@ Enterprise ID, which is required for connecting this VPN profile with an WIP pol | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -6040,7 +6056,7 @@ Enterprise ID, which is required for connecting this VPN profile with an WIP pol | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -6063,7 +6079,7 @@ The metric for the IPv4 interface. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[1-9999]` | @@ -6080,7 +6096,7 @@ The metric for the IPv4 interface. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -6103,7 +6119,7 @@ The metric for the IPv6 interface. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[1-9999]` | @@ -6120,7 +6136,7 @@ The metric for the IPv6 interface. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6143,7 +6159,7 @@ InboxNodes under NativeProfile are required when using a Windows Inbox VPN Proto | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Get | @@ -6159,7 +6175,7 @@ InboxNodes under NativeProfile are required when using a Windows Inbox VPN Proto | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6182,7 +6198,7 @@ Required node for native profile. It contains authentication information for the | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -6198,7 +6214,7 @@ Required node for native profile. It contains authentication information for the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6221,7 +6237,7 @@ Reserved for future use. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -6237,7 +6253,7 @@ Reserved for future use. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6260,7 +6276,7 @@ Reserved for future use. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -6276,7 +6292,7 @@ Reserved for future use. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6299,7 +6315,7 @@ Reserved for future use. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -6315,7 +6331,7 @@ Reserved for future use. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6338,7 +6354,7 @@ Required when the native profile specifies EAP authentication. EAP configuration | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -6354,7 +6370,7 @@ Required when the native profile specifies EAP authentication. EAP configuration | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6377,7 +6393,7 @@ HTML encoded XML of the EAP configuration. For more information,see [EAP configu | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -6393,7 +6409,7 @@ HTML encoded XML of the EAP configuration. For more information,see [EAP configu | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6419,7 +6435,7 @@ Required node for EAP profiles. This specifies the EAP Type ID | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -6435,7 +6451,7 @@ Required node for EAP profiles. This specifies the EAP Type ID | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6458,7 +6474,7 @@ This is only supported in IKEv2. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -6482,7 +6498,7 @@ This is only supported in IKEv2. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6493,7 +6509,7 @@ This is only supported in IKEv2. -This value can be one of the following: EAP or MSChapv2 (This is not supported for IKEv2). +This value can be one of the following: EAP or MSChapv2 (This isn't supported for IKEv2). @@ -6505,7 +6521,7 @@ This value can be one of the following: EAP or MSChapv2 (This is not supported f | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -6515,7 +6531,7 @@ This value can be one of the following: EAP or MSChapv2 (This is not supported f | Value | Description | |:--|:--| | EAP | EAP. | -| MSChapv2 | MSChapv2: This is not supported for IKEv2. | +| MSChapv2 | MSChapv2: This isn't supported for IKEv2. | @@ -6530,7 +6546,7 @@ This value can be one of the following: EAP or MSChapv2 (This is not supported f | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -6553,7 +6569,7 @@ Properties of IPSec tunnels. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -6569,7 +6585,7 @@ Properties of IPSec tunnels. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -6592,7 +6608,7 @@ Type of authentication transform constant. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -6621,7 +6637,7 @@ Type of authentication transform constant. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -6644,7 +6660,7 @@ Type of Cipher transform constant. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -6675,7 +6691,7 @@ Type of Cipher transform constant. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -6698,7 +6714,7 @@ Group used for DH (Diffie-Hellman). | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -6728,7 +6744,7 @@ Group used for DH (Diffie-Hellman). | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -6751,7 +6767,7 @@ Type of encryption method. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -6781,7 +6797,7 @@ Type of encryption method. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -6804,7 +6820,7 @@ Type of integrity check. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -6831,7 +6847,7 @@ Type of integrity check. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -6854,7 +6870,7 @@ Group used for PFS (Perfect Forward Secrecy). | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -6885,7 +6901,7 @@ Group used for PFS (Perfect Forward Secrecy). | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -6908,7 +6924,7 @@ Specifies the class based default routes. For example, if the interface IP begin | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | @@ -6933,7 +6949,7 @@ Specifies the class based default routes. For example, if the interface IP begin | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -6956,7 +6972,7 @@ The preshared key used for an L2TP connection. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -6972,7 +6988,7 @@ The preshared key used for an L2TP connection. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -6988,6 +7004,8 @@ Required for native profiles. Type of tunneling protocol used. +> [!NOTE] +> Using NativeProtocolType requires additional configuration of the NativeProfile/ProtocolList parameter. @@ -6995,7 +7013,7 @@ Required for native profiles. Type of tunneling protocol used. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -7024,7 +7042,7 @@ Required for native profiles. Type of tunneling protocol used. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -7035,7 +7053,7 @@ Required for native profiles. Type of tunneling protocol used. -True: Plumb traffic selectors as routes onto VPN interface, False: Do not plumb traffic selectors as routes. +True: Plumb traffic selectors as routes onto VPN interface, False: Don't plumb traffic selectors as routes. @@ -7047,7 +7065,7 @@ True: Plumb traffic selectors as routes onto VPN interface, False: Do not plumb | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | @@ -7063,7 +7081,7 @@ True: Plumb traffic selectors as routes onto VPN interface, False: Do not plumb | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20207] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20207] and later | @@ -7085,7 +7103,7 @@ True: Plumb traffic selectors as routes onto VPN interface, False: Do not plumb | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -7101,7 +7119,7 @@ True: Plumb traffic selectors as routes onto VPN interface, False: Do not plumb | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20207] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20207] and later | @@ -7117,6 +7135,8 @@ List of inbox VPN protocols in priority order. +> [!NOTE] +> Up to 4 VPN protocols are supported. A separate entry is needed for every VPN protocol. For a sample format, see [Examples](#examples). @@ -7124,7 +7144,7 @@ List of inbox VPN protocols in priority order. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -7140,7 +7160,7 @@ List of inbox VPN protocols in priority order. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20207] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20207] and later | @@ -7155,6 +7175,8 @@ List of inbox VPN protocols in priority order. +> [!NOTE] +> A separate entry is needed for every VPN protocol. For a sample format, see [Examples](#examples). @@ -7162,7 +7184,7 @@ List of inbox VPN protocols in priority order. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | @@ -7178,7 +7200,7 @@ List of inbox VPN protocols in priority order. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20207] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20207] and later | @@ -7194,6 +7216,8 @@ Inbox VPN protocols type. +> [!NOTE] +> A separate entry is needed for every VPN protocol. For a sample format, see [Examples](#examples). @@ -7201,7 +7225,7 @@ Inbox VPN protocols type. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -7228,7 +7252,7 @@ Inbox VPN protocols type. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.20207] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.20207] and later | @@ -7244,6 +7268,7 @@ Default 168, max 500000. +RetryTimeInHours specifies the length of time Windows tries to use the last succesful protocol when making a new connection. Setting this value to 0 disables remembering the last successful protocol. @@ -7251,7 +7276,7 @@ Default 168, max 500000. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -7267,7 +7292,7 @@ Default 168, max 500000. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7290,7 +7315,7 @@ Type of routing policy. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -7315,7 +7340,7 @@ Type of routing policy. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7326,7 +7351,7 @@ Type of routing policy. -Required for native profiles. Public or routable IP address or DNS name for the VPN gateway. It can point to the external IP of a gateway or a virtual IP for a server farm. Examples, 208.147.66.130 or vpn.contoso.com. The name can be a server name plus a friendly name separated with a semi-colon. For example, server2.example.com;server2FriendlyName. When you get the value, the return will include both the server name and the friendly name; if no friendly name had been supplied it will default to the server name. You can make a list of server by making a list of server names (with optional friendly names) seperated by commas. For example, server1.example.com,server2.example.com. +Required for native profiles. Public or routable IP address or DNS name for the VPN gateway. It can point to the external IP of a gateway or a virtual IP for a server farm. Examples, 208.147.66.130 or vpn.contoso.com The name can be a server name plus a friendly name separated with a semi-colon. For example, server2.example.com;server2FriendlyName. When you get the value, the return will include both the server name and the friendly name; if no friendly name had been supplied it will default to the server name. You can make a list of server by making a list of server names (with optional friendly names) seperated by commas. For example, server1.example.com,server2.example.com. @@ -7338,7 +7363,7 @@ Required for native profiles. Public or routable IP address or DNS name for the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -7354,7 +7379,7 @@ Required for native profiles. Public or routable IP address or DNS name for the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -7377,7 +7402,7 @@ The amount of time in seconds the network is allowed to idle. 0 means no limit. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-4294967295]` | @@ -7394,7 +7419,7 @@ The amount of time in seconds the network is allowed to idle. 0 means no limit. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7417,7 +7442,7 @@ Nodes under the PluginProfile are required when using a Microsoft Store based VP | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Get | @@ -7433,7 +7458,7 @@ Nodes under the PluginProfile are required when using a Microsoft Store based VP | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7444,7 +7469,7 @@ Nodes under the PluginProfile are required when using a Microsoft Store based VP -Optional. This is an HTML encoded XML blob for SSL-VPN plug-in specific configuration including authentication information that is deployed to the device to make it available for SSL-VPN plug-ins. Contact the plugin provider for format and other details. Most plugins can also configure values based on the server negotiations as well as defaults. +Optional. This is an HTML encoded XML blob for SSL-VPN plug-in specific configuration including authentication information that's deployed to the device to make it available for SSL-VPN plug-ins. Contact the plugin provider for format and other details. Most plugins can also configure values based on the server negotiations as well as defaults. @@ -7456,7 +7481,7 @@ Optional. This is an HTML encoded XML blob for SSL-VPN plug-in specific configur | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -7472,7 +7497,7 @@ Optional. This is an HTML encoded XML blob for SSL-VPN plug-in specific configur | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7495,7 +7520,7 @@ Required for Plugin Profiles. This node specifies the Package Family Name of the | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -7511,7 +7536,7 @@ Required for Plugin Profiles. This node specifies the Package Family Name of the | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7534,7 +7559,7 @@ Required for plug-in profiles. Semicolon-separated list of servers in URL, hostn | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -7550,7 +7575,7 @@ Required for plug-in profiles. Semicolon-separated list of servers in URL, hostn | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -7573,7 +7598,7 @@ Determines whether the VPN connection is public or private. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | true | @@ -7599,7 +7624,7 @@ Determines whether the VPN connection is public or private. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -7622,7 +7647,7 @@ The XML schema for provisioning all the fields of a VPN. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | See [ProfileXML XSD Schema](#profilexml-xsd-schema) | @@ -7639,7 +7664,7 @@ The XML schema for provisioning all the fields of a VPN. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7662,7 +7687,7 @@ A collection of configuration objects to enable a post-connect proxy support for | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -7678,7 +7703,7 @@ A collection of configuration objects to enable a post-connect proxy support for | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7701,7 +7726,7 @@ Optional. Set a URL to automatically retrieve the proxy settings. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -7717,7 +7742,7 @@ Optional. Set a URL to automatically retrieve the proxy settings. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7740,7 +7765,7 @@ Optional node containing the manual server settings. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -7756,7 +7781,7 @@ Optional node containing the manual server settings. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7779,7 +7804,7 @@ Optional. The value is the proxy server address as a fully qualified hostname or | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -7795,7 +7820,7 @@ Optional. The value is the proxy server address as a fully qualified hostname or | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -7818,7 +7843,7 @@ Allows registration of the connection's address in DNS. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | false | @@ -7828,7 +7853,7 @@ Allows registration of the connection's address in DNS. | Value | Description | |:--|:--| -| false (Default) | Do not register the connection's address in DNS. | +| false (Default) | Don't register the connection's address in DNS. | | true | Register the connection's addresses in DNS. | @@ -7844,7 +7869,7 @@ Allows registration of the connection's address in DNS. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7867,7 +7892,7 @@ Boolean value (true or false) for caching credentials. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | false | @@ -7877,7 +7902,7 @@ Boolean value (true or false) for caching credentials. | Value | Description | |:--|:--| -| false (Default) | Do not cache credentials. | +| false (Default) | Don't cache credentials. | | true | Credentials are cached whenever possible. | @@ -7893,7 +7918,7 @@ Boolean value (true or false) for caching credentials. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :x: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: [10.0.19628] and later | +| ❌ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ [10.0.19628] and later | @@ -7906,8 +7931,9 @@ Boolean value (true or false) for caching credentials. Applicable only to AppContainer profiles. -False : Do not show profile in Settings UI. -True : Show profile in Settings UI. +False: Don't show profile in Settings UI. + +True: Show profile in Settings UI. Optional. This node is only relevant for AppContainer profiles (i.e. using the VpnManagementAgent::AddProfileFromXmlAsync method). @@ -7921,7 +7947,7 @@ Optional. This node is only relevant for AppContainer profiles (i.e. using the V | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | @@ -7937,7 +7963,7 @@ Optional. This node is only relevant for AppContainer profiles (i.e. using the V | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7960,7 +7986,7 @@ List of routes to be added to the Routing table for the VPN Interface. Required | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -7976,7 +8002,7 @@ List of routes to be added to the Routing table for the VPN Interface. Required | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -7999,7 +8025,7 @@ A sequential integer identifier for the RouteList. This is required if you are a | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | UniqueName: A sequential integer identifier for the RouteList. This is required if you are adding routes. Sequencing must start at 0. | @@ -8016,7 +8042,7 @@ A sequential integer identifier for the RouteList. This is required if you are a | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8039,7 +8065,7 @@ Subnet address in IPv4/v6 address format which, along with the prefix will be us | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -8055,7 +8081,7 @@ Subnet address in IPv4/v6 address format which, along with the prefix will be us | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -8078,7 +8104,7 @@ A boolean value that specifies if the route being added should point to the VPN | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | false | @@ -8104,7 +8130,7 @@ A boolean value that specifies if the route being added should point to the VPN | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -8127,7 +8153,7 @@ The route's metric. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -8143,7 +8169,7 @@ The route's metric. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8166,7 +8192,7 @@ The subnet prefix size part of the destination prefix for the route entry. This, | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-4294967295]` | @@ -8183,7 +8209,7 @@ The subnet prefix size part of the destination prefix for the route entry. This, | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8208,7 +8234,7 @@ A list of rules allowing traffic over the VPN Interface. Each Rule ID is OR'ed. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -8224,7 +8250,7 @@ A list of rules allowing traffic over the VPN Interface. Each Rule ID is OR'ed. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8247,7 +8273,7 @@ A sequential integer identifier for the Traffic Filter rules. Sequencing must st | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get | | Dynamic Node Naming | UniqueName: A sequential integer identifier for the Traffic Filter rules. Sequencing must start at 0. | @@ -8264,7 +8290,7 @@ A sequential integer identifier for the Traffic Filter rules. Sequencing must st | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8287,7 +8313,7 @@ Per App VPN Rule. This will Allow only the Apps specified to be allowed over VPN | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -8303,7 +8329,7 @@ Per App VPN Rule. This will Allow only the Apps specified to be allowed over VPN | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8326,7 +8352,7 @@ App identity for the app-based traffic filter. The value for this node can be on | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -8342,7 +8368,7 @@ App identity for the app-based traffic filter. The value for this node can be on | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8365,7 +8391,7 @@ Returns the type of ID of the App/Id. Either PackageFamilyName, FilePath, or Sys | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -8381,7 +8407,7 @@ Returns the type of ID of the App/Id. Either PackageFamilyName, FilePath, or Sys | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8404,7 +8430,7 @@ Specifies a rule in Security Descriptor Definition Language (SDDL) format to che | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -8420,7 +8446,7 @@ Specifies a rule in Security Descriptor Definition Language (SDDL) format to che | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -8432,6 +8458,7 @@ Specifies a rule in Security Descriptor Definition Language (SDDL) format to che Outbound - The traffic filter allows traffic to reach destinations matching this rule. This is the default. + Inbound - The traffic filter allows traffic coming from external locations matching this rule. @@ -8444,7 +8471,7 @@ Inbound - The traffic filter allows traffic coming from external locations match | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -8460,7 +8487,7 @@ Inbound - The traffic filter allows traffic coming from external locations match | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8483,7 +8510,7 @@ A list of comma separated values specifying local IP address ranges to allow. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -8499,7 +8526,7 @@ A list of comma separated values specifying local IP address ranges to allow. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8522,7 +8549,7 @@ Comma Separated list of ranges for eg. 100-120,200,300-320. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Regular Expression: `^[\d]*$` | | Dependency [ProtocolDependency] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/VPNv2/[ProfileName]/TrafficFilterList/[trafficFilterId]/Protocol`
    Dependency Allowed Value: `[6,17]`
    Dependency Allowed Value Type: `Range`
    | @@ -8540,7 +8567,7 @@ Comma Separated list of ranges for eg. 100-120,200,300-320. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8563,7 +8590,7 @@ Comma Separated list of ranges for eg. 100-120,200,300-320. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-255]` | @@ -8580,7 +8607,7 @@ Comma Separated list of ranges for eg. 100-120,200,300-320. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8603,7 +8630,7 @@ A list of comma separated values specifying remote IP address ranges to allow. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -8619,7 +8646,7 @@ A list of comma separated values specifying remote IP address ranges to allow. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8642,7 +8669,7 @@ A list of comma separated values specifying remote port ranges to allow. For exa | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Regular Expression: `^[\d]*$` | | Dependency [ProtocolDependency] | Dependency Type: `DependsOn`
    Dependency URI: `Vendor/MSFT/VPNv2/[ProfileName]/TrafficFilterList/[trafficFilterId]/Protocol`
    Dependency Allowed Value: `[6,17]`
    Dependency Allowed Value Type: `Range`
    | @@ -8660,7 +8687,7 @@ A list of comma separated values specifying remote port ranges to allow. For exa | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8683,7 +8710,7 @@ Specifies the routing policy if an App or Claims type is used in the traffic fil | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -8708,7 +8735,7 @@ Specifies the routing policy if an App or Claims type is used in the traffic fil | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -8719,7 +8746,7 @@ Specifies the routing policy if an App or Claims type is used in the traffic fil -Comma separated string to identify the trusted network. VPN will not connect automatically when the user is on their corporate wireless network where protected resources are directly accessible to the device. +Comma separated string to identify the trusted network. VPN won't connect automatically when the user is on their corporate wireless network where protected resources are directly accessible to the device. @@ -8731,7 +8758,7 @@ Comma separated string to identify the trusted network. VPN will not connect aut | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | `,` | @@ -8748,7 +8775,7 @@ Comma separated string to identify the trusted network. VPN will not connect aut | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 21H2 [10.0.22000] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 21H2 [10.0.22000] and later | @@ -8771,7 +8798,7 @@ Determines whether the credential manager will save ras credentials after a conn | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | | Default Value | true | @@ -8781,7 +8808,7 @@ Determines whether the credential manager will save ras credentials after a conn | Value | Description | |:--|:--| -| false | Ras Credentials are not saved. | +| false | Ras Credentials aren't saved. | | true (Default) | Ras Credentials are saved. | @@ -8994,7 +9021,16 @@ Profile example VPN_Demo VPNServer.contoso.com - Automatic + ProtocolList + + + Ikev2 + + + Sstp + + 168 + Eap diff --git a/windows/client-management/mdm/wifi-csp.md b/windows/client-management/mdm/wifi-csp.md index 7bc7eec664..c2f8aa8687 100644 --- a/windows/client-management/mdm/wifi-csp.md +++ b/windows/client-management/mdm/wifi-csp.md @@ -4,7 +4,7 @@ description: Learn more about the WiFi CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 02/28/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -59,7 +59,7 @@ The following list shows the WiFi configuration service provider nodes: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -82,7 +82,7 @@ Identifies the Wi-Fi network configuration. Each Wi-Fi network configuration is | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -98,7 +98,7 @@ Identifies the Wi-Fi network configuration. Each Wi-Fi network configuration is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -124,7 +124,7 @@ SSID is the name of network you're connecting to, while Profile name is the name | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | | Atomic Required | True | | Dynamic Node Naming | ServerGeneratedUniqueIdentifier | @@ -142,7 +142,7 @@ SSID is the name of network you're connecting to, while Profile name is the name | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -165,7 +165,7 @@ Allows for defining which administrative entity is setting this Wi-Fi profile. T | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 0 | @@ -191,7 +191,7 @@ Allows for defining which administrative entity is setting this Wi-Fi profile. T | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -214,7 +214,7 @@ Optional node. The format is url:port. Configuration of the network proxy (if an | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -230,7 +230,7 @@ Optional node. The format is url:port. Configuration of the network proxy (if an | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -255,7 +255,7 @@ Optional node. URL to the PAC file location. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -271,7 +271,7 @@ Optional node. URL to the PAC file location. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -296,7 +296,7 @@ Optional node. The presence of the field enables WPAD for proxy lookup. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | @@ -321,7 +321,7 @@ Optional node. The presence of the field enables WPAD for proxy lookup. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -344,7 +344,7 @@ Optional node. If the policy is active selecting one of the values from the foll | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -371,7 +371,7 @@ Optional node. If the policy is active selecting one of the values from the foll | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -383,6 +383,7 @@ Optional node. If the policy is active selecting one of the values from the foll XML describing the network configuration and follows Windows WLAN_profile schema. + Link to schema: @@ -401,7 +402,7 @@ If it exists in the blob, the **keyType** and **protected** elements must come b | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -417,7 +418,7 @@ If it exists in the blob, the **keyType** and **protected** elements must come b | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -440,7 +441,7 @@ Identifies the Wi-Fi network configuration. Each Wi-Fi network configuration is | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -456,7 +457,7 @@ Identifies the Wi-Fi network configuration. Each Wi-Fi network configuration is | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -482,7 +483,7 @@ SSID is the name of network you're connecting to, while Profile name is the name | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Add, Delete, Get, Replace | | Atomic Required | True | | Dynamic Node Naming | ServerGeneratedUniqueIdentifier | @@ -500,7 +501,7 @@ SSID is the name of network you're connecting to, while Profile name is the name | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -523,7 +524,7 @@ Allows for defining which administrative entity is setting this Wi-Fi profile. T | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | | Default Value | 0 | @@ -549,7 +550,7 @@ Allows for defining which administrative entity is setting this Wi-Fi profile. T | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -572,7 +573,7 @@ Optional node. The format is url:port. Configuration of the network proxy (if an | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -588,7 +589,7 @@ Optional node. The format is url:port. Configuration of the network proxy (if an | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -613,7 +614,7 @@ Optional node. URL to the PAC file location. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -629,7 +630,7 @@ Optional node. URL to the PAC file location. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -654,7 +655,7 @@ Optional node. The presence of the field enables WPAD for proxy lookup. | Property name | Property value | |:--|:--| -| Format | bool | +| Format | `bool` | | Access Type | Add, Delete, Get, Replace | @@ -679,7 +680,7 @@ Optional node. The presence of the field enables WPAD for proxy lookup. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -702,7 +703,7 @@ Optional node. If the policy is active selecting one of the values from the foll | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 1 | @@ -729,7 +730,7 @@ Optional node. If the policy is active selecting one of the values from the foll | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -741,6 +742,7 @@ Optional node. If the policy is active selecting one of the values from the foll XML describing the network configuration and follows Windows WLAN_profile schema. + Link to schema: @@ -759,7 +761,7 @@ If it exists in the blob, the **keyType** and **protected** elements must come b | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | diff --git a/windows/client-management/mdm/windowsdefenderapplicationguard-csp.md b/windows/client-management/mdm/windowsdefenderapplicationguard-csp.md index a92d9f018f..7cc00d2ad9 100644 --- a/windows/client-management/mdm/windowsdefenderapplicationguard-csp.md +++ b/windows/client-management/mdm/windowsdefenderapplicationguard-csp.md @@ -4,7 +4,7 @@ description: Learn more about the WindowsDefenderApplicationGuard CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 02/28/2023 +ms.date: 05/11/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -19,6 +19,8 @@ ms.topic: reference The WindowsDefenderApplicationGuard configuration service provider (CSP) is used by the enterprise to configure the settings in Microsoft Defender Application Guard. This CSP was added in Windows 10, version 1709. + +[!INCLUDE [microsoft-defender-application-guard-mdag-configure-via-mdm](../../../includes/licensing/microsoft-defender-application-guard-mdag-configure-via-mdm.md)] @@ -49,7 +51,7 @@ The following list shows the WindowsDefenderApplicationGuard configuration servi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -72,7 +74,7 @@ Interior node for Audit. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -88,7 +90,7 @@ Interior node for Audit. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -111,7 +113,7 @@ This policy setting allows you to decide whether auditing events can be collecte | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -151,7 +153,7 @@ This policy setting allows you to decide whether auditing events can be collecte | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -174,7 +176,7 @@ Initiates remote installation of Application Guard feature. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Exec, Get | @@ -199,7 +201,7 @@ Initiates remote installation of Application Guard feature. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 2004 [10.0.19041] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 2004 [10.0.19041] and later | @@ -222,7 +224,7 @@ Returns bitmask that indicates status of Application Guard platform installation | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -238,7 +240,7 @@ Returns bitmask that indicates status of Application Guard platform installation | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -261,7 +263,7 @@ Interior Node for Settings. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -277,7 +279,7 @@ Interior Node for Settings. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -291,6 +293,7 @@ Interior Node for Settings. This policy setting allows you to determine whether applications inside Microsoft Defender Application Guard can access the device's camera and microphone when these settings are enabled on the user's device. - If you enable this policy setting, applications inside Microsoft Defender Application Guard will be able to access the camera and microphone on the user's device. + - If you disable or don't configure this policy setting, applications inside Microsoft Defender Application Guard will be unable to access the camera and microphone on the user's device. @@ -303,7 +306,7 @@ This policy setting allows you to determine whether applications inside Microsof | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -313,7 +316,7 @@ This policy setting allows you to determine whether applications inside Microsof | Value | Description | |:--|:--| -| 0 (Default) | Microsoft Defender Application Guard cannot access the device’s camera and microphone. When the policy is not configured, it is the same as disabled (0). | +| 0 (Default) | Microsoft Defender Application Guard can't access the device’s camera and microphone. When the policy isn't configured, it's the same as disabled (0). | | 1 | Turns on the functionality to allow Microsoft Defender Application Guard to access the device’s camera and microphone. | @@ -343,7 +346,7 @@ This policy setting allows you to determine whether applications inside Microsof | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -366,7 +369,7 @@ This policy setting allows you to decide whether data should persist across diff | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -405,7 +408,7 @@ This policy setting allows you to decide whether data should persist across diff | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -430,7 +433,7 @@ This policy setting allows you to determine whether Application Guard can use th | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -440,7 +443,7 @@ This policy setting allows you to determine whether Application Guard can use th | Value | Description | |:--|:--| -| 0 (Default) | Cannot access the vGPU and uses the CPU to support rendering graphics. When the policy is not configured, it is the same as disabled (0). | +| 0 (Default) | Cannot access the vGPU and uses the CPU to support rendering graphics. When the policy isn't configured, it's the same as disabled (0). | | 1 | Turns on the functionality to access the vGPU offloading graphics rendering from the CPU. This can create a faster experience when working with graphics intense websites or watching video within the container. | @@ -470,7 +473,7 @@ This policy setting allows you to determine whether Application Guard can use th | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -493,7 +496,7 @@ Turn on Microsoft Defender Application Guard in Enterprise Mode. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -532,7 +535,7 @@ Turn on Microsoft Defender Application Guard in Enterprise Mode. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -557,7 +560,7 @@ This policy setting allows you to decide whether websites can load non-enterpris | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -597,7 +600,7 @@ This policy setting allows you to decide whether websites can load non-enterpris | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -611,7 +614,8 @@ This policy setting allows you to decide whether websites can load non-enterpris This policy setting allows certain device level Root Certificates to be shared with the Microsoft Defender Application Guard container. - If you enable this setting, certificates with a thumbprint matching the ones specified will be transferred into the container. Multiple certificates can be specified by using a comma to separate the thumbprints for each certificate you want to transfer. Here's an example: b4e72779a8a362c860c36a6461f31e3aa7e58c14,1b1d49f06d2a697a544a1059bd59a7b058cda924. -- If you disable or don't configure this setting, certificates are not shared with the Microsoft Defender Application Guard container. + +- If you disable or don't configure this setting, certificates aren't shared with the Microsoft Defender Application Guard container. @@ -625,7 +629,7 @@ This policy setting allows certain device level Root Certificates to be shared w | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | | Allowed Values | List (Delimiter: `,`) | @@ -655,7 +659,7 @@ This policy setting allows certain device level Root Certificates to be shared w | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -678,7 +682,7 @@ Determines the type of content that can be copied from the host to Application G | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -717,7 +721,7 @@ Determines the type of content that can be copied from the host to Application G | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -740,7 +744,7 @@ This policy setting allows you to decide how the clipboard behaves while in Appl | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -781,7 +785,7 @@ This policy setting allows you to decide how the clipboard behaves while in Appl | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -804,7 +808,7 @@ This policy setting allows you to decide how the print functionality behaves whi | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -857,7 +861,7 @@ This policy setting allows you to decide how the print functionality behaves whi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1803 [10.0.17134] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1803 [10.0.17134] and later | @@ -880,7 +884,7 @@ This policy setting allows you to determine whether users can elect to download | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Default Value | 0 | @@ -890,7 +894,7 @@ This policy setting allows you to determine whether users can elect to download | Value | Description | |:--|:--| -| 0 (Default) | The user cannot download files from Edge in the container to the host file system. When the policy is not configured, it is the same as disabled (0). | +| 0 (Default) | The user can't download files from Edge in the container to the host file system. When the policy isn't configured, it's the same as disabled (0). | | 1 | Turns on the functionality to allow users to download files from Edge in the container to the host file system. | @@ -920,7 +924,7 @@ This policy setting allows you to determine whether users can elect to download | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1709 [10.0.16299] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1709 [10.0.16299] and later | @@ -943,7 +947,7 @@ Returns bitmask that indicates status of Application Guard installation and pre- | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | diff --git a/windows/client-management/mdm/windowslicensing-csp.md b/windows/client-management/mdm/windowslicensing-csp.md index 8c55c2fd8e..60dd258bf1 100644 --- a/windows/client-management/mdm/windowslicensing-csp.md +++ b/windows/client-management/mdm/windowslicensing-csp.md @@ -4,7 +4,7 @@ description: Learn more about the WindowsLicensing CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 05/01/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -59,7 +59,7 @@ The following list shows the WindowsLicensing configuration service provider nod | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1703 [10.0.15063] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1703 [10.0.15063] and later | @@ -82,7 +82,7 @@ Installs a product key for Windows 10 desktop devices. Does not reboot. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Exec | @@ -98,7 +98,7 @@ Installs a product key for Windows 10 desktop devices. Does not reboot. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -121,7 +121,7 @@ Returns TRUE if the entered product key can be used for an edition upgrade of Wi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Exec | @@ -161,7 +161,7 @@ Returns TRUE if the entered product key can be used for an edition upgrade of Wi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -184,7 +184,7 @@ Device Based Subscription. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -200,7 +200,7 @@ Device Based Subscription. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -223,7 +223,7 @@ Returns the last error code of Refresh/Remove Device License operation. Value wo | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -239,7 +239,7 @@ Returns the last error code of Refresh/Remove Device License operation. Value wo | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -250,7 +250,7 @@ Returns the last error code of Refresh/Remove Device License operation. Value wo -Returns last error description from Device Licensing. Value would be empty, if error decription can not be evaluated. +Returns last error description from Device Licensing. Value would be empty, if error decription can't be evaluated. @@ -262,7 +262,7 @@ Returns last error description from Device Licensing. Value would be empty, if e | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -278,7 +278,7 @@ Returns last error description from Device Licensing. Value would be empty, if e | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -301,7 +301,7 @@ Returns the status of Refresh/Remove Device License operation. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -317,7 +317,7 @@ Returns the status of Refresh/Remove Device License operation. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 11, version 22H2 [10.0.22621] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 11, version 22H2 [10.0.22621] and later | @@ -340,7 +340,7 @@ License Type: User Based Subscription or Device Based Subscription. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | @@ -365,7 +365,7 @@ License Type: User Based Subscription or Device Based Subscription. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -388,7 +388,7 @@ Returns a value that maps to the Windows 10 edition running on desktop or mobile | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -421,7 +421,7 @@ Returns a value that maps to the Windows 10 edition running on desktop or mobile | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -444,7 +444,7 @@ Returns the parameter type used by Windows 10 devices for an edition upgrade. Wi | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -477,7 +477,7 @@ Returns the parameter type used by Windows 10 devices for an edition upgrade. Wi | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -500,7 +500,7 @@ Interior node for managing S mode. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -516,7 +516,7 @@ Interior node for managing S mode. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -546,7 +546,7 @@ Possible values: | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -581,7 +581,7 @@ Possible values: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -604,7 +604,7 @@ Switches a device out of S mode if possible. Does not reboot. | Property name | Property value | |:--|:--| -| Format | null | +| Format | `null` | | Access Type | Exec | @@ -644,7 +644,7 @@ Switches a device out of S mode if possible. Does not reboot. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -668,7 +668,7 @@ This setting is only applicable to devices available in S mode. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | @@ -784,7 +784,7 @@ This setting is only applicable to devices available in S mode. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -807,7 +807,7 @@ Returns the status of an edition upgrade on Windows 10 desktop and mobile device | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -840,7 +840,7 @@ Returns the status of an edition upgrade on Windows 10 desktop and mobile device | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -863,7 +863,7 @@ Node for subscriptions. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | @@ -879,7 +879,7 @@ Node for subscriptions. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -902,7 +902,7 @@ Node for subscription IDs. | Property name | Property value | |:--|:--| -| Format | node | +| Format | `node` | | Access Type | Get | | Dynamic Node Naming | ClientInventory | @@ -919,7 +919,7 @@ Node for subscription IDs. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -942,7 +942,7 @@ Returns the name of the subscription. | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -958,7 +958,7 @@ Returns the name of the subscription. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -981,7 +981,7 @@ Returns the status of the subscription. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -997,7 +997,7 @@ Returns the status of the subscription. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1020,7 +1020,7 @@ Disable or Enable subscription activation on a device. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Replace | @@ -1045,7 +1045,7 @@ Disable or Enable subscription activation on a device. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1068,7 +1068,7 @@ Remove subscription uninstall subscription license. It also reset subscription t | Property name | Property value | |:--|:--| -| Format | null | +| Format | `null` | | Access Type | Exec | @@ -1084,7 +1084,7 @@ Remove subscription uninstall subscription license. It also reset subscription t | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1107,7 +1107,7 @@ Error code of last subscription operation. Value would be empty(0) in absence of | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -1123,7 +1123,7 @@ Error code of last subscription operation. Value would be empty(0) in absence of | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1134,7 +1134,7 @@ Error code of last subscription operation. Value would be empty(0) in absence of -Error description of last subscription operation. Value would be empty, if error description cannot be evaluated. +Error description of last subscription operation. Value would be empty, if error description can't be evaluated. @@ -1146,7 +1146,7 @@ Error description of last subscription operation. Value would be empty, if error | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Get | @@ -1162,7 +1162,7 @@ Error description of last subscription operation. Value would be empty, if error | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1185,7 +1185,7 @@ Status of last subscription operation. | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get | @@ -1201,7 +1201,7 @@ Status of last subscription operation. | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1607 [10.0.14393] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1607 [10.0.14393] and later | @@ -1224,7 +1224,7 @@ Set device to Device Based Subscription or User Based Subscription. For Device B | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Get, Replace | @@ -1252,7 +1252,7 @@ Set device to Device Based Subscription or User Based Subscription. For Device B | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1275,7 +1275,7 @@ Provide a license for an edition upgrade of Windows 10 mobile devices. Does not | Property name | Property value | |:--|:--| -| Format | xml | +| Format | `xml` | | Access Type | Exec | @@ -1291,7 +1291,7 @@ Provide a license for an edition upgrade of Windows 10 mobile devices. Does not | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :x: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :x: Windows SE | :heavy_check_mark: Windows 10, version 1511 [10.0.10586] and later | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE | ✅ Windows 10, version 1511 [10.0.10586] and later | @@ -1343,7 +1343,7 @@ Activation or changing a product key can be carried out on the following edition | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Exec | | Reboot Behavior | Automatic | diff --git a/windows/client-management/mdm/wirednetwork-csp.md b/windows/client-management/mdm/wirednetwork-csp.md index b4cc4b0e26..40515a8bd6 100644 --- a/windows/client-management/mdm/wirednetwork-csp.md +++ b/windows/client-management/mdm/wirednetwork-csp.md @@ -4,7 +4,7 @@ description: Learn more about the WiredNetwork CSP. author: vinaypamnani-msft manager: aaroncz ms.author: vinpa -ms.date: 02/28/2023 +ms.date: 05/10/2023 ms.localizationpriority: medium ms.prod: windows-client ms.technology: itpro-manage @@ -38,7 +38,7 @@ The following list shows the WiredNetwork configuration service provider nodes: | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -61,7 +61,7 @@ Enable block period (minutes), used to specify the duration for which automatic | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-4294967295]` | @@ -78,7 +78,7 @@ Enable block period (minutes), used to specify the duration for which automatic | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -101,7 +101,7 @@ XML describing the wired network configuration and follows the LAN_profile schem | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | @@ -117,7 +117,7 @@ XML describing the wired network configuration and follows the LAN_profile schem | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -140,7 +140,7 @@ Enable block period (minutes), used to specify the duration for which automatic | Property name | Property value | |:--|:--| -| Format | int | +| Format | `int` | | Access Type | Add, Delete, Get, Replace | | Allowed Values | Range: `[0-4294967295]` | @@ -157,7 +157,7 @@ Enable block period (minutes), used to specify the duration for which automatic | Scope | Editions | Applicable OS | |:--|:--|:--| -| :heavy_check_mark: Device
    :heavy_check_mark: User | :x: Home
    :heavy_check_mark: Pro
    :heavy_check_mark: Enterprise
    :heavy_check_mark: Education
    :heavy_check_mark: Windows SE | :heavy_check_mark: Windows 10, version 1809 [10.0.17763] and later | +| ✅ Device
    ✅ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE | ✅ Windows 10, version 1809 [10.0.17763] and later | @@ -180,7 +180,7 @@ XML describing the wired network configuration and follows the LAN_profile schem | Property name | Property value | |:--|:--| -| Format | chr (string) | +| Format | `chr` (string) | | Access Type | Add, Delete, Get, Replace | diff --git a/windows/configuration/TOC.yml b/windows/configuration/TOC.yml index b3887ade44..5a140f98e2 100644 --- a/windows/configuration/TOC.yml +++ b/windows/configuration/TOC.yml @@ -66,8 +66,10 @@ href: setup-digital-signage.md - name: Set up a single-app kiosk href: kiosk-single-app.md - - name: Set up a multi-app kiosk + - name: Set up a multi-app kiosk for Windows 10 href: lock-down-windows-10-to-specific-apps.md + - name: Set up a multi-app kiosk for Windows 11 + href: lock-down-windows-11-to-specific-apps.md - name: Kiosk reference information items: - name: More kiosk methods and reference information diff --git a/windows/configuration/kiosk-methods.md b/windows/configuration/kiosk-methods.md index fca2b5ab94..0fdc2d15c1 100644 --- a/windows/configuration/kiosk-methods.md +++ b/windows/configuration/kiosk-methods.md @@ -71,6 +71,8 @@ There are several kiosk configuration methods that you can choose from, dependin >[!IMPORTANT] >Single-app kiosk mode isn't supported over a remote desktop connection. Your kiosk users must sign in on the physical device that is set up as a kiosk. +[!INCLUDE [assigned-access-kiosk-mode](../../includes/licensing/assigned-access-kiosk-mode.md)] + ## Methods for a single-app kiosk running a UWP app You can use this method | For this edition | For this kiosk account type diff --git a/windows/configuration/lock-down-windows-11-to-specific-apps.md b/windows/configuration/lock-down-windows-11-to-specific-apps.md new file mode 100644 index 0000000000..fbf303f314 --- /dev/null +++ b/windows/configuration/lock-down-windows-11-to-specific-apps.md @@ -0,0 +1,383 @@ +--- +title: Set up a multi-app kiosk on Windows 11 +description: Learn how to configure a kiosk device running Windows 11 so that users can only run a few specific apps. +ms.prod: windows-client +ms.technology: itpro-configure +author: lizgt2000 +ms.author: lizlong +ms.date: 05/12/2023 +manager: aaroncz +ms.reviewer: sybruckm +ms.localizationpriority: medium +ms.topic: how-to +--- +# Set up a multi-app kiosk on Windows 11 devices + +**Applies to** + +- Windows 11 Pro, Enterprise, and Education + +> [!NOTE] +> The use of multiple monitors isn't supported for multi-app kiosk mode. + +An assigned access multi-app kiosk runs one or more apps from the desktop. People using the kiosk see a customized Start that shows only the apps that are allowed. With this approach, you can configure a locked-down experience for different account types. A multi-app kiosk is appropriate for devices that are shared by multiple people. Here's a guide on how to set up a multi-app kiosk. + +> [!WARNING] +> The assigned access feature is intended for corporate-owned fixed-purpose devices, like kiosks. When the multi-app assigned access configuration is applied on the device, [certain policies](kiosk-policies.md) are enforced system-wide, and will impact other users on the device. Deleting the kiosk configuration will remove the assigned access lockdown profiles associated with the users, but it cannot revert all the enforced policies (such as Start layout). A factory reset is needed to clear all the policies enforced via assigned access. + +> [!TIP] +> Be sure to check the [configuration recommendations](kiosk-prepare.md) before you set up your kiosk. + +## Configure a Multi-App Kiosk + +See the table below for the different methods to configure a multi-app kiosk in Windows 11. + +|Configuration Method|Availability| +|--------------------|------------| +|[MDM WMI Bridge Provider](#configure-a-kiosk-using-wmi-bridge) | Available May 2023| +|Intune|Coming soon| +|Provisioning Package Using Windows Configuration Designer| Coming soon| + +> [!NOTE] +> For WMI Bridge/PowerShell and Provisioning package methods, you will need to create your own multi-app kiosk XML file as specified below. + +## Create the XML file + +Let's start by looking at the basic structure of the XML file. + +- A configuration xml can define multiple *profiles*. Each profile has a unique **Id** and defines a set of applications that are allowed to run, whether the taskbar is visible, and can include a custom Start layout. + +- A configuration xml can have multiple *config* sections. Each config section associates a non-admin user account to a default profile **Id**. + +- Multiple config sections can be associated to the same profile. + +- A profile has no effect if it's not associated to a config section. + +You can start your file by pasting the following XML into an XML editor, and saving the file as *filename*.xml. Each section of this XML is explained in this article. + +> [!NOTE] +> If you want to write a configuration file to be applied to both Windows 10 and Windows 11 devices, follow the [Windows 10 instructions](lock-down-windows-10-to-specific-apps.md) to add the StartLayout tag to your XML file, just above the StartPins tag. Windows will automatically ignore the sections that don't apply to the version running. + +```xml + + + + + + + + + + + + + + + + + + +``` +#### Profile + +There are two types of profiles that you can specify in the XML: + +- **Lockdown profile**: Users assigned a lockdown profile will see the desktop in tablet mode with the specific apps on the Start screen. +- **Kiosk profile**: Starting with Windows 10 version 1803, this profile replaces the KioskModeApp node of the [AssignedAccess CSP](/windows/client-management/mdm/assignedaccess-csp). Users assigned a kiosk profile won't see the desktop, but only the kiosk app running in full-screen mode. + +A lockdown profile section in the XML has the following entries: + +- [**Id**](#id) + +- [**AllowedApps**](#allowedapps) + +- [**StartPins**](#startpins) + +- [**Taskbar**](#taskbar) + +A kiosk profile in the XML has the following entries: + +- [**Id**](#id) + +- [**KioskModeApp**](#kioskmodeapp) + +##### Id + +The profile **Id** is a GUID attribute to uniquely identify the profile. You can create a GUID using a GUID generator. The GUID just needs to be unique within this XML file. + +```xml + + + +``` + +##### AllowedApps + +**AllowedApps** is a list of applications that are allowed to run. Apps can be Universal Windows Platform (UWP) apps or Windows desktop applications. Starting with Windows 10 version 1809, you can configure a single app in the **AllowedApps** list to run automatically when the assigned access user account signs in. + +- For UWP apps, you need to provide the App User Model ID (AUMID). [Learn how to get the AUMID](./find-the-application-user-model-id-of-an-installed-app.md), or [get the AUMID from the Start Layout XML](#create-the-xml-file). +- For desktop apps, you need to specify the full path of the executable, which can contain one or more system environment variables in the form of `%variableName%`. For example, `%systemroot%` or `%windir%`. +- If an app has a dependency on another app, both must be included in the allowed apps list. For example, Internet Explorer 64-bit has a dependency on Internet Explorer 32-bit, so you must allow both `"C:\Program Files\internet explorer\iexplore.exe"` and `"C:\Program Files (x86)\Internet Explorer\iexplore.exe"`. +- To configure a single app to launch automatically when the user signs in, include `rs5:AutoLaunch="true"` after the AUMID or path. You can also include arguments to be passed to the app. For an example, see [the AllowedApps sample XML](#apps-sample). + +When the multi-app kiosk configuration is applied to a device, AppLocker rules will be generated to allow the apps that are listed in the configuration. Here are the predefined assigned access AppLocker rules for **UWP apps**: + +1. Default rule is to allow all users to launch the signed package apps. +2. The package app blocklist is generated at runtime when the assigned access user signs in. Based on the installed/provisioned package apps available for the user account, assigned access generates the blocklist. This list will exclude the default allowed inbox package apps, which are critical for the system to function. It then excludes the allowed packages that enterprises defined in the assigned access configuration. If there are multiple apps within the same package, all these apps will be excluded. This blocklist will be used to prevent the user from accessing the apps that are currently available for the user but not in the allowed list. + + > [!NOTE] + > You can't manage AppLocker rules that are generated by the multi-app kiosk configuration in [MMC snap-ins](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/hh994629(v=ws.11)#BKMK_Using_Snapins). Avoid creating AppLocker rules that conflict with AppLocker rules that are generated by the multi-app kiosk configuration. + > Multi-app kiosk mode doesn't block the enterprise or the users from installing UWP apps. When a new UWP app is installed during the current assigned access user session, this app will not be in the deny list. When the user signs out and signs in again, the app will be included in the blocklist. If this is an enterprise-deployed line-of-business app and you want to allow it to run, update the assigned access configuration to include it in the allowed app list. + +Here are the predefined assigned access AppLocker rules for **desktop apps**: + +1. Default rule is to allow all users to launch the desktop programs signed with Microsoft Certificate in order for the system to boot and function. The rule also allows the admin user group to launch all desktop programs. +2. There's a predefined inbox desktop app blocklist for the assigned access user account, and this blocklist is adjusted based on the desktop app allowlist that you defined in the multi-app configuration. +3. Enterprise-defined allowed desktop apps are added in the AppLocker allowlist. + +The following example allows Photos, Weather, Calculator, Paint, and Notepad apps to run on the device, with Notepad configured to automatically launch and create a file called `123.text` when the user signs in. + + + +```xml + + + + + + + + + +``` + +##### StartPins + +After you define the list of allowed applications, you can customize the Start layout for your kiosk experience. The easiest way to create a customized Start layout to apply to other Windows client devices is to set up the Start screen on a test device and then export the layout. Once you've decided, you can get the JSON needed for your kiosk configuration by following the steps to [Get the pinnedList JSON](customize-and-export-start-layout.md). If you opt to do this using the PowerShell command, make sure that the system you run the command on has the same file structure as the device on which you will apply the kiosk (the path to the allowed apps must be the same). At the end of this step, you should have a JSON pinnedList that looks something like the below. + +Add your pinnedList JSON into the StartPins tag in your XML file. + +```xml + + + +``` + +> [!NOTE] +> If an app isn't installed for the user, but is included in the Start layout XML, the app isn't shown on the Start screen. + +##### Taskbar + +Define whether you want to have the taskbar present in the kiosk device. For tablet-based or touch-enabled all-in-one kiosks, when you don't attach a keyboard and mouse, you can hide the taskbar as part of the multi-app experience if you want. + +The following example exposes the taskbar to the end user: + +```xml + +``` + +The following example hides the taskbar: + +```xml + +``` + +> [!NOTE] +> This is different from the **Automatically hide the taskbar** option in tablet mode, which shows the taskbar when swiping up from or moving the mouse pointer down to the bottom of the screen. Setting **ShowTaskbar** as **false** will always keep the taskbar hidden. + +##### KioskModeApp + +**KioskModeApp** is used for a [kiosk profile](#profile) only. Enter the AUMID for a single app. You can only specify one kiosk profile in the XML. + +```xml + +``` + +> [!IMPORTANT] +> The kiosk profile is designed for public-facing kiosk devices. We recommend that you use a local, non-administrator account. If the device is connected to your company network, using a domain or Azure Active Directory account could potentially compromise confidential information. + +#### Configs + +Under **Configs**, define which user account will be associated with the profile. When this user account signs in on the device, the associated assigned access profile will be enforced. This behavior includes the allowed apps, Start layout, taskbar configuration, and other local group policies or mobile device management (MDM) policies set as part of the multi-app experience. + +The full multi-app assigned access experience can only work for non-admin users. It's not supported to associate an admin user with the assigned access profile. Making this configuration in the XML file will result in unexpected or unsupported experiences when this admin user signs in. + +You can assign: + +- [A local standard user account that signs in automatically](#config-for-autologon-account) (Applies to Windows 10, version 1803 only) +- [An individual account, which can be local, domain, or Azure Active Directory (Azure AD)](#config-for-individual-accounts) +- [A group account, which can be local, Active Directory (domain), or Azure AD](#config-for-group-accounts) (Applies to Windows 10, version 1803 only). + +> [!NOTE] +> Configs that specify group accounts cannot use a kiosk profile, only a lockdown profile. If a group is configured to a kiosk profile, the CSP will reject the request. + +##### Config for AutoLogon Account + +When you use `` and the configuration is applied to a device, the specified account (managed by Assigned Access) is created on the device as a local standard user account. The specified account is signed in automatically after restart. + +The following example shows how to specify an account to sign in automatically. + +```xml + + + + + + +``` + +Starting with Windows 10 version 1809, you can configure the display name that will be shown when the user signs in. The following example shows how to create an AutoLogon Account that shows the name "Hello World". + +```xml + + + + + + +``` + +On domain-joined devices, local user accounts aren't shown on the sign-in screen by default. To show the **AutoLogonAccount** on the sign-in screen, enable the following Group Policy setting: **Computer Configuration > Administrative Templates > System > Logon > Enumerate local users on domain-joined computers**. (The corresponding MDM policy setting is [WindowsLogon/EnumerateLocalUsersOnDomainJoinedComputers in the Policy CSP](/windows/client-management/mdm/policy-csp-windowslogon#windowslogon-enumeratelocalusersondomainjoinedcomputers).) + +>[!IMPORTANT] +>When Exchange Active Sync (EAS) password restrictions are active on the device, the autologon feature does not work. This behavior is by design. For more informations, see [How to turn on automatic logon in Windows](/troubleshoot/windows-server/user-profiles-and-logon/turn-on-automatic-logon). + +##### Config for individual accounts + +Individual accounts are specified using ``. + +- Local account can be entered as `machinename\account` or `.\account` or just `account`. +- Domain account should be entered as `domain\account`. +- Azure AD account must be specified in this format: `AzureAD\{email address}`. **AzureAD** must be provided _as is_, and consider it's a fixed domain name. Then follow with the Azure AD email address. For example, `AzureAD\someone@contoso.onmicrosoft.com` + +> [!WARNING] +> Assigned access can be configured via WMI or CSP to run its applications under a domain user or service account, rather than a local account. However, use of domain user or service accounts introduces risks that an attacker subverting the assigned access application might gain access to sensitive domain resources that have been inadvertently left accessible to any domain account. We recommend that customers proceed with caution when using domain accounts with assigned access, and consider the domain resources potentially exposed by the decision to do so. + +Before applying the multi-app configuration, make sure the specified user account is available on the device, otherwise it will fail. + +> [!NOTE] +> For both domain and Azure AD accounts, it's not required that target account is explicitly added to the device. As long as the device is AD-joined or Azure AD-joined, the account can be discovered in the domain forest or tenant that the device is joined to. For local accounts, it is required that the account exist before you configure the account for assigned access. + +```xml + + + MultiAppKioskUser + + + +``` + +##### Config for group accounts + +Group accounts are specified using ``. Nested groups aren't supported. For example, if user A is member of Group 1, Group 1 is member of Group 2, and Group 2 is used in ``, user A won't have the kiosk experience. + +- Local group: Specify the group type as **LocalGroup** and put the group name in Name attribute. Any Azure AD accounts that are added to the local group won't have the kiosk settings applied. + + ```xml + + + + + ``` + +- Domain group: Both security and distribution groups are supported. Specify the group type as ActiveDirectoryGroup. Use the domain name as the prefix in the name attribute. + + ```xml + + + + + ``` + +- Azure AD group: Use the group object ID from the Azure portal to uniquely identify the group in the Name attribute. You can find the object ID on the overview page for the group in **Users and groups** > **All groups**. Specify the group type as **AzureActiveDirectoryGroup**. The kiosk device must have internet connectivity when users that belong to the group sign-in. + + ```xml + + + + + ``` + + > [!NOTE] + > If an Azure AD group is configured with a lockdown profile on a device, a user in the Azure AD group must change their password (after the account has been created with default password on the portal) before they can sign in to this device. If the user uses the default password to sign in to the device, the user will be immediately signed out. + + + +## Configure a kiosk using WMI Bridge + +Environments that use [Windows Management Instrumentation (WMI)](/windows/win32/wmisdk/wmi-start-page) can use the [MDM Bridge WMI Provider](/windows/win32/dmwmibridgeprov/mdm-bridge-wmi-provider-portal) to configure the MDM_AssignedAccess class. + +Here's an example of how to set AssignedAccess configuration: + +1. Download the [psexec tool](/sysinternals/downloads/psexec). +2. Run `psexec.exe -i -s cmd.exe`. +3. In the command prompt launched by psexec.exe, enter `powershell.exe` to open PowerShell. +4. Run the following script replacing the placeholder "your XML here, with the [XML](#create-the-xml-file) you created above. + +```xml +$nameSpaceName="root\cimv2\mdm\dmmap" +$className="MDM_AssignedAccess" +$obj = Get-CimInstance -Namespace $namespaceName -ClassName $className +Add-Type -AssemblyName System.Web +$obj.Configuration = [System.Web.HttpUtility]::HtmlEncode(@" + + + +"@) + +Set-CimInstance -CimInstance $obj +``` +## Sample Assigned Access XML + +Compare the below to your XML file to check for correct formatting. + +```xml + + + + + + + + + + + + + + + + + + + + + + + + MultiAppKioskUser + + + + +``` diff --git a/windows/deployment/do/TOC.yml b/windows/deployment/do/TOC.yml index 5bcf7b6dbe..4e9dc9cb0c 100644 --- a/windows/deployment/do/TOC.yml +++ b/windows/deployment/do/TOC.yml @@ -27,10 +27,12 @@ href: delivery-optimization-test.md - name: Microsoft Connected Cache items: - - name: Microsoft Connected Cache overview + - name: What is Microsoft Connected Cache? href: waas-microsoft-connected-cache.md - name: MCC for Enterprise and Education items: + - name: MCC for Enterprise and Education Overview + href: mcc-ent-edu-overview.md - name: Requirements href: mcc-enterprise-prerequisites.md - name: Deploy Microsoft Connected Cache @@ -41,6 +43,8 @@ href: mcc-enterprise-appendix.md - name: MCC for ISPs items: + - name: MCC for ISPs Overview + href: mcc-isp-overview.md - name: How-to guides items: - name: Operator sign up and service onboarding diff --git a/windows/deployment/do/delivery-optimization-workflow.md b/windows/deployment/do/delivery-optimization-workflow.md index 2c4b6f9158..b994ac956f 100644 --- a/windows/deployment/do/delivery-optimization-workflow.md +++ b/windows/deployment/do/delivery-optimization-workflow.md @@ -39,4 +39,4 @@ This workflow allows Delivery Optimization to securely and efficiently deliver r | cp\*.prod.do.dsp.mp.microsoft.com
    | 443 | Content Policy | Provides content specific policies and as content metadata URLs. | **Profile**: The device type (for example, PC or Xbox)
    **ContentId**: The content identifier
    **doClientVersion**: The version of the DoSvc client
    **countryCode**: The country the client is connected from
    **altCatalogID**: If ContentID isn't available, use the download URL instead
    **eID**: Client grouping ID
    **CacheHost**: Cache host ID | | disc\*.prod.do.dsp.mp.microsoft.com | 443 | Discovery | Directs clients to a particular instance of the peer matching service (Array), ensuing that clients are collocated by factors, such as content, groupID and external IP. | **Profile**: The device type (for example, PC or Xbox)
    **ContentID**: The content identifier
    **doClientVersion**: The version of the DoSvc client
    **partitionID**: Client partitioning hint
    **altCatalogID**: If ContentID isn't available, use the download URL instead
    **eID**: Client grouping ID | | array\*.prod.do.dsp.mp.microsoft.com | 443 | Arrays | Provides the client with list of peers that have the same content and belong to the same peer group. | **Profile**: The device type (for example, PC or Xbox)
    **ContentID**: The content identifier
    **doClientVersion**: The version of the DoSvc client
    **altCatalogID**: If ContentID isn't available, use the download URL instead
    **PeerID**: Identity of the device running DO client
    **ReportedIp**: The internal / private IP Address
    **IsBackground**: Is the download interactive or background
    **Uploaded**: Total bytes uploaded to peers
    **Downloaded**: Total bytes downloaded from peers
    **DownloadedCdn**: Total bytes downloaded from CDN
    **Left**: Bytes left to download
    **Peers Wanted**: Total number of peers wanted
    **Group ID**: Group the device belongs to (set via DownloadMode 2 + Group ID GP / MDM policies)
    **Scope**: The Download mode
    **UploadedBPS**: The upload speed in bytes per second
    **DownloadBPS**: The download speed in Bytes per second
    **eID**: Client grouping ID | -| dl.delivery.mp.microsoft.com
    emdl.ws.microsoft.com | 80 | Delivery Optimization metadata file hosting | CDN hostnames for Delivery Optimization content metadata files | Metadata download can come from different hostnames, but it's required for peer to peer. | +| dl.delivery.mp.microsoft.com
    emdl.ws.microsoft.com
    download.windowsupdate.com | 80 | Delivery Optimization metadata file hosting | CDN hostnames for Delivery Optimization content metadata files | Metadata download can come from different hostnames, but it's required for peer to peer. | diff --git a/windows/deployment/do/images/mcc-isp-bgp-diagram.png b/windows/deployment/do/images/mcc-isp-bgp-diagram.png new file mode 100644 index 0000000000..9db7e0c6f4 Binary files /dev/null and b/windows/deployment/do/images/mcc-isp-bgp-diagram.png differ diff --git a/windows/deployment/do/images/mcc-isp-bgp-route.png b/windows/deployment/do/images/mcc-isp-bgp-route.png new file mode 100644 index 0000000000..de0bd88695 Binary files /dev/null and b/windows/deployment/do/images/mcc-isp-bgp-route.png differ diff --git a/windows/deployment/do/mcc-ent-edu-overview.md b/windows/deployment/do/mcc-ent-edu-overview.md new file mode 100644 index 0000000000..5702d64fde --- /dev/null +++ b/windows/deployment/do/mcc-ent-edu-overview.md @@ -0,0 +1,72 @@ +--- +title: MCC for Enterprise and Education Overview +manager: aaroncz +description: Overview of Microsoft Connected Cache (MCC) for Enterprise and Education. +ms.prod: windows-client +author: amymzhou +ms.author: amyzhou +ms.topic: article +ms.date: 05/09/2023 +ms.technology: itpro-updates +ms.collection: tier3 +--- + +# Microsoft Connected Cache for Enterprise and Education Overview + +**Applies to** + +- Windows 10 +- Windows 11 + +> [!IMPORTANT] +> - Microsoft Connected Cache is currently a preview feature. For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/). +> - We're still accepting Enterprise and Education customers to join the early preview. To register your interest, fill out the survey located at [https://aka.ms/MSConnectedCacheSignup](https://aka.ms/MSConnectedCacheSignup). + +Microsoft Connected Cache (MCC) for Enterprise and Education (early preview) is a software-only caching solution that delivers Microsoft content within Enterprise and Education networks. MCC can be deployed to as many Windows servers, bare-metal servers, or VMs as needed, and is managed from a cloud portal. Cache nodes are created in the cloud portal and are configured by applying the client policy using management tools such as Intune. + +Microsoft Connected Cache (MCC) for Enterprise and Education (early preview) is a standalone cache for customers moving towards modern management and away from Configuration Manager distribution points. For information about Microsoft Connected Cache in Configuration Manager (generally available, starting Configuration Manager version 2111), see [Microsoft Connected Cache in Configuration Manager](/mem/configmgr/core/plan-design/hierarchy/microsoft-connected-cache). + +## Supported scenarios + +Connected Cache (early preview) supports the following scenarios: + +- Pre-provisioning of devices using Windows Autopilot +- Cloud-only devices, such as Intune-enrolled devices + +## Supported content types + +When clients download cloud-managed content, they use Delivery Optimization from the cache server installed on a Windows server or VM. Cloud-managed content includes the following types: + +- Windows Update for Business: Windows feature and quality updates +- Office Click-to-Run apps: Microsoft 365 Apps and updates +- Client apps: Microsoft Store apps and updates +- Endpoint protection: Windows Defender definition updates + +For the full list of content endpoints that Microsoft Connected Cache for Enterprise and Education supports, see [Microsoft Connected Cache content and services endpoints](delivery-optimization-endpoints.md). + +## How it works + +MCC is a hybrid (mix of on-premises and cloud resources) SaaS solution built as an Azure IoT Edge module and Docker compatible Linux container deployed to your Windows devices. The Delivery Optimization team chose IoT Edge for Linux on Windows (EFLOW) as a secure, reliable container management infrastructure. EFLOW is a Linux virtual machine, based on Microsoft's first party CBL-Mariner operating system. It's built with the IoT Edge runtime and validated as a tier 1 supported environment for IoT Edge workloads. MCC is a Linux IoT Edge module running on the Windows Host OS. + +1. The Azure Management Portal is used to create MCC nodes. +1. The MCC container is deployed and provisioned to the server using the installer provided in the portal. +1. Client policy is set in your management solution to point to the IP address or FQDN of the cache server. +1. Microsoft end-user devices make range requests for content from the MCC node. +1. The MCC node pulls content from the CDN, seeds its local cache stored on disk, and delivers the content to the client. +1. Subsequent requests from end-user devices for content will now come from cache. +1. If the MCC node is unavailable, the client pulls content from CDN to ensure uninterrupted service for your subscribers. + +The following diagram displays an overview of how MCC functions: + +:::image type="content" source="./images/waas-mcc-diag-overview.png" alt-text="Diagram displaying the components of MCC." lightbox="./images/waas-mcc-diag-overview.png"::: + +## IoT Edge + +Even though your MCC scenario isn't related to IoT, Azure IoT Edge is used as a more generic Linux container deployment and management infrastructure. The Azure IoT Edge runtime sits on your designated MCC device and performs management and communication operations. The runtime performs several functions important to manage MCC on your edge device: + +1. Installs and updates MCC on your edge device. +1. Maintains Azure IoT Edge security standards on your edge device. +1. Ensures that MCC is always running. +1. Reports MCC health and usage to the cloud for remote monitoring. + +For more information on Azure IoT Edge, see the Azure IoT Edge [documentation](/azure/iot-edge/about-iot-edge). diff --git a/windows/deployment/do/mcc-enterprise-prerequisites.md b/windows/deployment/do/mcc-enterprise-prerequisites.md index badea53748..d8282ff774 100644 --- a/windows/deployment/do/mcc-enterprise-prerequisites.md +++ b/windows/deployment/do/mcc-enterprise-prerequisites.md @@ -20,6 +20,7 @@ ms.collection: tier3 > [!NOTE] > We're still accepting Enterprise and Education customers to join the early preview. To register your interest, fill out the survey located at [https://aka.ms/MSConnectedCacheSignup](https://aka.ms/MSConnectedCacheSignup). + ## Enterprise requirements for MCC 1. **Azure subscription**: MCC management portal is hosted within Azure and is used to create the Connected Cache [Azure resource](/azure/cloud-adoption-framework/govern/resource-consistency/resource-access-management) and IoT Hub resource. Both are free services. diff --git a/windows/deployment/do/mcc-isp-create-provision-deploy.md b/windows/deployment/do/mcc-isp-create-provision-deploy.md index ecc4cf8379..d7bf5ee7a4 100644 --- a/windows/deployment/do/mcc-isp-create-provision-deploy.md +++ b/windows/deployment/do/mcc-isp-create-provision-deploy.md @@ -6,7 +6,7 @@ ms.prod: windows-client author: nidos ms.author: nidos ms.topic: article -ms.date: 12/31/2017 +ms.date: 05/09/2023 ms.technology: itpro-updates ms.collection: tier3 --- @@ -18,7 +18,7 @@ ms.collection: tier3 - Windows 10 - Windows 11 -This article outlines how to create, provision, and deploy your Microsoft Connected Cache nodes. The creation and provisioning of your cache node takes place in Azure portal. The deployment of your cache node will require downloading an installer script that will be run on your cache server. +This article outlines how to create, provision, and deploy your Microsoft Connected Cache nodes. The creation and provisioning of your cache node takes place in Azure portal. The deployment of your cache node requires downloading an installer script that will be run on your cache server. > [!IMPORTANT] > Before you can create your Microsoft Connected Cache, you will need to complete the [sign up process](mcc-isp-signup.md). You cannot proceed without signing up for our service. @@ -37,7 +37,7 @@ During the configuration of your cache node, there are many fields for you to co ### Client routing -Before serving traffic to your customers, client routing configuration is needed. During the configuration of your cache node in Azure portal, you'll be able to route your clients to your cache node. +Before serving traffic to your customers, client routing configuration is needed. During the configuration of your cache node in Azure portal, you're able to route your clients to your cache node. Microsoft Connected Cache offers two ways for you to route your clients to your cache node. The first method of manual entry involves uploading a comma-separated list of CIDR blocks that represents the clients. The second method of setting BGP (Border Gateway Protocol) is more automatic and dynamic, which is set up by establishing neighborships with other ASNs. All routing methods are set up within Azure portal. @@ -53,6 +53,23 @@ You can manually upload a list of your CIDR blocks in Azure portal to enable man BGP (Border Gateway Protocol) routing is another method offered for client routing. BGP dynamically retrieves CIDR ranges by exchanging information with routers to understand reachable networks. For an automatic method of routing traffic, you can choose to configure BGP routing in Azure portal. +Microsoft Connected Cache includes Bird BGP, which enables the cache node to: + - Establish iBGP peering sessions with routers, route servers, or route collectors within operator networks + - Act as a route collector + +The operator starts the iBGP peering session from the Microsoft Connected Cache side using the Azure management portal and then starts the session with the Microsoft Connected Cache node from the router. + +In the example configuration below: +- The operator ASN is 65100 +- The ASN of the Microsoft Connected Cache cache node is 65100 and the IP address is 192.168.8.99 +- iBGP peering sessions are established from the portal for ASNs 65100, 65200, and 65300. + + :::image type="content" source="images/mcc-isp-bgp-route.png" alt-text="Screenshot of a table entitled BGP route information showing how each ASN corresponds to a specific IP address." lightbox="./images/mcc-isp-provision-cache-node-numbered.png"::: + + :::image type="content" source="images/mcc-isp-bgp-diagram.png" alt-text="A diagram that shows the relationship between the cache node and other ASNs/routers when using BGP. BGP routing allows the cache node to route to other network providers with different ASNs." lightbox="./images/mcc-isp-provision-cache-node-numbered.png"::: + +To set up and enable BGP routing for your cache node, follow the steps below: + 1. Navigate to **Settings** > **Cache nodes**. Select the cache node you wish to provision. :::image type="content" source="images/mcc-isp-provision-cache-node-numbered.png" alt-text="Screenshot of the Azure portal depicting the cache node configuration page of a cache node. This screenshot shows all of the fields you can choose to configure the cache node." lightbox="./images/mcc-isp-provision-cache-node-numbered.png"::: @@ -101,6 +118,9 @@ There are five IDs that the device provisioning script takes as input in order t #### Provision your server +> [!IMPORTANT] +> Have you correctly mounted your disk? Your MCC will not be successfully installed without this important step. Before provisioning your server, ensure your disk is correctly mounted by following the instructions here: [Attach a data disk to a Linux VM](/azure/virtual-machines/linux/attach-disk-portal#find-the-disk). + :::image type="content" source="images/mcc-isp-deploy-cache-node-numbered.png" alt-text="Screenshot of the server provisioning tab within cache node configuration in Azure portal."::: 1. After completing cache node provisioning, navigate to the **Server provisioning** tab. Select **Download provisioning package** to download the installation package to your server. diff --git a/windows/deployment/do/mcc-isp-faq.yml b/windows/deployment/do/mcc-isp-faq.yml index ddcf91bb1e..375036f62d 100644 --- a/windows/deployment/do/mcc-isp-faq.yml +++ b/windows/deployment/do/mcc-isp-faq.yml @@ -85,6 +85,8 @@ sections: answer: If a downstream customer deploys a Microsoft Connected Cache node, the cache controller will prefer the downstream ASN when handling that ASN's traffic. - question: I signed up for Microsoft Connected Cache, but I'm not receiving the verification email. What should I do? answer: First, check that the email under the NOC role is correct in your PeeringDB page. If the email associated with NOC role is correct, search for an email from the sender "microsoft-noreply@microsoft.com" with the email subject - "Here's your Microsoft Connected Cache verification code" in your Spam folders. Still can't find it? Ensure that your email admin rules allow emails from the sender "microsoft-noreply@microsoft.com". + - question: I noticed I can set up BGP for routing. How does BGP routing work for Microsoft Connected Cache? + answer: BGP routing can be set up as an automatic method of routing traffic. To learn more about how BGP is used with Microsoft Connected Cache, see [BGP Routing](mcc-isp-create-provision-deploy.md#bgp-routing). - question: I have an active MCC, but I'm noticing I hit the message limit for my IoT Hub each day. Does this affect my MCC performance and should I be concerned? answer: Even when the quota of 8k messages is hit, the MCC functionality won't be affected. Your client devices will continue to download content as normal. You'll also not be charged above the 8k message limit, so you don't need to worry at all about getting a paid plan. MCC will always be a free service. So if functionality isn't impacted, what is? Instead, messages about the configuration or edge deployment would be impacted. This means that if there was a request to update your MCC and the daily quota was reached, your MCC might not update. In that case, you would just need to wait for the next day to update. This is only a limitation of the early preview and isn't an issue during public preview. - question: What do I do if I need more support and have more questions even after reading this FAQ page? diff --git a/windows/deployment/do/mcc-isp-overview.md b/windows/deployment/do/mcc-isp-overview.md new file mode 100644 index 0000000000..9ef0352aab --- /dev/null +++ b/windows/deployment/do/mcc-isp-overview.md @@ -0,0 +1,40 @@ +--- +title: MCC for ISPs Overview +manager: aaroncz +description: Overview for Microsoft Connected Cache for ISPs +ms.prod: windows-client +author: amymzhou +ms.author: amyzhou +ms.topic: article +ms.date: 05/09/2023 +ms.technology: itpro-updates +ms.collection: tier3 +--- + +# Microsoft Connected Cache for ISPs Overview + +**Applies to** + +- Windows 10 +- Windows 11 + +Microsoft Connected Cache (MCC) for Internet Service Providers (preview) is a software-only caching solution that delivers Microsoft content. MCC can be deployed to as many bare-metal servers or VMs as needed and is managed from a cloud portal. When deployed, MCC can help to reduce your network bandwidth usage for Microsoft software content and updates. Cache nodes are created in the cloud portal and are configured to deliver traffic to customers by manual CIDR or BGP routing. + +## Supported scenarios + +Microsoft Connected Cache (preview) supports the following scenarios: + +- Internet service provider that provides content downloads for end customers +- Network service providers that provide transit for other service providers + +## Supported content + +Microsoft Connected Cache uses Delivery Optimization as the backbone for Microsoft content delivery. Microsoft Connected Cache caches the following types: + +- Windows Update for Business: Windows feature and quality updates +- Office Click-to-Run apps: Microsoft 365 Apps and updates +- Client apps: Microsoft Store apps and updates +- Endpoint protection: Windows Defender definition updates +- Xbox: Xbox Game Pass (PC only) + +For the full list of content endpoints that Microsoft Connected Cache for ISPs supports, see [Microsoft Connected Cache content and services endpoints](delivery-optimization-endpoints.md). diff --git a/windows/deployment/do/mcc-isp-signup.md b/windows/deployment/do/mcc-isp-signup.md index 960485c7cb..9ae3e9ed19 100644 --- a/windows/deployment/do/mcc-isp-signup.md +++ b/windows/deployment/do/mcc-isp-signup.md @@ -21,7 +21,7 @@ ms.collection: tier3 This article details the process of signing up for Microsoft Connected Cache for Internet Service Providers (public preview). > [!NOTE] - > Microsoft Connected Cache is now in public review. Instead of submitting a survey, you can directly onboard by following the instructions in this article. + > Microsoft Connected Cache is now in public preview. Instead of submitting a survey, you can directly onboard by following the instructions in this article. ## Prerequisites diff --git a/windows/deployment/do/waas-delivery-optimization-faq.yml b/windows/deployment/do/waas-delivery-optimization-faq.yml index 1a0f413fd5..4cccd98fa6 100644 --- a/windows/deployment/do/waas-delivery-optimization-faq.yml +++ b/windows/deployment/do/waas-delivery-optimization-faq.yml @@ -81,6 +81,7 @@ sections: Delivery Optimization metadata: - `http://emdl.ws.microsoft.com` + - `http://download.windowsupdate.com` - `http://*.dl.delivery.mp.microsoft.com` Windows Update and Microsoft Store backend services and Windows Update and Microsoft Store payloads diff --git a/windows/deployment/do/waas-microsoft-connected-cache.md b/windows/deployment/do/waas-microsoft-connected-cache.md index dec5e3708d..7b4290c2a6 100644 --- a/windows/deployment/do/waas-microsoft-connected-cache.md +++ b/windows/deployment/do/waas-microsoft-connected-cache.md @@ -8,11 +8,11 @@ ms.localizationpriority: medium ms.author: carmenf ms.topic: article ms.technology: itpro-updates -ms.date: 12/31/2017 +ms.date: 05/09/2023 ms.collection: tier3 --- -# Microsoft Connected Cache overview +# What is Microsoft Connected Cache? **Applies to** @@ -31,47 +31,20 @@ Both products are created and managed in the cloud portal. ## Microsoft Connected Cache for ISPs (preview) > [!NOTE] -> Microsoft Connected Cache for Internet Service Providers is now in public preview. Instead of submitting a survey, you can directly onboard by following the instructions in the [Operator sign up and service onboarding](mcc-isp-signup.md) article. +> Microsoft Connected Cache for Internet Service Providers is now in public preview. To onboard, follow the instructions in the [Operator sign up and service onboarding](mcc-isp-signup.md) article. -Microsoft Connected Cache (MCC) for Internet Service Providers is currently in preview. MCC can be deployed to as many bare-metal servers or VMs as needed and is managed from a cloud portal. When deployed, MCC can help to reduce your network bandwidth usage for Microsoft software content and updates. Cache nodes are created in the cloud portal and are configured to deliver traffic to customers by manual CIDR or BGP routing. +Microsoft Connected Cache (MCC) for Internet Service Providers is currently in preview. MCC can be deployed to as many bare-metal servers or VMs as needed and is managed from a cloud portal. When deployed, MCC can help to reduce your network bandwidth usage for Microsoft software content and updates. Cache nodes are created in the cloud portal and are configured to deliver traffic to customers by manual CIDR or BGP routing. Learn more at [Microsoft Connected Cache for ISPs Overview](mcc-isp-overview.md). ## Microsoft Connected Cache for Enterprise and Education (early preview) > [!NOTE] > We're still accepting Enterprise and Education customers to join the early preview. To register your interest, fill out the survey located at [https://aka.ms/MSConnectedCacheSignup](https://aka.ms/MSConnectedCacheSignup). -Microsoft Connected Cache (MCC) for Enterprise and Education (early preview) is a software-only caching solution that delivers Microsoft content within Enterprise and Education networks. MCC can be deployed to as many Windows servers, bare-metal servers, or VMs as needed, and is managed from a cloud portal. Cache nodes are created in the cloud portal and are configured by applying the client policy using management tools such as Intune. +Microsoft Connected Cache (MCC) for Enterprise and Education (early preview) is a software-only caching solution that delivers Microsoft content within Enterprise and Education networks. MCC can be deployed to as many Windows servers, bare-metal servers, or VMs as needed, and is managed from a cloud portal. Cache nodes are created in the cloud portal and are configured by applying the client policy using management tools such as Intune. Learn more at [Microsoft Connected Cache for Enterprise and Education Overview](mcc-ent-edu-overview.md). -MCC is a hybrid (mix of on-premises and cloud resources) SaaS solution built as an Azure IoT Edge module and Docker compatible Linux container deployed to your Windows devices. The Delivery Optimization team chose IoT Edge for Linux on Windows (EFLOW) as a secure, reliable container management infrastructure. EFLOW is a Linux virtual machine, based on Microsoft's first party CBL-Mariner operating system. It’s built with the IoT Edge runtime and validated as a tier 1 supported environment for IoT Edge workloads. MCC will be a Linux IoT Edge module running on the Windows Host OS. - -## IoT Edge - -Both of Microsoft Connected Cache product offerings use Azure IoT Edge. Even though your MCC scenario isn't related to IoT, Azure IoT Edge is used as a more generic Linux container deployment and management infrastructure. The Azure IoT Edge runtime sits on your designated MCC device and performs management and communication operations. The runtime performs several functions important to manage MCC on your edge device: - -1. Installs and updates MCC on your edge device. -1. Maintains Azure IoT Edge security standards on your edge device. -1. Ensures that MCC is always running. -1. Reports MCC health and usage to the cloud for remote monitoring. - -To deploy a functional MCC to your device, you must obtain the necessary keys to provision the Connected Cache instance that communicates with Delivery Optimization services, and enable the device to cache and deliver content. The architecture of MCC is described below. - -For more information on Azure IoT Edge, see the Azure IoT Edge [documentation](/azure/iot-edge/about-iot-edge). - -## How MCC Works - -1. The Azure Management Portal is used to create MCC nodes. -1. The MCC container is deployed and provisioned to the server using the installer provided in the portal. -1. Client policy is set in your management solution to point to the IP address or FQDN of the cache server. -1. Microsoft end-user devices make range requests for content from the MCC node. -1. The MCC node pulls content from the CDN, seeds its local cache stored on disk, and delivers the content to the client. -1. Subsequent requests from end-user devices for content will now come from cache. -1. If the MCC node is unavailable, the client will pull content from CDN to ensure uninterrupted service for your subscribers. - -The following diagram displays and overview of how MCC functions: - -:::image type="content" source="./images/waas-mcc-diag-overview.png" alt-text="Diagram displaying the components of MCC." lightbox="./images/waas-mcc-diag-overview.png"::: +Microsoft Connected Cache (MCC) for Enterprise and Education (early preview) is a standalone cache for customers moving towards modern management and away from Configuration Manager distribution points. For Microsoft Connected Cache in Configuration Manager (generally available starting Configuration Manager version 2111), see [Microsoft Connected Cache in Configuration Manager](/mem/configmgr/core/plan-design/hierarchy/microsoft-connected-cache) ## Next steps -- [Microsoft Connected Cache for Enterprise and Education](mcc-enterprise-prerequisites.md) -- [Microsoft Connected Cache for ISPs](mcc-isp-signup.md) +- [Microsoft Connected Cache for ISPs Overview](mcc-isp-overview.md) +- [Microsoft Connected Cache for Enterprise and Education Overview](mcc-ent-edu-overview.md) diff --git a/windows/deployment/update/WIP4Biz-intro.md b/windows/deployment/update/WIP4Biz-intro.md index 15954efa93..ba129003a6 100644 --- a/windows/deployment/update/WIP4Biz-intro.md +++ b/windows/deployment/update/WIP4Biz-intro.md @@ -44,7 +44,7 @@ Windows 10 Insider Preview builds offer organizations a valuable and exciting op |Release channel |**Fast Ring:** Insider Preview builds in the Fast Ring are released approximately once a week and contain the very latest features. This makes them ideal for feature exploration.| |Users | Because Fast Ring builds are released so early in the development cycle, we recommend limiting feature exploration in your organization to IT administrators and developers running Insider Preview builds on secondary devices. | |Tasks | - Install and manage Insider Preview builds on devices (per device or centrally across multiple devices)
    - Explore new features in Windows designed for organizations, including new features related to current and planned line of business applications
    - Before running an Insider Preview build, check our [Windows Insider blog](https://blogs.windows.com/windowsexperience/tag/windows-insider-program/#k3WWwxKCTWHCO82H.97) for a summary of current features. | -|Feedback | - This helps us make adjustments to features as quickly as possible.
    - Encourage users to sign into the Feedback Hub using their Azure Active Directory work accounts. This enables both you and Microsoft to track feedback submitted by users within your specific organization. (Note: This tracking is only visible to Microsoft and registered Insiders within your organization’s domain.)
    - [Learn how to provide effective feedback in the Feedback Hub](https://insider.windows.com/how-to-feedback/) | +|Feedback | - This helps us make adjustments to features as quickly as possible.
    - Encourage users to sign into the Feedback Hub using their Azure Active Directory work accounts. This enables both you and Microsoft to track feedback submitted by users within your specific organization. (Note: This tracking is only visible to Microsoft and registered Insiders within your organization’s domain.)
    - [Learn how to provide effective feedback in the Feedback Hub](/windows-insider/feedback) | ## Validate Insider Preview builds Along with exploring new features, you also have the option to validate your apps and infrastructure on Insider Preview builds. Early validation has several benefits: diff --git a/windows/deployment/update/eval-infra-tools.md b/windows/deployment/update/eval-infra-tools.md index 14e8129982..4a20d28511 100644 --- a/windows/deployment/update/eval-infra-tools.md +++ b/windows/deployment/update/eval-infra-tools.md @@ -45,7 +45,7 @@ Keep security baselines current to help ensure that your environment is secure a There are a number of Windows policies (set by Group Policy, Intune, or other methods) that affect when Windows updates are installed, deferral, end-user experience, and many other aspects. Check these policies to make sure they are set appropriately. -- **Windows Administrative templates**: Each Windows client feature update has a supporting Administrative template (.admx) file. Group Policy tools use Administrative template files to populate policy settings in the user interface. The templates are available in the Download Center, for example, this one for [Windows 10, version 1909](https://www.microsoft.com/download/100591). +- **Windows Administrative templates**: Each Windows client feature update has a supporting Administrative template (.admx) file. Group Policy tools use Administrative template files to populate policy settings in the user interface. The templates are available in the Download Center, for example, this one for [Windows 11, version 22H2](https://www.microsoft.com/download/details.aspx?id=104593). - **Policies for update compliance and end-user experience**: A number of settings affect when a device installs updates, whether and for how long a user can defer an update, restart behavior after installation, and many other aspects of update behavior. It's especially important to look for existing policies that are out of date or could conflict with new ones. diff --git a/windows/deployment/update/media-dynamic-update.md b/windows/deployment/update/media-dynamic-update.md index 1fa2b50c6f..c1312b6132 100644 --- a/windows/deployment/update/media-dynamic-update.md +++ b/windows/deployment/update/media-dynamic-update.md @@ -8,7 +8,7 @@ ms.author: mstewart manager: aaroncz ms.topic: article ms.technology: itpro-updates -ms.date: 12/31/2017 +ms.date: 05/09/2023 ms.reviewer: stevedia --- diff --git a/windows/deployment/update/release-cycle.md b/windows/deployment/update/release-cycle.md index aa65a1cf19..6061c9efab 100644 --- a/windows/deployment/update/release-cycle.md +++ b/windows/deployment/update/release-cycle.md @@ -8,7 +8,7 @@ ms.author: mstewart manager: aaroncz ms.topic: article ms.technology: itpro-updates -ms.date: 03/23/2023 +ms.date: 05/19/2023 --- # Update release cycle for Windows clients @@ -96,7 +96,7 @@ Some of the new features may be disruptive to organizations. By default, these s - WSUS - Devices that have updates managed by Configuration Manager use WSUS -Features that are turned off by default are listed in the KB article for the monthly cumulative update. If you want to enable these features, there's a client policy that allows admins to **Enable features introduced via servicing that are off by default**. For more information about this policy, see [Enable features introduced via servicing that are off by default](waas-configure-wufb.md#enable-features-introduced-via-servicing-that-are-off-by-default). +Features that are turned off by default are listed in the KB article for the monthly cumulative update. If you want to enable these features, there's a client policy that allows admins to enable features that are behind temporary enterprise control. For more information about this policy, see [Enable features that are behind temporary enterprise feature control](waas-configure-wufb.md#enable-features-that-are-behind-temporary-enterprise-feature-control). ## Annual feature updates diff --git a/windows/deployment/update/waas-configure-wufb.md b/windows/deployment/update/waas-configure-wufb.md index 2b2f4074ec..c6c7a89a58 100644 --- a/windows/deployment/update/waas-configure-wufb.md +++ b/windows/deployment/update/waas-configure-wufb.md @@ -8,7 +8,7 @@ ms.localizationpriority: medium ms.author: mstewart ms.topic: article ms.technology: itpro-updates -ms.date: 02/28/2023 +ms.date: 05/19/2023 --- # Configure Windows Update for Business @@ -210,14 +210,14 @@ Starting with Windows 10, version 1607, you can selectively opt out of receiving | GPO for Windows 10, version 1607 or later:
    Computer Configuration > Administrative Templates > Windows Components > Windows Update > **Do not include drivers with Windows Updates** | \Policies\Microsoft\Windows\WindowsUpdate\ExcludeWUDriversInQualityUpdate | | MDM for Windows 10, version 1607 and later:
    ../Vendor/MSFT/Policy/Config/Update/
    **ExcludeWUDriversInQualityUpdate** | \Microsoft\PolicyManager\default\Update\ExcludeWUDriversInQualityUpdate | -## Enable features introduced via servicing that are off by default +## Enable features that are behind temporary enterprise feature control -New features and enhancements are introduced through the monthly cumulative update to provide continuous innovation for Windows 11. To give organizations time to plan and prepare, some of these new features are temporarily turned off by default. Features that are turned off by default are listed in the KB article for the monthly cumulative update. Typically, a feature is selected to be off by default because it either impacts the user experience or IT administrators significantly. +New features and enhancements are introduced through the monthly cumulative update to provide continuous innovation for Windows 11. To give organizations time to plan and prepare, some of these new features are temporarily turned off by default. Features that are turned off by default are listed in the KB article for the monthly cumulative update. Typically, a feature is selected to be off by default because it either impacts the user experience or IT administrators significantly. -The features that are turned off by default from servicing updates will be enabled in the next annual feature update. Organizations can choose to deploy feature updates at their own pace, to delay these features until they're ready for them. +The features that are behind temporary enterprise feature control will be enabled in the next annual feature update. Organizations can choose to deploy feature updates at their own pace, to delay these features until they're ready for them. For a list of features that are turned off by default, see [Windows 11 features behind temporary enterprise control](/windows/whats-new/temporary-enterprise-feature-control). -**Policy settings to enable features introduced via servicing that are off by default** +**Policy settings to enable features that are behind temporary enterprise control** | Policy | Sets registry key under HKLM\Software | | --- | --- | diff --git a/windows/deployment/update/waas-servicing-channels-windows-10-updates.md b/windows/deployment/update/waas-servicing-channels-windows-10-updates.md index 1b6ef429f8..82f1a7f953 100644 --- a/windows/deployment/update/waas-servicing-channels-windows-10-updates.md +++ b/windows/deployment/update/waas-servicing-channels-windows-10-updates.md @@ -48,10 +48,10 @@ The General Availability Channel is the default servicing channel for all Window To get started with the Windows Insider Program for Business, follows these steps: -1. On the [Windows Insider](https://insider.windows.com) website, go to **For Business > Getting Started** to [register your organizational Azure AD account](https://insider.windows.com/insidersigninaad/). -2. **Register your domain**. Rather than have each user register individually for Insider Preview builds, administrators can [register their domain](https://insider.windows.com/for-business-organization-admin/) and control settings centrally.
    **Note:** The signed-in user needs to be a **Global Administrator** of the Azure AD domain in order to be able to register the domain. +1. On the [Windows Insider](https://www.microsoft.com/windowsinsider/for-business) website, select **Register** to register your organizational Azure AD account. +2. Follow the prompts to register your tenant.
    **Note:** The signed-in user needs to be a **Global Administrator** of the Azure AD domain in order to be able to register. 3. Make sure the **Allow Telemetry** setting is set to **2** or higher. -4. For Windows 10, version 1709 or later, set policies to manage preview builds and their delivery: +4. For Windows devices, set policies to manage preview builds and their delivery: The **Manage preview builds** setting gives administrators control over enabling or disabling preview build installation on a device. You can also decide to stop preview builds once the release is public. * Group Policy: **Computer Configuration/Administrative Templates/Windows Components/Windows Update/Windows Update for Business** - *Manage preview builds* diff --git a/windows/deployment/update/wufb-compliancedeadlines.md b/windows/deployment/update/wufb-compliancedeadlines.md index 2c627d3a6e..3549b7bdb6 100644 --- a/windows/deployment/update/wufb-compliancedeadlines.md +++ b/windows/deployment/update/wufb-compliancedeadlines.md @@ -8,13 +8,13 @@ ms.author: mstewart manager: aaroncz ms.topic: article ms.technology: itpro-updates -ms.date: 12/31/2017 +ms.date: 05/12/2023 --- # Enforcing compliance deadlines for updates **Applies to** -- Windows 10 +- Windows 10 - Windows 11 Deploying feature or quality updates for many organizations is only part of the equation for managing their device ecosystem. The ability to enforce update compliance is the next important part. Windows Update for Business provides controls to manage deadlines for when devices should migrate to newer versions. @@ -43,3 +43,6 @@ When **Specify deadlines for automatic updates and restarts** is set (Windows 10 For feature updates, the deadline and grace period start their countdown from the time of a pending restart after the installation is complete. As soon as installation is complete and the device reaches pending restart, the device will try to update outside of active hours. Once the *effective deadline* is reached, the device will try to restart during active hours. (The effective deadline is whichever is the later of the restart pending date plus the specified deadline or the restart pending date plus the grace period.) For quality updates, the deadline countdown starts from the time the update is *offered* (not downloaded or installed). The grace period countdown starts from the time of the pending restart. The device will try to download and install the update at a time based on your other download and installation policies (the default is to automatically download and install in in the background). When the pending restart time is reached, the device will notify the user and try to update outside of active hours. Once the effective deadline is reached, the device will try to restart during active hours. + +> [!NOTE] +> When **Specify deadlines for automatic updates and restarts** is used, download, installation, and reboot settings stemming from the [Configure Automatic Updates](waas-restart.md#schedule-update-installation) are ignored. diff --git a/windows/deployment/upgrade/windows-10-edition-upgrades.md b/windows/deployment/upgrade/windows-10-edition-upgrades.md index ea38090b1d..c3c3acaa55 100644 --- a/windows/deployment/upgrade/windows-10-edition-upgrades.md +++ b/windows/deployment/upgrade/windows-10-edition-upgrades.md @@ -22,7 +22,6 @@ ms.date: 10/28/2022 With Windows 10, you can quickly upgrade from one edition of Windows 10 to another, provided the upgrade path is supported. For information on what edition of Windows 10 is right for you, see [Compare Windows 10 Editions](https://go.microsoft.com/fwlink/p/?LinkID=690882). For a comprehensive list of all possible upgrade paths to Windows 10, see [Windows 10 upgrade paths](windows-10-upgrade-paths.md). Downgrading the edition of Windows is discussed in the [License expiration](#license-expiration) section on this page. -For a list of operating systems that qualify for the Windows 10 Pro Upgrade or Windows 10 Enterprise Upgrade through Microsoft Volume Licensing, see [Windows 10 Qualifying Operating Systems](https://download.microsoft.com/download/2/d/1/2d14fe17-66c2-4d4c-af73-e122930b60f6/Windows10-QOS.pdf). The following table shows the methods and paths available to change the edition of Windows 10 that is running on your computer. diff --git a/windows/deployment/usmt/usmt-hard-link-migration-store.md b/windows/deployment/usmt/usmt-hard-link-migration-store.md index c11c83a8f3..13a65a73e1 100644 --- a/windows/deployment/usmt/usmt-hard-link-migration-store.md +++ b/windows/deployment/usmt/usmt-hard-link-migration-store.md @@ -63,14 +63,14 @@ Keeping the hard-link migration store can result in extra disk space being consu For example, a company has decided to deploy Windows 10 on all of their computers. Each employee will keep the same computer, but the operating system on each computer will be updated. -1. An administrator runs the **ScanState** command-line tool on each computer, specifying the `/hardlink` command-line option. The **ScanState** tool saves the user state to a hard-link migration store on each computer, improving performance by reducing file duplication, except in certain specific instances. +1. An administrator runs the **ScanState** command-line tool on each computer, specifying the `/hardlink` command-line option. The **ScanState** tool saves the user state to a hard-link migration store on each computer, improving performance by reducing file duplication, except in certain specific instances. > [!NOTE] - > As a best practice, we recommend that you do not create your hard-link migration store until just before you perform the migration in order to migrate the latest versions of your files. You should not use your software applications on the computer after creating the migration store until you have finished migrating your files with **LoadState**. + > As a best practice, we recommend that you do not create your hard-link migration store until just before you perform the migration in order to migrate the latest versions of your files. You should not use your software applications on the computer after creating the migration store until you have finished migrating your files with **LoadState**. -2. On each computer, an administrator installs the company's standard operating environment (SOE), which includes Windows 7 and other applications the company currently uses. +2. On each computer, an administrator installs the company's standard operating environment (SOE), which includes Windows 10 and other applications the company currently uses. -3. An administrator runs the **LoadState** command-line tool on each computer. The **LoadState** tool restores user state back on each computer. +3. An administrator runs the **LoadState** command-line tool on each computer. The **LoadState** tool restores user state back on each computer. > [!NOTE] > During the update of a domain-joined computer, the profiles of users whose SID cannot be resolved will not be migrated. When using a hard-link migration store, it could cause a data loss. @@ -119,7 +119,7 @@ For more information, see [Migrate EFS files and certificates](usmt-migrate-efs- Files that are locked by an application or the operating system are handled differently when using a hard-link migration store. -Files that are locked by the operating system can't remain in place and must be copied into the hard-link migration store. As a result, selecting many operating-system files for migration significantly reduces performance during a hard-link migration. As a best practice, we recommend that you don't migrate any files out of the `\Windows directory`, which minimizes performance-related issues. +Files that are locked by the operating system can't remain in place and must be copied into the hard-link migration store. As a result, selecting many operating-system files for migration significantly reduces performance during a hard-link migration. As a best practice, we recommend that you don't migrate any files out of the `\Windows` directory, which minimizes performance-related issues. Files that are locked by an application are treated the same in hard-link migrations as in other scenarios when the volume shadow-copy service isn't being utilized. The volume shadow-copy service can't be used with hard-link migrations. However, by modifying the new **<HardLinkStoreControl>** section in the `Config.xml` file, it's possible to enable the migration of files locked by an application. @@ -141,7 +141,7 @@ A new section in the `Config.xml` file allows optional configuration of some of > [!IMPORTANT] > You must use the `/nocompress` option with the `/HardLink` option. -The following XML sample specifies that files locked by an application under the `\Users` directory can remain in place during the migration. It also specifies that locked files that aren't located in the `\Users` directory should result in the **File in Use** error. It's important to exercise caution when specifying the paths using the ``** tag in order to minimize scenarios that make the hard-link migration store more difficult to delete. +The following XML sample specifies that files locked by an application under the `\Users` directory can remain in place during the migration. It also specifies that locked files that aren't located in the `\Users` directory should result in the **File in Use** error. It's important to exercise caution when specifying the paths using the **``** tag in order to minimize scenarios that make the hard-link migration store more difficult to delete. ```xml diff --git a/windows/deployment/volume-activation/volume-activation-windows-10.md b/windows/deployment/volume-activation/volume-activation-windows-10.md index 29dfd02ddc..3c213a2a45 100644 --- a/windows/deployment/volume-activation/volume-activation-windows-10.md +++ b/windows/deployment/volume-activation/volume-activation-windows-10.md @@ -27,7 +27,7 @@ ms.technology: itpro-fundamentals > [!TIP] > Are you looking for volume licensing information? > -> - [Download the Volume Licensing Reference Guide for Windows 10 Desktop Operating System](https://go.microsoft.com/fwlink/p/?LinkId=620104) +> - [Download the Volume Licensing Reference Guide for Windows 10 Desktop Operating System](https://www.microsoft.com/download/details.aspx?id=11091) > [!TIP] > Are you looking for information on retail activation? diff --git a/windows/deployment/windows-autopatch/deploy/windows-autopatch-groups-manage-autopatch-groups.md b/windows/deployment/windows-autopatch/deploy/windows-autopatch-groups-manage-autopatch-groups.md index 71ba52fc37..9831d4850d 100644 --- a/windows/deployment/windows-autopatch/deploy/windows-autopatch-groups-manage-autopatch-groups.md +++ b/windows/deployment/windows-autopatch/deploy/windows-autopatch-groups-manage-autopatch-groups.md @@ -1,7 +1,7 @@ --- title: Manage Windows Autopatch groups description: This article explains how to manage Autopatch groups -ms.date: 05/05/2023 +ms.date: 05/11/2023 ms.prod: windows-client ms.technology: itpro-updates ms.topic: how-to @@ -219,3 +219,12 @@ The Windows Autopatch team is currently developing the Autopatch group Azure AD > - Modern Workplace Devices-Windows Autopatch-Broad > > Use the [Policy health feature](../operate/windows-autopatch-policy-health-and-remediation.md) to restore these groups, if needed. For more information, see [restore deployment groups](../operate/windows-autopatch-policy-health-and-remediation.md#restore-deployment-groups). + +### Rename an Autopatch group + +- **Status: Active** + +You can't rename an Autopatch group yet. The Autopatch group name is appended to all deployment ring names in the Autopatch group. Windows Autopatch is currently developing the rename feature. + +> [!IMPORTANT] +> During the public preview, if you try to rename either the [Update rings](/mem/intune/protect/windows-10-update-rings) or [feature updates](/mem/intune/protect/windows-10-feature-updates) for Windows 10 and later policies directly in the Microsoft Intune end-user experience, the policy names are reverted back to the name defined by the Autopatch group end-user experience interface. diff --git a/windows/deployment/windows-autopatch/operate/windows-autopatch-maintain-environment.md b/windows/deployment/windows-autopatch/operate/windows-autopatch-maintain-environment.md index 8ac2a90c62..cab93e35da 100644 --- a/windows/deployment/windows-autopatch/operate/windows-autopatch-maintain-environment.md +++ b/windows/deployment/windows-autopatch/operate/windows-autopatch-maintain-environment.md @@ -1,7 +1,7 @@ --- title: Maintain the Windows Autopatch environment description: This article details how to maintain the Windows Autopatch environment -ms.date: 07/11/2022 +ms.date: 05/15/2023 ms.prod: windows-client ms.technology: itpro-updates ms.topic: how-to @@ -9,7 +9,10 @@ ms.localizationpriority: medium author: tiaraquan ms.author: tiaraquan manager: dougeby -ms.reviewer: hathind +ms.reviewer: smithcharles +ms.collection: + - highpri + - tier1 --- # Maintain the Windows Autopatch environment @@ -26,18 +29,20 @@ After you've completed enrollment in Windows Autopatch, some management settings | Setting | Description | | ----- | ----- | -| Deployment rings for Windows 10 or later | For any deployment rings for Windows 10 or later policies you've created, exclude the **Modern Workplace Devices - All** Azure AD group from each policy. For more information, see [Create and assign deployment rings](/mem/intune/protect/windows-10-update-rings#create-and-assign-update-rings).

    Windows Autopatch will also have created some update ring policies. all of which The policies will have "**Modern Workplace**" in the name. For example:

    • Modern Workplace Update Policy [Broad]-[Windows Autopatch]
    • Modern Workplace Update Policy [Fast]-[Windows Autopatch]
    • Modern Workplace Update Policy [First]-[Windows Autopatch]
    • Modern Workplace Update Policy [Test]-[Windows Autopatch]

    When you update your own policies, ensure that you don't exclude the **Modern Workplace Devices - All** Azure AD group from the policies that Windows Autopatch created.

    **To resolve the Not ready result:**

    After enrolling into Autopatch, make sure that any update ring policies you have **exclude** the **Modern Workplace Devices - All** Azure Active Directory (AD) group.For more information, see [Manage Windows 10 software updates in Intune](/mem/intune/protect/windows-update-for-business-configure).

    **To resolve the Advisory result:**

    1. Make sure that any update ring policies you have **exclude** the **Modern Workplace Devices - All** Azure Active Directory (AD) group.
    2. If you have assigned Azure AD user groups to these policies, make sure that any update ring policies you have also **exclude** the **Modern Workplace - All** Azure AD group that you add your Windows Autopatch users to (or an equivalent group).

    For more information, see [Manage Windows 10 software updates in Intune](/mem/intune/protect/windows-update-for-business-configure).

    | +| Deployment rings for Windows 10 or later | For any deployment rings for Windows 10 or later policies you've created, exclude the **Modern Workplace Devices - All** Azure AD group from each policy. For more information, see [Create and assign deployment rings](/mem/intune/protect/windows-10-update-rings#create-and-assign-update-rings).

    Windows Autopatch creates some update ring policies. These policies have "**Modern Workplace**" in the name. For example:

    • Modern Workplace Update Policy [Broad]-[Windows Autopatch]
    • Modern Workplace Update Policy [Fast]-[Windows Autopatch]
    • Modern Workplace Update Policy [First]-[Windows Autopatch]
    • Modern Workplace Update Policy [Test]-[Windows Autopatch]

    When you update your own policies, ensure that you don't exclude the **Modern Workplace Devices - All** Azure AD group from the policies that Windows Autopatch created.

    **To resolve the Not ready result:**

    After enrolling into Autopatch, make sure that any update ring policies you have **exclude** the **Modern Workplace Devices - All** Azure Active Directory (AD) group. For more information, see [Manage Windows 10 software updates in Intune](/mem/intune/protect/windows-update-for-business-configure).

    **To resolve the Advisory result:**

    1. Make sure that any update ring policies you have **exclude** the **Modern Workplace Devices - All** Azure Active Directory (AD) group.
    2. If you have assigned Azure AD user groups to these policies, make sure that any update ring policies you have also **exclude** the **Modern Workplace - All** Azure AD group that you add your Windows Autopatch users to (or an equivalent group).

    For more information, see [Manage Windows 10 software updates in Intune](/mem/intune/protect/windows-update-for-business-configure).

    | ## Windows Autopatch configurations Windows Autopatch deploys, manages and maintains all configurations related to the operation of the service, as described in [Changes made at tenant enrollment](../references/windows-autopatch-changes-to-tenant.md). Don't make any changes to any of the Windows Autopatch configurations. -## Windows Autopatch tenant actions +## Windows Autopatch tenant management -The **Tenant management** blade can be found by navigating to Tenant administration > Windows Autopatch > **Tenant management**. +### Windows Autopatch tenant actions + +The Tenant management blade presents IT admins with any actions that are required to maintain Windows Autopatch service health. The **Tenant management** blade can be found by navigating to **Tenant administration** > **Windows Autopatch** > **Tenant management**. > [!IMPORTANT] -> Starting October 12, 2022, Windows Autopatch will manage your tenant with our [enterprise applications](../references/windows-autopatch-changes-to-tenant.md#windows-autopatch-enterprise-applications). If your tenant is still using the [Windows Autopatch service accounts](../overview/windows-autopatch-privacy.md#service-accounts), your Global admin must go to the Tenant management blade to approve the configuration change. +> If you have any critical actions in your tenant, you must take action as soon as possible as the Windows Autopatch service might not be able to manage your tenant. When a critical action is active on your tenant, Windows Autopatch will consider your tenant as **[inactive](#inactive-status)**. The type of banner that appears depends on the severity of the action. Currently, only critical actions are listed. @@ -45,4 +50,30 @@ The type of banner that appears depends on the severity of the action. Currently | Severity | Description | | ----- | ----- | -| Critical | You must take action as soon as possible. If no action is taken, the Windows Autopatch service may be affected. | +| Critical | You must take action as soon as possible to avoid disruption to the Windows Autopatch service.

    If no action is taken, Windows Autopatch might not be able to manage devices in your tenant, and the Windows Autopatch service may be marked as **inactive**.

    To restore service health and return to an active status, all critical pending actions must be resolved.

    | + +### Critical actions + +| Action type | Severity | Description | +| ----- | ----- | ----- | +| Maintain tenant access | Critical | Required licenses have expired. The licenses include:
    • Microsoft Intune
    • Azure Active Directory Premium
    • Windows 10/11 Enterprise E3 or higher
      • For more information about specific services plans, see [Windows Autopatch Prerequisites](../prepare/windows-autopatch-prerequisites.md)

      To take action on missing licenses, you can visit the Microsoft 365 admin center or contact your Microsoft account manager. Until you have renewed the required licenses to run the service, Windows Autopatch marks your tenant as **inactive**. For more information, see [Microsoft 365 - What happens after my subscription expires?](/microsoft-365/commerce/subscriptions/what-if-my-subscription-expires)

      | +| Maintain tenant access | Critical | Address tenant access issues. Windows Autopatch currently can’t manage your tenant. Until you take action, your tenant is marked as **inactive**, and you have only limited access to the Windows Autopatch portal.

      Reasons for tenant access issues:

      • You haven't yet migrated to the new [Windows Autopatch enterprise application](../references/windows-autopatch-changes-to-tenant.md#windows-autopatch-enterprise-applications). Windows Autopatch uses this enterprise application to run the service.
      • You have blocked or removed the permissions required for the Windows Autopatch enterprise application.

      Take action by consenting to allow Windows Autopatch to make the appropriate changes on your behalf. You must be a Global Administrator to consent to this action. Once you provide consent, Windows Autopatch remediates this critical action for you.

      For more information, see [Windows Autopatch enterprise applications](../overview/windows-autopatch-privacy.md#tenant-access).

      | + +### Inactive status + +> [!NOTE] +> Only the Windows Autopatch sections of your tenant will be marked as **inactive**. + +When Windows Autopatch is **inactive**, you're alerted with banners on all Windows Autopatch blades. You only have access to the Tenant management and Support requests blades. All other blades return an error message and redirect you to Tenant management blade. + +To be taken out of the **inactive** status, you must [resolve any critical actions shown in the Tenant management blade](#critical-actions). + +> [!NOTE] +> Once critical actions are resolved, it can take up to two hours for Windows Autopatch to return to an **active** state. + +#### Impact to your tenant + +| Impact area | Description | +| ----- | ----- | +| Management | Windows Autopatch isn’t able to manage your tenant and perform non-interactive actions we use to run the service. Non-interactive actions include:
      • Managing the Windows Autopatch service
      • Publishing the baseline configuration updates to your tenant’s devices
      • Maintaining overall service health

      For more information, see [Windows Autopatch enterprise applications](../references/windows-autopatch-changes-to-tenant.md#windows-autopatch-enterprise-applications).

      | +| Device updates | Changes to Windows Autopatch policies aren't pushed to your devices. The existing configurations on these devices remain unchanged, and they continue receiving updates. | diff --git a/windows/deployment/windows-autopatch/whats-new/windows-autopatch-whats-new-2023.md b/windows/deployment/windows-autopatch/whats-new/windows-autopatch-whats-new-2023.md index a279da8f47..b4fb65849a 100644 --- a/windows/deployment/windows-autopatch/whats-new/windows-autopatch-whats-new-2023.md +++ b/windows/deployment/windows-autopatch/whats-new/windows-autopatch-whats-new-2023.md @@ -1,15 +1,18 @@ --- title: What's new 2023 description: This article lists the 2023 feature releases and any corresponding Message center post numbers. -ms.date: 05/01/2023 +ms.date: 05/15/2023 ms.prod: windows-client ms.technology: itpro-updates ms.topic: whats-new ms.localizationpriority: medium -author: tiaraquan +author: tiaraquan ms.author: tiaraquan manager: dougeby ms.reviewer: hathind +ms.collection: + - highpri + - tier1 --- # What's new 2023 @@ -24,6 +27,7 @@ Minor corrections such as typos, style, or formatting issues aren't listed. | Article | Description | | ----- | ----- | +| [Maintain the Windows Autopatch environment](../operate/windows-autopatch-maintain-environment.md) | Updated the following sections:
      • Tenant actions
      • Tenant action severity types
      • Critical actions

      Added the [Inactive status](../operate/windows-autopatch-maintain-environment.md#inactive-status) section

      • [MC536881](https://admin.microsoft.com/adminportal/home#/MessageCenter)
      | | [Device registration overview](../deploy/windows-autopatch-device-registration-overview.md) | Updated article to include Windows Autopatch groups. The Windows Autopatch groups feature is in public preview | | [Register your devices](../deploy/windows-autopatch-register-devices.md) | Updated article to include Windows Autopatch groups. The Windows Autopatch groups feature is in public preview | | [Windows Autopatch groups overview](../deploy/windows-autopatch-groups-overview.md) | New article for the Windows Autopatch groups experience. Windows Autopatch groups is in public preview | @@ -71,7 +75,7 @@ Minor corrections such as typos, style, or formatting issues aren't listed. | ----- | ----- | | [Windows quality update communications](../operate/windows-autopatch-windows-quality-update-communications.md#standard-communications) | Added guidance on how to [opt out of receiving emails for standard communications](../operate/windows-autopatch-windows-quality-update-communications.md#opt-out-of-receiving-emails-for-standard-communications) (public preview) | | [Microsoft 365 Apps for enterprise](../operate/windows-autopatch-microsoft-365-apps-enterprise.md) |
      • Added support for subscription versions of Microsoft Project and Visio desktop apps
      • Updated device eligibility criteria
      • Clarified update controls
      | -| [Customize Windows Update settings](../operate/windows-autopatch-windows-update.md) | New [Customize Windows Update settings](../operate/windows-autopatch-windows-update.md) feature. This feature is in public preview
    • [MC524715](https://admin.microsoft.com/adminportal/home#/MessageCenter)
    • | +| [Customize Windows Update settings](../operate/windows-autopatch-windows-update.md) | New [Customize Windows Update settings](../operate/windows-autopatch-windows-update.md) feature. This feature is in public preview
      • [MC524715](https://admin.microsoft.com/adminportal/home#/MessageCenter)
      | ### March service release diff --git a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md index 46a32b7e45..8c7588deb0 100644 --- a/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md +++ b/windows/privacy/basic-level-windows-diagnostic-events-and-fields-1809.md @@ -6,8 +6,8 @@ ms.technology: itpro-privacy localizationpriority: high author: DHB-MSFT ms.author: danbrown -manager: dougeby -ms.date: 03/27/2017 +manager: laurawi +ms.date: 05/23/2023 ms.topic: reference --- @@ -3375,7 +3375,7 @@ The following fields are available: - **IsDeviceNetworkMetered** Indicates whether the device is connected to a metered network. - **IsDeviceOobeBlocked** Indicates whether user approval is required to install updates on the device. - **IsDeviceRequireUpdateApproval** Indicates whether user approval is required to install updates on the device. -- **IsDeviceSccmManaged** Indicates whether the device is running the Configuration Manager to keep the operating system and applications up to date. +- **IsDeviceSccmManaged** Indicates whether the device is running Configuration Manager to keep the operating system and applications up to date. - **IsDeviceUninstallActive** Indicates whether the OS (operating system) on the device was recently updated. - **IsDeviceUpdateNotificationLevel** Indicates whether the device has a set policy to control update notifications. - **IsDeviceUpdateServiceManaged** Indicates whether the device uses WSUS (Windows Server Update Services). @@ -4249,7 +4249,7 @@ The following fields are available: - **FlightId** The ID of the Windows Insider build the device received. - **InstallDate** The date the driver was installed. - **InstallFlags** The driver installation flags. -- **OptionalData** Metadata specific to Windows Update (WU) associated with the driver (flight IDs, recovery IDs, etc.) +- **OptionalData** Metadata specific to Windows Update associated with the driver (flight IDs, recovery IDs, etc.) - **RebootRequired** Indicates whether a reboot is required after the installation. - **RollbackPossible** Indicates whether this driver can be rolled back. - **WuTargetedHardwareId** Indicates that the driver was installed because the device hardware ID was targeted by the Windows Update. @@ -5026,33 +5026,6 @@ This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedevic -### Microsoft.Windows.Inventory.General.AppHealthStaticAdd - -This event sends details collected for a specific application on the source device. The data collected with this event is used to keep Windows performing properly. - -The following fields are available: - -- **AhaVersion** The binary version of the App Health Analyzer tool. -- **ApplicationErrors** The count of application errors from the event log. -- **Bitness** The architecture type of the application (16 Bit or 32 bit or 64 bit). -- **device_level** Various JRE/JAVA versions installed on a particular device. -- **ExtendedProperties** Attribute used for aggregating all other attributes under this event type. -- **Jar** Flag to determine if an app has a Java JAR file dependency. -- **Jre** Flag to determine if an app has JRE framework dependency. -- **Jre_version** JRE versions an app has declared framework dependency for. -- **Name** Name of the application. -- **NonDPIAware** Flag to determine if an app is non-DPI aware. -- **NumBinaries** Count of all binaries (.sys,.dll,.ini) from application install location. -- **RequiresAdmin** Flag to determine if an app requests admin privileges for execution. -- **RequiresAdminv2** Additional flag to determine if an app requests admin privileges for execution. -- **RequiresUIAccess** Flag to determine if an app is based on UI features for accessibility. -- **VB6** Flag to determine if an app is based on VB6 framework. -- **VB6v2** Additional flag to determine if an app is based on VB6 framework. -- **Version** Version of the application. -- **VersionCheck** Flag to determine if an app has a static dependency on OS version. -- **VersionCheckv2** Additional flag to determine if an app has a static dependency on OS version. - - ### Microsoft.Windows.Inventory.General.InventoryMiscellaneousMemorySlotArrayInfoAdd This event provides basic information about active memory slots on the device. @@ -10124,4 +10097,4 @@ The following fields are available: - **LicenseType** The type of licensed used to authorize the app (0 - Unknown, 1 - User, 2 - Subscription, 3 - Offline, 4 - Disc). - **LicenseXuid** If the license type is 1 (User), this field contains the XUID (Xbox User ID) of the registered owner of the license. - **ProductGuid** The Xbox product GUID (Globally-Unique ID) of the application. -- **UserId** The XUID (Xbox User ID) of the current user. +- **UserId** The XUID (Xbox User ID) of the current user. \ No newline at end of file diff --git a/windows/privacy/required-diagnostic-events-fields-windows-11-22H2.md b/windows/privacy/required-diagnostic-events-fields-windows-11-22H2.md index 76b11fdfd5..02a50f6187 100644 --- a/windows/privacy/required-diagnostic-events-fields-windows-11-22H2.md +++ b/windows/privacy/required-diagnostic-events-fields-windows-11-22H2.md @@ -7,8 +7,8 @@ ms.technology: itpro-privacy localizationpriority: high author: DHB-MSFT ms.author: danbrown -manager: dougeby -ms.date: 08/26/2022 +manager: laurawi +ms.date: 05/23/2023 ms.topic: reference --- @@ -108,6 +108,29 @@ The following fields are available: - **SdbEntries** An array of fields that indicates the SDB entries that apply to this file. +### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileBackupAdd + +This event sends true/false compatibility decision data about a file to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser binary generating the events. +- **SdbEntries** Indicates if any matching compat Sdb entries are associated with this application + + +### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileBackupStartSync + +This event indicates that a full set of DataSourceMatchingInfoBlockStAdd events has completed being sent. This event is used to make compatibility decisions about files to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser binary generating the events. + + ### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileRemove This event indicates that the DatasourceApplicationFile object is no longer present. The data collected with this event is used to help keep Windows up to date. @@ -1269,7 +1292,6 @@ The following fields are available: - **uts** A bit field, with 2 bits being assigned to each user ID listed in xid. This field is omitted if all users are retail accounts. - **xid** A list of base10-encoded XBOX User IDs. - ## Common data fields ### Ms.Device.DeviceInventoryChange @@ -1284,6 +1306,7 @@ The following fields are available: - **objectType** Indicates the object type that the event applies to. - **syncId** A string used to group StartSync, EndSync, Add, and Remove operations that belong together. This field is unique by Sync period and is used to disambiguate in situations where multiple agents perform overlapping inventories for the same object. + ## Component-based servicing events ### CbsServicingProvider.CbsCapabilitySessionFinalize @@ -2246,6 +2269,18 @@ The following fields are available: ## Setup events +### Microsoft.Windows.Setup.WinSetupMon.ProtectionViolation + +This event provides information about move or deletion of a file or a directory which is being monitored for data safety during feature updates. The data collected with this event is used to help keep Windows up to date. + +The following fields are available: + +- **Path** Path to the file or the directory which is being moved or deleted. +- **Process** Path to the process which is requesting the move or the deletion. +- **SessionId** Identifier to correlate this component's telemetry with that of others. +- **TargetPath** (Optional) If the operation is a move, the target path to which the file or directory is being moved. + + ### SetupPlatformTel.SetupPlatformTelEvent This service retrieves events generated by SetupPlatform, the engine that drives the various deployment scenarios, to help keep Windows up to date. @@ -3373,7 +3408,6 @@ The following fields are available: This event is derived event results for the LaunchPageDuration scenario. - ### Microsoft.Windows.Update.WUClient.DownloadPaused This event is fired when the Download stage is paused. @@ -3448,4 +3482,7 @@ The following fields are available: - **ScenarioSupported** Whether the updated scenario that was passed in was supported. - **SessionId** The UpdateAgent “SessionId” value. - **UpdateId** Unique identifier for the Update. -- **WuId** Unique identifier for the Windows Update client. \ No newline at end of file +- **WuId** Unique identifier for the Windows Update client. + + + diff --git a/windows/privacy/required-windows-11-diagnostic-events-and-fields.md b/windows/privacy/required-windows-11-diagnostic-events-and-fields.md index 2c8573d89d..a2f855b64e 100644 --- a/windows/privacy/required-windows-11-diagnostic-events-and-fields.md +++ b/windows/privacy/required-windows-11-diagnostic-events-and-fields.md @@ -6,8 +6,8 @@ ms.technology: itpro-privacy localizationpriority: high author: DHB-MSFT ms.author: danbrown -manager: dougeby -ms.date: 05/28/2020 +manager: laurawi +ms.date: 05/23/2023 ms.collection: highpri ms.topic: reference --- @@ -149,6 +149,29 @@ The following fields are available: - **SdbEntries** An array of fields that indicates the SDB entries that apply to this file. +### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileBackupAdd + +This event sends true/false compatibility decision data about a file to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser binary generating the events. +- **SdbEntries** Indicates if any matching compat Sdb entries are associated with this application + + +### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileBackupStartSync + +This event indicates that a full set of DataSourceMatchingInfoBlockStAdd events has completed being sent. This event is used to make compatibility decisions about files to help keep Windows up to date. + +This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange). + +The following fields are available: + +- **AppraiserVersion** The version of the appraiser binary generating the events. + + ### Microsoft.Windows.Appraiser.General.DatasourceApplicationFileRemove This event indicates that the DatasourceApplicationFile object is no longer present. The data collected with this event is used to help keep Windows up to date. @@ -1455,7 +1478,7 @@ The following fields are available: - **MDMServiceProvider** A hash of the specific MDM authority, such as Microsoft Intune, that is managing the device. - **MPNId** Returns the Partner ID/MPN ID from Regkey. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\DeployID - **SCCMClientId** This ID correlate systems that send data to Compat Analytics (OMS) and other OMS based systems with systems in an enterprise Configuration Manager environment. -- **ServerFeatures** Represents the features installed on a Windows Server. This can be used by developers and administrators who need to automate the process of determining the features installed on a set of server computers. +- **ServerFeatures** Represents the features installed on a Windows Server. This can be used by developers and administrators who need to automate the process of determining the features installed on a set of server computers. - **SystemCenterID** The Configuration Manager ID is an anonymized one-way hash of the Active Directory Organization identifier @@ -1860,7 +1883,7 @@ The following fields are available: - **UpdateServiceURLConfigured** Retrieves if the device is managed by Windows Server Update Services (WSUS). - **WUDeferUpdatePeriod** Retrieves if deferral is set for Updates. - **WUDeferUpgradePeriod** Retrieves if deferral is set for Upgrades. -- **WUDODownloadMode** Retrieves whether DO is turned on and how to acquire/distribute updates Delivery Optimization (DO) allows users to deploy previously downloaded Windows Update (WU) updates to other devices on the same network. +- **WUDODownloadMode** Retrieves whether DO is turned on and how to acquire/distribute updates Delivery Optimization (DO) allows users to deploy previously downloaded Windows Update updates to other devices on the same network. - **WULCUVersion** Version of the LCU Installed on the machine. - **WUMachineId** Retrieves the Windows Update (WU) Machine Identifier. - **WUPauseState** Retrieves Windows Update setting to determine if updates are paused. @@ -2164,7 +2187,6 @@ The following fields are available: - **uts** A bit field, with 2 bits being assigned to each user ID listed in xid. This field is omitted if all users are retail accounts. - **xid** A list of base10-encoded XBOX User IDs. - ## Common data fields ### Ms.Device.DeviceInventoryChange @@ -3432,12 +3454,6 @@ The following fields are available: - **InventoryVersion** The version of the inventory file generating the events. -### Microsoft.Windows.Inventory.General.AppHealthStaticAdd - -This event sends details collected for a specific application on the source device. The data collected with this event is used to keep Windows performing properly. - - - ### Microsoft.Windows.Inventory.General.InventoryMiscellaneousMemorySlotArrayInfoAdd This event provides basic information about active memory slots on the device. @@ -6274,6 +6290,7 @@ The following fields are available: - **uptimeMinutes** Duration USO for up for in the current boot session. - **wilActivity** Wil Activity related information. + ### Microsoft.Windows.Update.WUClientExt.UUSLoadModuleFailed This is the UUSLoadModule failed event and is used to track the failure of loading an undocked component. The data collected with this event is used to help keep Windows up to date and secure. @@ -6574,6 +6591,8 @@ The following fields are available: This event is sent when the Update Reserve Manager removes a pending hard reserve adjustment. The data collected with this event is used to help keep Windows secure and up to date. + + ### Microsoft.Windows.UpdateReserveManager.TurnOffReserves This event is sent when the Update Reserve Manager turns off reserve functionality for certain operations. The data collected with this event is used to help keep Windows secure and up to date. @@ -6599,4 +6618,4 @@ The following fields are available: - **Disposition** The parameter for the hard reserve adjustment function. - **Flags** The flags passed to the hard reserve adjustment function. - **PendingHardReserveAdjustment** The final change to the hard reserve size. -- **UpdateType** Indicates whether the change is an increase or decrease in the size of the hard reserve. +- **UpdateType** Indicates whether the change is an increase or decrease in the size of the hard reserve. \ No newline at end of file diff --git a/windows/privacy/required-windows-diagnostic-data-events-and-fields-2004.md b/windows/privacy/required-windows-diagnostic-data-events-and-fields-2004.md index 5b73a85111..f564971ad6 100644 --- a/windows/privacy/required-windows-diagnostic-data-events-and-fields-2004.md +++ b/windows/privacy/required-windows-diagnostic-data-events-and-fields-2004.md @@ -6,8 +6,8 @@ ms.technology: itpro-privacy localizationpriority: high author: DHB-MSFT ms.author: danbrown -manager: dougeby -ms.date: 05/28/2020 +manager: laurawi +ms.date: 05/23/2023 ms.collection: highpri ms.topic: reference --- @@ -393,7 +393,7 @@ The following fields are available: - **DecisionSystemDiskSize_CO21H2Setup** The total number of objects of this type present on this device. - **DecisionSystemDiskSize_CU22H2Setup** The total number of objects of this type present on this device. - **DecisionSystemDiskSize_CU23H2Setup** The count of the number of this particular object type present on this device. -- **DecisionSystemDiskSize_NI22H2Setup** The total number of objects of this type present on this device. +- **DecisionSystemDiskSize_NI22H2Setup** The total number of objects of this type present on this device. - **DecisionSystemDiskSize_RS1** The total number of objects of this type present on this device. - **DecisionSystemDiskSize_RS2** The total number of objects of this type present on this device. - **DecisionSystemDiskSize_RS3** The total number of objects of this type present on this device. @@ -2422,7 +2422,7 @@ The following fields are available: - **WUDeferUpgradePeriod** Retrieves if deferral is set for Upgrades. - **WUDODownloadMode** Retrieves whether DO is turned on and how to acquire/distribute updates Delivery Optimization (DO) allows users to deploy previously downloaded Windows Update updates to other devices on the same network. - **WULCUVersion** Version of the LCU Installed on the machine. -- **WUMachineId** Retrieves the Windows Update (WU) Machine Identifier. +- **WUMachineId** Retrieves the Windows Update Machine Identifier. - **WUPauseState** Retrieves Windows Update setting to determine if updates are paused. - **WUServer** Retrieves the HTTP(S) URL of the WSUS server that is used by Automatic Updates and API callers (by default). @@ -2474,7 +2474,6 @@ The following fields are available: - **wilActivity** Contains the thread ID used to match the begin and end events, and for the end event also a HResult indicating sucess or failure. - ### Microsoft.Windows.Security.CodeIntegrity.HVCISysprep.HvciScanGetResultFailed Fires when driver scanning fails to get results. @@ -3114,6 +3113,37 @@ The following fields are available: ## Direct to update events +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCheckApplicability + +This event indicates that the Coordinator CheckApplicability call succeeded. The data collected with this event is used to help keep Windows secure and up to date. + +The following fields are available: + +- **ApplicabilityResult** Result of CheckApplicability function. +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **IsCTA** If device has the CTA regkey set. +- **IsDeviceAADDomainJoined** Indicates whether the device is logged in to the AAD (Azure Active Directory) domain. +- **IsDeviceADDomainJoined** Indicates whether the device is logged in to the AD (Active Directory) domain. +- **IsDeviceCloverTrail** Indicates whether the device has a Clover Trail system installed. +- **IsDeviceDiskSpaceLow** If device disk space is low. +- **IsDeviceEnterpriseSku** If device is an Enterprise SKU. +- **IsDeviceFeatureUpdatingPaused** Indicates whether Feature Update is paused on the device. +- **IsDeviceNetworkMetered** Indicates whether the device is connected to a metered network. +- **IsDeviceOobeBlocked** Indicates whether the OOBE (Out of Box Experience) is blocked on the device. +- **IsDeviceRequireUpdateApproval** Indicates whether user approval is required to install updates on the device. +- **IsDeviceSccmManaged** Indicates whether the device is running the Microsoft SCCM (System Center Configuration Manager) to keep the operating system and applications up to date. +- **IsDeviceUninstallActive** Indicates whether the OS (operating system) on the device was recently updated. +- **IsDeviceUpdateNotificationLevel** Indicates whether the device has a set policy to control update notifications. +- **IsDeviceUpdateServiceManaged** Indicates whether the device uses WSUS (Windows Server Update Services). +- **IsDeviceWUFBManaged** If device is WUfB managed. +- **IsDeviceZeroExhaust** Indicates whether the device subscribes to the Zero Exhaust policy to minimize connections from Windows to Microsoft. +- **IsGreaterThanMaxRetry** Indicates whether the DTU (Direct to Update) service has exceeded its maximum retry count. +- **IsVolumeLicensed** Indicates whether a volume license was used to authenticate the operating system or applications on the device. + + ### Microsoft.Windows.DirectToUpdate.DTUCoordinatorCheckApplicabilityGenericFailure This event indicatse that we have received an unexpected error in the Direct to Update (DTU) Coordinators CheckApplicability call. The data collected with this event is used to help keep Windows secure and up to date. @@ -3190,6 +3220,19 @@ The following fields are available: - **hResult** HRESULT of the failure. +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadIgnoredFailure + +This event indicates that we have received an error in the Direct to Update (DTU) Coordinator Download call that will be ignored. The data collected with this event is used to help keep Windows secure and up to date. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **hResult** HRESULT of the failure. + + ### Microsoft.Windows.DirectToUpdate.DTUCoordinatorDownloadSuccess This event indicates that the Coordinator Download call succeeded. The data collected with this event is used to help keep Windows secure and up to date. @@ -3253,6 +3296,18 @@ The following fields are available: - **hResult** HRESULT of the failure. +### Microsoft.Windows.DirectToUpdate.DTUCoordinatorInstallSuccess + +This event indicates that the Coordinator Install call succeeded. The data collected with this event is used to help keep Windows secure and up to date. + +The following fields are available: + +- **CampaignID** Campaign ID being run. +- **ClientID** Client ID being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. + + ### Microsoft.Windows.DirectToUpdate.DTUCoordinatorProgressCallBack This event indicates that the Coordinator's progress callback has been called. The data collected with this event is used to help keep Windows secure and up to date. @@ -3525,6 +3580,25 @@ The following fields are available: - **State** State of the workflow. +### Microsoft.Windows.DirectToUpdate.DTUNotificationUXEvaluation + +This event indicates that Applicability DLL ran a set of applicability tests. The data collected with this event is used to help keep Windows up to date and performing properly. + +The following fields are available: + +- **Action** The enumeration code of action that was handled. +- **ActiveTestExpectedResults** Bitmask of expected results of applicability tests. +- **ActiveTestResults** The bitmask results of applicability tests. +- **ActiveTestsRun** The bitmask of applicability tests that were run. +- **CampaignID** The ID of the campaign being run. +- **ClientID** The ID of the client being run. +- **CoordinatorVersion** The coordinator version of Direct To Update. +- **CV** Correlation vector. +- **FullTestResults** The bitmask of results of applicability tests. +- **FullTestsRun** The bitmask of applicability tests that were run. +- **SuppressedTests** The bitmask of applicability tests that were unable to run due to suppression caused by the configuration settings. + + ### Microsoft.Windows.DirectToUpdate.DTUNotificationUXEvaluationError This event indicates that Applicability DLL failed on a test. The data collected with this event is used to help keep Windows up to date and performing properly. @@ -3539,6 +3613,20 @@ The following fields are available: - **HRESULT** An error (if any) that occurred. +### Microsoft.Windows.DirectToUpdate.DTUNotificationUXExit + +This event indicates that DTUNotificationUX has finished execution. The data collected with this event is used to help keep Windows up to date and performing properly. + +The following fields are available: + +- **CampaignID** The ID of the campaign being run. +- **ClientID** The ID of the client being run. +- **CoordinatorVersion** Coordinator version of DTU. +- **CV** Correlation vector. +- **HRESULTCausingExit** HRESULT Causing an abnormal exit, or S_OK for normal exits. +- **ProcessExitCode** The exit code that DTUNotificationUX returns to DTUCoordinator. + + ### Microsoft.Windows.DirectToUpdate.DTUNotificationUXExitingState This event indicates that DTUNotificationUX has stopped processing a workflow state. The data collected with this event is used to help keep Windows up to date and performing properly. @@ -3753,7 +3841,7 @@ The following fields are available: - **FlightId** The ID of the Windows Insider build the device received. - **InstallDate** The date the driver was installed. - **InstallFlags** The driver installation flags. -- **OptionalData** Metadata specific to Windows Update (WU) associated with the driver (flight IDs, recovery IDs, etc.) +- **OptionalData** Metadata specific to Windows Update associated with the driver (flight IDs, recovery IDs, etc.) - **RebootRequired** Indicates whether a reboot is required after the installation. - **RollbackPossible** Indicates whether this driver can be rolled back. - **WuTargetedHardwareId** Indicates that the driver was installed because the device hardware ID was targeted by the Windows Update. @@ -4710,12 +4798,6 @@ The following fields are available: - **InventoryVersion** The version of the inventory file generating the events. -### Microsoft.Windows.Inventory.General.AppHealthStaticAdd - -This event sends details collected for a specific application on the source device. The data collected with this event is used to keep Windows performing properly. - - - ### Microsoft.Windows.Inventory.General.InventoryMiscellaneousMemorySlotArrayInfoAdd This event provides basic information about active memory slots on the device. @@ -8722,7 +8804,6 @@ The following fields are available: - **wilActivity** This struct provides a Windows Internal Library context used for Product and Service diagnostics. - ### Microsoft.Windows.Update.Orchestrator.DeferRestart This event indicates that a restart required for installing updates was postponed. The data collected with this event is used to help keep Windows secure and up to date. @@ -9012,7 +9093,7 @@ The following fields are available: - **updaterCmdLine** The command line requested by the updater. - **updaterId** The ID of the updater that requested the work. -- **wuDeviceid** Windows Update device ID. +- **wuDeviceid** Windows Update device ID. ### Microsoft.Windows.Update.Orchestrator.UniversalOrchestratorScheduleWorkNonSystem @@ -9359,7 +9440,7 @@ The following fields are available: - **PresentationCount** Number of times the interaction campaign has been presented. - **ResultId** The result ID currently recorded for the interaction campaign. - **StateCreationTime** Time the state was created. -- **StateModificationTime** Time the state was last modified. +- **StateModificationTime** Time the state was last modified. - **ThrottlingRoll** Randomly generated throttling roll for the interaction campaign. diff --git a/windows/security/TOC.yml b/windows/security/TOC.yml index d71b135f49..0c78b4dfbe 100644 --- a/windows/security/TOC.yml +++ b/windows/security/TOC.yml @@ -1,450 +1,28 @@ - name: Windows security href: index.yml -- name: Zero Trust and Windows - href: zero-trust-windows-device-health.md expanded: true +- name: Introduction + items: + - name: Windows security overview + href: introduction/index.md + - name: Zero Trust and Windows + href: zero-trust-windows-device-health.md + - name: Security features and edition requirements + href: introduction/security-features-edition-requirements.md + - name: Security features and licensing requirements + href: introduction/security-features-licensing-requirements.md - name: Hardware security - items: - - name: Overview - href: hardware.md - - name: Microsoft Pluton security processor - items: - - name: Microsoft Pluton overview - href: information-protection/pluton/microsoft-pluton-security-processor.md - - name: Microsoft Pluton as TPM - href: information-protection/pluton/pluton-as-tpm.md - - name: Trusted Platform Module - href: information-protection/tpm/trusted-platform-module-top-node.md - items: - - name: Trusted Platform Module overview - href: information-protection/tpm/trusted-platform-module-overview.md - - name: TPM fundamentals - href: information-protection/tpm/tpm-fundamentals.md - - name: How Windows uses the TPM - href: information-protection/tpm/how-windows-uses-the-tpm.md - - name: Manage TPM commands - href: information-protection/tpm/manage-tpm-commands.md - - name: Manager TPM Lockout - href: information-protection/tpm/manage-tpm-lockout.md - - name: Change the TPM password - href: information-protection/tpm/change-the-tpm-owner-password.md - - name: TPM Group Policy settings - href: information-protection/tpm/trusted-platform-module-services-group-policy-settings.md - - name: Back up the TPM recovery information to AD DS - href: information-protection/tpm/backup-tpm-recovery-information-to-ad-ds.md - - name: View status, clear, or troubleshoot the TPM - href: information-protection/tpm/initialize-and-configure-ownership-of-the-tpm.md - - name: Understanding PCR banks on TPM 2.0 devices - href: information-protection/tpm/switch-pcr-banks-on-tpm-2-0-devices.md - - name: TPM recommendations - href: information-protection/tpm/tpm-recommendations.md - - - name: Hardware-based root of trust - href: threat-protection/windows-defender-system-guard/how-hardware-based-root-of-trust-helps-protect-windows.md - - name: System Guard Secure Launch and SMM protection - href: threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md - - name: Enable virtualization-based protection of code integrity - href: threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity.md - - name: Kernel DMA Protection - href: information-protection/kernel-dma-protection-for-thunderbolt.md - - name: Windows secured-core devices - href: /windows-hardware/design/device-experiences/oem-highly-secure + href: hardware-security/toc.yml - name: Operating system security - items: - - name: Overview - href: operating-system.md - - name: System security - items: - - name: Secure the Windows boot process - href: information-protection/secure-the-windows-10-boot-process.md - - name: Trusted Boot - href: trusted-boot.md - - name: Cryptography and certificate management - href: cryptography-certificate-mgmt.md - - name: The Windows Security app - href: threat-protection/windows-defender-security-center/windows-defender-security-center.md - items: - - name: Virus & threat protection - href: threat-protection\windows-defender-security-center\wdsc-virus-threat-protection.md - - name: Account protection - href: threat-protection\windows-defender-security-center\wdsc-account-protection.md - - name: Firewall & network protection - href: threat-protection\windows-defender-security-center\wdsc-firewall-network-protection.md - - name: App & browser control - href: threat-protection\windows-defender-security-center\wdsc-app-browser-control.md - - name: Device security - href: threat-protection\windows-defender-security-center\wdsc-device-security.md - - name: Device performance & health - href: threat-protection\windows-defender-security-center\wdsc-device-performance-health.md - - name: Family options - href: threat-protection\windows-defender-security-center\wdsc-family-options.md - - name: Security policy settings - href: threat-protection/security-policy-settings/security-policy-settings.md - - name: Security auditing - href: threat-protection/auditing/security-auditing-overview.md - - name: Encryption and data protection - href: encryption-data-protection.md - items: - - name: Encrypted Hard Drive - href: information-protection/encrypted-hard-drive.md - - name: BitLocker - href: information-protection/bitlocker/bitlocker-overview.md - items: - - name: Overview of BitLocker Device Encryption in Windows - href: information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10.md - - name: BitLocker frequently asked questions (FAQ) - href: information-protection/bitlocker/bitlocker-frequently-asked-questions.yml - items: - - name: Overview and requirements - href: information-protection/bitlocker/bitlocker-overview-and-requirements-faq.yml - - name: Upgrading - href: information-protection/bitlocker/bitlocker-upgrading-faq.yml - - name: Deployment and administration - href: information-protection/bitlocker/bitlocker-deployment-and-administration-faq.yml - - name: Key management - href: information-protection/bitlocker/bitlocker-key-management-faq.yml - - name: BitLocker To Go - href: information-protection/bitlocker/bitlocker-to-go-faq.yml - - name: Active Directory Domain Services - href: information-protection/bitlocker/bitlocker-and-adds-faq.yml - - name: Security - href: information-protection/bitlocker/bitlocker-security-faq.yml - - name: BitLocker Network Unlock - href: information-protection/bitlocker/bitlocker-network-unlock-faq.yml - - name: General - href: information-protection/bitlocker/bitlocker-using-with-other-programs-faq.yml - - name: "Prepare your organization for BitLocker: Planning and policies" - href: information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md - - name: BitLocker deployment comparison - href: information-protection/bitlocker/bitlocker-deployment-comparison.md - - name: BitLocker basic deployment - href: information-protection/bitlocker/bitlocker-basic-deployment.md - - name: Deploy BitLocker on Windows Server 2012 and later - href: information-protection/bitlocker/bitlocker-how-to-deploy-on-windows-server.md - - name: BitLocker management for enterprises - href: information-protection/bitlocker/bitlocker-management-for-enterprises.md - - name: Enable Network Unlock with BitLocker - href: information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md - - name: Use BitLocker Drive Encryption Tools to manage BitLocker - href: information-protection/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md - - name: Use BitLocker Recovery Password Viewer - href: information-protection/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer.md - - name: BitLocker Group Policy settings - href: information-protection/bitlocker/bitlocker-group-policy-settings.md - - name: BCD settings and BitLocker - href: information-protection/bitlocker/bcd-settings-and-bitlocker.md - - name: BitLocker Recovery Guide - href: information-protection/bitlocker/bitlocker-recovery-guide-plan.md - - name: BitLocker Countermeasures - href: information-protection/bitlocker/bitlocker-countermeasures.md - - name: Protecting cluster shared volumes and storage area networks with BitLocker - href: information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md - - name: Troubleshoot BitLocker - items: - - name: Troubleshoot BitLocker - href: /troubleshoot/windows-client/windows-security/bitlocker-issues-troubleshooting - - name: "BitLocker cannot encrypt a drive: known issues" - href: /troubleshoot/windows-client/windows-security/bitlocker-cannot-encrypt-a-drive-known-issues - - name: "Enforcing BitLocker policies by using Intune: known issues" - href: /troubleshoot/windows-client/windows-security/enforcing-bitlocker-policies-by-using-intune-known-issues - - name: "BitLocker Network Unlock: known issues" - href: /troubleshoot/windows-client/windows-security/bitlocker-network-unlock-known-issues - - name: "BitLocker recovery: known issues" - href: /troubleshoot/windows-client/windows-security/bitlocker-recovery-known-issues - - name: "BitLocker configuration: known issues" - href: /troubleshoot/windows-client/windows-security/bitlocker-configuration-known-issues - - name: Troubleshoot BitLocker and TPM issues - items: - - name: "BitLocker cannot encrypt a drive: known TPM issues" - href: /troubleshoot/windows-client/windows-security/bitlocker-cannot-encrypt-a-drive-known-tpm-issues - - name: "BitLocker and TPM: other known issues" - href: /troubleshoot/windows-client/windows-security/bitlocker-and-tpm-other-known-issues - - name: Decode Measured Boot logs to track PCR changes - href: /troubleshoot/windows-client/windows-security/decode-measured-boot-logs-to-track-pcr-changes - - name: Personal Data Encryption (PDE) - items: - - name: Personal Data Encryption (PDE) overview - href: information-protection/personal-data-encryption/overview-pde.md - - name: Personal Data Encryption (PDE) frequently asked questions (FAQ) - href: information-protection/personal-data-encryption/faq-pde.yml - - name: Configure Personal Data Encryption (PDE) in Intune - items: - - name: Configure Personal Data Encryption (PDE) in Intune - href: information-protection/personal-data-encryption/configure-pde-in-intune.md - - name: Enable Personal Data Encryption (PDE) - href: information-protection/personal-data-encryption/pde-in-intune/intune-enable-pde.md - - name: Disable Winlogon automatic restart sign-on (ARSO) for PDE - href: information-protection/personal-data-encryption/pde-in-intune/intune-disable-arso.md - - name: Disable kernel-mode crash dumps and live dumps for PDE - href: information-protection/personal-data-encryption/pde-in-intune/intune-disable-memory-dumps.md - - name: Disable Windows Error Reporting (WER)/user-mode crash dumps for PDE - href: information-protection/personal-data-encryption/pde-in-intune/intune-disable-wer.md - - name: Disable hibernation for PDE - href: information-protection/personal-data-encryption/pde-in-intune/intune-disable-hibernation.md - - name: Disable allowing users to select when a password is required when resuming from connected standby for PDE - href: information-protection/personal-data-encryption/pde-in-intune/intune-disable-password-connected-standby.md - - name: Configure S/MIME for Windows - href: identity-protection/configure-s-mime.md - - name: Network security - items: - - name: VPN technical guide - href: identity-protection/vpn/vpn-guide.md - items: - - name: VPN connection types - href: identity-protection/vpn/vpn-connection-type.md - - name: VPN routing decisions - href: identity-protection/vpn/vpn-routing.md - - name: VPN authentication options - href: identity-protection/vpn/vpn-authentication.md - - name: VPN and conditional access - href: identity-protection/vpn/vpn-conditional-access.md - - name: VPN name resolution - href: identity-protection/vpn/vpn-name-resolution.md - - name: VPN auto-triggered profile options - href: identity-protection/vpn/vpn-auto-trigger-profile.md - - name: VPN security features - href: identity-protection/vpn/vpn-security-features.md - - name: VPN profile options - href: identity-protection/vpn/vpn-profile-options.md - - name: How to configure Diffie Hellman protocol over IKEv2 VPN connections - href: identity-protection/vpn/how-to-configure-diffie-hellman-protocol-over-ikev2-vpn-connections.md - - name: How to use single sign-on (SSO) over VPN and Wi-Fi connections - href: identity-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md - - name: Optimizing Office 365 traffic with the Windows VPN client - href: identity-protection/vpn/vpn-office-365-optimization.md - - name: Windows Defender Firewall - href: threat-protection/windows-firewall/windows-firewall-with-advanced-security.md - - name: Windows security baselines - href: threat-protection/windows-security-configuration-framework/windows-security-baselines.md - items: - - name: Security Compliance Toolkit - href: threat-protection/windows-security-configuration-framework/security-compliance-toolkit-10.md - - name: Get support - href: threat-protection/windows-security-configuration-framework/get-support-for-security-baselines.md - - name: Guide to removing Microsoft Baseline Security Analyzer (MBSA) - href: threat-protection/mbsa-removal-and-guidance.md - - name: Virus & threat protection - items: - - name: Overview - href: threat-protection/index.md - - name: Microsoft Defender Antivirus - href: /microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-windows - - name: Attack surface reduction rules - href: /microsoft-365/security/defender-endpoint/attack-surface-reduction - - name: Tamper protection - href: /microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection - - name: Network protection - href: /microsoft-365/security/defender-endpoint/network-protection - - name: Controlled folder access - href: /microsoft-365/security/defender-endpoint/controlled-folders - - name: Exploit protection - href: /microsoft-365/security/defender-endpoint/exploit-protection - - name: Microsoft Defender for Endpoint - href: /microsoft-365/security/defender-endpoint - - name: More Windows security - items: - - name: Override Process Mitigation Options to help enforce app-related security policies - href: threat-protection/override-mitigation-options-for-app-related-security-policies.md - - name: Use Windows Event Forwarding to help with intrusion detection - href: threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection.md - - name: Block untrusted fonts in an enterprise - href: threat-protection/block-untrusted-fonts-in-enterprise.md - - name: Windows Information Protection (WIP) - href: information-protection/windows-information-protection/protect-enterprise-data-using-wip.md - items: - - name: Create a WIP policy using Microsoft Intune - href: information-protection/windows-information-protection/overview-create-wip-policy.md - items: - - name: Create a WIP policy in Microsoft Intune - href: information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md - items: - - name: Deploy your WIP policy in Microsoft Intune - href: information-protection/windows-information-protection/deploy-wip-policy-using-intune-azure.md - - name: Associate and deploy a VPN policy for WIP in Microsoft Intune - href: information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune-azure.md - - name: Create and verify an EFS Data Recovery Agent (DRA) certificate - href: information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md - - name: Determine the enterprise context of an app running in WIP - href: information-protection/windows-information-protection/wip-app-enterprise-context.md - - name: Create a WIP policy using Microsoft Configuration Manager - href: information-protection/windows-information-protection/overview-create-wip-policy-configmgr.md - items: - - name: Create and deploy a WIP policy in Configuration Manager - href: information-protection/windows-information-protection/create-wip-policy-using-configmgr.md - - name: Create and verify an EFS Data Recovery Agent (DRA) certificate - href: information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md - - name: Determine the enterprise context of an app running in WIP - href: information-protection/windows-information-protection/wip-app-enterprise-context.md - - name: Mandatory tasks and settings required to turn on WIP - href: information-protection/windows-information-protection/mandatory-settings-for-wip.md - - name: Testing scenarios for WIP - href: information-protection/windows-information-protection/testing-scenarios-for-wip.md - - name: Limitations while using WIP - href: information-protection/windows-information-protection/limitations-with-wip.md - - name: How to collect WIP audit event logs - href: information-protection/windows-information-protection/collect-wip-audit-event-logs.md - - name: General guidance and best practices for WIP - href: information-protection/windows-information-protection/guidance-and-best-practices-wip.md - items: - - name: Enlightened apps for use with WIP - href: information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md - - name: Unenlightened and enlightened app behavior while using WIP - href: information-protection/windows-information-protection/app-behavior-with-wip.md - - name: Recommended Enterprise Cloud Resources and Neutral Resources network settings with WIP - href: information-protection/windows-information-protection/recommended-network-definitions-for-wip.md - - name: Using Outlook Web Access with WIP - href: information-protection/windows-information-protection/using-owa-with-wip.md - - name: Fine-tune WIP Learning - href: information-protection/windows-information-protection/wip-learning.md - - name: Disable WIP - href: information-protection/windows-information-protection/how-to-disable-wip.md + href: operating-system-security/toc.yml - name: Application security - items: - - name: Overview - href: apps.md - - name: Windows Defender Application Control and virtualization-based protection of code integrity - href: threat-protection/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md - - name: Windows Defender Application Control - href: threat-protection\windows-defender-application-control\windows-defender-application-control.md - - name: Microsoft Defender Application Guard - href: threat-protection\microsoft-defender-application-guard\md-app-guard-overview.md - - name: Windows Sandbox - href: threat-protection/windows-sandbox/windows-sandbox-overview.md - items: - - name: Windows Sandbox architecture - href: threat-protection/windows-sandbox/windows-sandbox-architecture.md - - name: Windows Sandbox configuration - href: threat-protection/windows-sandbox/windows-sandbox-configure-using-wsb-file.md - - name: Microsoft Defender SmartScreen overview - href: threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md - items: - - name: Enhanced Phishing Protection in Microsoft Defender SmartScreen - href: threat-protection\microsoft-defender-smartscreen\phishing-protection-microsoft-defender-smartscreen.md - - name: Microsoft Defender SmartScreen Group Policy and mobile device management (MDM) settings - href: threat-protection\microsoft-defender-smartscreen\microsoft-defender-smartscreen-available-settings.md - - name: Configure S/MIME for Windows - href: identity-protection\configure-s-mime.md - - name: Windows Credential Theft Mitigation Guide Abstract - href: identity-protection\windows-credential-theft-mitigation-guide-abstract.md -- name: User security and secured identity - items: - - name: Overview - href: identity.md - - name: Windows credential theft mitigation guide - href: identity-protection/windows-credential-theft-mitigation-guide-abstract.md - - name: Passwordless - items: - - name: Windows Hello for Business ⇒ - href: identity-protection/hello-for-business/index.yml - - name: FIDO 2 security keys - href: /azure/active-directory/authentication/howto-authentication-passwordless-security-key?context=/windows/security/context/context - - name: Local Administrator Password Solution (LAPS) - href: /windows-server/identity/laps/laps-overview?context=/windows/security/context/context - - name: Enterprise Certificate Pinning - href: identity-protection/enterprise-certificate-pinning.md - - name: Credential Guard - items: - - name: Protect derived domain credentials with Credential Guard - href: identity-protection/credential-guard/credential-guard.md - - name: How Credential Guard works - href: identity-protection/credential-guard/credential-guard-how-it-works.md - - name: Requirements - href: identity-protection/credential-guard/credential-guard-requirements.md - - name: Manage Credential Guard - href: identity-protection/credential-guard/credential-guard-manage.md - - name: Credential Guard protection limits - href: identity-protection/credential-guard/credential-guard-protection-limits.md - - name: Considerations when using Credential Guard - href: identity-protection/credential-guard/credential-guard-considerations.md - - name: Additional mitigations - href: identity-protection/credential-guard/additional-mitigations.md - - name: Known issues - href: identity-protection/credential-guard/credential-guard-known-issues.md - - name: Remote Credential Guard - href: identity-protection/remote-credential-guard.md - - name: Configuring LSA Protection - href: /windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection?toc=/windows/security/toc.json&bc=/windows/security/breadcrumb/toc.json - - name: Technical support policy for lost or forgotten passwords - href: identity-protection/password-support-policy.md - - name: Access Control - items: - - name: Overview - href: identity-protection/access-control/access-control.md - - name: Local Accounts - href: identity-protection/access-control/local-accounts.md - - name: User Account Control (UAC) - items: - - name: Overview - href: identity-protection/user-account-control/user-account-control-overview.md - - name: How User Account Control works - href: identity-protection/user-account-control/how-user-account-control-works.md - - name: User Account Control security policy settings - href: identity-protection/user-account-control/user-account-control-security-policy-settings.md - - name: User Account Control Group Policy and registry key settings - href: identity-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings.md - - name: Smart Cards - href: identity-protection/smart-cards/smart-card-windows-smart-card-technical-reference.md - items: - - name: How Smart Card Sign-in Works in Windows - href: identity-protection/smart-cards/smart-card-how-smart-card-sign-in-works-in-windows.md - items: - - name: Smart Card Architecture - href: identity-protection/smart-cards/smart-card-architecture.md - - name: Certificate Requirements and Enumeration - href: identity-protection/smart-cards/smart-card-certificate-requirements-and-enumeration.md - - name: Smart Card and Remote Desktop Services - href: identity-protection/smart-cards/smart-card-and-remote-desktop-services.md - - name: Smart Cards for Windows Service - href: identity-protection/smart-cards/smart-card-smart-cards-for-windows-service.md - - name: Certificate Propagation Service - href: identity-protection/smart-cards/smart-card-certificate-propagation-service.md - - name: Smart Card Removal Policy Service - href: identity-protection/smart-cards/smart-card-removal-policy-service.md - - name: Smart Card Tools and Settings - href: identity-protection/smart-cards/smart-card-tools-and-settings.md - items: - - name: Smart Cards Debugging Information - href: identity-protection/smart-cards/smart-card-debugging-information.md - - name: Smart Card Group Policy and Registry Settings - href: identity-protection/smart-cards/smart-card-group-policy-and-registry-settings.md - - name: Smart Card Events - href: identity-protection/smart-cards/smart-card-events.md - - name: Virtual smart cards - href: identity-protection/virtual-smart-cards/virtual-smart-card-overview.md - items: - - name: Understand and evaluate virtual smart cards - href: identity-protection/virtual-smart-cards/virtual-smart-card-understanding-and-evaluating.md - items: - - name: Get started with virtual smart cards - href: identity-protection/virtual-smart-cards/virtual-smart-card-get-started.md - - name: Use virtual smart cards - href: identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md - - name: Deploy virtual smart cards - href: identity-protection/virtual-smart-cards/virtual-smart-card-deploy-virtual-smart-cards.md - - name: Evaluate virtual smart card security - href: identity-protection/virtual-smart-cards/virtual-smart-card-evaluate-security.md - - name: Tpmvscmgr - href: identity-protection/virtual-smart-cards/virtual-smart-card-tpmvscmgr.md -- name: Cloud services - items: - - name: Overview - href: cloud.md - - name: Mobile device management - href: /windows/client-management/mdm/ - - name: Windows 365 Cloud PCs - href: /windows-365/overview - - name: Azure Virtual Desktop - href: /azure/virtual-desktop/ + href: application-security/toc.yml +- name: Identity protection + href: identity-protection/toc.yml +- name: Windows Privacy 🔗 + href: /windows/privacy - name: Security foundations - items: - - name: Overview - href: security-foundations.md - - name: Microsoft Security Development Lifecycle - href: threat-protection/msft-security-dev-lifecycle.md - - name: FIPS 140-2 Validation - href: threat-protection/fips-140-validation.md - - name: Common Criteria Certifications - href: threat-protection/windows-platform-common-criteria.md -- name: Windows Privacy - href: /windows/privacy/windows-10-and-privacy-compliance + href: security-foundations/toc.yml +- name: Cloud security + href: cloud-security/toc.yml \ No newline at end of file diff --git a/windows/security/application-security/application-control/toc.yml b/windows/security/application-security/application-control/toc.yml new file mode 100644 index 0000000000..8f15439329 --- /dev/null +++ b/windows/security/application-security/application-control/toc.yml @@ -0,0 +1,15 @@ +items: +- name: User Account Control (UAC) + items: + - name: Overview + href: user-account-control/index.md + - name: How UAC works + href: user-account-control/how-it-works.md + - name: UAC settings and configuration + href: user-account-control/settings-and-configuration.md +- name: Windows Defender Application Control and virtualization-based protection of code integrity + href: ../../threat-protection/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md +- name: Windows Defender Application Control + href: ../../threat-protection/windows-defender-application-control/windows-defender-application-control.md +- name: Smart App Control + href: ../../threat-protection/windows-defender-application-control/windows-defender-application-control.md \ No newline at end of file diff --git a/windows/security/application-security/application-control/user-account-control/how-it-works.md b/windows/security/application-security/application-control/user-account-control/how-it-works.md new file mode 100644 index 0000000000..861c6bc68b --- /dev/null +++ b/windows/security/application-security/application-control/user-account-control/how-it-works.md @@ -0,0 +1,195 @@ +--- +title: How User Account Control works +description: Learn about User Account Control (UAC) components and how it interacts with the end users. +ms.collection: + - highpri + - tier2 +ms.topic: conceptual +ms.date: 05/24/2023 +--- + +# How User Account Control works + +User Account Control (UAC) is a key part of Windows security. UAC reduces the risk of malware by limiting the ability of malicious code to execute with administrator privileges. This article describes how UAC works and how it interacts with the end-users. + +## UAC process and interactions + +With UAC, each application that requires the *administrator access token* must prompt the end user for consent. The only exception is the relationship that exists between parent and child processes. Child processes inherit the user's access token from the parent process. Both the parent and child processes, however, must have the same *integrity level*. + +Windows protects processes by marking their integrity levels. Integrity levels are measurements of trust: + +- A *high integrity application* is one that performs tasks that modify system data, such as a disk partitioning application +- A *low integrity application* is one that performs tasks that could potentially compromise the operating system, like as a Web brows + +Applications with lower integrity levels can't modify data in applications with higher integrity levels. When a standard user attempts to run an app that requires an administrator access token, UAC requires that the user provides valid administrator credentials. + +To better understand how this process works, let's take a closer look at the Windows sign in process. + +## Sign in process + +The following diagram shows how the sign in process for an administrator differs from the sign in process for a standard user. + +:::image type="content" source="images/uac-windows-logon-process.gif" alt-text="Diagram that describes the UAC Windows logon process."::: + +By default, both standard and administrator users access resources and execute apps in the security context of a standard user.\ +When a user signs in, the system creates an access token for that user. The access token contains information about the level of access that the user is granted, including specific security identifiers (SIDs) and Windows privileges. + +When an administrator logs on, two separate access tokens are created for the user: a *standard user access token* and an *administrator access token*. The standard user access token: + +- Contains the same user-specific information as the administrator access token, but the administrative Windows privileges and SIDs are removed +- It's used to start applications that don't perform administrative tasks (standard user apps) +- It's used to display the desktop by executing the process *explorer.exe*. Explorer.exe is the parent process from which all other user-initiated processes inherit their access token. As a result, all apps run as a standard user unless a user provides consent or credentials to approve an app to use a full administrative access token + +A user that is a member of the Administrators group can sign in, browse the Web, and read e-mail while using a standard user access token. When the administrator needs to perform a task that requires the administrator access token, Windows automatically prompts the user for approval. This prompt is called an *elevation prompt*, and its behavior can be configured via policy or registry. + +## The UAC user experience + +When UAC is enabled, the user experience for standard users is different from administrator users. The recommended and more secure method of running Windows, is to ensure your primary user account is a standard user. Running as a standard user helps to maximize security for a managed environment. With the built-in UAC elevation component, standard users can easily perform an administrative task by entering valid credentials for a local administrator account. + +The default, built-in UAC elevation component for standard users is the *credential prompt*. + +The alternative to running as a standard user is to run as an administrator in *Admin Approval Mode*. With the built-in UAC elevation component, members of the local Administrators group can easily perform an administrative task by providing approval. + +The default, built-in UAC elevation component for an administrator account in Admin Approval Mode is called the *consent prompt*. + +### The credential prompt + +The credential prompt is presented when a standard user attempts to perform a task that requires a user's administrative access token. Administrators can also be required to provide their credentials by setting the **User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode** policy setting value to **Prompt for credentials**. + +:::image type="content" source="images/uac-credential-prompt.png" alt-text="Screenshot showing the UAC credential prompt."::: + +### The consent prompt + +The consent prompt is presented when a user attempts to perform a task that requires a user's administrative access token. + + :::image type="content" source="images/uac-consent-prompt-admin.png" alt-text="Screenshot showing the UAC consent prompt."::: + +### UAC elevation prompts + +The UAC elevation prompts are color-coded to be app-specific, enabling for easier identification of an application's potential security risk. When an app attempts to run with an administrator's full access token, Windows first analyzes the executable file to determine its publisher. Apps are first separated into three categories based on the file's publisher: + +- Windows +- Publisher verified (signed) +- Publisher not verified (unsigned) + +The elevation prompt color-coding is as follows: + +- Gray background: The application is a Windows administrative app, such as a Control Panel item, or an application signed by a verified publisher + :::image type="content" source="images/uac-credential-prompt-signed.png" alt-text="Screenshot showing the UAC credential prompt with a signed executable."::: +- Yellow background: the application is unsigned or signed but isn't trusted + :::image type="content" source="images/uac-credential-prompt-unsigned.png" alt-text="Screenshot showing the UAC consent prompt with an unsigned executable."::: + +### Shield icon + +Some Control Panel items, such as **Date and Time**, contain a combination of administrator and standard user operations. Standard users can view the clock and change the time zone, but a full administrator access token is required to change the local system time. The following is a screenshot of the **Date and Time** Control Panel item. + +:::image type="content" source="images/uac-shield-icon.png" alt-text="Screenshot showing the UAC Shield Icon in Date and Time Properties." border="false"::: + +The shield icon on the **Change date and time...** button indicates that the process requires a full administrator access token. + +## Securing the elevation prompt + +The elevation process is further secured by directing the prompt to the *secure desktop*. The consent and credential prompts are displayed on the secure desktop by default. Only Windows processes can access the secure desktop. For higher levels of security, we recommend keeping the **User Account Control: Switch to the secure desktop when prompting for elevation** policy setting enabled. + +When an executable file requests elevation, the *interactive desktop*, also called the *user desktop*, is switched to the secure desktop. The secure desktop dims the user desktop and displays an elevation prompt that must be responded to before continuing. When the user selects **Yes** or **No**, the desktop switches back to the user desktop. + +Malware can present an imitation of the secure desktop, but when the **User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode** policy setting is set to **Prompt for consent**, the malware doesn't gain elevation if the user selects **Yes** on the imitation. If the policy setting is set to **Prompt for credentials**, malware imitating the credential prompt may be able to gather the credentials from the user. However, the malware doesn't gain elevated privilege and the system has other protections that mitigate malware from taking control of the user interface even with a harvested password. + +While malware could present an imitation of the secure desktop, this issue can't occur unless a user previously installed the malware on the PC. Because processes requiring an administrator access token can't silently install when UAC is enabled, the user must explicitly provide consent by selecting **Yes** or by providing administrator credentials. The specific behavior of the UAC elevation prompt is dependent upon security policies. + +## UAC Architecture + +The following diagram details the UAC architecture. + +:::image type="content" source="images/uac-architecture.gif" alt-text="Diagram that describes the UAC architecture."::: + +To better understand each component, review the following tables: + +### User + +|Component|Description| +|--- |--- | +|

      User performs operation requiring privilege|

      If the operation changes the file system or registry, Virtualization is called. All other operations call ShellExecute.| +|

      ShellExecute|

      ShellExecute calls CreateProcess. ShellExecute looks for the ERROR_ELEVATION_REQUIRED error from CreateProcess. If it receives the error, ShellExecute calls the Application Information service to attempt to perform the requested task with the elevated prompt.| +|

      CreateProcess|

      If the application requires elevation, CreateProcess rejects the call with ERROR_ELEVATION_REQUIRED.| + +### System + +|Component|Description| +|--- |--- | +|

      Application Information service|

      A system service that helps start apps that require one or more elevated privileges or user rights to run, such as local administrative tasks, and apps that require higher integrity levels. The Application Information service helps start such apps by creating a new process for the application with an administrative user's full access token when elevation is required. Depending on the configured policies, the user may give consent.| +|

      Elevating an ActiveX install|

      If ActiveX isn't installed, the system checks the UAC slider level. If ActiveX is installed, the **User Account Control: Switch to the secure desktop when prompting for elevation** Group Policy setting is checked.| +|

      Check UAC slider level|

      UAC has a slider to select from four levels of notification.

      • **Always notify** will:

        • Notify you when programs try to install software or make changes to your computer.
        • Notify you when you make changes to Windows settings.
        • Freeze other tasks until you respond.

        Recommended if you often install new software or visit unfamiliar websites.

      • **Notify me only when programs try to make changes to my computer** will:

        • Notify you when programs try to install software or make changes to your computer.
        • Not notify you when you make changes to Windows settings.
        • Freeze other tasks until you respond.

        Recommended if you don't often install apps or visit unfamiliar websites.

      • **Notify me only when programs try to make changes to my computer (do not dim my desktop)** will:

        • Notify you when programs try to install software or make changes to your computer.
        • Not notify you when you make changes to Windows settings.
        • Not freeze other tasks until you respond.

        Not recommended. Choose this only if it takes a long time to dim the desktop on your computer.

      • **Never notify (Disable UAC prompts)** will:

        • Not notify you when programs try to install software or make changes to your computer.
        • Not notify you when you make changes to Windows settings.
        • Not freeze other tasks until you respond.

        Not recommended due to security concerns.| +|

        Secure desktop enabled|

        The **User Account Control: Switch to the secure desktop when prompting for elevation** policy setting is checked:

        • If the secure desktop is enabled, all elevation requests go to the secure desktop regardless of prompt behavior policy settings for administrators and standard users.

        • If the secure desktop isn't enabled, all elevation requests go to the interactive user's desktop, and the per-user settings for administrators and standard users are used.| +|

          CreateProcess|

          CreateProcess calls AppCompat, Fusion, and Installer detection to assess if the app requires elevation. The file is then inspected to determine its requested execution level, which is stored in the application manifest for the file. CreateProcess fails if the requested execution level specified in the manifest doesn't match the access token and returns an error (ERROR_ELEVATION_REQUIRED) to ShellExecute.| +|

          AppCompat|

          The AppCompat database stores information in the application compatibility fix entries for an application.| +|

          Fusion|

          The Fusion database stores information from application manifests that describe the applications. The manifest schema is updated to add a new requested execution level field.| +|

          Installer detection|

          Installer detection detects setup files, which helps prevent installations from being run without the user's knowledge and consent.| + +### Kernel + +|Component|Description| +|--- |--- | +|

          Virtualization|

          Virtualization technology ensures that noncompliant apps don't silently fail to run or fail in a way that the cause can't be determined. UAC also provides file and registry virtualization and logging for applications that write to protected areas.| +|

          File system and registry|

          The per-user file and registry virtualization redirects per-computer registry and file write requests to equivalent per-user locations. Read requests are redirected to the virtualized per-user location first and to the per-computer location second.| + +The slider never turns off UAC completely. If you set it to **Never notify**, it will: + +- Keep the UAC service running +- Cause all elevation request initiated by administrators to be auto-approved without showing a UAC prompt +- Automatically deny all elevation requests for standard users + +> [!IMPORTANT] +> In order to fully disable UAC you must disable the policy **User Account Control: Run all administrators in Admin Approval Mode**. + +> [!WARNING] +> Some Universal Windows Platform apps may not work when UAC is disabled. + +### Virtualization + +Because system administrators in enterprise environments attempt to secure systems, many line-of-business (LOB) applications are designed to use only a standard user access token. As a result, you don't need to replace most apps when UAC is turned on. + +Windows includes file and registry virtualization technology for apps that aren't UAC-compliant and that requires an administrator's access token to run correctly. When an administrative app that isn't UAC-compliant attempts to write to a protected folder, such as *Program Files*, UAC gives the app its own virtualized view of the resource it's attempting to change. The virtualized copy is maintained in the user's profile. This strategy creates a separate copy of the virtualized file for each user that runs the noncompliant app. + +Most app tasks operate properly by using virtualization features. Although virtualization allows most applications to run, it's a short-term fix and not a long-term solution. App developers should modify their apps to be compliant as soon as possible, rather than relying on file, folder, and registry virtualization. + +Virtualization isn't an option in the following scenarios: + +- Virtualization doesn't apply to apps that are elevated and run with a full administrative access token +- Virtualization supports only 32-bit apps. Non-elevated 64-bit apps receive an access denied message when they attempt to acquire a handle (a unique identifier) to a Windows object. Native Windows 64-bit apps are required to be compatible with UAC and to write data into the correct locations +- Virtualization is disabled if the app includes an app manifest with a requested execution level attribute + +### Request execution levels + +An app manifest is an XML file that describes and identifies the shared and private side-by-side assemblies that an app should bind to at run time. The app manifest includes entries for UAC app compatibility purposes. Administrative apps that include an entry in the app manifest prompt the user for permission to access the user's access token. Although they lack an entry in the app manifest, most administrative app can run without modification by using app compatibility fixes. App compatibility fixes are database entries that enable applications that aren't UAC-compliant to work properly. + +All UAC-compliant apps should have a requested execution level added to the application manifest. If the application requires administrative access to the system, marking the app with a requested execution level of *require administrator* ensures that the system identifies this program as an administrative app, and performs the necessary elevation steps. Requested execution levels specify the privileges required for an app. + +### Installer detection technology + +Installation programs are apps designed to deploy software. Most installation programs write to system directories and registry keys. These protected system locations are typically writeable only by an administrator in Installer detection technology, which means that standard users don't have sufficient access to install programs. Windows heuristically detects installation programs and requests administrator credentials or approval from the administrator user in order to run with access privileges. Windows also heuristically detects updates and programs that uninstall applications. One of the design goals of UAC is to prevent installations from being run without the user's knowledge and consent because installation programs write to protected areas of the file system and registry. + +Installer detection only applies to: + +- 32-bit executable files +- Applications without a requested execution level attribute +- Interactive processes running as a standard user with UAC enabled + +Before a 32-bit process is created, the following attributes are checked to determine whether it's an installer: + +- The file name includes keywords such as "install," "setup," or "update." +- Versioning Resource fields contain the following keywords: Vendor, Company Name, Product Name, File Description, Original Filename, Internal Name, and Export Name +- Keywords in the side-by-side manifest are embedded in the executable file +- Keywords in specific StringTable entries are linked in the executable file +- Key attributes in the resource script data are linked in the executable file +- There are targeted sequences of bytes within the executable file + +> [!NOTE] +> The keywords and sequences of bytes were derived from common characteristics observed from various installer technologies. + +> [!NOTE] +> The *User Account Control: Detect application installations and prompt for elevation* policy must be enabled for installer detection to detect installation programs. For more information, see [User Account Control settings list](settings-and-configuration.md#user-account-control-settings-list). + +## Next steps + +Learn more about [User Account Control settings and configuration](settings-and-configuration.md). diff --git a/windows/security/identity-protection/user-account-control/images/uacarchitecture.gif b/windows/security/application-security/application-control/user-account-control/images/uac-architecture.gif similarity index 100% rename from windows/security/identity-protection/user-account-control/images/uacarchitecture.gif rename to windows/security/application-security/application-control/user-account-control/images/uac-architecture.gif diff --git a/windows/security/application-security/application-control/user-account-control/images/uac-consent-prompt-admin.png b/windows/security/application-security/application-control/user-account-control/images/uac-consent-prompt-admin.png new file mode 100644 index 0000000000..3e5a5ae7bc Binary files /dev/null and b/windows/security/application-security/application-control/user-account-control/images/uac-consent-prompt-admin.png differ diff --git a/windows/security/application-security/application-control/user-account-control/images/uac-credential-prompt-signed.png b/windows/security/application-security/application-control/user-account-control/images/uac-credential-prompt-signed.png new file mode 100644 index 0000000000..c66349ec11 Binary files /dev/null and b/windows/security/application-security/application-control/user-account-control/images/uac-credential-prompt-signed.png differ diff --git a/windows/security/application-security/application-control/user-account-control/images/uac-credential-prompt-unsigned.png b/windows/security/application-security/application-control/user-account-control/images/uac-credential-prompt-unsigned.png new file mode 100644 index 0000000000..1d8074889f Binary files /dev/null and b/windows/security/application-security/application-control/user-account-control/images/uac-credential-prompt-unsigned.png differ diff --git a/windows/security/application-security/application-control/user-account-control/images/uac-credential-prompt.png b/windows/security/application-security/application-control/user-account-control/images/uac-credential-prompt.png new file mode 100644 index 0000000000..462b775fcb Binary files /dev/null and b/windows/security/application-security/application-control/user-account-control/images/uac-credential-prompt.png differ diff --git a/windows/security/application-security/application-control/user-account-control/images/uac-settings-catalog.png b/windows/security/application-security/application-control/user-account-control/images/uac-settings-catalog.png new file mode 100644 index 0000000000..adbf9fb65e Binary files /dev/null and b/windows/security/application-security/application-control/user-account-control/images/uac-settings-catalog.png differ diff --git a/windows/security/application-security/application-control/user-account-control/images/uac-shield-icon.png b/windows/security/application-security/application-control/user-account-control/images/uac-shield-icon.png new file mode 100644 index 0000000000..7336800e99 Binary files /dev/null and b/windows/security/application-security/application-control/user-account-control/images/uac-shield-icon.png differ diff --git a/windows/security/identity-protection/user-account-control/images/uacwindowslogonprocess.gif b/windows/security/application-security/application-control/user-account-control/images/uac-windows-logon-process.gif similarity index 100% rename from windows/security/identity-protection/user-account-control/images/uacwindowslogonprocess.gif rename to windows/security/application-security/application-control/user-account-control/images/uac-windows-logon-process.gif diff --git a/windows/security/application-security/application-control/user-account-control/index.md b/windows/security/application-security/application-control/user-account-control/index.md new file mode 100644 index 0000000000..d0f5b5db9d --- /dev/null +++ b/windows/security/application-security/application-control/user-account-control/index.md @@ -0,0 +1,36 @@ +--- +title: User Account Control +description: Learn how User Account Control (UAC) helps to prevent unauthorized changes to Windows devices. +ms.collection: + - highpri + - tier2 +ms.topic: conceptual +ms.date: 05/24/2023 +--- + +# User Account Control overview + +User Account Control (UAC) is a Windows security feature designed to protect the operating system from unauthorized changes. When changes to the system require administrator-level permission, UAC notifies the user, giving the opportunity to approve or deny the change. UAC improves the security of Windows devices by limiting the access that malicious code has to execute with administrator privileges. UAC empowers users to make informed decisions about actions that may affect the stability and security of their device. + +Unless you disable UAC, malicious software is prevented from disabling or interfering with UAC settings. UAC is enabled by default, and you can configure it if you have administrative privileges. + +## Benefits of UAC + +UAC allows all users to sign in their devices using a *standard user account*. Processes launched using a *standard user token* may perform tasks using access rights granted to a standard user. For instance, Windows Explorer automatically inherits standard user level permissions. Any applications that are started using Windows Explorer (for example, by opening a shortcut) also run with the standard set of user permissions. Most applications, including the ones included with the operating system, are designed to work properly this way.\ +Other applications, like ones that aren't designed with security settings in mind, may require more permissions to run successfully. These applications are referred to as *legacy apps*. + +When a user tries to perform an action that requires administrative privileges, UAC triggers a *consent prompt*. The prompt notifies the user that a change is about to occur, asking for their permission to proceed: + +- If the user approves the change, the action is performed with the highest available privilege +- If the user doesn't approve the change, the action isn't performed and the application that requested the change is prevented from running + +:::image type="content" source="images/uac-consent-prompt-admin.png" alt-text="Screenshot showing the UAC consent prompt."::: + +When an app requires to run with more than standard user rights, UAC allows users to run apps with their *administrator token* (that is, with administrative rights and permissions) instead of their default, standard user token. Users continue to operate in the standard user security context, while enabling certain apps to run with elevated privileges, if needed. + +[!INCLUDE [user-account-control-uac](../../../../../includes/licensing/user-account-control-uac.md)] + +## Next steps + +- [How User Account Control works](how-it-works.md) +- [User Account Control settings and configuration](settings-and-configuration.md) diff --git a/windows/security/application-security/application-control/user-account-control/settings-and-configuration.md b/windows/security/application-security/application-control/user-account-control/settings-and-configuration.md new file mode 100644 index 0000000000..131622bbf4 --- /dev/null +++ b/windows/security/application-security/application-control/user-account-control/settings-and-configuration.md @@ -0,0 +1,102 @@ +--- +title: User Account Control settings and configuration +description: Learn about the User Account Control settings and how to configure them via Intune, CSP, group policy and registry. +ms.date: 05/26/2023 +ms.topic: how-to +--- + +# User Account Control settings and configuration + +## User Account Control settings list + +The following table lists the available settings to configure the UAC behavior, and their default values. + +|Setting name| Description| +|-|-| +|Run all administrators in Admin Approval Mode|Controls the behavior of all UAC policy settings.

          **Enabled (default)**: Admin Approval Mode is enabled. This policy must be enabled and related UAC settings configured. The policy allows the built-in Administrator account and members of the Administrators group to run in Admin Approval Mode.
          **Disabled**: Admin Approval Mode and all related UAC policy settings are disabled. Note: If this policy setting is disabled, the Windows Security app notifies you that the overall security of the operating system has been reduced.| +|Admin Approval Mode for the Built-in Administrator account|Controls the behavior of Admin Approval Mode for the built-in Administrator account.

          **Enabled**: The built-in Administrator account uses Admin Approval Mode. By default, any operation that requires elevation of privilege prompts the user to approve the operation.
          **Disabled (default)** : The built-in Administrator account runs all applications with full administrative privilege.| +|Switch to the secure desktop when prompting for elevation|This policy setting controls whether the elevation request prompt is displayed on the interactive user's desktop or the secure desktop.

          **Enabled (default)**: All elevation requests go to the secure desktop regardless of prompt behavior policy settings for administrators and standard users.
          **Disabled**: All elevation requests go to the interactive user's desktop. Prompt behavior policy settings for administrators and standard users are used.| +|Behavior of the elevation prompt for administrators in Admin Approval Mode|Controls the behavior of the elevation prompt for administrators.

          **Elevate without prompting**: Allows privileged accounts to perform an operation that requires elevation without requiring consent or credentials. **Use this option only in the most constrained environments**.
          **Prompt for credentials on the secure desktop**: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a privileged user name and password. If the user enters valid credentials, the operation continues with the user's highest available privilege.
          **Prompt for consent on the secure desktop**: When an operation requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege.
          **Prompt for credentials**: When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
          **Prompt for consent**: When an operation requires elevation of privilege, the user is prompted to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege.
          **Prompt for consent for non-Windows binaries (default)**: When an operation for a non-Microsoft application requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege.| +|Behavior of the elevation prompt for standard users|Controls the behavior of the elevation prompt for standard users.

          **Prompt for credentials (default)**: When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
          **Automatically deny elevation requests**: When an operation requires elevation of privilege, a configurable access denied error message is displayed. An enterprise that is running desktops as standard user may choose this setting to reduce help desk calls.
          **Prompt for credentials on the secure desktop** When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a different user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.| +|Detect application installations and prompt for elevation|Controls the behavior of application installation detection for the computer.

          **Enabled (default)**: When an app installation package is detected that requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
          **Disabled**: App installation packages aren't detected and prompted for elevation. Enterprises that are running standard user desktops and use delegated installation technologies, such as Microsoft Intune, should disable this policy setting. In this case, installer detection is unnecessary. | +|Only elevate executables that are signed and validated|Enforces signature checks for any interactive applications that request elevation of privilege. IT admins can control which applications are allowed to run by adding certificates to the Trusted Publishers certificate store on local devices.

          **Enabled**: Enforces the certificate certification path validation for a given executable file before it's permitted to run.
          **Disabled (default)**: Doesn't enforce the certificate certification path validation before a given executable file is permitted to run.| +|Only elevate UIAccess applications that are installed in secure locations|Controls whether applications that request to run with a User Interface Accessibility (UIAccess) integrity level must reside in a secure location in the file system. Secure locations are limited to the following folders:
          - `%ProgramFiles%`, including subfolders
          - `%SystemRoot%\system32\`
          - `%ProgramFiles(x86)%`, including subfolders


          **Enabled (default)**: If an app resides in a secure location in the file system, it runs only with UIAccess integrity.
          **Disabled**: An app runs with UIAccess integrity even if it doesn't reside in a secure location in the file system.

          **Note:** Windows enforces a digital signature check on any interactive apps that requests to run with a UIAccess integrity level regardless of the state of this setting.| +|Allow UIAccess applications to prompt for elevation without using the secure desktop|Controls whether User Interface Accessibility (UIAccess or UIA) programs can automatically disable the secure desktop for elevation prompts used by a standard user.

          **Enabled**: UIA programs, including Remote Assistance, automatically disable the secure desktop for elevation prompts. If you don't disable the **Switch to the secure desktop when prompting for elevation** policy setting, the prompts appear on the interactive user's desktop instead of the secure desktop. This setting allows the remote administrator to provide the appropriate credentials for elevation. This policy setting doesn't change the behavior of the UAC elevation prompt for administrators. If you plan to enable this policy setting, you should also review the effect of the **Behavior of the elevation prompt for standard users** policy setting: if it's' configured as **Automatically deny elevation requests**, elevation requests aren't presented to the user.
          **Disabled (default)**: The secure desktop can be disabled only by the user of the interactive desktop or by disabling the **Switch to the secure desktop when prompting for elevation** policy setting.| +|Virtualize File And Registry Write Failures To Per User Locations|Controls whether application write failures are redirected to defined registry and file system locations. This setting mitigates applications that run as administrator and write run-time application data to `%ProgramFiles%`, `%Windir%`, `%Windir%\system32`, or `HKLM\Software`.

          **Enabled (default)**: App write failures are redirected at run time to defined user locations for both the file system and registry.
          **Disabled**: Apps that write data to protected locations fail.| + +## User Account Control configuration + +To configure UAC, you can use: + +- Microsoft Intune/MDM +- Group policy +- Registry + +The following instructions provide details how to configure your devices. Select the option that best suits your needs. + + +#### [:::image type="icon" source="../../../images/icons/intune.svg" border="false"::: **Intune/MDM**](#tab/intune) + +### Configure UAC with a Settings catalog policy + +To configure devices using Microsoft Intune, [create a **Settings catalog** policy][MEM-2], and use the settings listed under the category **`Local Policies Security Options`**: + +:::image type="content" source="./images/uac-settings-catalog.png" alt-text="Screenshot that shows the UAC policies in the Intune settings catalog." lightbox="./images/uac-settings-catalog.png" border="True"::: + +Assign the policy to a security group that contains as members the devices or users that you want to configure. + +Alternatively, you can configure devices using a [custom policy][MEM-1] with the [LocalPoliciesSecurityOptions Policy CSP][WIN-1].\ +The policy settings are located under: `./Device/Vendor/MSFT/Policy/Config/LocalPoliciesSecurityOptions`. + +|Setting| +| - | +| **Setting name**: Run all administrators in Admin Approval Mode
          **Policy CSP name**: `UserAccountControl_RunAllAdministratorsInAdminApprovalMode`| +| **Setting name**: Admin Approval Mode for the built-in Administrator account
          **Policy CSP name**: `UserAccountControl_UseAdminApprovalMode`| +| **Setting name**: Switch to the secure desktop when prompting for elevation
          **Policy CSP name**: `UserAccountControl_SwitchToTheSecureDesktopWhenPromptingForElevation`| +| **Setting name**: Behavior of the elevation prompt for administrators in Admin Approval Mode
          **Policy CSP name**: `UserAccountControl_BehaviorOfTheElevationPromptForAdministrators`| +| **Setting name**: Behavior of the elevation prompt for standard users
          **Policy CSP name**: `UserAccountControl_BehaviorOfTheElevationPromptForStandardUsers`| +| **Setting name**: Detect application installations and prompt for elevation
          **Policy CSP name**: `UserAccountControl_DetectApplicationInstallationsAndPromptForElevation`| +| **Setting name**: Only elevate executables that are signed and validated
          **Policy CSP name**: `UserAccountControl_OnlyElevateExecutableFilesThatAreSignedAndValidated`| +| **Setting name**: Only elevate UIAccess applications that are installed in secure locations
          **Policy CSP name**: `UserAccountControl_OnlyElevateUIAccessApplicationsThatAreInstalledInSecureLocations`| +| **Setting name**: Allow UIAccess applications to prompt for elevation without using the secure desktop
          **Policy CSP name**: `UserAccountControl_AllowUIAccessApplicationsToPromptForElevation`| +| **Setting name**: Virtualize file and registry write failures to per-user locations
          **Policy CSP name**: `UserAccountControl_VirtualizeFileAndRegistryWriteFailuresToPerUserLocations`| + +#### [:::image type="icon" source="../../../images/icons/group-policy.svg" border="false"::: **Group policy**](#tab/gpo) + +You can use security policies to configure how User Account Control works in your organization. The policies can be configured locally by using the Local Security Policy snap-in (`secpol.msc`) or configured for the domain, OU, or specific groups by group policy. + +The policy settings are located under: `Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options`. + +| Group Policy setting |Default value| +| - | - | +|User Account Control: Run all administrators in Admin Approval Mode| Enabled | +|User Account Control: Admin Approval Mode for the built-in Administrator account| Disabled | +|User Account Control: Switch to the secure desktop when prompting for elevation | Enabled | +|User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode| Prompt for consent for non-Windows binaries | +|User Account Control: Behavior of the elevation prompt for standard users | Prompt for credentials | +|User Account Control: Detect application installations and prompt for elevation| Enabled (default for home only)
          Disabled (default) | +|User Account Control: Only elevate executables that are signed and validated| Disabled | +|User Account Control: Only elevate UIAccess applications that are installed in secure locations | Enabled | +|User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop| Disabled | +|User Account Control: Virtualize file and registry write failures to per-user locations | Enabled | + +#### [:::image type="icon" source="../../../images/icons/windows-os.svg" border="false"::: **Registry**](#tab/reg) + +The registry keys are found under the key: `HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System`. + +| Setting name | Registry key name | Value | +| - | - | - | +| Run all administrators in Admin Approval Mode | `EnableLUA` | 0 = Disabled
          1 (Default) = Enabled | +| Admin Approval Mode for the built-in Administrator account | `FilterAdministratorToken` | 0 (Default) = Disabled
          1 = Enabled | +| Switch to the secure desktop when prompting for elevation| `PromptOnSecureDesktop` | 0 = Disabled
          1 (Default) = Enabled | +| Behavior of the elevation prompt for administrators in Admin Approval Mode| `ConsentPromptBehaviorAdmin` | 0 = Elevate without prompting
          1 = Prompt for credentials on the secure desktop
          2 = Prompt for consent on the secure desktop
          3 = Prompt for credentials
          4 = Prompt for consent
          5 (Default) = Prompt for consent for non-Windows binaries| +| Behavior of the elevation prompt for standard users | `ConsentPromptBehaviorUser` | 0 = Automatically deny elevation requests
          1 = Prompt for credentials on the secure desktop
          3 (Default) = Prompt for credentials | +| Detect application installations and prompt for elevation | `EnableInstallerDetection` | 1 = Enabled (default for home only)
          0 = Disabled (default) | +| Only elevate executables that are signed and validated | `ValidateAdminCodeSignatures` | 0 (Default) = Disabled
          1 = Enabled | +| Only elevate UIAccess applications that are installed in secure locations | `EnableSecureUIAPaths` | 0 = Disabled
          1 (Default) = Enabled | +| Allow UIAccess applications to prompt for elevation without using the secure desktop | `EnableUIADesktopToggle` | 0 (Default) = Disabled
          1 = Enabled | +| Virtualize file and registry write failures to per-user locations | `EnableVirtualization` | 0 = Disabled
          1 (Default) = Enabled | + +[WIN-1]: /windows/client-management/mdm/policy-csp-localpoliciessecurityoptions +[MEM-1]: /mem/intune/configuration/custom-settings-windows-10 +[MEM-2]: /mem/intune/configuration/settings-catalog diff --git a/windows/security/application-security/application-isolation/toc.yml b/windows/security/application-security/application-isolation/toc.yml new file mode 100644 index 0000000000..cb920b5e4e --- /dev/null +++ b/windows/security/application-security/application-isolation/toc.yml @@ -0,0 +1,20 @@ +items: +- name: Microsoft Defender Application Guard (MDAG) + href: ../../threat-protection\microsoft-defender-application-guard\md-app-guard-overview.md +- name: MDAG for Edge standalone mode + href: ../../threat-protection/microsoft-defender-application-guard/md-app-guard-overview.md +- name: MDAG for Edge enterprise mode and enterprise management 🔗 + href: /deployedge/microsoft-edge-security-windows-defender-application-guard +- name: MDAG for Microsoft Office + href: https://support.microsoft.com/office/application-guard-for-office-9e0fb9c2-ffad-43bf-8ba3-78f785fdba46 +- name: MDAG configure via MDM 🔗 + href: /windows/client-management/mdm/windowsdefenderapplicationguard-csp +- name: Windows containers 🔗 + href: /virtualization/windowscontainers/about +- name: Windows Sandbox + href: ./windows-sandbox/windows-sandbox-overview.md + items: + - name: Windows Sandbox architecture + href: ./windows-sandbox/windows-sandbox-architecture.md + - name: Windows Sandbox configuration + href: ./windows-sandbox/windows-sandbox-configure-using-wsb-file.md \ No newline at end of file diff --git a/windows/security/threat-protection/windows-sandbox/images/1-dynamic-host.png b/windows/security/application-security/application-isolation/windows-sandbox/images/1-dynamic-host.png similarity index 100% rename from windows/security/threat-protection/windows-sandbox/images/1-dynamic-host.png rename to windows/security/application-security/application-isolation/windows-sandbox/images/1-dynamic-host.png diff --git a/windows/security/threat-protection/windows-sandbox/images/2-dynamic-working.png b/windows/security/application-security/application-isolation/windows-sandbox/images/2-dynamic-working.png similarity index 100% rename from windows/security/threat-protection/windows-sandbox/images/2-dynamic-working.png rename to windows/security/application-security/application-isolation/windows-sandbox/images/2-dynamic-working.png diff --git a/windows/security/threat-protection/windows-sandbox/images/3-memory-sharing.png b/windows/security/application-security/application-isolation/windows-sandbox/images/3-memory-sharing.png similarity index 100% rename from windows/security/threat-protection/windows-sandbox/images/3-memory-sharing.png rename to windows/security/application-security/application-isolation/windows-sandbox/images/3-memory-sharing.png diff --git a/windows/security/threat-protection/windows-sandbox/images/4-integrated-kernal.png b/windows/security/application-security/application-isolation/windows-sandbox/images/4-integrated-kernal.png similarity index 100% rename from windows/security/threat-protection/windows-sandbox/images/4-integrated-kernal.png rename to windows/security/application-security/application-isolation/windows-sandbox/images/4-integrated-kernal.png diff --git a/windows/security/threat-protection/windows-sandbox/images/5-wddm-gpu-virtualization.png b/windows/security/application-security/application-isolation/windows-sandbox/images/5-wddm-gpu-virtualization.png similarity index 100% rename from windows/security/threat-protection/windows-sandbox/images/5-wddm-gpu-virtualization.png rename to windows/security/application-security/application-isolation/windows-sandbox/images/5-wddm-gpu-virtualization.png diff --git a/windows/security/threat-protection/windows-sandbox/windows-sandbox-architecture.md b/windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-architecture.md similarity index 97% rename from windows/security/threat-protection/windows-sandbox/windows-sandbox-architecture.md rename to windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-architecture.md index 0dfbc42f89..dac2d9f311 100644 --- a/windows/security/threat-protection/windows-sandbox/windows-sandbox-architecture.md +++ b/windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-architecture.md @@ -1,13 +1,8 @@ --- title: Windows Sandbox architecture description: Windows Sandbox architecture -ms.prod: windows-client -author: vinaypamnani-msft -ms.author: vinpa -manager: aaroncz ms.topic: article -ms.date: 6/30/2022 -ms.technology: itpro-security +ms.date: 05/25/2023 --- # Windows Sandbox architecture @@ -19,7 +14,7 @@ Windows Sandbox benefits from new container technology in Windows to achieve a c Rather than requiring a separate copy of Windows to boot the sandbox, Dynamic Base Image technology uses the copy of Windows already installed on the host. Most OS files are immutable and can be freely shared with Windows Sandbox. A small subset of operating system files are mutable and can't be shared, so the sandbox base image contains pristine copies of them. A complete Windows image can be constructed from a combination of the sharable immutable files on the host and the pristine copies of the mutable files. With the help of this scheme, Windows Sandbox has a full Windows installation to boot from without needing to download or store an extra copy of Windows. - + Before Windows Sandbox is installed, the dynamic base image package is stored as a compressed 30-MB package. Once it's installed, the dynamic base image occupies about 500 MB of disk space. ![A chart compares scale of dynamic image of files and links with the host file system.](images/1-dynamic-host.png) @@ -43,7 +38,7 @@ With ordinary virtual machines, the Microsoft hypervisor controls the scheduling ![A chart compares the scheduling in Windows Sandbox versus a traditional VM.](images/4-integrated-kernal.png) Windows Sandbox employs a unique policy that allows the virtual processors of the Sandbox to be scheduled like host threads. Under this scheme, high-priority tasks on the host can preempt less important work in the Sandbox. This preemption means that the most important work will be prioritized, whether it's on the host or in the container. - + ## WDDM GPU virtualization Hardware accelerated rendering is key to a smooth and responsive user experience, especially for graphics-intensive use cases. Microsoft works with its graphics ecosystem partners to integrate modern graphics virtualization capabilities directly into DirectX and Windows Display Driver Model (WDDM), the driver model used by Windows. @@ -53,7 +48,7 @@ This feature allows programs running inside the sandbox to compete for GPU resou ![A chart illustrates graphics kernel use in Sandbox managed alongside apps on the host.](images/5-wddm-gpu-virtualization.png) To take advantage of these benefits, a system with a compatible GPU and graphics drivers (WDDM 2.5 or newer) is required. Incompatible systems will render apps in Windows Sandbox with Microsoft's CPU-based rendering technology, Windows Advanced Rasterization Platform (WARP). - + ## Battery pass-through Windows Sandbox is also aware of the host's battery state, which allows it to optimize its power consumption. This functionality is critical for technology that is used on laptops, where battery life is often critical. diff --git a/windows/security/threat-protection/windows-sandbox/windows-sandbox-configure-using-wsb-file.md b/windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-configure-using-wsb-file.md similarity index 98% rename from windows/security/threat-protection/windows-sandbox/windows-sandbox-configure-using-wsb-file.md rename to windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-configure-using-wsb-file.md index e9dc1bb0cc..a0d3dc4bea 100644 --- a/windows/security/threat-protection/windows-sandbox/windows-sandbox-configure-using-wsb-file.md +++ b/windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-configure-using-wsb-file.md @@ -1,16 +1,11 @@ --- title: Windows Sandbox configuration description: Windows Sandbox configuration -ms.prod: windows-client -author: vinaypamnani-msft -ms.author: vinpa -manager: aaroncz ms.collection: - highpri - tier2 ms.topic: article -ms.date: 6/30/2022 -ms.technology: itpro-security +ms.date: 05/25/2023 --- # Windows Sandbox configuration diff --git a/windows/security/threat-protection/windows-sandbox/windows-sandbox-overview.md b/windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-overview.md similarity index 88% rename from windows/security/threat-protection/windows-sandbox/windows-sandbox-overview.md rename to windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-overview.md index 74e81b1a05..02bb837f09 100644 --- a/windows/security/threat-protection/windows-sandbox/windows-sandbox-overview.md +++ b/windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-overview.md @@ -1,23 +1,18 @@ --- title: Windows Sandbox description: Windows Sandbox overview -ms.prod: windows-client -author: vinaypamnani-msft -ms.author: vinpa -manager: aaroncz ms.collection: - highpri - tier2 ms.topic: article -ms.date: 6/30/2022 -ms.technology: itpro-security +ms.date: 05/25/2023 --- # Windows Sandbox Windows Sandbox provides a lightweight desktop environment to safely run applications in isolation. Software installed inside the Windows Sandbox environment remains "sandboxed" and runs separately from the host machine. -A sandbox is temporary. When it's closed, all the software and files and the state are deleted. You get a brand-new instance of the sandbox every time you open the application. Note, however, that as of [Windows 11 Build 22509](https://blogs.windows.com/windows-insider/2021/12/01/announcing-windows-11-insider-preview-build-22509/), your data will persist through a restart initiated from inside the virtualized environment—useful for installing applications that require the OS to reboot. +A sandbox is temporary. When it's closed, all the software and files and the state are deleted. You get a brand-new instance of the sandbox every time you open the application. Note, however, that as of Windows 11, version 22H2, your data will persist through a restart initiated from inside the virtualized environment—useful for installing applications that require the OS to reboot. Software and applications installed on the host aren't directly available in the sandbox. If you need specific applications available inside the Windows Sandbox environment, they must be explicitly installed within the environment. @@ -32,10 +27,10 @@ Windows Sandbox has the following properties: > [!IMPORTANT] > Windows Sandbox enables network connection by default. It can be disabled using the [Windows Sandbox configuration file](/windows/security/threat-protection/windows-sandbox/windows-sandbox-configure-using-wsb-file#networking). +[!INCLUDE [windows-sandbox](../../../../../includes/licensing/windows-sandbox.md)] + ## Prerequisites -- Windows 10, version 1903 and later, or Windows 11 -- Windows Pro, Enterprise or Education edition - ARM64 (for Windows 11, version 22H2 and later) or AMD64 architecture - Virtualization capabilities enabled in BIOS - At least 4 GB of RAM (8 GB recommended) diff --git a/windows/security/apps.md b/windows/security/application-security/index.md similarity index 65% rename from windows/security/apps.md rename to windows/security/application-security/index.md index cbf8e3d5c8..fddf34c9a4 100644 --- a/windows/security/apps.md +++ b/windows/security/application-security/index.md @@ -1,7 +1,7 @@ --- title: Windows application security description: Get an overview of application security in Windows -ms.reviewer: +ms.reviewer: manager: aaroncz ms.author: paoloma author: paolomatarazzo @@ -19,9 +19,6 @@ The following table summarizes the Windows security features and capabilities fo | Security Measures | Features & Capabilities | |:---|:---| -| Windows Defender Application Control | Application control is one of the most effective security controls to prevent unwanted or malicious code from running. It moves away from an application trust model where all code is assumed trustworthy to one where apps must earn trust to run. Learn more: [Application Control for Windows](threat-protection/windows-defender-application-control/windows-defender-application-control.md) | -| Microsoft Defender Application Guard | Application Guard uses chip-based hardware isolation to isolate untrusted websites and untrusted Office files, seamlessly running untrusted websites and files in an isolated Hyper-V-based container, separate from the desktop operating system, and making sure that anything that happens within the container remains isolated from the desktop. Learn more [Microsoft Defender Application Guard overview](threat-protection/microsoft-defender-application-guard/md-app-guard-overview.md). | -| Windows Sandbox | Windows Sandbox provides a lightweight desktop environment to safely run applications in isolation. Software installed inside the Windows Sandbox environment remains "sandboxed" and runs separately from the host machine. A sandbox is temporary. When it's closed, all the software and files and the state are deleted. You get a brand-new instance of the sandbox every time you open the application. Learn more: [Windows Sandbox](threat-protection\windows-sandbox\windows-sandbox-overview.md) -| Email Security | With Windows S/MIME email security, users can encrypt outgoing messages and attachments, so only intended recipients with digital identification (ID)—also called a certificate—can read them. Users can digitally sign a message, which verifies the identity of the sender and ensures the message has not been tampered with.[Configure S/MIME for Windows 10](identity-protection/configure-s-mime.md) | -| Microsoft Defender SmartScreen | Microsoft Defender SmartScreen protects against phishing or malware websites and applications, and the downloading of potentially malicious files. Learn more: [Microsoft Defender SmartScreen overview](threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md) | - +| Windows Defender Application Control | Application control is one of the most effective security controls to prevent unwanted or malicious code from running. It moves away from an application trust model where all code is assumed trustworthy to one where apps must earn trust to run. Learn more: [Application Control for Windows](../threat-protection/windows-defender-application-control/windows-defender-application-control.md) | +| Microsoft Defender Application Guard | Application Guard uses chip-based hardware isolation to isolate untrusted websites and untrusted Office files, seamlessly running untrusted websites and files in an isolated Hyper-V-based container, separate from the desktop operating system, and making sure that anything that happens within the container remains isolated from the desktop. Learn more [Microsoft Defender Application Guard overview](../threat-protection/microsoft-defender-application-guard/md-app-guard-overview.md). | +| Windows Sandbox | Windows Sandbox provides a lightweight desktop environment to safely run applications in isolation. Software installed inside the Windows Sandbox environment remains "sandboxed" and runs separately from the host machine. A sandbox is temporary. When it's closed, all the software and files and the state are deleted. You get a brand-new instance of the sandbox every time you open the application. Learn more: [Windows Sandbox](../application-security/application-isolation/windows-sandbox/windows-sandbox-overview.md) | diff --git a/windows/security/application-security/toc.yml b/windows/security/application-security/toc.yml new file mode 100644 index 0000000000..3ae26b2e31 --- /dev/null +++ b/windows/security/application-security/toc.yml @@ -0,0 +1,8 @@ +items: +- name: Overview + href: index.md +- name: Application Control + href: application-control/toc.yml +- name: Application Isolation + href: application-isolation/toc.yml + diff --git a/windows/security/cloud-security/toc.yml b/windows/security/cloud-security/toc.yml new file mode 100644 index 0000000000..4350280431 --- /dev/null +++ b/windows/security/cloud-security/toc.yml @@ -0,0 +1,16 @@ +items: +- name: Join Active Directory and Azure AD with single sign-on (SSO) 🔗 + href: /azure/active-directory/devices/concept-azure-ad-join +- name: Security baselines with Intune 🔗 + href: /mem/intune/protect/security-baselines +- name: Remote wipe (Autopilot reset) 🔗 + href: /windows/client-management/mdm/remotewipe-csp +- name: Mobile Device Management (MDM) 🔗 + href: /windows/client-management/mdm/ +- name: Universal Print 🔗 + href: /universal-print +- name: Windows Autopatch 🔗 + href: /windows/deployment/windows-autopatch +- name: Windows Autopilot 🔗 + href: /windows/deployment/windows-autopilot + diff --git a/windows/security/cloud.md b/windows/security/cloud.md deleted file mode 100644 index 6d99441988..0000000000 --- a/windows/security/cloud.md +++ /dev/null @@ -1,33 +0,0 @@ ---- -title: Windows and cloud security -description: Get an overview of cloud services supported in Windows 11 and Windows 10 -ms.reviewer: -author: paolomatarazzo -ms.author: paoloma -manager: aaroncz -ms.topic: conceptual -ms.date: 09/20/2021 -ms.localizationpriority: medium -ms.custom: -search.appverid: MET150 -ms.prod: windows-client -ms.technology: itpro-security ---- - -# Windows and cloud security - -Today's workforce has more freedom and mobility than ever before. With the growth of enterprise cloud adoption, increased personal app usage, and increased use of third-party apps, the risk of data exposure is at its highest. Enabling Zero-Trust protection, Windows 11 works with Microsoft cloud services. Windows and cloud services together help organizations strengthen their multi-cloud security infrastructure, protect hybrid cloud workloads, and safeguard sensitive information while controlling access and mitigating threats. - -Windows 11 includes the cloud services that are listed in the following table:

          - -| Service type | Description | -|:---|:---| -| Mobile device management (MDM) and Microsoft Intune | Windows 11 supports MDM, an enterprise management solution to help you manage your organization's security policies and business applications. MDM enables your security team to manage devices without compromising people's privacy on their personal devices.

          Non-Microsoft servers can be used to manage Windows 11 by using industry standard protocols.

          To learn more, see [Mobile device management](/windows/client-management/mdm/). | -| Microsoft account | When users add their Microsoft account to Windows 11, they can bring their Windows, Microsoft Edge, Xbox settings, web page favorites, files, photos, and more across their devices.

          The Microsoft account enables people to manage everything in one place. They can keep tabs on their subscriptions and order history, organize their family's digital life, update their privacy and security settings, track the health and safety of their devices, and even get rewards.

          To learn more, see [Microsoft Accounts](/windows-server/identity/ad-ds/manage/understand-microsoft-accounts).| -| OneDrive | OneDrive is your online storage for your files, photos, and data. OneDrive provides extra security, backup, and restore options for important files and photos. With options for both personal and business, people can use OneDrive to store and protect files in the cloud, allowing users to them on their laptops, desktops, and mobile devices. If a device is lost or stolen, people can quickly recover all their important files, photos, and data.

          The OneDrive Personal Vault also provides protection for your most sensitive files without losing the convenience of anywhere access. Files are secured by identity verification, yet easily accessible to users across their devices. [Learn how to set up your Personal Vault](https://support.microsoft.com/office/protect-your-onedrive-files-in-personal-vault-6540ef37-e9bf-4121-a773-56f98dce78c4).

          If there's a ransomware attack, OneDrive can enable recovery. And if you’ve configured backups in OneDrive, you have more options to mitigate and recover from a ransomware attack. [Learn more about how to recover from a ransomware attack using Office 365](/microsoft-365/security/office-365-security/recover-from-ransomware). | -| Access to Azure Active Directory | Microsoft Azure Active Directory (Azure AD) is a complete cloud identity and access management solution for managing identities and directories, enabling access to applications, and protecting identities from security threats.

          With Azure AD, you can manage and secure identities for your employees, partners, and customers to access the applications and services they need. Windows 11 works seamlessly with Azure Active Directory to provide secure access, identity management, and single sign-on to apps and services from anywhere.

          To learn more, see [What is Azure AD?](/azure/active-directory/fundamentals/active-directory-whatis) | - -## Next steps - -- [Learn more about MDM and Windows 11](/windows/client-management/mdm/) -- [Learn more about Windows security](index.yml) \ No newline at end of file diff --git a/windows/security/docfx.json b/windows/security/docfx.json index 7504a93725..1222b0620c 100644 --- a/windows/security/docfx.json +++ b/windows/security/docfx.json @@ -53,11 +53,12 @@ "folder_relative_path_in_docset": "./" } }, + "titleSuffix": "Windows Security", "contributors_to_exclude": [ - "rjagiewich", - "traya1", - "rmca14", - "claydetels19", + "rjagiewich", + "traya1", + "rmca14", + "claydetels19", "jborsecnik", "tiburd", "AngelaMotherofDragons", @@ -66,59 +67,78 @@ "garycentric", "beccarobins" ], - "searchScope": ["Windows 10"] + "searchScope": [ + "Windows 10" + ] }, "fileMetadata": { "author":{ + "application-security/application-control/user-account-control/*.md": "paolomatarazzo", + "application-security/application-isolation/windows-sandbox/**/*.md": "vinaypamnani-msft", "identity-protection/**/*.md": "paolomatarazzo", - "threat-protection/windows-firewall/**/*.md": "aczechowski" + "operating-system-security/network-security/**/*.md": "paolomatarazzo", + "operating-system-security/network-security/windows-firewall/**/*.md": "ngangulyms" }, "ms.author":{ + "application-security/application-control/user-account-control/*.md": "paoloma", + "application-security/application-isolation/windows-sandbox/**/*.md": "vinpa", "identity-protection/**/*.md": "paoloma", - "threat-protection/windows-firewall/*.md": "aaroncz" + "operating-system-security/network-security/**/*.md": "paoloma", + "operating-system-security/network-security/windows-firewall/*.md": "nganguly" }, - "appliesto":{ + "appliesto": { + "application-security/application-isolation/windows-sandbox/**/*.md": [ + "✅ Windows 11", + "✅ Windows 10" + ], "identity-protection/**/*.md": [ - "✅ Windows 11", - "✅ Windows 10" + "✅ Windows 11", + "✅ Windows 10" ], "identity-protection/credential-guard/**/*.md": [ - "✅ Windows 11", - "✅ Windows 10", - "✅ Windows Server 2022", - "✅ Windows Server 2019", - "✅ Windows Server 2016" + "✅ Windows 11", + "✅ Windows 10", + "✅ Windows Server 2022", + "✅ Windows Server 2019", + "✅ Windows Server 2016" ], "identity-protection/smart-cards/**/*.md": [ - "✅ Windows 11", - "✅ Windows 10", - "✅ Windows Server 2022", - "✅ Windows Server 2019", - "✅ Windows Server 2016" + "✅ Windows 11", + "✅ Windows 10", + "✅ Windows Server 2022", + "✅ Windows Server 2019", + "✅ Windows Server 2016" ], "identity-protection/user-account-control/**/*.md": [ - "✅ Windows 11", - "✅ Windows 10", - "✅ Windows Server 2022", - "✅ Windows Server 2019", - "✅ Windows Server 2016" + "✅ Windows 11", + "✅ Windows 10", + "✅ Windows Server 2022", + "✅ Windows Server 2019", + "✅ Windows Server 2016" ], "identity-protection/virtual-smart-cards/**/*.md": [ - "✅ Windows 11", - "✅ Windows 10", - "✅ Windows Server 2022", - "✅ Windows Server 2019", - "✅ Windows Server 2016" + "✅ Windows 11", + "✅ Windows 10", + "✅ Windows Server 2022", + "✅ Windows Server 2019", + "✅ Windows Server 2016" + ], + "operating-system-security/network-security/windows-firewall/**/*.md": [ + "✅ Windows 11", + "✅ Windows 10", + "✅ Windows Server 2022", + "✅ Windows Server 2019", + "✅ Windows Server 2016" ] }, - "ms.reviewer":{ + "ms.reviewer": { "identity-protection/hello-for-business/*.md": "erikdau", "identity-protection/credential-guard/*.md": "zwhittington", "identity-protection/access-control/*.md": "sulahiri", - "threat-protection/windows-firewall/*.md": "paoloma", - "identity-protection/vpn/*.md": "pesmith" + "operating-system-security/network-security/windows-firewall/*.md": "paoloma", + "operating-system-security/network-security/vpn/*.md": "pesmith" }, - "ms.collection":{ + "ms.collection": { "identity-protection/hello-for-business/*.md": "tier1", "information-protection/bitlocker/*.md": "tier1", "information-protection/personal-data-encryption/*.md": "tier1", @@ -126,11 +146,11 @@ "information-protection/tpm/*.md": "tier1", "threat-protection/auditing/*.md": "tier3", "threat-protection/windows-defender-application-control/*.md": "tier3", - "threat-protection/windows-firewall/*.md": "tier3" + "operating-system-security/network-security/windows-firewall/*.md": "tier3" } }, "template": [], "dest": "security", "markdownEngineName": "markdig" } -} +} \ No newline at end of file diff --git a/windows/security/hardware-security/toc.yml b/windows/security/hardware-security/toc.yml new file mode 100644 index 0000000000..6cd5d10c39 --- /dev/null +++ b/windows/security/hardware-security/toc.yml @@ -0,0 +1,54 @@ +items: + - name: Overview + href: ../hardware.md + - name: Hardware root of trust + items: + - name: Windows Defender System Guard + href: ../threat-protection/windows-defender-system-guard/how-hardware-based-root-of-trust-helps-protect-windows.md + - name: Trusted Platform Module + href: ../information-protection/tpm/trusted-platform-module-top-node.md + items: + - name: Trusted Platform Module overview + href: ../information-protection/tpm/trusted-platform-module-overview.md + - name: TPM fundamentals + href: ../information-protection/tpm/tpm-fundamentals.md + - name: How Windows uses the TPM + href: ../information-protection/tpm/how-windows-uses-the-tpm.md + - name: Manage TPM commands + href: ../information-protection/tpm/manage-tpm-commands.md + - name: Manager TPM Lockout + href: ../information-protection/tpm/manage-tpm-lockout.md + - name: Change the TPM password + href: ../information-protection/tpm/change-the-tpm-owner-password.md + - name: TPM Group Policy settings + href: ../information-protection/tpm/trusted-platform-module-services-group-policy-settings.md + - name: Back up the TPM recovery information to AD DS + href: ../information-protection/tpm/backup-tpm-recovery-information-to-ad-ds.md + - name: View status, clear, or troubleshoot the TPM + href: ../information-protection/tpm/initialize-and-configure-ownership-of-the-tpm.md + - name: Understanding PCR banks on TPM 2.0 devices + href: ../information-protection/tpm/switch-pcr-banks-on-tpm-2-0-devices.md + - name: TPM recommendations + href: ../information-protection/tpm/tpm-recommendations.md + - name: Microsoft Pluton security processor + items: + - name: Microsoft Pluton overview + href: ../information-protection/pluton/microsoft-pluton-security-processor.md + - name: Microsoft Pluton as TPM + href: ../information-protection/pluton/pluton-as-tpm.md + - name: Silicon assisted security + items: + - name: Virtualization-based security (VBS) + href: /windows-hardware/design/device-experiences/oem-vbs + - name: Memory integrity (HVCI) + href: ../threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity.md + - name: Memory integrity and VBS enablement 🔗 + href: /windows-hardware/design/device-experiences/oem-hvci-enablement + - name: Hardware-enforced stack protection + href: https://techcommunity.microsoft.com/t5/windows-os-platform-blog/understanding-hardware-enforced-stack-protection/ba-p/1247815 + - name: Secured-core PC 🔗 + href: /windows-hardware/design/device-experiences/oem-highly-secure-11 + - name: Kernel Direct Memory Access (DMA) protection + href: ../information-protection/kernel-dma-protection-for-thunderbolt.md + - name: System Guard Secure Launch + href: ../threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md \ No newline at end of file diff --git a/windows/security/identity-protection/access-control/access-control.md b/windows/security/identity-protection/access-control/access-control.md index 6bec9ee14c..b1ca0e2e0f 100644 --- a/windows/security/identity-protection/access-control/access-control.md +++ b/windows/security/identity-protection/access-control/access-control.md @@ -39,6 +39,8 @@ This content set contains: - [Service Accounts](/windows-server/identity/ad-ds/manage/understand-service-accounts) - [Active Directory Security Groups](/windows-server/identity/ad-ds/manage/understand-security-groups) +[!INCLUDE [access-control-aclsscals](../../../../includes/licensing/access-control-aclsscals.md)] + ## Practical applications Administrators who use the supported version of Windows can refine the application and management of access control to objects and subjects to provide the following security: diff --git a/windows/security/identity-protection/configure-s-mime.md b/windows/security/identity-protection/configure-s-mime.md deleted file mode 100644 index 317ef89a50..0000000000 --- a/windows/security/identity-protection/configure-s-mime.md +++ /dev/null @@ -1,81 +0,0 @@ ---- -title: Configure S/MIME for Windows -description: S/MIME lets users encrypt outgoing messages and attachments so that only intended recipients with a digital ID, also known as a certificate, can read them. -ms.topic: article -ms.date: 07/27/2017 ---- - - -# Configure S/MIME for Windows - -S/MIME stands for Secure/Multipurpose Internet Mail Extensions, and provides an added layer of security for email sent to and from an Exchange ActiveSync (EAS) account. S/MIME lets users encrypt outgoing messages and attachments so that only intended recipients who have a digital identification (ID), also known as a certificate, can read them. Users can digitally sign a message, which provides the recipients with a way to verify the identity of the sender and that the message hasn't been tampered with. - -## About message encryption - -Users can send encrypted message to people in their organization and people outside their organization if they have their encryption certificates. However, users using Windows Mail app can only read encrypted messages if the message is received on their Exchange account and they have corresponding decryption keys. - -Encrypted messages can be read only by recipients who have a certificate. If you try to send an encrypted message to recipients whose encryption certificate is not available, the app will prompt you to remove these recipients before sending the email. - -## About digital signatures - -A digitally signed message reassures the recipient that the message hasn't been tampered with and verifies the identity of the sender. Recipients can only verify the digital signature if they're using an email client that supports S/MIME. - -## Prerequisites - -- [S/MIME is enabled for Exchange accounts](/microsoft-365/security/office-365-security/s-mime-for-message-signing-and-encryption) (on-premises and Office 365). Users can't use S/MIME signing and encryption with a personal account such as Outlook.com. -- Valid Personal Information Exchange (PFX) certificates are installed on the device. - - - [How to Create PFX Certificate Profiles in Configuration Manager](/previous-versions/system-center/system-center-2012-R2/mt131410(v=technet.10)) - - [Enable access to company resources using certificate profiles with Microsoft Intune](/mem/intune/protect/certificates-configure) - -## Choose S/MIME settings - -On the device, perform the following steps: (add select certificate) - -1. Open the Mail app. - -2. Open **Settings** by tapping the gear icon on a PC, or the ellipsis (...) and then the gear icon on a phone. - - :::image type="content" alt-text="settings icon in mail app." source="images/mailsettings.png"::: - -3. Tap **Email security**. - - :::image type="content" alt-text="email security settings." source="images/emailsecurity.png"::: - -4. In **Select an account**, select the account for which you want to configure S/MIME options. - -5. Make a certificate selection for digital signature and encryption. - - - Select **Automatically** to let the app choose the certificate. - - Select **Manually** to specify the certificate yourself from the list of valid certificates on the device. -6. (Optional) Select **Always sign with S/MIME**, **Always encrypt with S/MIME**, or both, to automatically digitally sign or encrypt all outgoing messages. - - > [!NOTE] - > The option to sign or encrypt can be changed for individual messages, unless EAS policies prevent it. -   -7. Tap the back arrow. - -## Encrypt or sign individual messages - -1. While composing a message, choose **Options** from the ribbon. On phone, **Options** can be accessed by tapping the ellipsis (...). - -2. Use **Sign** and **Encrypt** icons to turn on digital signature and encryption for this message. - - :::image type="content" alt-text="sign or encrypt message." source="images/signencrypt.png"::: - -## Read signed or encrypted messages - -When you receive an encrypted message, the mail app will check whether there is a certificate available on your computer. If there is a certificate available, the message will be decrypted when you open it. If your certificate is stored on a smartcard, you will be prompted to insert the smartcard to read the message. Your smartcard may also require a PIN to access the certificate. - -## Install certificates from a received message - -When you receive a signed email, the app provides a feature to install corresponding encryption certificate on your device if the certificate is available. This certificate can then be used to send encrypted email to this person. - -1. Open a signed email. - -2. Tap or click the digital signature icon in the reading pane. - -3. Tap **Install.** - - :::image type="content" alt-text="message security information." source="images/installcert.png"::: -  diff --git a/windows/security/identity-protection/credential-guard/additional-mitigations.md b/windows/security/identity-protection/credential-guard/additional-mitigations.md index ca9c7acd52..32967fd8b7 100644 --- a/windows/security/identity-protection/credential-guard/additional-mitigations.md +++ b/windows/security/identity-protection/credential-guard/additional-mitigations.md @@ -18,7 +18,6 @@ Credential theft attacks allow the attacker to steal secrets from one device and Kerberos armoring is part of RFC 6113. When a device supports Kerberos armoring, its TGT is used to protect the user's proof of possession which can mitigate offline dictionary attacks. Kerberos armoring also provides the additional benefit of signed KDC errors this mitigates tampering which can result in things such as downgrade attacks. **To enable Kerberos armoring for restricting domain users to specific domain-joined devices** - - Users need to be in domains that are running Windows Server 2012 R2 or higher - All the domain controllers in these domains must be configured to support Kerberos armoring. Set the **KDC support for claims, compound authentication, and Kerberos armoring** Group Policy setting to either **Supported** or **Always provide claims**. - All the devices with Windows Defender Credential Guard that the users will be restricted to must be configured to support Kerberos armoring. Enable the **Kerberos client support for claims, compound authentication and Kerberos armoring** Group Policy settings under **Computer Configuration** -> **Administrative Templates** -> **System** -> **Kerberos**. diff --git a/windows/security/identity-protection/credential-guard/credential-guard-manage.md b/windows/security/identity-protection/credential-guard/credential-guard-manage.md index eb38ab1250..295926ae5f 100644 --- a/windows/security/identity-protection/credential-guard/credential-guard-manage.md +++ b/windows/security/identity-protection/credential-guard/credential-guard-manage.md @@ -1,5 +1,5 @@ --- -title: Manage Windows Defender Credential Guard (Windows) +title: Manage Windows Defender Credential Guard description: Learn how to deploy and manage Windows Defender Credential Guard using Group Policy or the registry. ms.date: 11/23/2022 ms.collection: diff --git a/windows/security/identity-protection/credential-guard/credential-guard-protection-limits.md b/windows/security/identity-protection/credential-guard/credential-guard-protection-limits.md index 6b9dbeadc9..6719b3db77 100644 --- a/windows/security/identity-protection/credential-guard/credential-guard-protection-limits.md +++ b/windows/security/identity-protection/credential-guard/credential-guard-protection-limits.md @@ -1,5 +1,5 @@ --- -title: Windows Defender Credential Guard protection limits (Windows) +title: Windows Defender Credential Guard protection limits description: Some ways to store credentials are not protected by Windows Defender Credential Guard in Windows. Learn more with this guide. ms.date: 08/17/2017 ms.topic: article diff --git a/windows/security/identity-protection/credential-guard/credential-guard-requirements.md b/windows/security/identity-protection/credential-guard/credential-guard-requirements.md index ea7bf02bae..2afb9f4a6a 100644 --- a/windows/security/identity-protection/credential-guard/credential-guard-requirements.md +++ b/windows/security/identity-protection/credential-guard/credential-guard-requirements.md @@ -66,6 +66,8 @@ Applications may cause performance issues when they attempt to hook the isolated Services or protocols that rely on Kerberos, such as file shares, remote desktop, or BranchCache, continue to work and are not affected by Windows Defender Credential Guard. +[!INCLUDE [windows-defender-credential-guard](../../../../includes/licensing/windows-defender-credential-guard.md)] + ## Security considerations All computers that meet baseline protections for hardware, firmware, and software can use Windows Defender Credential Guard. @@ -96,7 +98,7 @@ The following tables describe baseline protections, plus protections for improve |Protections for Improved Security|Description| |---|---| |Hardware: **IOMMU** (input/output memory management unit)|**Requirement**:
          - VT-D or AMD Vi IOMMU

          **Security benefits**:
          - An IOMMU can enhance system resiliency against memory attacks. For more information, see [Advanced Configuration and Power Interface (ACPI) description tables](/windows-hardware/drivers/bringup/acpi-system-description-tables)| -|Firmware: **Securing Boot Configuration and Management**|**Requirements**:
          - BIOS password or stronger authentication must be supported.
          - In the BIOS configuration, BIOS authentication must be set.
          - There must be support for protected BIOS option to configure list of permitted boot devices (for example, “Boot only from internal hard drive”) and boot device order, overriding BOOTORDER modification made by operating system.
          - In the BIOS configuration, BIOS options related to security and boot options (list of permitted boot devices, boot order) must be secured to prevent other operating systems from starting and to prevent changes to the BIOS settings.| +|Firmware: **Securing Boot Configuration and Management**|**Requirements**:
          - BIOS password or stronger authentication must be supported.
          - In the BIOS configuration, BIOS authentication must be set.
          - There must be support for protected BIOS option to configure list of permitted boot devices (for example, "Boot only from internal hard drive") and boot device order, overriding BOOTORDER modification made by operating system.
          - In the BIOS configuration, BIOS options related to security and boot options (list of permitted boot devices, boot order) must be secured to prevent other operating systems from starting and to prevent changes to the BIOS settings.| |Firmware: **Secure MOR, revision 2 implementation**|**Requirement**:
          - Secure MOR, revision 2 implementation| ### 2016 Additional security qualifications starting with Windows 10, version 1607, and Windows Server 2016 diff --git a/windows/security/identity-protection/credential-guard/credential-guard.md b/windows/security/identity-protection/credential-guard/credential-guard.md index af00a1aef1..519ec863c8 100644 --- a/windows/security/identity-protection/credential-guard/credential-guard.md +++ b/windows/security/identity-protection/credential-guard/credential-guard.md @@ -1,5 +1,5 @@ --- -title: Protect derived domain credentials with Windows Defender Credential Guard (Windows) +title: Protect derived domain credentials with Windows Defender Credential Guard description: Windows Defender Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them. ms.date: 11/22/2022 ms.topic: article diff --git a/windows/security/identity-protection/credential-guard/toc.yml b/windows/security/identity-protection/credential-guard/toc.yml new file mode 100644 index 0000000000..3661af7b0e --- /dev/null +++ b/windows/security/identity-protection/credential-guard/toc.yml @@ -0,0 +1,17 @@ +items: +- name: Protect derived domain credentials with Credential Guard + href: credential-guard.md +- name: How Credential Guard works + href: credential-guard-how-it-works.md +- name: Requirements + href: credential-guard-requirements.md +- name: Manage Credential Guard + href: credential-guard-manage.md +- name: Credential Guard protection limits + href: credential-guard-protection-limits.md +- name: Considerations when using Credential Guard + href: credential-guard-considerations.md +- name: Additional mitigations + href: additional-mitigations.md +- name: Known issues + href: credential-guard-known-issues.md \ No newline at end of file diff --git a/windows/security/identity-protection/enterprise-certificate-pinning.md b/windows/security/identity-protection/enterprise-certificate-pinning.md index d4f8cceb8d..47f0d59394 100644 --- a/windows/security/identity-protection/enterprise-certificate-pinning.md +++ b/windows/security/identity-protection/enterprise-certificate-pinning.md @@ -1,24 +1,24 @@ --- -title: Enterprise Certificate Pinning -description: Enterprise certificate pinning is a Windows feature for remembering; or pinning a root issuing certificate authority, or end entity certificate to a given domain name. +title: Enterprise certificate pinning +description: Enterprise certificate pinning is a Windows feature for remembering, or pinning, a root issuing certificate authority, or end-entity certificate to a domain name. ms.topic: conceptual -ms.date: 07/27/2017 +ms.date: 05/24/2023 --- -# Enterprise Certificate Pinning +# Enterprise certificate pinning overview -Enterprise certificate pinning is a Windows feature for remembering, or pinning a root issuing certificate authority or end entity certificate to a given domain name. -Enterprise certificate pinning helps reduce man-in-the-middle attacks by enabling you to protect your internal domain names from chaining to unwanted certificates or to fraudulently issued certificates. +Enterprise certificate pinning is a Windows feature for remembering (pinning), a root issuing certificate authority, or end-entity certificate, to a domain name.\ +The feature helps to reduce man-in-the-middle attacks by protecting internal domain names from chaining to unwanted or fraudulently issued certificates. > [!NOTE] > External domain names, where the certificate issued to these domains is issued by a public certificate authority, are not ideal for enterprise certificate pinning. -Windows Certificate APIs (CertVerifyCertificateChainPolicy and WinVerifyTrust) are updated to check if the site's chain that authenticates servers matches a restricted set of certificates. -These restrictions are encapsulated in a Pin Rules Certificate Trust List (CTL) that is configured and deployed to Windows 10 computers. -Any site certificate that triggers a name mismatch causes Windows to write an event to the CAPI2 event log and prevents the user from navigating to the web site using Microsoft Edge or Internet Explorer. +Windows Certificate APIs (*CertVerifyCertificateChainPolicy* and *WinVerifyTrust*) are updated to check if the site's chain that authenticates servers matches a restricted set of certificates.\ +The restrictions are encapsulated in a *Pin Rules Certificate Trust List (CTL)* that is configured and deployed to Windows devices.\ +Any site certificates that trigger a name mismatch causes Windows to write an event to the *CAPI2 event log*, and prevents the user from browsing the web site. > [!NOTE] -> Enterprise Certificate Pinning feature triggering doesn't cause clients other than Microsoft Edge or Internet Explorer to block the connection. +> Enterprise Certificate Pinning feature triggering doesn't cause clients other than Microsoft Edge to block the connection. ## Deployment @@ -27,14 +27,14 @@ To deploy enterprise certificate pinning, you need to: - Create a well-formatted certificate pinning rule XML file - Create a pin rules certificate trust list file from the XML file - Apply the pin rules certificate trust list file to a reference administrative computer -- Deploy the registry configuration on the reference computer using Group Policy Management Console (GPMC), which is included in the [Remote Server Administration Tools (RSAT)](https://www.microsoft.com/download/details.aspx?id=45520). +- Deploy the registry configuration on the reference computer via group policy -### Create a Pin Rules XML file +### Create a pin rules XML file -The XML-based pin rules file consists of a sequence of PinRule elements. +The XML-based pin rules file consists of a sequence of PinRule elements. Each PinRule element contains a sequence of one or more Site elements and a sequence of zero or more Certificate elements. -```code +```xml @@ -58,28 +58,28 @@ Each PinRule element contains a sequence of one or more Site elements and a sequ ``` -#### PinRules Element +#### PinRules element -The PinRules element can have the following attributes. -For help with formatting Pin Rules, see [Representing a Date in XML](#representing-a-date-in-xml) or [Representing a Duration in XML](#representing-a-duration-in-xml). +The PinRules element can have the following attributes. +For help with formatting Pin Rules, see [Represent a date in XML](#represent-a-date-in-xml) or [Represent a duration in XML](#represent-a-duration-in-xml). | Attribute | Description | Required | |-----------|-------------|----------| -| **Duration** or **NextUpdate** | Specifies when the Pin Rules will expire. Either is required. **NextUpdate** takes precedence if both are specified.
          **Duration**, represented as an XML TimeSpan data type, doesn't allow years and months. You represent the **NextUpdate** attribute as an XML DateTime data type in UTC. | **Required?** Yes. At least one is required. | +| **Duration** or **NextUpdate** | Specifies when the Pin Rules expires. Either is required. **NextUpdate** takes precedence if both are specified.
          **Duration**, represented as an XML TimeSpan data type, doesn't allow years and months. You represent the **NextUpdate** attribute as an XML DateTime data type in UTC. | **Required?** Yes. At least one is required. | | **LogDuration** or **LogEndDate** | Configures auditing only to extend beyond the expiration of enforcing the Pin Rules.
          **LogEndDate**, represented as an XML DateTime data type in UTC, takes precedence if both are specified.
          You represent **LogDuration** as an XML TimeSpan data type, which doesn't allow years and months.
          If `none of the attributes are specified, auditing expiration uses **Duration** or **NextUpdate** attributes. | No. | | **ListIdentifier** | Provides a friendly name for the list of pin rules. Windows doesn't use this attribute for certificate pinning enforcement; however, it's included when the pin rules are converted to a certificate trust list (CTL). | No. | -#### PinRule Element +#### PinRule element -The **PinRule** element can have the following attributes. +The **PinRule** element can have the following attributes. | Attribute | Description | Required | |-----------|-------------|----------| -| **Name** | Uniquely identifies the **PinRule**. Windows uses this attribute to identify the element for a parsing error or for verbose output. The attribute isn't included in the generated certificate trust list (CTL). | Yes.| -| **Error** | Describes the action Windows performs when it encounters a PIN mismatch. You can choose from the following string values:
          - **Revoked** - Windows reports the certificate protecting the site as if it was revoked. This typically prevents the user from accessing the site.
          - **InvalidName** - Windows reports the certificate protecting the site as if the name on the certificate doesn't match the name of the site. This typically results in prompting the user before accessing the site.
          - **None** - The default value. No error is returned. You can use this setting to audit the pin rules without introducing any user friction. | No. | +| **Name** | Uniquely identifies the **PinRule**. Windows uses the attribute to identify the element for a parsing error or for verbose output. The attribute isn't included in the generated certificate trust list (CTL). | Yes.| +| **Error** | Describes the action Windows performs when it encounters a PIN mismatch. You can choose from the following string values:
          - **Revoked** - Windows reports the certificate protecting the site as if it was revoked. This typically prevents the user from accessing the site.
          - **InvalidName** - Windows reports the certificate protecting the site as if the name on the certificate doesn't match the name of the site. This typically results in prompting the user before accessing the site.
          - **None** - The default value. No error is returned. You can use the setting to audit the pin rules without introducing any user friction. | No. | | **Log** | A Boolean value represents a string that equals **true** or **false**. By default, logging is enabled (**true**). | No. | -#### Certificate element +#### Certificate element The **Certificate** element can have the following attributes. @@ -88,7 +88,7 @@ The **Certificate** element can have the following attributes. | **File** | Path to a file containing one or more certificates. Where the certificate(s) can be encoded as:
          - single certificate
          - p7b
          - sst
          These files can also be Base64 formatted. All **Site** elements included in the same **PinRule** element can match any of these certificates. | Yes (File, Directory, or Base64 must be present). | | **Directory** | Path to a directory containing one or more of the above certificate files. Skips any files not containing any certificates. | Yes (File, Directory, or Base64 must be present). | | **Base64** | Base64 encoded certificate(s). Where the certificate(s) can be encoded as:
          - single certificate
          - p7b
          - sst
          This allows the certificates to be included in the XML file without a file directory dependency.
          Note:
          You can use **certutil -encode** to convert a .cer file into base64. You can then use Notepad to copy and paste the base64 encoded certificate into the pin rule. | Yes (File, Directory, or Base64 must be present). | -| **EndDate** | Enables you to configure an expiration date for when the certificate is no longer valid in the pin rule.
          If you are in the process of switching to a new root or CA, you can set the **EndDate** to allow matching of this element's certificates.
          If the current time is past the **EndDate**, then, when creating the certificate trust list (CTL), the parser outputs a warning message and excludes the certificate(s) from the Pin Rule in the generated CTL.
          For help with formatting Pin Rules, see [Representing a Date in XML](#representing-a-date-in-xml).| No.| +| **EndDate** | Enables you to configure an expiration date for when the certificate is no longer valid in the pin rule.
          If you are in the process of switching to a new root or CA, you can set the **EndDate** to allow matching of this element's certificates.
          If the current time is past the **EndDate**, when creating the certificate trust list (CTL) the parser outputs a warning message and excludes the certificate(s) from the Pin Rule in the generated CTL.
          For help with formatting Pin Rules, see [Represent a date in XML](#represent-a-date-in-xml).| No.| #### Site element @@ -96,15 +96,15 @@ The **Site** element can have the following attributes. | Attribute | Description | Required | |-----------|-------------|----------| -| **Domain** | Contains the DNS name to be matched for this pin rule. When creating the certificate trust list, the parser normalizes the input name string value as follows:
          - If the DNS name has a leading "*", it's removed.
          - Non-ASCII DNS name is converted to ASCII Puny Code.
          - Upper case ASCII characters are converted to lower case.
          If the normalized name has a leading ".", then wildcard left-hand label matching is enabled. For example, ".xyz.com" would match "abc.xyz.com". | Yes.| +| **Domain** | Contains the DNS name to be matched for this pin rule. When you create the certificate trust list, the parser normalizes the input name string value as follows:
          - If the DNS name has a leading "*", it's removed.
          - Non-ASCII DNS name is converted to ASCII Puny Code.
          - Upper case ASCII characters are converted to lower case.
          If the normalized name has a leading ".", then wildcard left-hand label matching is enabled. For example, ".xyz.com" would match "abc.xyz.com". | Yes.| | **AllSubdomains** | By default, wildcard left-hand label matching is restricted to a single left-hand label. This attribute can be set to "true" to enable wildcard matching of all of the left-hand labels.
          For example, setting this attribute would also match "123.abc.xyz.com" for the ".xyz.com" domain value.| No.| -### Create a Pin Rules Certificate Trust List +### Create a pin rules certificate trust list -The command line utility, **Certutil.exe**, includes the **generatePinRulesCTL** argument to parse the XML file and generate the encoded certificate trust list (CTL) that you add to your reference Windows 10 version 1703 computer and subsequently deploy. -The usage syntax is: +The *Certutil.exe* command includes the *generatePinRulesCTL* argument. The argument parses the XML file and generates the encoded certificate trust list (CTL) that you add to your reference Windows device and then deploy. +The syntax is: -```code +```cmd CertUtil [Options] -generatePinRulesCTL XMLFile CTLFile [SSTFile] Generate Pin Rules CTL XMLFile -- input XML file to be parsed. @@ -118,40 +118,42 @@ Options: -v -- Verbose operation ``` -The same certificate(s) can occur in multiple **PinRule** elements. -The same domain can occur in multiple **PinRule** elements. -Certutil coalesces these in the resultant pin rules certificate trust list. +- The same certificate(s) can occur in multiple **PinRule** elements +- The same domain can occur in multiple **PinRule** elements +- Certutil coalesces these in the resultant pin rules certificate trust list +- Certutil.exe doesn't strictly enforce the XML schema definition -Certutil.exe doesn't strictly enforce the XML schema definition. -It does perform the following to enable other tools to add/consume their own specific elements and attributes: +Certutil performs the following to enable other tools to add/consume their own specific elements and attributes: -- Skips elements before and after the **PinRules** element. -- Skips any element not matching **Certificate** or **Site** within the **PinRules** element. -- Skips any attributes not matching the above names for each element type. +- Skips elements before and after the **PinRules** element +- Skips any element not matching **Certificate** or **Site** within the **PinRules** element +- Skips any attributes not matching the above names for each element type -Use the **certutil** command with the **generatePinRulesCTL** argument along with your XML file that contains your certificate pinning rules. +Use the *certutil* command with the *generatePinRulesCTL* argument along with your XML file that contains your certificate pinning rules. Lastly, provide the name of an output file that will include your certificate pinning rules in the form of a certificate trust list. -```code +```cmd certutil -generatePinRulesCTL certPinRules.xml pinrules.stl ``` -### Applying Certificate Pinning Rules to a Reference Computer +### Apply certificate pinning rules to a reference computer Now that your certificate pinning rules are in the certificate trust list format, you need to apply the settings to a reference computer as a prerequisite to deploying the setting to your enterprise. To simplify the deployment configuration, it's best to apply your certificate pinning rules to a computer that has the Group Policy Management Console (GPMC) included in the Remote Server Administration Tools (RSAT). -Use **certutil.exe** to apply your certificate pinning rules to your reference computer using the **setreg** argument. -The **setreg** argument takes a secondary argument that determines the location of where certutil writes the certificate pining rules. -This secondary argument is **chain\PinRules**. -The last argument you provide is the name of file that contains your certificate pinning rules in certificate trust list format (.stl). -You'll pass the name of the file as the last argument; however, you need to prefix the file name with the '@' symbol as shown in the following example. -You need to perform this command from an elevated command prompt. +Use *certutil.exe* to apply your certificate pinning rules to your reference computer using the *setreg* argument.\ +The *setreg* argument takes a secondary argument that determines the location of where certutil writes the certificate pining rules.\ +The secondary argument is *chain\PinRules*.\ +The last argument you provide is the name of file that contains your certificate pinning rules in certificate trust list format (`.stl`).\ +You pass the name of the file as the last argument. You must prefix the file name with the `@` symbol as in the following example: -```code +```cmd Certutil -setreg chain\PinRules @pinrules.stl ``` +> [!NOTE] +> You must execute the command from an elevated command prompt. + Certutil writes the binary information to the following registration location: | Name | Value | @@ -163,39 +165,39 @@ Certutil writes the binary information to the following registration location: ![Registry binary information.](images/enterprise-pinning-registry-binary-information.png) -### Deploying Enterprise Pin Rule Settings using Group Policy +### Deploy enterprise pin rule settings using group policy -You've successfully created a certificate pinning rules XML file. -From the XML file you've created a certificate pinning trust list file, and you've applied the contents of that file to your reference computer from which you can run the Group Policy Management Console. -Now you need to configure a Group Policy object to include the applied certificate pin rule settings and deploy it to your environment. +From the XML file, you've created a certificate pinning trust list file. Then, you've applied the content of the file to your reference device from which you can run the Group Policy Management Console. + +The next step consists of configuring a group policy object that includes the applied certificate pin rule settings, and deploy it in your environment. Sign-in to the reference computer using domain administrator equivalent credentials. -1. Start the **Group Policy Management Console** (gpmc.msc) -2. In the navigation pane, expand the forest node and then expand the domain node. -3. Expand the node that contains your Active Directory's domain name -4. Select the **Group Policy objects** node. Right-click the **Group Policy objects** node and click **New**. -5. In the **New GPO** dialog box, type _Enterprise Certificate Pinning Rules_ in the **Name** text box and click **OK**. -6. In the content pane, right-click the **Enterprise Certificate Pinning Rules** Group Policy object and click **Edit**. -7. In the **Group Policy Management Editor**, in the navigation pane, expand the **Preferences** node under **Computer Configuration**. Expand **Windows Settings**. -8. Right-click the **Registry** node and click **New**. -9. In the **New Registry Properties** dialog box, select **Update** from the **Action** list. Select **HKEY_LOCAL_MACHINE** from the **Hive** list. -10. For the **Key Path**, click **…** to launch the **Registry Item Browser**. Navigate to the following registry key and select the **PinRules** registry value name: +1. Start the **Group Policy Management Console** (gpmc.msc) +1. In the navigation pane, expand the forest node and then expand the domain node +1. Expand the node that contains your Active Directory's domain name +1. Select the **Group Policy objects** node. Right-click the **Group Policy objects** node and select **New** +1. In the **New GPO** dialog box, type _Enterprise Certificate Pinning Rules_ in the **Name** text box and select **OK** +1. In the content pane, right-click the **Enterprise Certificate Pinning Rules** Group Policy object and select **Edit** +1. In the **Group Policy Management Editor**, in the navigation pane, expand the **Preferences** node under **Computer Configuration**. Expand **Windows Settings** +1. Right-click the **Registry** node and select **New** +1. In the **New Registry Properties** dialog box, select **Update** from the **Action** list. Select **HKEY_LOCAL_MACHINE** from the **Hive** list +1. For the **Key Path**, select **…** to launch the **Registry Item Browser**. Navigate to the following registry key and select the **PinRules** registry value name: - HKLM\SOFTWARE\Microsoft\Cryptography\OID\EncodingType0\CertDllCreateCertificateChainEngine\Config + `HKLM\SOFTWARE\Microsoft\Cryptography\OID\EncodingType0\CertDllCreateCertificateChainEngine\Config` - Click **Select** to close the **Registry Item Browser**. + Select **Select** to close the **Registry Item Browser** -11. The **Key Path** should contain the selected registry key. The **Value name** configuration should contain the registry value name **_PinRules_**. **Value type** should read **_REG\_BINARY_** and **Value data** should contain a long series of numbers from 0-9 and letters ranging from A-F (hexadecimal). Click **OK** to save your settings and close the dialog box. +1. The **Key Path** should contain the selected registry key. The **Value name** configuration should contain the registry value name **_PinRules_**. **Value type** should read **_REG\_BINARY_** and **Value data** should contain a long series of numbers from 0-9 and letters ranging from A-F (hexadecimal). Select **OK** to save your settings and close the dialog box - ![PinRules Properties.](images/enterprise-certificate-pinning-pinrules-properties.png) + ![PinRules Properties.](images/enterprise-certificate-pinning-pinrules-properties.png) -12. Close the **Group Policy Management Editor** to save your settings. -13. Link the **Enterprise Certificate Pinning Rules** Group Policy object to apply to computers that run Windows 10, version 1703 in your enterprise. When these domain-joined computers apply Group Policy, the registry information configured in the Group Policy object is applied to the computer. +1. Close the **Group Policy Management Editor** to save your settings +1. Link the **Enterprise Certificate Pinning Rules** GPO to the OU containing the devices that you want to configure -## Additional Pin Rules Logging +## Additional pin rules logging -To assist in constructing certificate pinning rules, you can configure the **PinRulesLogDir** setting under the certificate chain configuration registry key to include a parent directory to log pin rules. +To help constructing certificate pinning rules, you can configure the **PinRulesLogDir** setting under the certificate chain configuration registry key to include a parent directory to log pin rules. | Name | Value | |------|-------| @@ -204,12 +206,12 @@ To assist in constructing certificate pinning rules, you can configure the **Pin | Value | The Parent directory where Windows should write the additional pin rule logs | | Data type | REG_SZ | -### Permission for the Pin Rule Log Folder +### Permission for the pin rule log folder -The folder in which Windows writes the additional pin rule logs must have permissions so that all users and applications have full access. -You can run the following commands from an elevated command prompt to achieve the proper permissions. +The folder in which Windows writes the additional pin rule logs must have permissions so that all users and applications have full access. +You can run the following commands from an elevated command prompt to achieve the proper permissions. -```code +```cmd set PinRulesLogDir=c:\PinRulesLog mkdir %PinRulesLogDir% icacls %PinRulesLogDir% /grant *S-1-15-2-1:(OI)(CI)(F) @@ -218,64 +220,61 @@ icacls %PinRulesLogDir% /grant *S-1-5-12:(OI)(CI)(F) icacls %PinRulesLogDir% /inheritance:e /setintegritylevel (OI)(CI)L ``` -Whenever an application verifies a TLS/SSL certificate chain that contains a server name matching a DNS name in the server certificate, Windows writes a .p7b file consisting of all the certificates in the server's chain to one of three child folders: +When an application verifies a TLS/SSL certificate chain that contains a server name matching a DNS name in the server certificate, Windows writes a .p7b file consisting of all the certificates in the server's chain to one of three child folders: -- AdminPinRules - Matched a site in the enterprise certificate pinning rules. -- AutoUpdatePinRules - Matched a site in the certificate pinning rules managed by Microsoft. -- NoPinRules - Didn't match any site in the certificate pin rules. +- `AdminPinRules`: Matched a site in the enterprise certificate pinning rules +- `AutoUpdatePinRules`: Matched a site in the certificate pinning rules managed by Microsoft +- `NoPinRules`: Didn't match any site in the certificate pin rules -The output file name consists of the leading eight ASCII hex digits of the root's SHA1 thumbprint followed by the server name. +The output file name consists of the leading eight ASCII hex digits of the root's SHA1 thumbprint followed by the server name. For example: - `D4DE20D0_xsi.outlook.com.p7b` - `DE28F4A4_www.yammer.com.p7b` -If there's either an enterprise certificate pin rule or a Microsoft certificate pin rule mismatch, then Windows writes the .p7b file to the **MismatchPinRules** child folder. +If there's either an enterprise certificate pin rule or a Microsoft certificate pin rule mismatch, then Windows writes the .p7b file to the **MismatchPinRules** child folder. If the pin rules have expired, then Windows writes the .p7b to the **ExpiredPinRules** child folder. -## Representing a Date in XML +## Represent a date in XML -Many attributes within the pin rules xml file are dates. -These dates must be properly formatted and represented in UTC. -You can use Windows PowerShell to format these dates. -You can then copy and paste the output of the cmdlet into the XML file. +Many attributes within the pin rules xml file are dates.\ +These dates must be properly formatted and represented in UTC.\ +You can use Windows PowerShell to format these dates.\ +You can then copy and paste the output of the cmdlet into the XML file. ![Representing a date.](images/enterprise-certificate-pinning-representing-a-date.png) For simplicity, you can truncate decimal point (.) and the numbers after it. However, be certain to append the uppercase "Z" to the end of the XML date string. -```code +```cmd 2015-05-11T07:00:00.2655691Z 2015-05-11T07:00:00Z ``` -## Converting an XML Date +## Convert an XML date You can also use Windows PowerShell to validate and convert an XML date into a human readable date to validate it's the correct date. ![Converting an XML date.](images/enterprise-certificate-pinning-converting-an-xml-date.png) -## Representing a Duration in XML +## Represent a duration in XML -Some elements may be configured to use a duration rather than a date. -You must represent the duration as an XML timespan data type. +Some elements may be configured to use a duration rather than a date. +You must represent the duration as an XML timespan data type. You can use Windows PowerShell to properly format and validate durations (timespans) and copy and paste them into your XML file. ![Representing a duration.](images/enterprise-certificate-pinning-representing-a-duration.png) -## Converting an XML Duration +## Convert an XML duration You can convert an XML formatted timespan into a timespan variable that you can read. ![Converting an XML duration.](images/enterprise-certificate-pinning-converting-a-duration.png) -## Certificate Trust List XML Schema Definition (XSD) +## Certificate trust list XML schema definition (XSD) -```code +```xml @@ -329,12 +328,3 @@ You can convert an XML formatted timespan into a timespan variable that you can ``` - - - - - - - - - diff --git a/windows/security/identity-protection/hello-for-business/hello-biometrics-in-enterprise.md b/windows/security/identity-protection/hello-for-business/hello-biometrics-in-enterprise.md index f1a275279e..9e89894af8 100644 --- a/windows/security/identity-protection/hello-for-business/hello-biometrics-in-enterprise.md +++ b/windows/security/identity-protection/hello-for-business/hello-biometrics-in-enterprise.md @@ -1,5 +1,5 @@ --- -title: Windows Hello biometrics in the enterprise (Windows) +title: Windows Hello biometrics in the enterprise description: Windows Hello uses biometrics to authenticate users and guard against potential spoofing, through fingerprint matching and facial recognition. ms.date: 01/12/2021 ms.topic: article diff --git a/windows/security/identity-protection/hello-for-business/hello-faq.yml b/windows/security/identity-protection/hello-for-business/hello-faq.yml index 0a5083fd99..08924b2594 100644 --- a/windows/security/identity-protection/hello-for-business/hello-faq.yml +++ b/windows/security/identity-protection/hello-for-business/hello-faq.yml @@ -207,7 +207,7 @@ sections: questions: - question: Can I use an external Windows Hello compatible camera when my computer has a built-in Windows Hello compatible camera? answer: | - Yes. Starting with Windows 10, version 21H1 an external Windows Hello compatible camera can be used if a device already supports an internal Windows Hello camera. When both cameras are present, the external camera is used for face authentication. For more information, see [IT tools to support Windows 10, version 21H1](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/it-tools-to-support-windows-10-version-21h1/ba-p/2365103). However, using external Hello cameras and accessories is restricted if ESS is enabled, please see [Windows Hello Enhanced Sign-in Security](/windows-hardware/design/device-experiences/windows-hello-enhanced-sign-in-security#pluggableperipheral-biometric-sensors). + Yes, you can use an external Windows Hello compatible camera if a device has an internal Windows Hello camera. When both cameras are present, the external camera is used for face authentication. For more information, see [IT tools to support Windows 10, version 21H1](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/it-tools-to-support-windows-10-version-21h1/ba-p/2365103). If ESS is enabled, see [Windows Hello Enhanced Sign-in Security](/windows-hardware/design/device-experiences/windows-hello-enhanced-sign-in-security). - question: Can I use an external Windows Hello compatible camera or other Windows Hello compatible accessory when my laptop lid is closed or docked? answer: | Some laptops and tablets with keyboards that close may not use an external Windows Hello compatible camera or other Windows Hello compatible accessory when the computer is docked with the lid closed. The issue has been addressed in Windows 11, version 22H2. diff --git a/windows/security/identity-protection/hello-for-business/hello-how-it-works-authentication.md b/windows/security/identity-protection/hello-for-business/hello-how-it-works-authentication.md index f25bac5b47..313d215066 100644 --- a/windows/security/identity-protection/hello-for-business/hello-how-it-works-authentication.md +++ b/windows/security/identity-protection/hello-for-business/hello-how-it-works-authentication.md @@ -1,24 +1,16 @@ --- -title: How Windows Hello for Business works - Authentication -description: Learn about the authentication flow for Windows Hello for Business. -ms.date: 02/15/2022 -ms.topic: article +title: How Windows Hello for Business authentication works +description: Learn about the Windows Hello for Business authentication flows. +ms.date: 05/24/2023 +ms.topic: reference --- -# Windows Hello for Business and Authentication +# Windows Hello for Business authentication -Windows Hello for Business authentication is passwordless, two-factor authentication. Authenticating with Windows Hello for Business provides a convenient sign-in experience that authenticates the user to both Azure Active Directory and Active Directory resources. +Windows Hello for Business authentication is a passwordless, two-factor authentication. Authenticating with Windows Hello for Business provides a convenient sign-in experience that authenticates the user to both Azure Active Directory and Active Directory resources. -Azure Active Directory-joined devices authenticate to Azure during sign-in and can optionally authenticate to Active Directory. Hybrid Azure Active Directory-joined devices authenticate to Active Directory during sign-in, and authenticate to Azure Active Directory in the background. +Azure AD-joined devices authenticate to Azure AD during sign-in and can, optionally, authenticate to Active Directory. Hybrid Azure AD-joined devices authenticate to Active Directory during sign-in, and authenticate to Azure AD in the background. -- [Azure AD join authentication to Azure Active Directory](#azure-ad-join-authentication-to-azure-active-directory) -- [Azure AD join authentication to Active Directory using Azure AD Kerberos (cloud Kerberos trust)](#azure-ad-join-authentication-to-active-directory-using-azure-ad-kerberos-cloud-kerberos-trust) -- [Azure AD join authentication to Active Directory using a key](#azure-ad-join-authentication-to-active-directory-using-a-key) -- [Azure AD join authentication to Active Directory using a certificate](#azure-ad-join-authentication-to-active-directory-using-a-certificate) -- [Hybrid Azure AD join authentication using Azure AD Kerberos (cloud Kerberos trust)](#hybrid-azure-ad-join-authentication-using-azure-ad-kerberos-cloud-kerberos-trust) -- [Hybrid Azure AD join authentication using a key](#hybrid-azure-ad-join-authentication-using-a-key) -- [Hybrid Azure AD join authentication using a certificate](#hybrid-azure-ad-join-authentication-using-a-certificate) - -## Azure AD join authentication to Azure Active Directory +## Azure AD join authentication to Azure AD ![Azure AD join authentication to Azure Active Directory.](images/howitworks/auth-aadj-cloud.png) @@ -27,20 +19,20 @@ Azure Active Directory-joined devices authenticate to Azure during sign-in and c | Phase | Description | | :----: | :----------- | -|A | Authentication begins when the user dismisses the lock screen, which triggers winlogon to show the Windows Hello for Business credential provider. The user provides their Windows Hello gesture (PIN or biometrics). The credential provider packages these credentials and returns them to winlogon. Winlogon passes the collected credentials to lsass. Lsass passes the collected credentials to the Cloud Authentication security support provider, referred to as the Cloud AP provider.| +|A | Authentication begins when the user dismisses the lock screen, which triggers Winlogon to show the Windows Hello for Business credential provider. The user provides their Windows Hello gesture (PIN or biometrics). The credential provider packages these credentials and returns them to Winlogon. Winlogon passes the collected credentials to lsass. Lsass passes the collected credentials to the Cloud Authentication security support provider, referred to as the Cloud AP provider.| |B | The Cloud AP provider requests a nonce from Azure Active Directory. Azure AD returns a nonce. The Cloud AP provider signs the nonce using the user's private key and returns the signed nonce to the Azure Active Directory.| -|C | Azure Active Directory validates the signed nonce using the user's securely registered public key against the nonce signature. After validating the signature, Azure AD then validates the returned signed nonce. After validating the nonce, Azure AD creates a PRT with session key that is encrypted to the device's transport key and returns it to the Cloud AP provider.| +|C | Azure Active Directory validates the signed nonce using the user's securely registered public key against the nonce signature. Azure AD then validates the returned signed nonce, and creates a PRT with session key that is encrypted to the device's transport key and returns it to the Cloud AP provider.| |D | The Cloud AP provider receives the encrypted PRT with session key. Using the device's private transport key, the Cloud AP provider decrypt the session key and protects the session key using the device's TPM.| -|E | The Cloud AP provider returns a successful authentication response to lsass. Lsass caches the PRT, and informs winlogon of the success authentication. Winlogon creates a logon session, loads the user's profile, and starts explorer.exe.| +|E | The Cloud AP provider returns a successful authentication response to lsass. Lsass caches the PRT, and informs Winlogon of the success authentication. Winlogon creates a logon session, loads the user's profile, and starts explorer.exe.| -## Azure AD join authentication to Active Directory using Azure AD Kerberos (cloud Kerberos trust) +## Azure AD join authentication to Active Directory using cloud Kerberos trust ![Azure Active Directory join authentication to Azure AD.](images/howitworks/auth-aadj-cloudtrust-kerb.png) | Phase | Description | | :----: | :----------- | |A | Authentication to Active Directory from an Azure AD joined device begins with the user first attempts to use a resource that needs Kerberos authentication. The Kerberos security support provider, hosted in lsass, uses metadata from the Windows Hello for Business key to get a hint of the user's domain. Using the hint, the provider uses the DClocator service to locate a 2016 domain controller. -|B | After locating an active 2016 domain controller, the Kerberos provider sends a partial TGT that it received from Azure AD from a previous Azure AD authentication to the domain controller. The partial TGT contains only the user SID and is signed by Azure AD Kerberos. The domain controller will verify that the partial TGT is valid. On success, the KDC returns a TGT to the client.| +|B | After locating a domain controller, the Kerberos provider sends a partial TGT that it received from Azure AD from a previous Azure AD authentication to the domain controller. The partial TGT contains only the user SID, and it's signed by Azure AD Kerberos. The domain controller verifies that the partial TGT is valid. On success, the KDC returns a TGT to the client.| ## Azure AD join authentication to Active Directory using a key @@ -48,9 +40,9 @@ Azure Active Directory-joined devices authenticate to Azure during sign-in and c | Phase | Description | | :----: | :----------- | -|A | Authentication to Active Directory from an Azure AD joined device begins with the user first attempts to use a resource that needs Kerberos authentication. The Kerberos security support provider, hosted in lsass, uses metadata from the Windows Hello for Business key to get a hint of the user's domain. Using the hint, the provider uses the DClocator service to locate a 2016 domain controller. After the provider locates an active 2016 domain controller, the provider uses the private key to sign the Kerberos pre-authentication data.| -|B | The Kerberos provider sends the signed pre-authentication data and its public key (in the form of a self-signed certificate) to the Key Distribution Center (KDC) service running on the 2016 domain controller in the form of a KERB_AS_REQ.
          The 2016 domain controller determines the certificate is a self-signed certificate. It retrieves the public key from the certificate included in the KERB_AS_REQ and searches for the public key in Active Directory. It validates the UPN for authentication request matches the UPN registered in Active Directory and validates the signed pre-authentication data using the public key from Active Directory. On success, the KDC returns a TGT to the client with its certificate in a KERB_AS_REP.| -|C | The Kerberos provider ensures it can trust the response from the domain controller. First, it ensures the KDC certificate chains to a root certificate that is trusted by the device. Next, it ensures the certificate is within its validity period and that it has not been revoked. The Kerberos provider then verifies the certificate has the KDC Authentication present and that the subject alternate name listed in the KDC's certificate matches the domain name to which the user is authenticating. After passing this criteria, Kerberos returns the TGT to lsass, where it is cached and used for subsequent service ticket requests.| +|A | Authentication to Active Directory from an Azure AD joined device begins with the user first attempts to use a resource that needs Kerberos authentication. The Kerberos security support provider, hosted in lsass, uses metadata from the Windows Hello for Business key to get a hint of the user's domain. Using the hint, the provider uses the DClocator service to locate a 2016 domain controller. After the provider locates a domain controller, the provider uses the private key to sign the Kerberos preauthentication data.| +|B | The Kerberos provider sends the signed preauthentication data and its public key (in the form of a self-signed certificate) to the Key Distribution Center (KDC) service running on the 2016 domain controller in the form of a KERB_AS_REQ.
          The 2016 domain controller determines the certificate is a self-signed certificate. It retrieves the public key from the certificate included in the KERB_AS_REQ and searches for the public key in Active Directory. It validates the UPN for authentication request matches the UPN registered in Active Directory and validates the signed preauthentication data using the public key from Active Directory. On success, the KDC returns a TGT to the client with its certificate in a KERB_AS_REP.| +|C | The Kerberos provider ensures it can trust the response from the domain controller. First, it ensures the KDC certificate chains to a root certificate that is trusted by the device. Next, it ensures the certificate is within its validity period and that it hasn't been revoked. The Kerberos provider then verifies the certificate has the KDC Authentication present and that the subject alternate name listed in the KDC's certificate matches the domain name to which the user is authenticating. After passing this criteria, Kerberos returns the TGT to lsass, where it's cached and used for subsequent service ticket requests.| > [!NOTE] > You might have an on-premises domain federated with Azure AD. Once you have successfully provisioned Windows Hello for Business PIN/Bio on the Azure AD joined device, any future login of Windows Hello for Business (PIN/Bio) sign-in will directly authenticate against Azure AD to get PRT and trigger authenticate against your DC (if LOS to DC is available) to get Kerberos. It no longer uses AD FS to authenticate for Windows Hello for Business sign-ins. @@ -61,24 +53,24 @@ Azure Active Directory-joined devices authenticate to Azure during sign-in and c | Phase | Description | | :----: | :----------- | -|A | Authentication to Active Directory from an Azure AD joined device begins with the user first attempts to use a resource that needs Kerberos authentication. The Kerberos security support provider, hosted in lsass, uses information from the certificate to get a hint of the user's domain. Kerberos can use the distinguished name of the user found in the subject of the certificate, or it can use the user principal name of the user found in the subject alternate name of the certificate. Using the hint, the provider uses the DClocator service to locate a domain controller. After the provider locates an active domain controller, the provider uses the private key to sign the Kerberos pre-authentication data.| -|B | The Kerberos provider sends the signed pre-authentication data and user's certificate, which includes the public key, to the Key Distribution Center (KDC) service running on the domain controller in the form of a KERB_AS_REQ.
          The domain controller determines the certificate is not self-signed certificate. The domain controller ensures the certificate chains to trusted root certificate, is within its validity period, can be used for authentication, and has not been revoked. It retrieves the public key and UPN from the certificate included in the KERB_AS_REQ and searches for the UPN in Active Directory. It validates the signed pre-authentication data using the public key from the certificate. On success, the KDC returns a TGT to the client with its certificate in a KERB_AS_REP.| -|C | The Kerberos provider ensures it can trust the response from the domain controller. First, it ensures the KDC certificate chains to a root certificate that is trusted by the device. Next, it ensures the certificate is within its validity period and that it has not been revoked. The Kerberos provider then verifies the certificate has the KDC Authentication present and that the subject alternate name listed in the KDC's certificate matches the domain name to which the user is authenticating. After passing this criteria, Kerberos returns the TGT to lsass, where it is cached and used for subsequent service ticket requests.| +|A | Authentication to Active Directory from an Azure AD joined device begins with the user first attempts to use a resource that needs Kerberos authentication. The Kerberos security support provider, hosted in lsass, uses information from the certificate to get a hint of the user's domain. Kerberos can use the distinguished name of the user found in the subject of the certificate, or it can use the user principal name of the user found in the subject alternate name of the certificate. Using the hint, the provider uses the DClocator service to locate a domain controller. After the provider locates an active domain controller, the provider uses the private key to sign the Kerberos preauthentication data.| +|B | The Kerberos provider sends the signed preauthentication data and user's certificate, which includes the public key, to the Key Distribution Center (KDC) service running on the domain controller in the form of a KERB_AS_REQ.
          The domain controller determines the certificate isn't self-signed certificate. The domain controller ensures the certificate chains to trusted root certificate, is within its validity period, can be used for authentication, and hasn't been revoked. It retrieves the public key and UPN from the certificate included in the KERB_AS_REQ and searches for the UPN in Active Directory. It validates the signed preauthentication data using the public key from the certificate. On success, the KDC returns a TGT to the client with its certificate in a KERB_AS_REP.| +|C | The Kerberos provider ensures it can trust the response from the domain controller. First, it ensures the KDC certificate chains to a root certificate that is trusted by the device. Next, it ensures the certificate is within its validity period and that it hasn't been revoked. The Kerberos provider then verifies the certificate has the KDC Authentication present and that the subject alternate name listed in the KDC's certificate matches the domain name to which the user is authenticating. After passing this criteria, Kerberos returns the TGT to lsass, where it's cached and used for subsequent service ticket requests.| > [!NOTE] > You may have an on-premises domain federated with Azure AD. Once you have successfully provisioned Windows Hello for Business PIN/Bio on, any future login of Windows Hello for Business (PIN/Bio) sign-in will directly authenticate against Azure AD to get PRT, as well as authenticate against your DC (if LOS to DC is available) to get Kerberos as mentioned previously. AD FS federation is used only when Enterprise PRT calls are placed from the client. You need to have device write-back enabled to get "Enterprise PRT" from your federation. -## Hybrid Azure AD join authentication using Azure AD Kerberos (cloud Kerberos trust) +## Hybrid Azure AD join authentication using cloud Kerberos trust ![Hybrid Azure AD join authentication using Azure AD Kerberos](images/howitworks/auth-haadj-cloudtrust.png) | Phase | Description | | :----: | :----------- | -|A | Authentication begins when the user dismisses the lock screen, which triggers winlogon to show the Windows Hello for Business credential provider. The user provides their Windows Hello gesture (PIN or biometrics). The credential provider packages these credentials and returns them to winlogon. Winlogon passes the collected credentials to lsass. Lsass queries Windows Hello for Business policy to check if cloud Kerberos trust is enabled. If cloud Kerberos trust is enabled, Lsass passes the collected credentials to the Cloud Authentication security support provider, or Cloud AP. Cloud AP requests a nonce from Azure Active Directory. Azure AD returns a nonce. +|A | Authentication begins when the user dismisses the lock screen, which triggers Winlogon to show the Windows Hello for Business credential provider. The user provides their Windows Hello gesture (PIN or biometrics). The credential provider packages these credentials and returns them to Winlogon. Winlogon passes the collected credentials to lsass. Lsass queries Windows Hello for Business policy to check if cloud Kerberos trust is enabled. If cloud Kerberos trust is enabled, Lsass passes the collected credentials to the Cloud Authentication security support provider, or Cloud AP. Cloud AP requests a nonce from Azure Active Directory. Azure AD returns a nonce. |B | Cloud AP signs the nonce using the user's private key and returns the signed nonce to Azure AD. |C | Azure AD validates the signed nonce using the user's securely registered public key against the nonce signature. After validating the signature, Azure AD then validates the returned signed nonce. After validating the nonce, Azure AD creates a PRT with session key that is encrypted to the device's transport key and creates a Partial TGT from Azure AD Kerberos and returns them to Cloud AP. |D | Cloud AP receives the encrypted PRT with session key. Using the device's private transport key, Cloud AP decrypts the session key and protects the session key using the device's TPM (if available). Cloud AP returns a successful authentication response to lsass. Lsass caches the PRT and the Partial TGT. -|E | The Kerberos security support provider, hosted in lsass, uses metadata from the Windows Hello for Business key to get a hint of the user's domain. Using the hint, the provider uses the DClocator service to locate a 2016 domain controller. After locating an active 2016 domain controller, the Kerberos provider sends the partial TGT that it received from Azure AD to the domain controller. The partial TGT contains only the user SID and is signed by Azure AD Kerberos. The domain controller will verify that the partial TGT is valid. On success, the KDC returns a TGT to the client. Kerberos will return the TGT to lsass, where it is cached and used for subsequent service ticket requests. Lsass informs winlogon of the success authentication. Winlogon creates a logon session, loads the user's profile, and starts explorer.exe.| +|E | The Kerberos security support provider, hosted in lsass, uses metadata from the Windows Hello for Business key to get a hint of the user's domain. Using the hint, the provider uses the DClocator service to locate a 2016 domain controller. After locating an active 2016 domain controller, the Kerberos provider sends the partial TGT that it received from Azure AD to the domain controller. The partial TGT contains only the user SID and is signed by Azure AD Kerberos. The domain controller verifies that the partial TGT is valid. On success, the KDC returns a TGT to the client. Kerberos returns the TGT to lsass, where it's cached and used for subsequent service ticket requests. Lsass informs Winlogon of the success authentication. Winlogon creates a logon session, loads the user's profile, and starts explorer.exe.| ## Hybrid Azure AD join authentication using a key @@ -86,11 +78,11 @@ Azure Active Directory-joined devices authenticate to Azure during sign-in and c | Phase | Description | | :----: | :----------- | -|A | Authentication begins when the user dismisses the lock screen, which triggers winlogon to show the Windows Hello for Business credential provider. The user provides their Windows Hello gesture (PIN or biometrics). The credential provider packages these credentials and returns them to winlogon. Winlogon passes the collected credentials to lsass. Lsass passes the collected credentials to the Kerberos security support provider. The Kerberos provider gets domain hints from the domain joined workstation to locate a domain controller for the user.| -|B | The Kerberos provider sends the signed pre-authentication data and the user's public key (in the form of a self-signed certificate) to the Key Distribution Center (KDC) service running on the 2016 domain controller in the form of a KERB_AS_REQ.
          The 2016 domain controller determines the certificate is a self-signed certificate. It retrieves the public key from the certificate included in the KERB_AS_REQ and searches for the public key in Active Directory. It validates the UPN for authentication request matches the UPN registered in Active Directory and validates the signed pre-authentication data using the public key from Active Directory. On success, the KDC returns a TGT to the client with its certificate in a KERB_AS_REP.| -|C | The Kerberos provider ensures it can trust the response from the domain controller. First, it ensures the KDC certificate chains to a root certificate that is trusted by the device. Next, it ensures the certificate is within its validity period and that it has not been revoked. The Kerberos provider then verifies the certificate has the KDC Authentication present and that the subject alternate name listed in the KDC's certificate matches the domain name to which the user is authenticating. -|D | After passing this criteria, Kerberos returns the TGT to lsass, where it is cached and used for subsequent service ticket requests.| -|E | Lsass informs winlogon of the success authentication. Winlogon creates a logon session, loads the user's profile, and starts explorer.exe.| +|A | Authentication begins when the user dismisses the lock screen, which triggers Winlogon to show the Windows Hello for Business credential provider. The user provides their Windows Hello gesture (PIN or biometrics). The credential provider packages these credentials and returns them to Winlogon. Winlogon passes the collected credentials to lsass. Lsass passes the collected credentials to the Kerberos security support provider. The Kerberos provider gets domain hints from the domain joined workstation to locate a domain controller for the user.| +|B | The Kerberos provider sends the signed preauthentication data and the user's public key (in the form of a self-signed certificate) to the Key Distribution Center (KDC) service running on the 2016 domain controller in the form of a KERB_AS_REQ.
          The 2016 domain controller determines the certificate is a self-signed certificate. It retrieves the public key from the certificate included in the KERB_AS_REQ and searches for the public key in Active Directory. It validates the UPN for authentication request matches the UPN registered in Active Directory and validates the signed preauthentication data using the public key from Active Directory. On success, the KDC returns a TGT to the client with its certificate in a KERB_AS_REP.| +|C | The Kerberos provider ensures it can trust the response from the domain controller. First, it ensures the KDC certificate chains to a root certificate that is trusted by the device. Next, it ensures the certificate is within its validity period and that it hasn't been revoked. The Kerberos provider then verifies the certificate has the KDC Authentication present and that the subject alternate name listed in the KDC's certificate matches the domain name to which the user is authenticating. +|D | After passing this criteria, Kerberos returns the TGT to lsass, where it's cached and used for subsequent service ticket requests.| +|E | Lsass informs Winlogon of the success authentication. Winlogon creates a logon session, loads the user's profile, and starts explorer.exe.| |F | While Windows loads the user's desktop, lsass passes the collected credentials to the Cloud Authentication security support provider, referred to as the Cloud AP provider. The Cloud AP provider requests a nonce from Azure Active Directory. Azure AD returns a nonce.| |G | The Cloud AP provider signs the nonce using the user's private key and returns the signed nonce to the Azure Active Directory. Azure Active Directory validates the signed nonce using the user's securely registered public key against the nonce signature. After validating the signature, Azure AD then validates the returned signed nonce. After validating the nonce, Azure AD creates a PRT with session key that is encrypted to the device's transport key and returns it to the Cloud AP provider.
          The Cloud AP provider receives the encrypted PRT with session key. Using the device's private transport key, the Cloud AP provider decrypt the session key and protects the session key using the device's TPM.
          The Cloud AP provider returns a successful authentication response to lsass. Lsass caches the PRT.| @@ -103,13 +95,13 @@ Azure Active Directory-joined devices authenticate to Azure during sign-in and c | Phase | Description | | :----: | :----------- | -|A | Authentication begins when the user dismisses the lock screen, which triggers winlogon to show the Windows Hello for Business credential provider. The user provides their Windows Hello gesture (PIN or biometrics). The credential provider packages these credentials and returns them to winlogon. Winlogon passes the collected credentials to lsass. Lsass passes the collected credentials to the Kerberos security support provider. The Kerberos provider gets domain hints from the domain joined workstation to locate a domain controller for the user.| -|B | The Kerberos provider sends the signed pre-authentication data and user's certificate, which includes the public key, to the Key Distribution Center (KDC) service running on the domain controller in the form of a KERB_AS_REQ.
          The domain controller determines the certificate is not self-signed certificate. The domain controller ensures the certificate chains to trusted root certificate, is within its validity period, can be used for authentication, and has not been revoked. It retrieves the public key and UPN from the certificate included in the KERB_AS_REQ and searches for the UPN in Active Directory. It validates the signed pre-authentication data using the public key from the certificate. On success, the KDC returns a TGT to the client with its certificate in a KERB_AS_REP.| -|C | The Kerberos provider ensures it can trust the response from the domain controller. First, it ensures the KDC certificate chains to a root certificate that is trusted by the device. Next, it ensures the certificate is within its validity period and that it has not been revoked. The Kerberos provider then verifies the certificate has the KDC Authentication present and that the subject alternate name listed in the KDC's certificate matches the domain name to which the user is authenticating. -|D | After passing this criteria, Kerberos returns the TGT to lsass, where it is cached and used for subsequent service ticket requests.| -|E | Lsass informs winlogon of the success authentication. Winlogon creates a logon session, loads the user's profile, and starts explorer.exe.| +|A | Authentication begins when the user dismisses the lock screen, which triggers Winlogon to show the Windows Hello for Business credential provider. The user provides their Windows Hello gesture (PIN or biometrics). The credential provider packages these credentials and returns them to Winlogon. Winlogon passes the collected credentials to lsass. Lsass passes the collected credentials to the Kerberos security support provider. The Kerberos provider gets domain hints from the domain joined workstation to locate a domain controller for the user.| +|B | The Kerberos provider sends the signed preauthentication data and user's certificate, which includes the public key, to the Key Distribution Center (KDC) service running on the domain controller in the form of a KERB_AS_REQ.
          The domain controller determines the certificate isn't self-signed certificate. The domain controller ensures the certificate chains to trusted root certificate, is within its validity period, can be used for authentication, and hasn't been revoked. It retrieves the public key and UPN from the certificate included in the KERB_AS_REQ and searches for the UPN in Active Directory. It validates the signed preauthentication data using the public key from the certificate. On success, the KDC returns a TGT to the client with its certificate in a KERB_AS_REP.| +|C | The Kerberos provider ensures it can trust the response from the domain controller. First, it ensures the KDC certificate chains to a root certificate that is trusted by the device. Next, it ensures the certificate is within its validity period and that it hasn't been revoked. The Kerberos provider then verifies the certificate has the KDC Authentication present and that the subject alternate name listed in the KDC's certificate matches the domain name to which the user is authenticating. +|D | After passing this criteria, Kerberos returns the TGT to lsass, where it's cached and used for subsequent service ticket requests.| +|E | Lsass informs Winlogon of the success authentication. Winlogon creates a logon session, loads the user's profile, and starts explorer.exe.| |F | While Windows loads the user's desktop, lsass passes the collected credentials to the Cloud Authentication security support provider, referred to as the Cloud AP provider. The Cloud AP provider requests a nonce from Azure Active Directory. Azure AD returns a nonce.| |G | The Cloud AP provider signs the nonce using the user's private key and returns the signed nonce to the Azure Active Directory. Azure Active Directory validates the signed nonce using the user's securely registered public key against the nonce signature. After validating the signature, Azure AD then validates the returned signed nonce. After validating the nonce, Azure AD creates a PRT with session key that is encrypted to the device's transport key and returns it to the Cloud AP provider.
          The Cloud AP provider receives the encrypted PRT with session key. Using the device's private transport key, the Cloud AP provider decrypt the session key and protects the session key using the device's TPM.
          The Cloud AP provider returns a successful authentication response to lsass. Lsass caches the PRT.| > [!IMPORTANT] -> In the above deployment model, a newly provisioned user will not be able to sign in using Windows Hello for Business unless the device has line of sight to the domain controller for the first time. +> In the above deployment model, a **newly provisioned** user will not be able to sign in using Windows Hello for Business unless the device has line of sight to the domain controller. diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-provision.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-provision.md index 629d9c561e..934a3f70de 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-provision.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-provision.md @@ -139,7 +139,7 @@ To configure Windows Hello for Business using an *account protection* policy: 1. Under *Block Windows Hello for Business*, select **Disabled** and multiple policies become available - These policies are optional to configure, but it's recommended to configure *Enable to use a Trusted Platform Module (TPM)* to **Yes** - For more information about these policies, see [MDM policy settings for Windows Hello for Business](hello-manage-in-organization.md#mdm-policy-settings-for-windows-hello-for-business) -1. Under *Enable to certificate for on-premises resources*, select **Disabled** and multiple policies become available +1. Under *Enable to certificate for on-premises resources*, select **YES** 1. Select **Next** 1. Optionally, add *scope tags* > **Next** 1. Assign the policy to a security group that contains as members the devices or users that you want to configure > **Next** @@ -195,4 +195,4 @@ The certificate authority validates the certificate was signed by the registrati [MEM-3]: /mem/intune/configuration/custom-settings-configure [MEM-4]: /windows/client-management/mdm/passportforwork-csp [MEM-5]: /mem/intune/protect/endpoint-security-account-protection-policy -[MEM-6]: /mem/intune/protect/identity-protection-configure \ No newline at end of file +[MEM-6]: /mem/intune/protect/identity-protection-configure diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-cloud-kerberos-trust.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-cloud-kerberos-trust.md index d3f07a3668..47edfbacd4 100644 --- a/windows/security/identity-protection/hello-for-business/hello-hybrid-cloud-kerberos-trust.md +++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-cloud-kerberos-trust.md @@ -35,12 +35,14 @@ With Azure AD Kerberos, Azure AD can issue TGTs for one or more AD domains. Wind When Azure AD Kerberos is enabled in an Active Directory domain, an *Azure AD Kerberos server object* is created in the domain. This object: - Appears as a Read Only Domain Controller (RODC) object, but isn't associated with any physical servers -- Is only used by Azure AD to generate TGTs for the Active Directory domain. The same rules and restrictions used for RODCs apply to the Azure AD Kerberos Server object +- Is only used by Azure AD to generate TGTs for the Active Directory domain. + > [!NOTE] + > The same rules and restrictions used for RODCs apply to the Azure AD Kerberos Server object. For example, users that are direct or indirect members of the built-in security group *Denied RODC Password Replication Group* won't be able to use cloud Kerberos trust. :::image type="content" source="images/azuread-kerberos-object.png" alt-text="Active Directory Users and Computers console, showing the computer object representing the Azure AD Kerberos server "::: For more information about how Azure AD Kerberos enables access to on-premises resources, see [enabling passwordless security key sign-in to on-premises resources][AZ-1].\ -For more information about how Azure AD Kerberos works with Windows Hello for Business cloud Kerberos trust, see [Windows Hello for Business authentication technical deep dive](hello-how-it-works-authentication.md#hybrid-azure-ad-join-authentication-using-azure-ad-kerberos-cloud-kerberos-trust). +For more information about how Azure AD Kerberos works with Windows Hello for Business cloud Kerberos trust, see [Windows Hello for Business authentication technical deep dive](hello-how-it-works-authentication.md#hybrid-azure-ad-join-authentication-using-cloud-kerberos-trust). > [!IMPORTANT] > When implementing the cloud Kerberos trust deployment model, you *must* ensure that you have an adequate number of *read-write domain controllers* in each Active Directory site where users will be authenticating with Windows Hello for Business. For more information, see [Capacity planning for Active Directory][SERV-1]. @@ -88,4 +90,4 @@ Once the prerequisites are met, deploying Windows Hello for Business with a clou [SERV-1]: /windows-server/administration/performance-tuning/role/active-directory-server/capacity-planning-for-active-directory-domain-services [SUP-1]: https://support.microsoft.com/topic/january-23-2020-kb4534307-os-build-14393-3474-b181594e-2c6a-14ea-e75b-678efea9d27e -[SUP-2]: https://support.microsoft.com/topic/january-23-2020-kb4534321-os-build-17763-1012-023e84c3-f9aa-3b55-8aff-d512911c459f \ No newline at end of file +[SUP-2]: https://support.microsoft.com/topic/january-23-2020-kb4534321-os-build-17763-1012-023e84c3-f9aa-3b55-8aff-d512911c459f diff --git a/windows/security/identity-protection/hello-for-business/hello-manage-in-organization.md b/windows/security/identity-protection/hello-for-business/hello-manage-in-organization.md index 2676f0066f..576ffdb0a4 100644 --- a/windows/security/identity-protection/hello-for-business/hello-manage-in-organization.md +++ b/windows/security/identity-protection/hello-for-business/hello-manage-in-organization.md @@ -1,6 +1,6 @@ --- -title: Manage Windows Hello in your organization (Windows) -description: You can create a Group Policy or mobile device management (MDM) policy that will implement Windows Hello for Business on devices running Windows 10. +title: Manage Windows Hello in your organization +description: Learn how to create a Group Policy or mobile device management (MDM) policy to configure and deploy Windows Hello for Business. ms.collection: - highpri - tier1 @@ -19,31 +19,31 @@ You can create a Group Policy or mobile device management (MDM) policy to config ## Group Policy settings for Windows Hello for Business -The following table lists the Group Policy settings that you can configure for Windows Hello use in your workplace. These policy settings are available in **User configuration** and **Computer Configuration** under **Policies** > **Administrative Templates** > **Windows Components** > **Windows Hello for Business**. +The following table lists the Group Policy settings that you can configure for Windows Hello use in your organization. These policy settings are available in **User configuration** and **Computer Configuration** under **Policies > Administrative Templates > Windows Components > Windows Hello for Business**. > [!NOTE] -> Starting with Windows 10, version 1709, the location of the PIN complexity section of the Group Policy is: **Computer Configuration** > **Administrative Templates** > **System** > **PIN Complexity**. +> The location of the PIN complexity section of the Group Policy is: **Computer Configuration > Administrative Templates > System > PIN Complexity**. |Policy|Scope|Options| |--- |--- |--- | -|Use Windows Hello for Business|Computer or user|

          Not configured: Device does not provision Windows Hello for Business for any user.

          Enabled: Device provisions Windows Hello for Business using keys or certificates for all users.

          Disabled: Device does not provision Windows Hello for Business for any user.| -|Use a hardware security device|Computer|

          Not configured: Windows Hello for Business will be provisioned using TPM if available, and will be provisioned using software if TPM is not available.

          Enabled: Windows Hello for Business will only be provisioned using TPM. This feature will provision Windows Hello for Business using TPM 1.2 unless the option to exclude them is explicitly set.

          Disabled: Windows Hello for Business will be provisioned using TPM if available, and will be provisioned using software if TPM is not available.| +|Use Windows Hello for Business|Computer or user|

          Not configured: Device doesn't provision Windows Hello for Business for any user.

          Enabled: Device provisions Windows Hello for Business using keys or certificates for all users.

          Disabled: Device doesn't provision Windows Hello for Business for any user.| +|Use a hardware security device|Computer|

          Not configured: Windows Hello for Business will be provisioned using TPM if available, and will be provisioned using software if TPM isn't available.

          Enabled: Windows Hello for Business will only be provisioned using TPM. This feature will provision Windows Hello for Business using TPM 1.2 unless the option to exclude them is explicitly set.

          Disabled: Windows Hello for Business will be provisioned using TPM if available, and will be provisioned using software if TPM isn't available.| |Use certificate for on-premises authentication|Computer or user|

          Not configured: Windows Hello for Business enrolls a key that is used for on-premises authentication.

          Enabled: Windows Hello for Business enrolls a sign-in certificate using ADFS that is used for on-premises authentication.

          Disabled: Windows Hello for Business enrolls a key that is used for on-premises authentication.| -|Use PIN recovery|Computer|

          Added in Windows 10, version 1703

          Not configured: Windows Hello for Business does not create or store a PIN recovery secret. PIN reset does not use the Azure-based PIN recovery service

          Enabled: Windows Hello for Business uses the Azure-based PIN recovery service for PIN reset

          Disabled: Windows Hello for Business does not create or store a PIN recovery secret. PIN reset does not use the Azure-based PIN recovery service.

          For more information about using the PIN recovery service for PIN reset see [Windows Hello for Business PIN Reset](hello-feature-pin-reset.md).| +|Use PIN recovery|Computer|

          Added in Windows 10, version 1703

          Not configured: Windows Hello for Business doesn't create or store a PIN recovery secret. PIN reset doesn't use the Azure-based PIN recovery service

          Enabled: Windows Hello for Business uses the Azure-based PIN recovery service for PIN reset

          Disabled: Windows Hello for Business doesn't create or store a PIN recovery secret. PIN reset doesn't use the Azure-based PIN recovery service.

          For more information about using the PIN recovery service for PIN reset see [Windows Hello for Business PIN Reset](hello-feature-pin-reset.md).| |Use biometrics|Computer|

          Not configured: Biometrics can be used as a gesture in place of a PIN

          Enabled: Biometrics can be used as a gesture in place of a PIN.

          Disabled: Only a PIN can be used as a gesture.| ### PIN Complexity |Policy|Scope|Options| |--- |--- |--- | -|Require digits|Computer|

          Not configured: Users must include a digit in their PIN.

          Enabled: Users must include a digit in their PIN.

          Disabled: Users cannot use digits in their PIN.| -|Require lowercase letters|Computer|

          Not configured: Users cannot use lowercase letters in their PIN

          Enabled: Users must include at least one lowercase letter in their PIN.

          Disabled: Users cannot use lowercase letters in their PIN.| +|Require digits|Computer|

          Not configured: Users must include a digit in their PIN.

          Enabled: Users must include a digit in their PIN.

          Disabled: Users can't use digits in their PIN.| +|Require lowercase letters|Computer|

          Not configured: Users can't use lowercase letters in their PIN

          Enabled: Users must include at least one lowercase letter in their PIN.

          Disabled: Users can't use lowercase letters in their PIN.| |Maximum PIN length|Computer|

          Not configured: PIN length must be less than or equal to 127.

          Enabled: PIN length must be less than or equal to the number you specify.

          Disabled: PIN length must be less than or equal to 127.| |Minimum PIN length|Computer|

          Not configured: PIN length must be greater than or equal to 4.

          Enabled: PIN length must be greater than or equal to the number you specify.

          Disabled: PIN length must be greater than or equal to 4.| -|Expiration|Computer|

          Not configured: PIN does not expire.

          Enabled: PIN can be set to expire after any number of days between 1 and 730, or PIN can be set to never expire by setting policy to 0.

          Disabled: PIN does not expire.| -|History|Computer|

          Not configured: Previous PINs are not stored.

          Enabled: Specify the number of previous PINs that can be associated to a user account that can't be reused.

          Disabled: Previous PINs are not stored.

          Note  Current PIN is included in PIN history.
          | -|Require special characters|Computer|

          Not configured: Windows allows, but does not require, special characters in the PIN.

          Enabled: Windows requires the user to include at least one special character in their PIN.

          Disabled: Windows does not allow the user to include special characters in their PIN.| -|Require uppercase letters|Computer|

          Not configured: Users cannot include an uppercase letter in their PIN.

          Enabled: Users must include at least one uppercase letter in their PIN.

          Disabled: Users cannot include an uppercase letter in their PIN.| +|Expiration|Computer|

          Not configured: PIN doesn't expire.

          Enabled: PIN can be set to expire after any number of days between 1 and 730, or PIN can be set to never expire by setting policy to 0.

          Disabled: PIN doesn't expire.| +|History|Computer|

          Not configured: Previous PINs aren't stored.

          Enabled: Specify the number of previous PINs that can be associated to a user account that can't be reused.

          Disabled: Previous PINs aren't stored.

          Note  Current PIN is included in PIN history.
          | +|Require special characters|Computer|

          Not configured: Windows allows, but doesn't require, special characters in the PIN.

          Enabled: Windows requires the user to include at least one special character in their PIN.

          Disabled: Windows doesn't allow the user to include special characters in their PIN.| +|Require uppercase letters|Computer|

          Not configured: Users can't include an uppercase letter in their PIN.

          Enabled: Users must include at least one uppercase letter in their PIN.

          Disabled: Users can't include an uppercase letter in their PIN.| ### Phone Sign-in @@ -60,30 +60,30 @@ The following table lists the MDM policy settings that you can configure for Win |Policy|Scope|Default|Options| |--- |--- |--- |--- | -|UsePassportForWork|Device or user|True|

          True: Windows Hello for Business will be provisioned for all users on the device.

          False: Users will not be able to provision Windows Hello for Business.

          **Note:** If Windows Hello for Business is enabled, and then the policy is changed to False, users who previously set up Windows Hello for Business can continue to use it, but will not be able to set up Windows Hello for Business on other devices
          | -|RequireSecurityDevice|Device or user|False|

          True: Windows Hello for Business will only be provisioned using TPM.

          False: Windows Hello for Business will be provisioned using TPM if available, and will be provisioned using software if TPM is not available.| +|UsePassportForWork|Device or user|True|

          True: Windows Hello for Business will be provisioned for all users on the device.

          False: Users won't be able to provision Windows Hello for Business.

          **Note:** If Windows Hello for Business is enabled, and then the policy is changed to False, users who previously set up Windows Hello for Business can continue to use it, but won't be able to set up Windows Hello for Business on other devices
          | +|RequireSecurityDevice|Device or user|False|

          True: Windows Hello for Business will only be provisioned using TPM.

          False: Windows Hello for Business will be provisioned using TPM if available, and will be provisioned using software if TPM isn't available.| |ExcludeSecurityDevice

          TPM12|Device|False|Added in Windows 10, version 1703

          True: TPM revision 1.2 modules will be disallowed from being used with Windows Hello for Business.

          False: TPM revision 1.2 modules will be allowed to be used with Windows Hello for Business.| -|EnablePinRecovery|Device or use|False|

          Added in Windows 10, version 1703

          True: Windows Hello for Business uses the Azure-based PIN recovery service for PIN reset.

          False: Windows Hello for Business does not create or store a PIN recovery secret. PIN reset does not use the Azure-based PIN recovery service. For more information about using the PIN recovery service for PIN reset see [Windows Hello for Business PIN Reset](hello-feature-pin-reset.md).| +|EnablePinRecovery|Device or use|False|

          Added in Windows 10, version 1703

          True: Windows Hello for Business uses the Azure-based PIN recovery service for PIN reset.

          False: Windows Hello for Business doesn't create or store a PIN recovery secret. PIN reset doesn't use the Azure-based PIN recovery service. For more information about using the PIN recovery service for PIN reset see [Windows Hello for Business PIN Reset](hello-feature-pin-reset.md).| ### Biometrics |Policy|Scope|Default|Options| |--- |--- |--- |--- | |UseBiometrics|Device |False|

          True: Biometrics can be used as a gesture in place of a PIN for domain sign-in.

          False: Only a PIN can be used as a gesture for domain sign-in.| -|

          FacialFeaturesUser

          EnhancedAntiSpoofing|Device|Not configured|

          Not configured: users can choose whether to turn on enhanced anti-spoofing.

          True: Enhanced anti-spoofing is required on devices which support it.

          False: Users cannot turn on enhanced anti-spoofing.| +|

          FacialFeaturesUser

          EnhancedAntiSpoofing|Device|Not configured|

          Not configured: users can choose whether to turn on enhanced anti-spoofing.

          True: Enhanced anti-spoofing is required on devices which support it.

          False: Users can't turn on enhanced anti-spoofing.| ### PINComplexity |Policy|Scope|Default|Options| |--- |--- |--- |--- | -|Digits |Device or user|1 |

          0: Digits are allowed.

          1: At least one digit is required.

          2: Digits are not allowed.| -|Lowercase letters |Device or user|2|

          0: Lowercase letters are allowed.

          1: At least one lowercase letter is required.

          2: Lowercase letters are not allowed.| -|Special characters|Device or user|2|

          0: Special characters are allowed.

          1: At least one special character is required.

          2: Special characters are not allowed.| -|Uppercase letters|Device or user|2|

          0: Uppercase letters are allowed.

          1: At least one uppercase letter is required.

          2: Uppercase letters are not allowed.| -|Maximum PIN length |Device or user|127 |

          Maximum length that can be set is 127. Maximum length cannot be less than minimum setting.| -|Minimum PIN length|Device or user|6|

          Minimum length that can be set is 6. Minimum length cannot be greater than maximum setting.| +|Digits |Device or user|1 |

          0: Digits are allowed.

          1: At least one digit is required.

          2: Digits aren't allowed.| +|Lowercase letters |Device or user|2|

          0: Lowercase letters are allowed.

          1: At least one lowercase letter is required.

          2: Lowercase letters aren't allowed.| +|Special characters|Device or user|2|

          0: Special characters are allowed.

          1: At least one special character is required.

          2: Special characters aren't allowed.| +|Uppercase letters|Device or user|2|

          0: Uppercase letters are allowed.

          1: At least one uppercase letter is required.

          2: Uppercase letters aren't allowed.| +|Maximum PIN length |Device or user|127 |

          Maximum length that can be set is 127. Maximum length can't be less than minimum setting.| +|Minimum PIN length|Device or user|6|

          Minimum length that can be set is 6. Minimum length can't be greater than maximum setting.| |Expiration |Device or user|0|

          Integer value specifies the period of time (in days) that a PIN can be used before the system requires the user to change it. The largest number you can configure for this policy setting is 730. The lowest number you can configure for this policy setting is 0. If this policy is set to 0, then the user's PIN will never expire.| -|History|Device or user|0|

          Integer value that specifies the number of past PINs that can be associated to a user account that can't be reused. The largest number you can configure for this policy setting is 50. The lowest number you can configure for this policy setting is 0. If this policy is set to 0, then storage of previous PINs is not required.| +|History|Device or user|0|

          Integer value that specifies the number of past PINs that can be associated to a user account that can't be reused. The largest number you can configure for this policy setting is 50. The lowest number you can configure for this policy setting is 0. If this policy is set to 0, then storage of previous PINs isn't required.| ### Remote diff --git a/windows/security/identity-protection/hello-for-business/hello-overview.md b/windows/security/identity-protection/hello-for-business/hello-overview.md index 005fb6c685..84acf6b19c 100644 --- a/windows/security/identity-protection/hello-for-business/hello-overview.md +++ b/windows/security/identity-protection/hello-for-business/hello-overview.md @@ -1,11 +1,11 @@ --- -title: Windows Hello for Business Overview (Windows) -description: Learn how Windows Hello for Business replaces passwords with strong two-factor authentication on PCs and mobile devices in Windows 10 and Windows 11. +title: Windows Hello for Business Overview +description: Learn how Windows Hello for Business replaces passwords with strong two-factor authentication on Windows devices. ms.collection: - highpri - tier1 ms.topic: conceptual -ms.date: 12/31/2017 +ms.date: 04/24/2023 --- # Windows Hello for Business Overview @@ -65,6 +65,8 @@ Imagine that someone is looking over your shoulder as you get money from an ATM Windows Hello helps protect user identities and user credentials. Because the user doesn't enter a password (except during provisioning), it helps circumvent phishing and brute force attacks. It also helps prevent server breaches because Windows Hello credentials are an asymmetric key pair, which helps prevent replay attacks when these keys are protected by TPMs. +[!INCLUDE [windows-hello-for-business](../../../../includes/licensing/windows-hello-for-business.md)] + ## How Windows Hello for Business works: key points - Windows Hello credentials are based on certificate or asymmetrical key pair. Windows Hello credentials can be bound to the device, and the token that is obtained using the credential is also bound to the device. diff --git a/windows/security/identity-protection/hello-for-business/hello-prepare-people-to-use.md b/windows/security/identity-protection/hello-for-business/hello-prepare-people-to-use.md index 90bd5ec677..fc9083049d 100644 --- a/windows/security/identity-protection/hello-for-business/hello-prepare-people-to-use.md +++ b/windows/security/identity-protection/hello-for-business/hello-prepare-people-to-use.md @@ -1,5 +1,5 @@ --- -title: Prepare people to use Windows Hello (Windows) +title: Prepare people to use Windows Hello description: When you set a policy to require Windows Hello for Business in the workplace, you will want to prepare people in your organization. ms.date: 08/19/2018 ms.topic: article diff --git a/windows/security/identity-protection/images/emailsecurity.png b/windows/security/identity-protection/images/emailsecurity.png deleted file mode 100644 index 4181fc4f45..0000000000 Binary files a/windows/security/identity-protection/images/emailsecurity.png and /dev/null differ diff --git a/windows/security/identity-protection/images/mailsettings.png b/windows/security/identity-protection/images/mailsettings.png deleted file mode 100644 index 02423ab89c..0000000000 Binary files a/windows/security/identity-protection/images/mailsettings.png and /dev/null differ diff --git a/windows/security/identity-protection/index.md b/windows/security/identity-protection/index.md index c16e630bed..f118eb9d30 100644 --- a/windows/security/identity-protection/index.md +++ b/windows/security/identity-protection/index.md @@ -2,7 +2,7 @@ title: Identity and access management description: Learn more about identity and access protection technologies in Windows. ms.topic: article -ms.date: 02/05/2018 +ms.date: 05/31/2023 --- # Identity and access management @@ -13,15 +13,14 @@ Learn more about identity and access management technologies in Windows. | Section | Description | |-|-| -| [Local Administrator Password Solution](/defender-for-identity/cas-isp-laps) | Local Administrator Password Solution (LAPS) provides management of local account passwords of domain-joined computers. Passwords are stored in Azure Active Directory (Azure AD) and protected by an access control list (ACL), so only eligible users can read them or request a reset. +| [Windows Hello for Business](hello-for-business/index.yml) | Windows Hello replaces passwords with strong two-factor authentication on client devices. The authentication consists of a type of user credential that is tied to a device and a biometric or PIN. | +| [Windows Local Administrator Password Solution (LAPS)](/windows-server/identity/laps/laps-overview) | Windows Local Administrator Password Solution (Windows LAPS) is a Windows feature that automatically manages and backs up the password of a local administrator account on your Azure Active Directory-joined or Windows Server Active Directory-joined devices. | [Technical support policy for lost or forgotten passwords](password-support-policy.md)| Outlines the ways in which Microsoft can help you reset a lost or forgotten password, and provides links to instructions for doing so. | | [Access control](access-control/access-control.md) | Describes access control in Windows, which is the process of authorizing users, groups, and computers to access objects on the network or computer. Key concepts that make up access control are permissions, ownership of objects, inheritance of permissions, user rights, and object auditing. | -| [Configure S/MIME for Windows 10](configure-s-mime.md) | In Windows 10, S/MIME lets users encrypt outgoing messages and attachments so that only intended recipients who have a digital identification (ID), also known as a certificate, can read them. Users can digitally sign a message, which provides the recipients with a way to verify the identity of the sender and that the message hasn't been tampered with. | -| [Protect derived domain credentials with Credential Guard](credential-guard/credential-guard.md) | Introduced in Windows 10 Enterprise, Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them. Unauthorized access to these secrets can lead to credential theft attacks, such as Pass-the-Hash or Pass-The-Ticket. Credential Guard helps prevent these attacks by protecting NTLM password hashes and Kerberos Ticket Granting Tickets. | +| [Protect derived domain credentials with Credential Guard](credential-guard/credential-guard.md) | Credential Guard uses Virtualization-based security (VBS) to isolate secrets so that only privileged system software can access them. Unauthorized access to the secrets can lead to credential theft attacks, such as *pass the hash* or *pass the ticket*. Credential Guard helps prevent such attacks by protecting NTLM password hashes and Kerberos Ticket Granting Tickets. | | [Protect Remote Desktop credentials with Remote Credential Guard](remote-credential-guard.md) | Remote Credential Guard helps you protect your credentials over a Remote Desktop connection by redirecting the Kerberos requests back to the device that's requesting the connection. | -| [User Account Control](user-account-control/user-account-control-overview.md)| Provides information about User Account Control (UAC), which helps prevent malware from damaging a PC and helps organizations deploy a better-managed desktop. UAC can help block the automatic installation of unauthorized apps and prevent inadvertent changes to system settings.| -| [Virtual Smart Cards](virtual-smart-cards/virtual-smart-card-overview.md) | Provides information about deploying and managing virtual smart cards, which are functionally similar to physical smart cards and appear in Windows as smart cards that are always-inserted. Virtual smart cards use the Trusted Platform Module (TPM) chip that is available on computers in many organizations, rather than requiring the use of a separate physical smart card and reader. | -| [VPN technical guide](vpn/vpn-guide.md) | Virtual private networks (VPN) let you give your users secure remote access to your company network. Windows 10 adds useful new VPN profile options to help you manage how users connect. | -| [Smart Cards](smart-cards/smart-card-windows-smart-card-technical-reference.md) | Provides a collection of references topics about smart cards, which are tamper-resistant portable storage devices that can enhance the security of tasks such as authenticating clients, signing code, securing e-mail, and signing in with a Windows domain account. | -| [Windows Hello for Business](hello-for-business/index.yml) | In Windows 10, Windows Hello replaces passwords with strong two-factor authentication on client devices. This authentication consists of a new type of user credential that is tied to a device and a biometric or PIN. | -| [Windows 10 Credential Theft Mitigation Guide Abstract](windows-credential-theft-mitigation-guide-abstract.md) | Learn more about credential theft mitigation in Windows 10. | +| [User Account Control](../application-security/application-control/user-account-control/index.md)| Provides information about User Account Control (UAC), which helps prevent malware from damaging a PC and helps organizations deploy a better-managed desktop. UAC can help block the automatic installation of unauthorized apps and prevent inadvertent changes to system settings.| +| [Smart Cards](smart-cards/smart-card-windows-smart-card-technical-reference.md) | Provides a collection of references articles about smart cards, which are tamper-resistant portable storage devices that can enhance the security of tasks such as authenticating clients, signing code, securing e-mail, and signing in with a Windows domain account. | +| [Windows Credential Theft Mitigation Guide Abstract](windows-credential-theft-mitigation-guide-abstract.md) | Learn more about credential theft mitigation in Windows. | +| [Virtual Smart Cards](virtual-smart-cards/virtual-smart-card-overview.md) | Provides information about deploying and managing virtual smart cards. Virtual smart cards use the Trusted Platform Module (TPM) chip that is available on computers in many organizations, rather than requiring the use of a separate physical smart card and reader. | +| Microsoft Defender SmartScreen | Microsoft Defender SmartScreen protects against phishing or malware websites and applications, and the downloading of potentially malicious files. Learn more: [Microsoft Defender SmartScreen overview](../threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md) | diff --git a/windows/security/identity-protection/remote-credential-guard.md b/windows/security/identity-protection/remote-credential-guard.md index 64e9869d2a..41748c9408 100644 --- a/windows/security/identity-protection/remote-credential-guard.md +++ b/windows/security/identity-protection/remote-credential-guard.md @@ -1,5 +1,5 @@ --- -title: Protect Remote Desktop credentials with Windows Defender Remote Credential Guard (Windows 10) +title: Protect Remote Desktop credentials with Windows Defender Remote Credential Guard description: Windows Defender Remote Credential Guard helps to secure your Remote Desktop credentials by never sending them to the target device. ms.collection: - highpri @@ -20,9 +20,7 @@ Introduced in Windows 10, version 1607, Windows Defender Remote Credential Guard Administrator credentials are highly privileged and must be protected. By using Windows Defender Remote Credential Guard to connect during Remote Desktop sessions, if the target device is compromised, your credentials are not exposed because both credential and credential derivatives are never passed over the network to the target device. > [!IMPORTANT] -> For information on Remote Desktop connection scenarios involving helpdesk support, see [Remote Desktop connections and helpdesk support scenarios](#helpdesk) in this article. - - +> For information on Remote Desktop connection scenarios involving helpdesk support, see [Remote Desktop connections and helpdesk support scenarios](#remote-desktop-connections-and-helpdesk-support-scenarios) in this article. ## Comparing Windows Defender Remote Credential Guard with other Remote Desktop connection options @@ -30,43 +28,28 @@ The following diagram helps you to understand how a standard Remote Desktop sess ![RDP connection to a server without Windows Defender Remote Credential Guard.png.](images/rdp-to-a-server-without-windows-defender-remote-credential-guard.png) -
          - The following diagram helps you to understand how Windows Defender Remote Credential Guard works, what it helps to protect against, and compares it with the [Restricted Admin mode](https://social.technet.microsoft.com/wiki/contents/articles/32905.how-to-enable-restricted-admin-mode-for-remote-desktop.aspx) option: ![Windows Defender Remote Credential Guard.](images/windows-defender-remote-credential-guard-with-remote-admin-mode.png) -
          As illustrated, Windows Defender Remote Credential Guard blocks NTLM (allowing only Kerberos), prevents Pass-the-Hash (PtH) attacks, and also prevents use of credentials after disconnection. -
          -
          Use the following table to compare different Remote Desktop connection security options: -
          -
          - - | Feature | Remote Desktop | Windows Defender Remote Credential Guard | Restricted Admin mode | -|--------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| -| **Protection benefits** | Credentials on the server are not protected from Pass-the-Hash attacks. | User credentials remain on the client. An attacker can act on behalf of the user *only* when the session is ongoing | User logs on to the server as local administrator, so an attacker cannot act on behalf of the "domain user". Any attack is local to the server | -| **Version support** | The remote computer can run any Windows operating system | Both the client and the remote computer must be running **at least Windows 10, version 1607, or Windows Server 2016**. | The remote computer must be running **at least patched Windows 7 or patched Windows Server 2008 R2**.

          For more information about patches (software updates) related to Restricted Admin mode, see [Microsoft Security Advisory 2871997](/security-updates/SecurityAdvisories/2016/2871997). | -| **Helps prevent**                    |      N/A          |

          • Pass-the-Hash
          • Use of a credential after disconnection
          |
          • Pass-the-Hash
          • Use of domain identity during connection
          | -| **Credentials supported from the remote desktop client device** |
          • Signed on credentials
          • Supplied credentials
          • Saved credentials
          |
          • Signed on credentials only |
            • Signed on credentials
            • Supplied credentials
            • Saved credentials
            | -| **Access** | **Users allowed**, that is, members of Remote Desktop Users group of remote host. | **Users allowed**, that is, members of Remote Desktop Users of remote host. | **Administrators only**, that is, only members of Administrators group of remote host. | -| **Network identity** | Remote Desktop session **connects to other resources as signed-in user**. | Remote Desktop session **connects to other resources as signed-in user**. | Remote Desktop session **connects to other resources as remote host's identity**. | -| **Multi-hop** | From the remote desktop, **you can connect through Remote Desktop to another computer** | From the remote desktop, you **can connect through Remote Desktop to another computer**. | Not allowed for user as the session is running as a local host account | -| **Supported authentication** | Any negotiable protocol. | Kerberos only. | Any negotiable protocol | - -
            +|--|--|--|--| +| **Protection benefits** | Credentials on the server are not protected from Pass-the-Hash attacks. | User credentials remain on the client. An attacker can act on behalf of the user *only* when the session is ongoing | User logs on to the server as local administrator, so an attacker cannot act on behalf of the "domain user". Any attack is local to the server | +| **Version support** | The remote computer can run any Windows operating system | Both the client and the remote computer must be running **at least Windows 10, version 1607, or Windows Server 2016**. | The remote computer must be running **at least patched Windows 7 or patched Windows Server 2008 R2**.

            For more information about patches (software updates) related to Restricted Admin mode, see [Microsoft Security Advisory 2871997](/security-updates/SecurityAdvisories/2016/2871997). | +| **Helps prevent**                    |      N/A          |
            • Pass-the-Hash
            • Use of a credential after disconnection
            |
            • Pass-the-Hash
            • Use of domain identity during connection
            | +| **Credentials supported from the remote desktop client device** |
            • Signed on credentials
            • Supplied credentials
            • Saved credentials
            |
            • Signed on credentials only |
              • Signed on credentials
              • Supplied credentials
              • Saved credentials
              | +| **Access** | **Users allowed**, that is, members of Remote Desktop Users group of remote host. | **Users allowed**, that is, members of Remote Desktop Users of remote host. | **Administrators only**, that is, only members of Administrators group of remote host. | +| **Network identity** | Remote Desktop session **connects to other resources as signed-in user**. | Remote Desktop session **connects to other resources as signed-in user**. | Remote Desktop session **connects to other resources as remote host's identity**. | +| **Multi-hop** | From the remote desktop, **you can connect through Remote Desktop to another computer** | From the remote desktop, you **can connect through Remote Desktop to another computer**. | Not allowed for user as the session is running as a local host account | +| **Supported authentication** | Any negotiable protocol. | Kerberos only. | Any negotiable protocol | For further technical information, see [Remote Desktop Protocol](/windows/win32/termserv/remote-desktop-protocol) and [How Kerberos works](/previous-versions/windows/it-pro/windows-2000-server/cc961963(v=technet.10)). -
              - - - ## Remote Desktop connections and helpdesk support scenarios For helpdesk support scenarios in which personnel require administrative access to provide remote assistance to computer users via Remote Desktop sessions, Microsoft recommends that Windows Defender Remote Credential Guard should not be used in that context. This is because if an RDP session is initiated to a compromised client that an attacker already controls, the attacker could use that open channel to create sessions on the user's behalf (without compromising credentials) to access any of the user's resources for a limited time (a few hours) after the session disconnects. @@ -77,8 +60,7 @@ To further harden security, we also recommend that you implement Local Administr For further information on LAPS, see [Microsoft Security Advisory 3062591](https://technet.microsoft.com/library/security/3062591.aspx). - - +[!INCLUDE [windows-defender-remote-credential-guard](../../../includes/licensing/windows-defender-remote-credential-guard.md)] ## Remote Credential Guard requirements @@ -86,20 +68,17 @@ To use Windows Defender Remote Credential Guard, the Remote Desktop client and r The Remote Desktop client device: -- Must be running at least Windows 10, version 1703 to be able to supply credentials, which is sent to the remote device. This allows users to run as different users without having to send credentials to the remote machine. - -- Must be running at least Windows 10, version 1607 or Windows Server 2016 to use the user's signed-in credentials. This requires the user's account be able to sign in to both the client device and the remote host. - -- Must be running the Remote Desktop Classic Windows application. The Remote Desktop Universal Windows Platform application doesn't support Windows Defender Remote Credential Guard. - -- Must use Kerberos authentication to connect to the remote host. If the client cannot connect to a domain controller, then RDP attempts to fall back to NTLM. Windows Defender Remote Credential Guard does not allow NTLM fallback because this would expose credentials to risk. +- Must be running at least Windows 10, version 1703 to be able to supply credentials, which is sent to the remote device. This allows users to run as different users without having to send credentials to the remote machine +- Must be running at least Windows 10, version 1607 or Windows Server 2016 to use the user's signed-in credentials. This requires the user's account be able to sign in to both the client device and the remote host +- Must be running the Remote Desktop Classic Windows application. The Remote Desktop Universal Windows Platform application doesn't support Windows Defender Remote Credential Guard +- Must use Kerberos authentication to connect to the remote host. If the client cannot connect to a domain controller, then RDP attempts to fall back to NTLM. Windows Defender Remote Credential Guard does not allow NTLM fallback because this would expose credentials to risk The Remote Desktop remote host: -- Must be running at least Windows 10, version 1607 or Windows Server 2016. -- Must allow Restricted Admin connections. -- Must allow the client's domain user to access Remote Desktop connections. -- Must allow delegation of non-exportable credentials. +- Must be running at least Windows 10, version 1607 or Windows Server 2016. +- Must allow Restricted Admin connections. +- Must allow the client's domain user to access Remote Desktop connections. +- Must allow delegation of non-exportable credentials. There are no hardware requirements for Windows Defender Remote Credential Guard. @@ -109,31 +88,26 @@ There are no hardware requirements for Windows Defender Remote Credential Guard. > GPO [Remote host allows delegation of non-exportable credentials](/windows/client-management/mdm/policy-csp-credentialsdelegation) should be enabled for delegation of non-exportable credentials. - For Windows Defender Remote Credential Guard to be supported, the user must authenticate to the remote host using Kerberos authentication. - - The remote host must be running at least Windows 10 version 1607, or Windows Server 2016. - - The Remote Desktop classic Windows app is required. The Remote Desktop Universal Windows Platform app doesn't support Windows Defender Remote Credential Guard. ## Enable Windows Defender Remote Credential Guard You must enable Restricted Admin or Windows Defender Remote Credential Guard on the remote host by using the Registry. -1. Open Registry Editor on the remote host. +1. Open Registry Editor on the remote host +1. Enable Restricted Admin and Windows Defender Remote Credential Guard: -2. Enable Restricted Admin and Windows Defender Remote Credential Guard: + - Go to `HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa` + - Add a new DWORD value named **DisableRestrictedAdmin** + - To turn on Restricted Admin and Windows Defender Remote Credential Guard, set the value of this registry setting to 0 - - Go to HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa. - - - Add a new DWORD value named **DisableRestrictedAdmin**. - - - To turn on Restricted Admin and Windows Defender Remote Credential Guard, set the value of this registry setting to 0. - -3. Close Registry Editor. +1. Close Registry Editor You can add this by running the following command from an elevated command prompt: -```console -reg add HKLM\SYSTEM\CurrentControlSet\Control\Lsa /v DisableRestrictedAdmin /d 0 /t REG_DWORD +```cmd +reg.exe add HKLM\SYSTEM\CurrentControlSet\Control\Lsa /v DisableRestrictedAdmin /d 0 /t REG_DWORD ``` ## Using Windows Defender Remote Credential Guard @@ -142,36 +116,28 @@ Beginning with Windows 10 version 1703, you can enable Windows Defender Remote C ### Turn on Windows Defender Remote Credential Guard by using Group Policy -1. From the Group Policy Management Console, go to **Computer Configuration** -> **Administrative Templates** -> **System** -> **Credentials Delegation**. - -2. Double-click **Restrict delegation of credentials to remote servers**. - +1. From the Group Policy Management Console, go to **Computer Configuration** -> **Administrative Templates** -> **System** -> **Credentials Delegation** +1. Double-click **Restrict delegation of credentials to remote servers** ![Windows Defender Remote Credential Guard Group Policy.](images/remote-credential-guard-gp.png) - -3. Under **Use the following restricted mode**: - - - If you want to require either [Restricted Admin mode](https://social.technet.microsoft.com/wiki/contents/articles/32905.remote-desktop-services-enable-restricted-admin-mode.aspx) or Windows Defender Remote Credential Guard, choose **Restrict Credential Delegation**. In this configuration, Windows Defender Remote Credential Guard is preferred, but it will use Restricted Admin mode (if supported) when Windows Defender Remote Credential Guard cannot be used. +1. Under **Use the following restricted mode**: + - If you want to require either [Restricted Admin mode](https://social.technet.microsoft.com/wiki/contents/articles/32905.remote-desktop-services-enable-restricted-admin-mode.aspx) or Windows Defender Remote Credential Guard, choose **Restrict Credential Delegation**. In this configuration, Windows Defender Remote Credential Guard is preferred, but it will use Restricted Admin mode (if supported) when Windows Defender Remote Credential Guard cannot be used > [!NOTE] > Neither Windows Defender Remote Credential Guard nor Restricted Admin mode will send credentials in clear text to the Remote Desktop server. - > When **Restrict Credential Delegation** is enabled, the /restrictedAdmin switch will be ignored. Windows will enforce the policy configuration instead and will use Windows Defender Remote Credential Guard. + > When **Restrict Credential Delegation** is enabled, the /restrictedAdmin switch will be ignored. Windows will enforce the policy configuration instead and will use Windows Defender Remote Credential Guard. - - If you want to require Windows Defender Remote Credential Guard, choose **Require Remote Credential Guard**. With this setting, a Remote Desktop connection will succeed only if the remote computer meets the [requirements](#reqs) listed earlier in this topic. - - - If you want to require Restricted Admin mode, choose **Require Restricted Admin**. For information about Restricted Admin mode, see the table in [Comparing Windows Defender Remote Credential Guard with other Remote Desktop connection options](#comparing-remote-credential-guard-with-other-remote-desktop-connection-options), earlier in this topic. - -4. Click **OK**. - -5. Close the Group Policy Management Console. - -6. From a command prompt, run **gpupdate.exe /force** to ensure that the Group Policy object is applied. + - If you want to require Windows Defender Remote Credential Guard, choose **Require Remote Credential Guard**. With this setting, a Remote Desktop connection will succeed only if the remote computer meets the [requirements](#remote-credential-guard-requirements) listed earlier in this topic. + - If you want to require Restricted Admin mode, choose **Require Restricted Admin**. For information about Restricted Admin mode, see the table in [Comparing Windows Defender Remote Credential Guard with other Remote Desktop connection options](#comparing-windows-defender-remote-credential-guard-with-other-remote-desktop-connection-options), earlier in this topic. +1. Click **OK** +1. Close the Group Policy Management Console +1. From a command prompt, run **gpupdate.exe /force** to ensure that the Group Policy object is applied ### Use Windows Defender Remote Credential Guard with a parameter to Remote Desktop Connection If you don't use Group Policy in your organization, or if not all your remote hosts support Remote Credential Guard, you can add the remoteGuard parameter when you start Remote Desktop Connection to turn on Windows Defender Remote Credential Guard for that connection. -```console +```cmd mstsc.exe /remoteGuard ``` @@ -180,12 +146,8 @@ mstsc.exe /remoteGuard ## Considerations when using Windows Defender Remote Credential Guard -- Windows Defender Remote Credential Guard does not support compound authentication. For example, if you're trying to access a file server from a remote host that requires a device claim, access will be denied. - -- Windows Defender Remote Credential Guard can be used only when connecting to a device that is joined to a Windows Server Active Directory domain, including AD domain-joined servers that run as Azure virtual machines (VMs). Windows Defender Remote Credential Guard cannot be used when connecting to remote devices joined to Azure Active Directory. - -- Remote Desktop Credential Guard only works with the RDP protocol. - -- No credentials are sent to the target device, but the target device still acquires Kerberos Service Tickets on its own. - -- The server and client must authenticate using Kerberos. +- Windows Defender Remote Credential Guard does not support compound authentication. For example, if you're trying to access a file server from a remote host that requires a device claim, access will be denied +- Windows Defender Remote Credential Guard can be used only when connecting to a device that is joined to a Windows Server Active Directory domain, including AD domain-joined servers that run as Azure virtual machines (VMs). Windows Defender Remote Credential Guard cannot be used when connecting to remote devices joined to Azure Active Directory +- Remote Desktop Credential Guard only works with the RDP protocol +- No credentials are sent to the target device, but the target device still acquires Kerberos Service Tickets on its own +- The server and client must authenticate using Kerberos diff --git a/windows/security/identity-protection/smart-cards/smart-card-and-remote-desktop-services.md b/windows/security/identity-protection/smart-cards/smart-card-and-remote-desktop-services.md index 365f168f07..5443446244 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-and-remote-desktop-services.md +++ b/windows/security/identity-protection/smart-cards/smart-card-and-remote-desktop-services.md @@ -1,6 +1,6 @@ --- ms.date: 09/24/2021 -title: Smart Card and Remote Desktop Services (Windows) +title: Smart Card and Remote Desktop Services description: This topic for the IT professional describes the behavior of Remote Desktop Services when you implement smart card sign-in. ms.topic: article ms.reviewer: ardenw diff --git a/windows/security/identity-protection/smart-cards/smart-card-architecture.md b/windows/security/identity-protection/smart-cards/smart-card-architecture.md index 5a810263fc..d305de2eae 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-architecture.md +++ b/windows/security/identity-protection/smart-cards/smart-card-architecture.md @@ -1,5 +1,5 @@ --- -title: Smart Card Architecture (Windows) +title: Smart Card Architecture description: This topic for the IT professional describes the system architecture that supports smart cards in the Windows operating system. ms.reviewer: ardenw ms.topic: article diff --git a/windows/security/identity-protection/smart-cards/smart-card-certificate-propagation-service.md b/windows/security/identity-protection/smart-cards/smart-card-certificate-propagation-service.md index bbdab0c142..f44786fcb1 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-certificate-propagation-service.md +++ b/windows/security/identity-protection/smart-cards/smart-card-certificate-propagation-service.md @@ -1,5 +1,5 @@ --- -title: Certificate Propagation Service (Windows) +title: Certificate Propagation Service description: This topic for the IT professional describes the certificate propagation service (CertPropSvc), which is used in smart card implementation. ms.reviewer: ardenw ms.topic: article diff --git a/windows/security/identity-protection/smart-cards/smart-card-certificate-requirements-and-enumeration.md b/windows/security/identity-protection/smart-cards/smart-card-certificate-requirements-and-enumeration.md index e52b7eeabd..ac153d8216 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-certificate-requirements-and-enumeration.md +++ b/windows/security/identity-protection/smart-cards/smart-card-certificate-requirements-and-enumeration.md @@ -1,5 +1,5 @@ --- -title: Certificate Requirements and Enumeration (Windows) +title: Certificate Requirements and Enumeration description: This topic for the IT professional and smart card developers describes how certificates are managed and used for smart card sign-in. ms.reviewer: ardenw ms.topic: article diff --git a/windows/security/identity-protection/smart-cards/smart-card-debugging-information.md b/windows/security/identity-protection/smart-cards/smart-card-debugging-information.md index 72b31805ae..afd45f5a5f 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-debugging-information.md +++ b/windows/security/identity-protection/smart-cards/smart-card-debugging-information.md @@ -1,5 +1,5 @@ --- -title: Smart Card Troubleshooting (Windows) +title: Smart Card Troubleshooting description: Describes the tools and services that smart card developers can use to help identify certificate issues with the smart card deployment. ms.reviewer: ardenw ms.collection: diff --git a/windows/security/identity-protection/smart-cards/smart-card-events.md b/windows/security/identity-protection/smart-cards/smart-card-events.md index 50e701debe..2d80036a23 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-events.md +++ b/windows/security/identity-protection/smart-cards/smart-card-events.md @@ -1,5 +1,5 @@ --- -title: Smart Card Events (Windows) +title: Smart Card Events description: This topic for the IT professional and smart card developer describes events that are related to smart card deployment and development. ms.reviewer: ardenw ms.topic: article diff --git a/windows/security/identity-protection/smart-cards/smart-card-group-policy-and-registry-settings.md b/windows/security/identity-protection/smart-cards/smart-card-group-policy-and-registry-settings.md index 78fe0f4b8a..e2ef4a9160 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-group-policy-and-registry-settings.md +++ b/windows/security/identity-protection/smart-cards/smart-card-group-policy-and-registry-settings.md @@ -1,5 +1,5 @@ --- -title: Smart Card Group Policy and Registry Settings (Windows) +title: Smart Card Group Policy and Registry Settings description: Discover the Group Policy, registry key, local security policy, and credential delegation policy settings that are available for configuring smart cards. ms.reviewer: ardenw ms.topic: article diff --git a/windows/security/identity-protection/smart-cards/smart-card-how-smart-card-sign-in-works-in-windows.md b/windows/security/identity-protection/smart-cards/smart-card-how-smart-card-sign-in-works-in-windows.md index a44e2533fc..5d498cb152 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-how-smart-card-sign-in-works-in-windows.md +++ b/windows/security/identity-protection/smart-cards/smart-card-how-smart-card-sign-in-works-in-windows.md @@ -21,3 +21,5 @@ This topic for IT professional provides links to resources about the implementat - [Certificate Propagation Service](smart-card-certificate-propagation-service.md): Learn about how the certificate propagation service works when a smart card is inserted into a computer. - [Smart Card Removal Policy Service](smart-card-removal-policy-service.md): Learn about using Group Policy to control what happens when a user removes a smart card. + +[!INCLUDE [smart-cards-for-windows-service](../../../../includes/licensing/smart-cards-for-windows-service.md)] \ No newline at end of file diff --git a/windows/security/identity-protection/smart-cards/smart-card-removal-policy-service.md b/windows/security/identity-protection/smart-cards/smart-card-removal-policy-service.md index 40f781ce63..8250828ff6 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-removal-policy-service.md +++ b/windows/security/identity-protection/smart-cards/smart-card-removal-policy-service.md @@ -1,5 +1,5 @@ --- -title: Smart Card Removal Policy Service (Windows) +title: Smart Card Removal Policy Service description: This topic for the IT professional describes the role of the removal policy service (ScPolicySvc) in smart card implementation. ms.reviewer: ardenw ms.topic: article diff --git a/windows/security/identity-protection/smart-cards/smart-card-smart-cards-for-windows-service.md b/windows/security/identity-protection/smart-cards/smart-card-smart-cards-for-windows-service.md index 170dfa5cf4..e3a98718be 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-smart-cards-for-windows-service.md +++ b/windows/security/identity-protection/smart-cards/smart-card-smart-cards-for-windows-service.md @@ -1,5 +1,5 @@ --- -title: Smart Cards for Windows Service (Windows) +title: Smart Cards for Windows Service description: This topic for the IT professional and smart card developers describes how the Smart Cards for Windows service manages readers and application interactions. ms.reviewer: ardenw ms.topic: article diff --git a/windows/security/identity-protection/smart-cards/smart-card-tools-and-settings.md b/windows/security/identity-protection/smart-cards/smart-card-tools-and-settings.md index bb1e4d8fb6..4de4acbfc6 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-tools-and-settings.md +++ b/windows/security/identity-protection/smart-cards/smart-card-tools-and-settings.md @@ -1,5 +1,5 @@ --- -title: Smart Card Tools and Settings (Windows) +title: Smart Card Tools and Settings description: This topic for the IT professional and smart card developer links to information about smart card debugging, settings, and events. ms.reviewer: ardenw ms.topic: article diff --git a/windows/security/identity-protection/smart-cards/smart-card-windows-smart-card-technical-reference.md b/windows/security/identity-protection/smart-cards/smart-card-windows-smart-card-technical-reference.md index 3b74397463..07d20ddf30 100644 --- a/windows/security/identity-protection/smart-cards/smart-card-windows-smart-card-technical-reference.md +++ b/windows/security/identity-protection/smart-cards/smart-card-windows-smart-card-technical-reference.md @@ -1,5 +1,5 @@ --- -title: Smart Card Technical Reference (Windows) +title: Smart Card Technical Reference description: Learn about the Windows smart card infrastructure for physical smart cards, and how smart card-related components work in Windows. ms.reviewer: ardenw ms.topic: article diff --git a/windows/security/identity-protection/smart-cards/toc.yml b/windows/security/identity-protection/smart-cards/toc.yml new file mode 100644 index 0000000000..0d82f8c3a7 --- /dev/null +++ b/windows/security/identity-protection/smart-cards/toc.yml @@ -0,0 +1,28 @@ +items: +- name: Smart Card Technical Reference + href: smart-card-windows-smart-card-technical-reference.md + items: + - name: How Smart Card Sign-in Works in Windows + href: smart-card-how-smart-card-sign-in-works-in-windows.md + items: + - name: Smart Card Architecture + href: smart-card-architecture.md + - name: Certificate Requirements and Enumeration + href: smart-card-certificate-requirements-and-enumeration.md + - name: Smart Card and Remote Desktop Services + href: smart-card-and-remote-desktop-services.md + - name: Smart Cards for Windows Service + href: smart-card-smart-cards-for-windows-service.md + - name: Certificate Propagation Service + href: smart-card-certificate-propagation-service.md + - name: Smart Card Removal Policy Service + href: smart-card-removal-policy-service.md + - name: Smart Card Tools and Settings + href: smart-card-tools-and-settings.md + items: + - name: Smart Cards Debugging Information + href: smart-card-debugging-information.md + - name: Smart Card Group Policy and Registry Settings + href: smart-card-group-policy-and-registry-settings.md + - name: Smart Card Events + href: smart-card-events.md \ No newline at end of file diff --git a/windows/security/identity-protection/toc.yml b/windows/security/identity-protection/toc.yml new file mode 100644 index 0000000000..f1d265b8cb --- /dev/null +++ b/windows/security/identity-protection/toc.yml @@ -0,0 +1,49 @@ +items: + - name: Overview + href: ../identity.md + - name: Windows credential theft mitigation guide + href: windows-credential-theft-mitigation-guide-abstract.md + - name: Passwordless sign-in + items: + - name: Windows Hello for Business 🔗 + href: hello-for-business/index.yml + - name: Windows presence sensing + href: https://support.microsoft.com/windows/wake-your-windows-11-pc-when-you-approach-82285c93-440c-4e15-9081-c9e38c1290bb + - name: Windows Hello for Business Enhanced Security Sign-in (ESS) 🔗 + href: /windows-hardware/design/device-experiences/windows-hello-enhanced-sign-in-security + - name: FIDO 2 security key 🔗 + href: /azure/active-directory/authentication/howto-authentication-passwordless-security-key + - name: Federated sign-in 🔗 + href: /education/windows/federated-sign-in + - name: Smart Cards + href: smart-cards/toc.yml + - name: Virtual smart cards + href: virtual-smart-cards/toc.yml + displayName: VSC + - name: Enterprise Certificate Pinning + href: enterprise-certificate-pinning.md + - name: Account Lockout Policy 🔗 + href: ../threat-protection/security-policy-settings/account-lockout-policy.md + - name: Technical support policy for lost or forgotten passwords + href: password-support-policy.md + - name: Windows LAPS (Local Administrator Password Solution) 🔗 + displayName: LAPS + href: /windows-server/identity/laps/laps-overview + - name: Enhanced Phishing Protection in Microsoft Defender SmartScreen + href: ../operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/enhanced-phishing-protection.md + displayName: EPP + - name: Access Control + items: + - name: Overview + href: access-control/access-control.md + displayName: ACL + - name: Local Accounts + href: access-control/local-accounts.md + - name: Security policy settings 🔗 + href: ../threat-protection/security-policy-settings/security-policy-settings.md + - name: Advanced credential protection + items: + - name: Windows Defender Credential Guard + href: credential-guard/toc.yml + - name: Windows Defender Remote Credential Guard + href: remote-credential-guard.md \ No newline at end of file diff --git a/windows/security/identity-protection/user-account-control/how-user-account-control-works.md b/windows/security/identity-protection/user-account-control/how-user-account-control-works.md deleted file mode 100644 index 0e56328a44..0000000000 --- a/windows/security/identity-protection/user-account-control/how-user-account-control-works.md +++ /dev/null @@ -1,179 +0,0 @@ ---- -title: How User Account Control works (Windows) -description: User Account Control (UAC) is a fundamental component of Microsoft's overall security vision. UAC helps mitigate the impact of malware. -ms.collection: - - highpri - - tier2 -ms.topic: article -ms.date: 09/23/2021 ---- - -# How User Account Control works - -User Account Control (UAC) is a fundamental component of Microsoft's overall security vision. UAC helps mitigate the impact of malware. - -## UAC process and interactions - -Each app that requires the administrator access token must prompt for consent. The one exception is the relationship that exists between parent and child processes. Child processes inherit the user's access token from the parent process. Both the parent and child processes, however, must have the same integrity level. Windows protects processes by marking their integrity levels. Integrity levels are measurements of trust. A "high" integrity application is one that performs tasks that modify system data, such as a disk partitioning application, while a "low" integrity application is one that performs tasks that could potentially compromise the operating system, such as a Web browser. Apps with lower integrity levels cannot modify data in applications with higher integrity levels. When a standard user attempts to run an app that requires an administrator access token, UAC requires that the user provide valid administrator credentials. - -To better understand how this process happens, let's look at the Windows logon process. - -### Logon process - -The following shows how the logon process for an administrator differs from the logon process for a standard user. - -![uac windows logon process.](images/uacwindowslogonprocess.gif) - -By default, standard users and administrators access resources and run apps in the security context of standard users. When a user logs on to a computer, the system creates an access token for that user. The access token contains information about the level of access that the user is granted, including specific security identifiers (SIDs) and Windows privileges. - -When an administrator logs on, two separate access tokens are created for the user: a standard user access token and an administrator access token. The standard user access token contains the same user-specific information as the administrator access token, but the administrative Windows privileges and SIDs are removed. The standard user access token is used to start apps that do not perform administrative tasks (standard user apps). The standard user access token is then used to display the desktop (explorer.exe). Explorer.exe is the parent process from which all other user-initiated processes inherit their access token. As a result, all apps run as a standard user unless a user provides consent or credentials to approve an app to use a full administrative access token. - -A user that is a member of the Administrators group can log on, browse the Web, and read e-mail while using a standard user access token. When the administrator needs to perform a task that requires the administrator access token, Windows automatically prompts the user for approval. This prompt is called an elevation prompt, and its behavior can be configured by using the Local Security Policy snap-in (Secpol.msc) or Group Policy. For more info, see [User Account Control security policy settings](user-account-control-security-policy-settings.md). - -### The UAC User Experience - -When UAC is enabled, the user experience for standard users is different from that of administrators in Admin Approval Mode. The recommended and more secure method of running Windows, is to make your primary user account a standard user account. Running as a standard user helps to maximize security for a managed environment. With the built-in UAC elevation component, standard users can easily perform an administrative task by entering valid credentials for a local administrator account. The default, built-in UAC elevation component for standard users is the credential prompt. - -The alternative to running as a standard user is to run as an administrator in Admin Approval Mode. With the built-in UAC elevation component, members of the local Administrators group can easily perform an administrative task by providing approval. The default, built-in UAC elevation component for an administrator account in Admin Approval Mode is called the consent prompt. - -**The consent and credential prompts** - -With UAC enabled, Windows prompts for consent or prompts for credentials of a valid local administrator account before starting a program or task that requires a full administrator access token. This prompt ensures that no malicious software can be silently installed. - -**The consent prompt** - -The consent prompt is presented when a user attempts to perform a task that requires a user's administrative access token. The following is an example of the UAC consent prompt. - -:::image type="content" source="images/uacconsentprompt.png" alt-text="UAC consent prompt."::: - -**The credential prompt** - -The credential prompt is presented when a standard user attempts to perform a task that requires a user's administrative access token. Administrators can also be required to provide their credentials by setting the **User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode** policy setting value to **Prompt for credentials**. - -The following is an example of the UAC credential prompt. - -:::image type="content" source="images/uaccredentialprompt.png" alt-text="UAC credential prompt."::: - -**UAC elevation prompts** - -The UAC elevation prompts are color-coded to be app-specific, enabling for immediate identification of an application's potential security risk. When an app attempts to run with an administrator's full access token, Windows first analyzes the executable file to determine its publisher. Apps are first separated into three categories based on the file's publisher: Windows 10 or Windows 11, publisher verified (signed), and publisher not verified (unsigned). The following diagram illustrates how Windows determines which color elevation prompt to present to the user. - -The elevation prompt color-coding is as follows: - -- Red background with a red shield icon: The app is blocked by Group Policy or is from a publisher that is blocked. -- Blue background with a blue and gold shield icon: The application is a Windows 10 and Windows 11 administrative app, such as a Control Panel item. -- Blue background with a blue shield icon: The application is signed by using Authenticode and is trusted by the local computer. -- Yellow background with a yellow shield icon: The application is unsigned or signed but is not yet trusted by the local computer. - -**Shield icon** - -Some Control Panel items, such as **Date and Time Properties**, contain a combination of administrator and standard user operations. Standard users can view the clock and change the time zone, but a full administrator access token is required to change the local system time. The following is a screenshot of the **Date and Time Properties** Control Panel item. - -:::image type="content" source="images/uacshieldicon.png" alt-text="UAC Shield Icon in Date and Time Properties"::: - -The shield icon on the **Change date and time** button indicates that the process requires a full administrator access token and will display a UAC elevation prompt. - -**Securing the elevation prompt** - -The elevation process is further secured by directing the prompt to the secure desktop. The consent and credential prompts are displayed on the secure desktop by default in Windows 10 and Windows 11. Only Windows processes can access the secure desktop. For higher levels of security, we recommend keeping the **User Account Control: Switch to the secure desktop when prompting for elevation** policy setting enabled. - -When an executable file requests elevation, the interactive desktop, also called the user desktop, is switched to the secure desktop. The secure desktop dims the user desktop and displays an elevation prompt that must be responded to before continuing. When the user clicks **Yes** or **No**, the desktop switches back to the user desktop. - -Malware can present an imitation of the secure desktop, but when the **User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode** policy setting is set to **Prompt for consent**, the malware does not gain elevation if the user clicks **Yes** on the imitation. If the policy setting is set to **Prompt for credentials**, malware imitating the credential prompt may be able to gather the credentials from the user. However, the malware does not gain elevated privilege and the system has other protections that mitigate malware from taking control of the user interface even with a harvested password. - -While malware could present an imitation of the secure desktop, this issue cannot occur unless a user previously installed the malware on the PC. Because processes requiring an administrator access token cannot silently install when UAC is enabled, the user must explicitly provide consent by clicking **Yes** or by providing administrator credentials. The specific behavior of the UAC elevation prompt is dependent upon Group Policy. - -## UAC Architecture - -The following diagram details the UAC architecture. - -![uac architecture.](images/uacarchitecture.gif) - -To better understand each component, review the table below: - -### User - -|Component|Description| -|--- |--- | -|

              User performs operation requiring privilege|

              If the operation changes the file system or registry, Virtualization is called. All other operations call ShellExecute.| -|

              ShellExecute|

              ShellExecute calls CreateProcess. ShellExecute looks for the ERROR_ELEVATION_REQUIRED error from CreateProcess. If it receives the error, ShellExecute calls the Application Information service to attempt to perform the requested task with the elevated prompt.| -|

              CreateProcess|

              If the application requires elevation, CreateProcess rejects the call with ERROR_ELEVATION_REQUIRED.| - -### System - -|Component|Description| -|--- |--- | -|

              Application Information service|

              A system service that helps start apps that require one or more elevated privileges or user rights to run, such as local administrative tasks, and apps that require higher integrity levels. The Application Information service helps start such apps by creating a new process for the application with an administrative user's full access token when elevation is required and (depending on Group Policy) consent is given by the user to do so.| -|

              Elevating an ActiveX install|

              If ActiveX is not installed, the system checks the UAC slider level. If ActiveX is installed, the **User Account Control: Switch to the secure desktop when prompting for elevation** Group Policy setting is checked.| -|

              Check UAC slider level|

              UAC has a slider to select from four levels of notification.

              • **Always notify** will:

                • Notify you when programs try to install software or make changes to your computer.
                • Notify you when you make changes to Windows settings.
                • Freeze other tasks until you respond.

                Recommended if you often install new software or visit unfamiliar websites.

              • **Notify me only when programs try to make changes to my computer** will:

                • Notify you when programs try to install software or make changes to your computer.
                • Not notify you when you make changes to Windows settings.
                • Freeze other tasks until you respond.

                Recommended if you do not often install apps or visit unfamiliar websites.

              • **Notify me only when programs try to make changes to my computer (do not dim my desktop)** will:

                • Notify you when programs try to install software or make changes to your computer.
                • Not notify you when you make changes to Windows settings.
                • Not freeze other tasks until you respond.

                Not recommended. Choose this only if it takes a long time to dim the desktop on your computer.

              • **Never notify (Disable UAC prompts)** will:

                • Not notify you when programs try to install software or make changes to your computer.
                • Not notify you when you make changes to Windows settings.
                • Not freeze other tasks until you respond.

                Not recommended due to security concerns.| -|

                Secure desktop enabled|

                The **User Account Control: Switch to the secure desktop when prompting for elevation** policy setting is checked:

                • If the secure desktop is enabled, all elevation requests go to the secure desktop regardless of prompt behavior policy settings for administrators and standard users.

                • If the secure desktop is not enabled, all elevation requests go to the interactive user's desktop, and the per-user settings for administrators and standard users are used.| -|

                  CreateProcess|

                  CreateProcess calls AppCompat, Fusion, and Installer detection to assess if the app requires elevation. The file is then inspected to determine its requested execution level, which is stored in the application manifest for the file. CreateProcess fails if the requested execution level specified in the manifest does not match the access token and returns an error (ERROR_ELEVATION_REQUIRED) to ShellExecute.| -|

                  AppCompat|

                  The AppCompat database stores information in the application compatibility fix entries for an application.| -|

                  Fusion|

                  The Fusion database stores information from application manifests that describe the applications. The manifest schema is updated to add a new requested execution level field.| -|

                  Installer detection|

                  Installer detection detects setup files, which helps prevent installations from being run without the user's knowledge and consent.| - -### Kernel - -|Component|Description| -|--- |--- | -|

                  Virtualization|

                  Virtualization technology ensures that non-compliant apps do not silently fail to run or fail in a way that the cause cannot be determined. UAC also provides file and registry virtualization and logging for applications that write to protected areas.| -|

                  File system and registry|

                  The per-user file and registry virtualization redirects per-computer registry and file write requests to equivalent per-user locations. Read requests are redirected to the virtualized per-user location first and to the per-computer location second.| - -The slider will never turn UAC completely off. If you set it to **Never notify**, it will: - -- Keep the UAC service running. -- Cause all elevation request initiated by administrators to be auto-approved without showing a UAC prompt. -- Automatically deny all elevation requests for standard users. - -> [!IMPORTANT] -> In order to fully disable UAC you must disable the policy **User Account Control: Run all administrators in Admin Approval Mode**. - -> [!WARNING] -> Some Universal Windows Platform apps may not work when UAC is disabled. - -### Virtualization - -Because system administrators in enterprise environments attempt to secure systems, many line-of-business (LOB) applications are designed to use only a standard user access token. As a result, you do not need to replace the majority of apps when UAC is turned on. - -Windows 10 and Windows 11 include file and registry virtualization technology for apps that are not UAC-compliant and that require an administrator's access token to run correctly. When an administrative app that is not UAC-compliant attempts to write to a protected folder, such as Program Files, UAC gives the app its own virtualized view of the resource it is attempting to change. The virtualized copy is maintained in the user's profile. This strategy creates a separate copy of the virtualized file for each user that runs the non-compliant app. - -Most app tasks operate properly by using virtualization features. Although virtualization allows a majority of applications to run, it is a short-term fix and not a long-term solution. App developers should modify their apps to be compliant as soon as possible, rather than relying on file, folder, and registry virtualization. - -Virtualization is not an option in the following scenarios: - -- Virtualization does not apply to apps that are elevated and run with a full administrative access token. - -- Virtualization supports only 32-bit apps. Non-elevated 64-bit apps simply receive an access denied message when they attempt to acquire a handle (a unique identifier) to a Windows object. Native Windows 64-bit apps are required to be compatible with UAC and to write data into the correct locations. - -- Virtualization is disabled if the app includes an app manifest with a requested execution level attribute. - -### Request execution levels - -An app manifest is an XML file that describes and identifies the shared and private side-by-side assemblies that an app should bind to at run time. The app manifest includes entries for UAC app compatibility purposes. Administrative apps that include an entry in the app manifest prompt the user for permission to access the user's access token. Although they lack an entry in the app manifest, most administrative app can run without modification by using app compatibility fixes. App compatibility fixes are database entries that enable applications that are not UAC-compliant to work properly. - -All UAC-compliant apps should have a requested execution level added to the application manifest. If the application requires administrative access to the system, then marking the app with a requested execution level of "require administrator" ensures that the system identifies this program as an administrative app and performs the necessary elevation steps. Requested execution levels specify the privileges required for an app. - -### Installer detection technology - -Installation programs are apps designed to deploy software. Most installation programs write to system directories and registry keys. These protected system locations are typically writeable only by an administrator in Installer detection technology, which means that standard users do not have sufficient access to install programs. Windows 10 and Windows 11 heuristically detect installation programs and requests administrator credentials or approval from the administrator user in order to run with access privileges. Windows 10 and Windows 11 also heuristically detect updates and programs that uninstall applications. One of the design goals of UAC is to prevent installations from being run without the user's knowledge and consent because installation programs write to protected areas of the file system and registry. - -Installer detection only applies to: - -- 32-bit executable files. -- Applications without a requested execution level attribute. -- Interactive processes running as a standard user with UAC enabled. - -Before a 32-bit process is created, the following attributes are checked to determine whether it is an installer: - -- The file name includes keywords such as "install," "setup," or "update." -- Versioning Resource fields contain the following keywords: Vendor, Company Name, Product Name, File Description, Original Filename, Internal Name, and Export Name. -- Keywords in the side-by-side manifest are embedded in the executable file. -- Keywords in specific StringTable entries are linked in the executable file. -- Key attributes in the resource script data are linked in the executable file. -- There are targeted sequences of bytes within the executable file. - -> [!NOTE] -> The keywords and sequences of bytes were derived from common characteristics observed from various installer technologies. - -> [!NOTE] -> The User Account Control: Detect application installations and prompt for elevation policy setting must be enabled for installer detection to detect installation programs. For more info, see [User Account Control security policy settings](user-account-control-security-policy-settings.md). diff --git a/windows/security/identity-protection/user-account-control/images/uacconsentprompt.png b/windows/security/identity-protection/user-account-control/images/uacconsentprompt.png deleted file mode 100644 index 1a84a4cfd7..0000000000 Binary files a/windows/security/identity-protection/user-account-control/images/uacconsentprompt.png and /dev/null differ diff --git a/windows/security/identity-protection/user-account-control/images/uaccredentialprompt.png b/windows/security/identity-protection/user-account-control/images/uaccredentialprompt.png deleted file mode 100644 index df0077b91b..0000000000 Binary files a/windows/security/identity-protection/user-account-control/images/uaccredentialprompt.png and /dev/null differ diff --git a/windows/security/identity-protection/user-account-control/images/uacshieldicon.png b/windows/security/identity-protection/user-account-control/images/uacshieldicon.png deleted file mode 100644 index 5c9e4de2f7..0000000000 Binary files a/windows/security/identity-protection/user-account-control/images/uacshieldicon.png and /dev/null differ diff --git a/windows/security/identity-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings.md b/windows/security/identity-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings.md deleted file mode 100644 index 08e9ce3e06..0000000000 --- a/windows/security/identity-protection/user-account-control/user-account-control-group-policy-and-registry-key-settings.md +++ /dev/null @@ -1,191 +0,0 @@ ---- -title: User Account Control Group Policy and registry key settings (Windows) -description: Here's a list of UAC Group Policy and registry key settings that your organization can use to manage UAC. -ms.collection: - - highpri - - tier2 -ms.topic: article -ms.date: 04/19/2017 ---- - -# User Account Control Group Policy and registry key settings -## Group Policy settings -There are 10 Group Policy settings that can be configured for User Account Control (UAC). The table lists the default for each of the policy settings, and the following sections explain the different UAC policy settings and provide recommendations. These policy settings are located in **Security Settings\\Local Policies\\Security Options** in the Local Security Policy snap-in. For more information about each of the Group Policy settings, see the Group Policy description. For information about the registry key settings, see [Registry key settings](#registry-key-settings). - - -| Group Policy setting | Registry key | Default | -| - | - | - | - | -| [User Account Control: Admin Approval Mode for the built-in Administrator account](#user-account-control-admin-approval-mode-for-the-built-in-administrator-account) | FilterAdministratorToken | Disabled | -| [User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop](#user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop) | EnableUIADesktopToggle | Disabled | -| [User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode](#user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode) | ConsentPromptBehaviorAdmin | Prompt for consent for non-Windows binaries | -| [User Account Control: Behavior of the elevation prompt for standard users](#user-account-control-behavior-of-the-elevation-prompt-for-standard-users) | ConsentPromptBehaviorUser | Prompt for credentials | -| [User Account Control: Detect application installations and prompt for elevation](#user-account-control-detect-application-installations-and-prompt-for-elevation) | EnableInstallerDetection | Enabled (default for home)
                  Disabled (default for enterprise) | -| [User Account Control: Only elevate executables that are signed and validated](#user-account-control-only-elevate-executables-that-are-signed-and-validated) | ValidateAdminCodeSignatures | Disabled | -| [User Account Control: Only elevate UIAccess applications that are installed in secure locations](#user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations) | EnableSecureUIAPaths | Enabled | -| [User Account Control: Run all administrators in Admin Approval Mode](#user-account-control-run-all-administrators-in-admin-approval-mode) | EnableLUA | Enabled | -| [User Account Control: Switch to the secure desktop when prompting for elevation](#user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation) | PromptOnSecureDesktop | Enabled | -| [User Account Control: Virtualize file and registry write failures to per-user locations](#user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations) | EnableVirtualization | Enabled | - -### User Account Control: Admin Approval Mode for the built-in Administrator account - -The **User Account Control: Admin Approval Mode for the built-in Administrator account** policy setting controls the behavior of Admin Approval Mode for the built-in Administrator account. - -The options are: - -- **Enabled.** The built-in Administrator account uses Admin Approval Mode. By default, any operation that requires elevation of privilege will prompt the user to approve the operation. -- **Disabled.** (Default) The built-in Administrator account runs all applications with full administrative privilege. - - -### User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop - -The **User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop** policy setting controls whether User Interface Accessibility (UIAccess or UIA) programs can automatically disable the secure desktop for elevation prompts used by a standard user. - -The options are: - -- **Enabled.** UIA programs, including Windows Remote Assistance, automatically disable the secure desktop for elevation prompts. If you do not disable the **User Account Control: Switch to the secure desktop when prompting for elevation** policy setting, the prompts appear on the interactive user's desktop instead of the secure desktop. -- **Disabled.** (Default) The secure desktop can be disabled only by the user of the interactive desktop or by disabling the **User Account Control: Switch to the secure desktop when prompting for elevation** policy setting. - -UIA programs are designed to interact with Windows and application programs on behalf of a user. This policy setting allows UIA programs to bypass the secure desktop to increase usability in certain cases; however, allowing elevation requests to appear on the interactive desktop instead of the secure desktop can increase your security risk. - -UIA programs must be digitally signed because they must be able to respond to prompts regarding security issues, such as the UAC elevation prompt. By default, UIA programs are run only from the following protected paths: - -- ...\\Program Files, including subfolders -- ...\\Program Files (x86), including subfolders for 64-bit versions of Windows -- ...\\Windows\\System32 - -The **User Account Control: Only elevate UIAccess applications that are installed in secure locations** policy setting disables the requirement to be run from a protected path. - -While this policy setting applies to any UIA program, it is primarily used in certain remote assistance scenarios, including the Windows Remote Assistance program in Windows 7. - -If a user requests remote assistance from an administrator and the remote assistance session is established, any elevation prompts appear on the interactive user's secure desktop and the administrator's remote session is paused. To avoid pausing the remote administrator's session during elevation requests, the user may select the **Allow IT Expert to respond to User Account Control prompts** check box when setting up the remote assistance session. However, selecting this check box requires that the interactive user respond to an elevation prompt on the secure desktop. If the interactive user is a standard user, the user does not have the required credentials to allow elevation. - -If you enable this policy setting, requests for elevation are automatically sent to the interactive desktop (not the secure desktop) and also appear on the remote administrator's view of the desktop during a remote assistance session. This allows the remote administrator to provide the appropriate credentials for elevation. - -This policy setting does not change the behavior of the UAC elevation prompt for administrators. - -If you plan to enable this policy setting, you should also review the effect of the **User Account Control: Behavior of the elevation prompt for standard users** policy setting. If it is configured as **Automatically deny elevation requests**, elevation requests are not presented to the user. - - -### User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode - -The **User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode** policy setting controls the behavior of the elevation prompt for administrators. - -The options are: - -- **Elevate without prompting.** Allows privileged accounts to perform an operation that requires elevation without requiring consent or credentials. - - **Note** Use this option only in the most constrained environments. - -- **Prompt for credentials on the secure desktop.** When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a privileged user name and password. If the user enters valid credentials, the operation continues with the user's highest available privilege. -- **Prompt for consent on the secure desktop.** When an operation requires elevation of privilege, the user is prompted on the secure desktop to select either **Permit** or **Deny**. If the user selects **Permit**, the operation continues with the user's highest available privilege. -- **Prompt for credentials.** When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. -- **Prompt for consent.** When an operation requires elevation of privilege, the user is prompted to select either **Permit** or **Deny**. If the user selects **Permit**, the operation continues with the user's highest available privilege. -- **Prompt for consent for non-Windows binaries.** (Default) When an operation for a non-Microsoft application requires elevation of privilege, the user is prompted on the secure desktop to select either **Permit** or **Deny**. If the user selects **Permit**, the operation continues with the user's highest available privilege. - - -### User Account Control: Behavior of the elevation prompt for standard users - -The **User Account Control: Behavior of the elevation prompt for standard users** policy setting controls the behavior of the elevation prompt for standard users. - -The options are: - -- **Automatically deny elevation requests.** When an operation requires elevation of privilege, a configurable access denied error message is displayed. An enterprise that is running desktops as standard user may choose this setting to reduce help desk calls. -- **Prompt for credentials on the secure desktop.** When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a different user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. -- **Prompt for credentials.** (Default) When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. - -### User Account Control: Detect application installations and prompt for elevation - -The **User Account Control: Detect application installations and prompt for elevation** policy setting controls the behavior of application installation detection for the computer. - -The options are: - -- **Enabled.** (Default for home) When an application installation package is detected that requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. -- **Disabled.** (Default for enterprise) Application installation packages are not detected and prompted for elevation. Enterprises that are running standard user desktops and use delegated installation technologies such as Group Policy Software Installation or Systems Management Server (SMS) should disable this policy setting. In this case, installer detection is unnecessary. - -### User Account Control: Only elevate executables that are signed and validated - -The **User Account Control: Only elevate executables that are signed and validated** policy setting enforces public key infrastructure (PKI) signature checks for any interactive applications that request elevation of privilege. Enterprise administrators can control which applications are allowed to run by adding certificates to the Trusted Publishers certificate store on local computers. - -The options are: - -- **Enabled.** Enforces the PKI certification path validation for a given executable file before it is permitted to run. -- **Disabled.** (Default) Does not enforce PKI certification path validation before a given executable file is permitted to run. - -### User Account Control: Only elevate UIAccess applications that are installed in secure locations - -The **User Account Control: Only elevate UIAccess applications that are installed in secure locations** policy setting controls whether applications that request to run with a User Interface Accessibility (UIAccess) integrity level must reside in a secure location in the file system. Secure locations are limited to the following: - -- ...\\Program Files, including subfolders -- ...\\Windows\\system32 -- ...\\Program Files (x86), including subfolders for 64-bit versions of Windows - -**Note** Windows enforces a PKI signature check on any interactive application that requests to run with a UIAccess integrity level regardless of the state of this security setting. - -The options are: - -- **Enabled.** (Default) If an application resides in a secure location in the file system, it runs only with UIAccess integrity. -- **Disabled.** An application runs with UIAccess integrity even if it does not reside in a secure location in the file system. - -### User Account Control: Run all administrators in Admin Approval Mode - -The **User Account Control: Run all administrators Admin Approval Mode** policy setting controls the behavior of all UAC policy settings for the computer. If you change this policy setting, you must restart your computer. - -The options are: - -- **Enabled.** (Default) Admin Approval Mode is enabled. This policy must be enabled and related UAC policy settings must also be set appropriately to allow the built-in Administrator account and all other users who are members of the **Administrators** group to run in Admin Approval Mode. -- **Disabled.** Admin Approval Mode and all related UAC policy settings are disabled. - -**Note** If this policy setting is disabled, the Windows Security app notifies you that the overall security of the operating system has been reduced. - -### User Account Control: Switch to the secure desktop when prompting for elevation - -The **User Account Control: Switch to the secure desktop when prompting for elevation** policy setting controls whether the elevation request prompt is displayed on the interactive user's desktop or the secure desktop. - -The options are: - -- **Enabled.** (Default) All elevation requests go to the secure desktop regardless of prompt behavior policy settings for administrators and standard users. -- **Disabled.** All elevation requests go to the interactive user's desktop. Prompt behavior policy settings for administrators and standard users are used. - -When this policy setting is enabled, it overrides the **User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode** policy setting. The following table describes the behavior of the elevation prompt for each of the administrator policy settings when the **User Account Control: Switch to the secure desktop when prompting for elevation** policy setting is enabled or disabled. - -| Administrator policy setting | Enabled | Disabled | -| - | - | - | -| **Prompt for credentials on the secure desktop** | The prompt appears on the secure desktop. | The prompt appears on the secure desktop. | -| **Prompt for consent on the secure desktop** | The prompt appears on the secure desktop. | The prompt appears on the secure desktop. | -| **Prompt for credentials** | The prompt appears on the secure desktop. | The prompt appears on the interactive user's desktop. | -| **Prompt for consent** | The prompt appears on the secure desktop. | The prompt appears on the interactive user's desktop. | -| **Prompt for consent for non-Windows binaries** | The prompt appears on the secure desktop. | The prompt appears on the interactive user's desktop. | - -When this policy setting is enabled, it overrides the **User Account Control: Behavior of the elevation prompt for standard users** policy setting. The following table describes the behavior of the elevation prompt for each of the standard user policy settings when the **User Account Control: Switch to the secure desktop when prompting for elevation** policy setting is enabled or disabled. - -| Standard policy setting | Enabled | Disabled | -| - | - | - | -| **Automatically deny elevation requests** | No prompt. The request is automatically denied. | No prompt. The request is automatically denied. | -| **Prompt for credentials on the secure desktop** | The prompt appears on the secure desktop. | The prompt appears on the secure desktop. | -| **Prompt for credentials** | The prompt appears on the secure desktop. | The prompt appears on the interactive user's desktop. | - -### User Account Control: Virtualize file and registry write failures to per-user locations - -The **User Account Control: Virtualize file and registry write failures to per-user locations** policy setting controls whether application write failures are redirected to defined registry and file system locations. This policy setting mitigates applications that run as administrator and write run-time application data to %ProgramFiles%, %Windir%, %Windir%\\system32, or HKLM\\Software. - -The options are: - -- **Enabled.** (Default) Application write failures are redirected at run time to defined user locations for both the file system and registry. -- **Disabled.** Applications that write data to protected locations fail. - -## Registry key settings - -The registry keys are found in **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System**. For information about each of the registry keys, see the associated Group Policy description. - -| Registry key | Group Policy setting | Registry setting | -| - | - | - | -| FilterAdministratorToken | [User Account Control: Admin Approval Mode for the built-in Administrator account](#user-account-control-admin-approval-mode-for-the-built-in-administrator-account) | 0 (Default) = Disabled
                  1 = Enabled | -| EnableUIADesktopToggle | [User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop](#user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop) | 0 (Default) = Disabled
                  1 = Enabled | -| ConsentPromptBehaviorAdmin | [User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode](#user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode) | 0 = Elevate without prompting
                  1 = Prompt for credentials on the secure desktop
                  2 = Prompt for consent on the secure desktop
                  3 = Prompt for credentials
                  4 = Prompt for consent
                  5 (Default) = Prompt for consent for non-Windows binaries
                  | -| ConsentPromptBehaviorUser | [User Account Control: Behavior of the elevation prompt for standard users](#user-account-control-behavior-of-the-elevation-prompt-for-standard-users) | 0 = Automatically deny elevation requests
                  1 = Prompt for credentials on the secure desktop
                  3 (Default) = Prompt for credentials | -| EnableInstallerDetection | [User Account Control: Detect application installations and prompt for elevation](#user-account-control-detect-application-installations-and-prompt-for-elevation) | 1 = Enabled (default for home)
                  0 = Disabled (default for enterprise) | -| ValidateAdminCodeSignatures | [User Account Control: Only elevate executables that are signed and validated](#user-account-control-only-elevate-executables-that-are-signed-and-validated) | 0 (Default) = Disabled
                  1 = Enabled | -| EnableSecureUIAPaths | [User Account Control: Only elevate UIAccess applications that are installed in secure locations](#user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations) | 0 = Disabled
                  1 (Default) = Enabled | -| EnableLUA | [User Account Control: Run all administrators in Admin Approval Mode](#user-account-control-run-all-administrators-in-admin-approval-mode) | 0 = Disabled
                  1 (Default) = Enabled | -| PromptOnSecureDesktop | [User Account Control: Switch to the secure desktop when prompting for elevation](#user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation) | 0 = Disabled
                  1 (Default) = Enabled | -| EnableVirtualization | [User Account Control: Virtualize file and registry write failures to per-user locations](#user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations) | 0 = Disabled
                  1 (Default) = Enabled | diff --git a/windows/security/identity-protection/user-account-control/user-account-control-overview.md b/windows/security/identity-protection/user-account-control/user-account-control-overview.md deleted file mode 100644 index e85aae3ab9..0000000000 --- a/windows/security/identity-protection/user-account-control/user-account-control-overview.md +++ /dev/null @@ -1,35 +0,0 @@ ---- -title: User Account Control (Windows) -description: User Account Control (UAC) helps prevent malware from damaging a PC and helps organizations deploy a better-managed desktop. -ms.collection: - - highpri - - tier2 -ms.topic: article -ms.date: 09/24/2011 ---- - -# User Account Control - -User Account Control (UAC) helps prevent malware from damaging a PC and helps organizations deploy a better-managed desktop. With UAC, apps and tasks always run in the security context of a non-administrator account, unless an administrator specifically authorizes administrator-level access to the system. UAC can block the automatic installation of unauthorized apps and prevent inadvertent changes to system settings. - -UAC allows all users to log on to their computers using a standard user account. Processes launched using a standard user token may perform tasks using access rights granted to a standard user. For instance, Windows Explorer automatically inherits standard user level permissions. Additionally, any apps that are started using Windows Explorer (for example, by double-clicking a shortcut) also run with the standard set of user permissions. Many apps, including those that are included with the operating system itself, are designed to work properly in this way. - -Other apps, especially those that were not specifically designed with security settings in mind, often require additional permissions to run successfully. These types of apps are referred to as legacy apps. Additionally, actions such as installing new software and making configuration changes to the Windows Firewall, require more permissions than what is available to a standard user account. - -When an app needs to run with more than standard user rights, UAC allows users to run apps with their administrator token (with administrative groups and privileges) instead of their default, standard user access token. Users continue to operate in the standard user security context, while enabling certain apps to run with elevated privileges, if needed. - -## Practical applications - -Admin Approval Mode in UAC helps prevent malware from silently installing without an administrator's knowledge. It also helps protect from inadvertent system-wide changes. Lastly, it can be used to enforce a higher level of compliance where administrators must actively consent or provide credentials for each administrative process. - - -## In this section - -| Topic | Description | -| - | - | -| [How User Account Control works](how-user-account-control-works.md) | User Account Control (UAC) is a fundamental component of Microsoft's overall security vision. UAC helps mitigate the impact of malware. | -| [User Account Control security policy settings](user-account-control-security-policy-settings.md) | You can use security policies to configure how User Account Control works in your organization. They can be configured locally by using the Local Security Policy snap-in (secpol.msc) or configured for the domain, OU, or specific groups by Group Policy. | -| [User Account Control Group Policy and registry key settings](user-account-control-group-policy-and-registry-key-settings.md) | Here's a list of UAC Group Policy and registry key settings that your organization can use to manage UAC. | - - - diff --git a/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings.md b/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings.md deleted file mode 100644 index ffdb4e4a3f..0000000000 --- a/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings.md +++ /dev/null @@ -1,94 +0,0 @@ ---- -title: User Account Control security policy settings (Windows) -description: You can use security policies to configure how User Account Control works in your organization. -ms.topic: article -ms.date: 09/24/2021 ---- - -# User Account Control security policy settings - -You can use security policies to configure how User Account Control works in your organization. They can be configured locally by using the Local Security Policy snap-in (secpol.msc) or configured for the domain, OU, or specific groups by Group Policy. - -## User Account Control: Admin Approval Mode for the Built-in Administrator account - -This policy setting controls the behavior of Admin Approval Mode for the built-in Administrator account. - -- **Enabled** The built-in Administrator account uses Admin Approval Mode. By default, any operation that requires elevation of privilege will prompt the user to approve the operation. -- **Disabled** (Default) The built-in Administrator account runs all applications with full administrative privilege. - -## User Account Control: Allow UIAccess application to prompt for elevation without using the secure desktop - -This policy setting controls whether User Interface Accessibility (UIAccess or UIA) programs can automatically disable the secure desktop for elevation prompts used by a standard user. - -- **Enabled** UIA programs, including Windows Remote Assistance, automatically disable the secure desktop for elevation prompts. If you don't disable the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting, the prompts appear on the interactive user's desktop instead of the secure desktop. -- **Disabled** (Default) The secure desktop can be disabled only by the user of the interactive desktop or by disabling the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting. - -## User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode - -This policy setting controls the behavior of the elevation prompt for administrators. - -- **Elevate without prompting** Allows privileged accounts to perform an operation that requires elevation without requiring consent or credentials. - - >**Note:**  Use this option only in the most constrained environments. -   -- **Prompt for credentials on the secure desktop** When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a privileged user name and password. If the user enters valid credentials, the operation continues with the user's highest available privilege. -- **Prompt for consent on the secure desktop** When an operation requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege. -- **Prompt for credentials** When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. -- **Prompt for consent** When an operation requires elevation of privilege, the user is prompted to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege. -- **Prompt for consent for non-Windows binaries** (Default) When an operation for a non-Microsoft application requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege. - -## User Account Control: Behavior of the elevation prompt for standard users - -This policy setting controls the behavior of the elevation prompt for standard users. - -- **Prompt for credentials** (Default) When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. -- **Automatically deny elevation requests** When an operation requires elevation of privilege, a configurable access denied error message is displayed. An enterprise that is running desktops as standard user may choose this setting to reduce help desk calls. -- **Prompt for credentials on the secure desktop** When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a different user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. - -## User Account Control: Detect application installations and prompt for elevation - -This policy setting controls the behavior of application installation detection for the computer. - -- **Enabled** (Default) When an app installation package is detected that requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. -- **Disabled** App installation packages aren't detected and prompted for elevation. Enterprises that are running standard user desktops and use delegated installation technologies, such as Group Policy or Microsoft Intune should disable this policy setting. In this case, installer detection is unnecessary. - -## User Account Control: Only elevate executable files that are signed and validated - -This policy setting enforces public key infrastructure (PKI) signature checks for any interactive applications that request elevation of privilege. Enterprise administrators can control which applications are allowed to run by adding certificates to the Trusted Publishers certificate store on local computers. - -- **Enabled** Enforces the certificate certification path validation for a given executable file before it's permitted to run. -- **Disabled** (Default) Doesn't enforce the certificate certification path validation before a given executable file is permitted to run. - -## User Account Control: Only elevate UIAccess applications that are installed in secure locations - -This policy setting controls whether applications that request to run with a User Interface Accessibility (UIAccess) integrity level must reside in a secure location in the file system. Secure locations are limited to the following folders: - -- …\\Program Files\\, including subfolders -- …\\Windows\\system32\\ -- …\\Program Files (x86)\\, including subfolders for 64-bit versions of Windows - ->**Note:**  Windows enforces a digital signature check on any interactive app that requests to run with a UIAccess integrity level regardless of the state of this security setting. -  -- **Enabled** (Default) If an app resides in a secure location in the file system, it runs only with UIAccess integrity. -- **Disabled** An app runs with UIAccess integrity even if it doesn't reside in a secure location in the file system. - -## User Account Control: Turn on Admin Approval Mode - -This policy setting controls the behavior of all User Account Control (UAC) policy settings for the computer. If you change this policy setting, you must restart your computer. - -- **Enabled** (Default) Admin Approval Mode is enabled. This policy must be enabled and related UAC policy settings must also be set appropriately. They'll allow the built-in Administrator account and all other users who are members of the Administrators group to run in Admin Approval Mode. -- **Disabled** Admin Approval Mode and all related UAC policy settings are disabled. Note: If this policy setting is disabled, the Windows Security app notifies you that the overall security of the operating system has been reduced. - -## User Account Control: Switch to the secure desktop when prompting for elevation - -This policy setting controls whether the elevation request prompt is displayed on the interactive user's desktop or the secure desktop. - -- **Enabled** (Default) All elevation requests go to the secure desktop regardless of prompt behavior policy settings for administrators and standard users. -- **Disabled** All elevation requests go to the interactive user's desktop. Prompt behavior policy settings for administrators and standard users are used. - -## User Account Control: Virtualize file and registry write failures to per-user locations - -This policy setting controls whether application write failures are redirected to defined registry and file system locations. This policy setting mitigates applications that run as administrator and write run-time application data to %ProgramFiles%, %Windir%, %Windir%\\system32, or HKLM\\Software. - -- **Enabled** (Default) App write failures are redirected at run time to defined user locations for both the file system and registry. -- **Disabled** Apps that write data to protected locations fail. diff --git a/windows/security/identity-protection/virtual-smart-cards/toc.yml b/windows/security/identity-protection/virtual-smart-cards/toc.yml new file mode 100644 index 0000000000..68842b6001 --- /dev/null +++ b/windows/security/identity-protection/virtual-smart-cards/toc.yml @@ -0,0 +1,17 @@ +items: +- name: Virtual Smart Card overview + href: virtual-smart-card-overview.md + items: + - name: Understand and evaluate virtual smart cards + href: virtual-smart-card-understanding-and-evaluating.md + items: + - name: Get started with virtual smart cards + href: virtual-smart-card-get-started.md + - name: Use virtual smart cards + href: virtual-smart-card-use-virtual-smart-cards.md + - name: Deploy virtual smart cards + href: virtual-smart-card-deploy-virtual-smart-cards.md + - name: Evaluate virtual smart card security + href: virtual-smart-card-evaluate-security.md + - name: Tpmvscmgr + href: virtual-smart-card-tpmvscmgr.md \ No newline at end of file diff --git a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-get-started.md b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-get-started.md index 9d8e125298..e3348db8ba 100644 --- a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-get-started.md +++ b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-get-started.md @@ -1,5 +1,5 @@ --- -title: Get Started with Virtual Smart Cards - Walkthrough Guide (Windows 10) +title: Get Started with Virtual Smart Cards - Walkthrough Guide description: This topic for the IT professional describes how to set up a basic test environment for using TPM virtual smart cards. ms.topic: conceptual ms.date: 02/22/2023 diff --git a/windows/security/identity-protection/vpn/images/vpn-app-rules.png b/windows/security/identity-protection/vpn/images/vpn-app-rules.png deleted file mode 100644 index edc4a24209..0000000000 Binary files a/windows/security/identity-protection/vpn/images/vpn-app-rules.png and /dev/null differ diff --git a/windows/security/identity-protection/vpn/images/vpn-app-trigger.PNG b/windows/security/identity-protection/vpn/images/vpn-app-trigger.PNG deleted file mode 100644 index aebd913df5..0000000000 Binary files a/windows/security/identity-protection/vpn/images/vpn-app-trigger.PNG and /dev/null differ diff --git a/windows/security/identity-protection/vpn/images/vpn-connection-intune.png b/windows/security/identity-protection/vpn/images/vpn-connection-intune.png deleted file mode 100644 index 8098b3445e..0000000000 Binary files a/windows/security/identity-protection/vpn/images/vpn-connection-intune.png and /dev/null differ diff --git a/windows/security/identity-protection/vpn/images/vpn-eap-xml.png b/windows/security/identity-protection/vpn/images/vpn-eap-xml.png deleted file mode 100644 index 9a90401c88..0000000000 Binary files a/windows/security/identity-protection/vpn/images/vpn-eap-xml.png and /dev/null differ diff --git a/windows/security/identity-protection/vpn/images/vpn-name-intune.png b/windows/security/identity-protection/vpn/images/vpn-name-intune.png deleted file mode 100644 index a7b3bfe3b4..0000000000 Binary files a/windows/security/identity-protection/vpn/images/vpn-name-intune.png and /dev/null differ diff --git a/windows/security/identity-protection/vpn/images/vpn-split-route.png b/windows/security/identity-protection/vpn/images/vpn-split-route.png deleted file mode 100644 index 12c3fe64d6..0000000000 Binary files a/windows/security/identity-protection/vpn/images/vpn-split-route.png and /dev/null differ diff --git a/windows/security/identity-protection/vpn/images/vpn-split.png b/windows/security/identity-protection/vpn/images/vpn-split.png deleted file mode 100644 index b4143ab1e5..0000000000 Binary files a/windows/security/identity-protection/vpn/images/vpn-split.png and /dev/null differ diff --git a/windows/security/identity-protection/vpn/images/vpn-traffic-rules.png b/windows/security/identity-protection/vpn/images/vpn-traffic-rules.png deleted file mode 100644 index fa7b526e80..0000000000 Binary files a/windows/security/identity-protection/vpn/images/vpn-traffic-rules.png and /dev/null differ diff --git a/windows/security/identity-protection/vpn/vpn-auto-trigger-profile.md b/windows/security/identity-protection/vpn/vpn-auto-trigger-profile.md deleted file mode 100644 index 51c5aebb16..0000000000 --- a/windows/security/identity-protection/vpn/vpn-auto-trigger-profile.md +++ /dev/null @@ -1,94 +0,0 @@ ---- -title: VPN auto-triggered profile options (Windows 10 and Windows 11) -description: Learn about the types of auto-trigger rules for VPNs in Windows, which start a VPN when it is needed to access a resource. -ms.date: 09/23/2021 -ms.topic: conceptual ---- - -# VPN auto-triggered profile options - -In Windows 10 and Windows 11, a number of features have been added to auto-trigger VPN so users won't have to manually connect when VPN is needed to access necessary resources. There are three different types of auto-trigger rules: - -- App trigger -- Name-based trigger -- Always On - -> [!NOTE] -> Auto-triggered VPN connections will not work if Folder Redirection for AppData is enabled. Either Folder Redirection for AppData must be disabled or the auto-triggered VPN profile must be deployed in system context, which changes the path to where the rasphone.pbk file is stored. - - -## App trigger - -VPN profiles in Windows 10 or Windows 11 can be configured to connect automatically on the launch of a specified set of applications. You can configure desktop or Universal Windows Platform (UWP) apps to trigger a VPN connection. You can also configure per-app VPN and specify traffic rules for each app. See [Traffic filters](vpn-security-features.md#traffic-filters) for more details. - -The app identifier for a desktop app is a file path. The app identifier for a UWP app is a package family name. - -[Find a package family name (PFN) for per-app VPN configuration](/mem/configmgr/protect/deploy-use/find-a-pfn-for-per-app-vpn) - -## Name-based trigger - -You can configure a domain name-based rule so that a specific domain name triggers the VPN connection. - -Name-based auto-trigger can be configured using the VPNv2/*ProfileName*/DomainNameInformationList/dniRowId/AutoTrigger setting in the [VPNv2 Configuration Service Provider (CSP)](/windows/client-management/mdm/vpnv2-csp). - -There are four types of name-based triggers: - -- Short name: for example, if **HRweb** is configured as a trigger and the stack sees a DNS resolution request for **HRweb**, the VPN will be triggered. -- Fully-qualified domain name (FQDN): for example, if **HRweb.corp.contoso.com** is configured as a trigger and the stack sees a DNS resolution request for **HRweb.corp.contoso.com**, the VPN will be triggered. -- Suffix: for example, if **.corp.contoso.com** is configured as a trigger and the stack sees a DNS resolution request with a matching suffix (such as **HRweb.corp.contoso.com**), the VPN will be triggered. For any short name resolution, VPN will be triggered and the DNS server will be queried for the *ShortName*.**corp.contoso.com**. -- All: if used, all DNS resolution should trigger VPN. - - -## Always On - -Always On is a feature in Windows 10 and Windows 11 which enables the active VPN profile to connect automatically on the following triggers: - -- User sign-in -- Network change -- Device screen on - -When the trigger occurs, VPN tries to connect. If an error occurs or any user input is needed, the user is shown a toast notification for additional interaction. - - -When a device has multiple profiles with Always On triggers, the user can specify the active profile in **Settings** > **Network & Internet** > **VPN** > *VPN profile* by selecting the **Let apps automatically use this VPN connection** checkbox. By default, the first MDM-configured profile is marked as **Active**. Devices with multiple users have the same restriction: only one profile and therefore only one user will be able to use the Always On triggers. - -## Preserving user Always On preference - -Windows has a feature to preserve a user's AlwaysOn preference. In the event that a user manually unchecks the "Connect automatically" checkbox, Windows will remember this user preference for this profile name by adding the profile name to the value **AutoTriggerDisabledProfilesList**. - -Should a management tool remove or add the same profile name back and set **AlwaysOn** to **true**, Windows will not check the box if the profile name exists in the following registry value in order to preserve user preference. - -**Key:** HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasMan\Config
                  -**Value:** AutoTriggerDisabledProfilesList
                  -**Type:** REG_MULTI_SZ - - -## Trusted network detection - -This feature configures the VPN such that it would not get triggered if a user is on a trusted corporate network. The value of this setting is a list of DNS suffixes. The VPN stack will look at the network name of the physical interface connection profile and if it matches any in the configured list and the network is private or provisioned by MDM, then VPN will not get triggered. - -Trusted network detection can be configured using the VPNv2/*ProfileName*/TrustedNetworkDetection setting in the [VPNv2 CSP](/windows/client-management/mdm/vpnv2-csp). - - -## Configure app-triggered VPN - -See [VPN profile options](vpn-profile-options.md) and [VPNv2 CSP](/windows/client-management/mdm/vpnv2-csp) for XML configuration. - -The following image shows associating an app to a VPN connection in a VPN Profile configuration policy using Microsoft Intune. - -![Add an app for the VPN connection.](images/vpn-app-trigger.png) - -After you add an associated app, if you select the **Only these apps can use this VPN connection (per-app VPN)** checkbox, the app becomes available in **Corporate Boundaries**, where you can configure rules for the app. See [Traffic filters](vpn-security-features.md#traffic-filters) for more details. - -![Configure rules for the app.](images/vpn-app-rules.png) - -## Related topics - -- [VPN technical guide](vpn-guide.md) -- [VPN connection types](vpn-connection-type.md) -- [VPN routing decisions](vpn-routing.md) -- [VPN authentication options](vpn-authentication.md) -- [VPN and conditional access](vpn-conditional-access.md) -- [VPN name resolution](vpn-name-resolution.md) -- [VPN security features](vpn-security-features.md) -- [VPN profile options](vpn-profile-options.md) diff --git a/windows/security/identity-protection/vpn/vpn-connection-type.md b/windows/security/identity-protection/vpn/vpn-connection-type.md deleted file mode 100644 index 0ae1626c8b..0000000000 --- a/windows/security/identity-protection/vpn/vpn-connection-type.md +++ /dev/null @@ -1,75 +0,0 @@ ---- -title: VPN connection types (Windows 10 and Windows 11) -description: Learn about Windows VPN platform clients and the VPN connection-type features that can be configured. -ms.date: 08/23/2021 -ms.topic: conceptual ---- - -# VPN connection types - -Virtual private networks (VPNs) are point-to-point connections across a private or public network, such as the Internet. A VPN client uses special TCP/IP or UDP-based protocols, called *tunneling protocols*, to make a virtual call to a virtual port on a VPN server. In a typical VPN deployment, a client initiates a virtual point-to-point connection to a remote access server over the Internet. The remote access server answers the call, authenticates the caller, and transfers data between the VPN client and the organization's private network. - -There are many options for VPN clients. In Windows 10 and Windows 11, the built-in plug-in and the Universal Windows Platform (UWP) VPN plug-in platform are built on top of the Windows VPN platform. This guide focuses on the Windows VPN platform clients and the features that can be configured. - -![VPN connection types.](images/vpn-connection.png) - -## Built-in VPN client - -- Tunneling protocols - - - [Internet Key Exchange version 2 (IKEv2)](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ff687731(v=ws.10)) - - Configure the IPsec/IKE tunnel cryptographic properties using the **Cryptography Suite** setting in the [VPNv2 Configuration Service Provider (CSP)](/windows/client-management/mdm/vpnv2-csp). - - - [L2TP](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ff687761(v=ws.10)) - - L2TP with pre-shared key (PSK) authentication can be configured using the **L2tpPsk** setting in the [VPNv2 CSP](/windows/client-management/mdm/vpnv2-csp). - - - [PPTP](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ff687676(v=ws.10)) - - - [SSTP](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ff687819(v=ws.10)) - - SSTP is supported for Windows desktop editions only. SSTP cannot be configured using mobile device management (MDM), but it is one of the protocols attempted in the **Automatic** option. - - > [!NOTE] - > When a VPN plug-in is used, the adapter will be listed as an SSTP adapter, even though the VPN protocol used is the plug-in's protocol. - -- Automatic - - The **Automatic** option means that the device will try each of the built-in tunneling protocols until one succeeds. It will attempt from most secure to least secure. - - Configure **Automatic** for the **NativeProtocolType** setting in the [VPNv2 CSP](/windows/client-management/mdm/vpnv2-csp). - - - -## Universal Windows Platform VPN plug-in - -The Universal Windows Platform (UWP) VPN plug-ins were introduced in Windows 10 and Windows 11, although there was originally separate version available for the Windows 8.1 PC platform. Using the UWP platform, third-party VPN providers can create app-containerized plug-ins using WinRT APIs, eliminating the complexity and problems often associated with writing to system-level drivers. - -There are a number of Universal Windows Platform VPN applications, such as Pulse Secure, Cisco AnyConnect, F5 Access, Sonicwall Mobile Connect, and Check Point Capsule. If you want to use a UWP VPN plug-in, work with your vendor for any custom settings needed to configure your VPN solution. - -## Configure connection type - -See [VPN profile options](vpn-profile-options.md) and [VPNv2 CSP](/windows/client-management/mdm/vpnv2-csp) for XML configuration. - -The following image shows connection options in a VPN Profile configuration policy using Microsoft Intune: - -> [!div class="mx-imgBorder"] -> ![Available connection types.](images/vpn-connection-intune.png) - -In Intune, you can also include custom XML for third-party plug-in profiles: - -> [!div class="mx-imgBorder"] -> ![Custom XML.](images/vpn-custom-xml-intune.png) - - -## Related topics - -- [VPN technical guide](vpn-guide.md) -- [VPN routing decisions](vpn-routing.md) -- [VPN authentication options](vpn-authentication.md) -- [VPN and conditional access](vpn-conditional-access.md) -- [VPN name resolution](vpn-name-resolution.md) -- [VPN auto-triggered profile options](vpn-auto-trigger-profile.md) -- [VPN security features](vpn-security-features.md) -- [VPN profile options](vpn-profile-options.md) diff --git a/windows/security/identity-protection/vpn/vpn-name-resolution.md b/windows/security/identity-protection/vpn/vpn-name-resolution.md deleted file mode 100644 index 2c6402477a..0000000000 --- a/windows/security/identity-protection/vpn/vpn-name-resolution.md +++ /dev/null @@ -1,74 +0,0 @@ ---- -title: VPN name resolution (Windows 10 and Windows 11) -description: Learn how the name resolution setting in the VPN profile configures how name resolution works when a VPN client connects to a VPN server. -ms.date: 09/23/2021 -ms.topic: conceptual ---- - -# VPN name resolution - -When the VPN client connects to the VPN server, the VPN client receives the client IP address. The client may also receive the IP address of the Domain Name System (DNS) server and the IP address of the Windows Internet Name Service (WINS) server. - -The name resolution setting in the VPN profile configures how name resolution should work on the system when VPN is connected. The networking stack first looks at the Name Resolution Policy table (NRPT) for any matches and tries a resolution in the case of a match. If no match is found, the DNS suffix on the most preferred interface based on the interface metric is appended to the name (in the case of a short name) and a DNS query is sent out on the preferred interface. If the query times out, the DNS suffix search list is used in order and DNS queries are sent on all interfaces. - -## Name Resolution Policy table (NRPT) - -The NRPT is a table of namespaces that determines the DNS client's behavior when issuing name resolution queries and processing responses. It is the first place that the stack will look after the DNSCache. - -There are 3 types of name matches that can set up for NRPT: - -- Fully qualified domain name (FQDN) that can be used for direct matching to a name - -- Suffix match results in either a comparison of suffixes (for FQDN resolution) or the appending of the suffix (in case of a short name) - -- Any resolution should attempt to first resolve with the proxy server/DNS server with this entry - -NRPT is set using the **VPNv2/*ProfileName*/DomainNameInformationList** node of the [VPNv2 CSP](/windows/client-management/mdm/vpnv2-csp). This node also configures Web proxy server or domain name servers. - -[Learn more about NRPT](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ee649207(v=ws.10)) - - -## DNS suffix - -This setting is used to configure the primary DNS suffix for the VPN interface and the suffix search list after the VPN connection is established. - -Primary DNS suffix is set using the **VPNv2/*ProfileName*/DnsSuffix** node. - - - -[Learn more about primaryDNS suffix](/previous-versions/windows/it-pro/windows-2000-server/cc959611(v=technet.10)) - -## Persistent - -You can also configure *persistent* name resolution rules. Name resolution for specified items will only be performed over the VPN. - -Persistent name resolution is set using the **VPNv2/*ProfileName*/DomainNameInformationList//*dniRowId*/Persistent** node. - - - -## Configure name resolution - -See [VPN profile options](vpn-profile-options.md) and [VPNv2 CSP](/windows/client-management/mdm/vpnv2-csp) for XML configuration. - -The following image shows name resolution options in a VPN Profile configuration policy using Microsoft Intune. - -![Add DNS rule.](images/vpn-name-intune.png) - -The fields in **Add or edit DNS rule** in the Intune profile correspond to the XML settings shown in the following table. - -| Field | XML | -| --- | --- | -| **Name** | **VPNv2/*ProfileName*/DomainNameInformationList/*dniRowId*/DomainName** | -| **Servers (comma separated)** | **VPNv2/*ProfileName*/DomainNameInformationList/*dniRowId*/DnsServers** | -| **Proxy server** | **VPNv2/*ProfileName*/DomainNameInformationList/*dniRowId*/WebServers** | - -## Related topics - -- [VPN technical guide](vpn-guide.md) -- [VPN connection types](vpn-connection-type.md) -- [VPN routing decisions](vpn-routing.md) -- [VPN authentication options](vpn-authentication.md) -- [VPN and conditional access](vpn-conditional-access.md) -- [VPN auto-triggered profile options](vpn-auto-trigger-profile.md) -- [VPN security features](vpn-security-features.md) -- [VPN profile options](vpn-profile-options.md) \ No newline at end of file diff --git a/windows/security/identity-protection/vpn/vpn-routing.md b/windows/security/identity-protection/vpn/vpn-routing.md deleted file mode 100644 index 925b124da9..0000000000 --- a/windows/security/identity-protection/vpn/vpn-routing.md +++ /dev/null @@ -1,59 +0,0 @@ ---- -ms.date: 09/23/2021 -title: VPN routing decisions -description: Learn about approaches that either send all data through a VPN or only selected data. The one you choose impacts capacity planning and security expectations. -ms.topic: conceptual ---- -# VPN routing decisions - -Network routes are required for the stack to understand which interface to use for outbound traffic. One of the most important decision points for VPN configuration is whether you want to send all the data through VPN (*force tunnel*) or only some data through the VPN (*split tunnel*). This decision impacts the configuration and the capacity planning, as well as security expectations from the connection. - -## Split tunnel configuration - -In a split tunnel configuration, routes can be specified to go over VPN and all other traffic will go over the physical interface. - -Routes can be configured using the VPNv2/*ProfileName*/RouteList setting in the [VPNv2 Configuration Service Provider (CSP)](/windows/client-management/mdm/vpnv2-csp). - -For each route item in the list, the following can be specified: - -- **Address**: VPNv2/*ProfileName*/RouteList/*routeRowId*/Address -- **Prefix size**: VPNv2/*ProfileName*/RouteList/*routeRowId*/Prefix -- **Exclusion route**: VPNv2/*ProfileName*/RouteList/*routeRowId*/ExclusionRoute - - Windows VPN platform now supports the ability to specify exclusion routes that specifically should not go over the physical interface. - -Routes can also be added at connect time through the server for UWP VPN apps. - -## Force tunnel configuration - -In a force tunnel configuration, all traffic will go over VPN. This is the default configuration and takes effect if no routes are specified. - -The only implication of this setting is the manipulation of routing entries. In the case of a force tunnel, VPN V4 and V6 default routes (for example. 0.0.0.0/0) are added to the routing table with a lower metric than ones for other interfaces. This sends traffic through the VPN as long as there isn't a specific route on the physical interface itself. - -For built-in VPN, this decision is controlled using the MDM setting **VPNv2/ProfileName/NativeProfile/RoutingPolicyType**. - -For a UWP VPN plug-in, this property is directly controlled by the app. If the VPN plug-in indicates the default route for IPv4 and IPv6 as the only two Inclusion routes, the VPN platform marks the connection as Force Tunneled. - -## Configure routing - -See [VPN profile options](vpn-profile-options.md) and [VPNv2 CSP](/windows/client-management/mdm/vpnv2-csp) for XML configuration. - -When you configure a VPN profile in Microsoft Intune, you select a checkbox to enable split tunnel configuration. - -![split tunnel.](images/vpn-split.png) - -Next, in **Corporate Boundaries**, you add the routes that should use the VPN connection. - -![add route for split tunnel.](images/vpn-split-route.png) - - -## Related topics - -- [VPN technical guide](vpn-guide.md) -- [VPN connection types](vpn-connection-type.md) -- [VPN authentication options](vpn-authentication.md) -- [VPN and conditional access](vpn-conditional-access.md) -- [VPN name resolution](vpn-name-resolution.md) -- [VPN auto-triggered profile options](vpn-auto-trigger-profile.md) -- [VPN security features](vpn-security-features.md) -- [VPN profile options](vpn-profile-options.md) \ No newline at end of file diff --git a/windows/security/identity-protection/vpn/vpn-security-features.md b/windows/security/identity-protection/vpn/vpn-security-features.md deleted file mode 100644 index c4d9da3ec4..0000000000 --- a/windows/security/identity-protection/vpn/vpn-security-features.md +++ /dev/null @@ -1,84 +0,0 @@ ---- -title: VPN security features -description: Learn about security features for VPN, including LockDown VPN, Windows Information Protection integration with VPN, and traffic filters. -ms.date: 07/21/2022 -ms.topic: conceptual ---- - -# VPN security features - -## Hyper-V based containers and VPN - -Windows supports different kinds of Hyper-V based containers. This support includes, but isn't limited to, Microsoft Defender Application Guard and Windows Sandbox. When you use 3rd party VPN solutions, these Hyper-V based containers may not be able to seamlessly connect to the internet. Additional configurational changes might be needed to resolve connectivity issues. - -For example, for more information on a workaround for Cisco AnyConnect VPN, see [Cisco AnyConnect Secure Mobility Client Administrator Guide: Connectivity issues with VM-based subsystems](https://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect410/administration/guide/b-anyconnect-admin-guide-4-10/troubleshoot-anyconnect.html#Cisco_Task_in_List_GUI.dita_3a9a8101-f034-4e9b-b24a-486ee47b5e9f). - -## Windows Information Protection (WIP) integration with VPN - -Windows Information Protection provides capabilities allowing the separation and protection of enterprise data against disclosure across both company and personally owned devices, without requiring additional changes to the environments or the apps themselves. Additionally, when used with Rights Management Services (RMS), WIP can help to protect enterprise data locally. - -The **EdpModeId** node in the [VPNv2 Configuration Service Provider (CSP)](/windows/client-management/mdm/vpnv2-csp) allows a Windows 10 or Windows 11 VPN client to integrate with WIP, extending its functionality to remote devices. Use case scenarios for WIP include: - -- Core functionality: File encryption and file access blocking -- UX policy enforcement: Restricting copy/paste, drag/drop, and sharing operations -- WIP network policy enforcement: Protecting intranet resources over the corporate network and VPN -- Network policy enforcement: Protecting SMB and Internet cloud resources over the corporate network and VPN - -The value of the **EdpModeId** is an Enterprise ID. The networking stack will look for this ID in the app token to determine whether VPN should be triggered for that particular app. - -Additionally, when connecting with WIP, the admin does not have to specify AppTriggerList and TrafficFilterList rules separately in this profile (unless more advanced configuration is needed) because the WIP policies and App lists automatically take effect. - -[Learn more about Windows Information Protection](/windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip) - - -## Traffic Filters - -Traffic Filters give enterprises the ability to decide what traffic is allowed into the corporate network based on policy. Network admins can use Traffic Filters to effectively add interface specific firewall rules on the VPN Interface. There are two types of Traffic Filter rules: - -- App-based rules. With app-based rules, a list of applications can be marked to allow only traffic originating from these apps to go over the VPN interface. -- Traffic-based rules. Traffic-based rules are 5-tuple policies (ports, addresses, protocol) that can be specified to allow only traffic matching these rules to go over the VPN interface. - -There can be many sets of rules which are linked by OR. Within each set, there can be app-based rules and traffic-based rules; all the properties within the set will be linked by AND. In addition, these rules can be applied at a per-app level or a per-device level. - -For example, an admin could define rules that specify: - -- The Contoso HR App must be allowed to go through the VPN and only access port 4545. -- The Contoso finance apps are allowed to go over the VPN and only access the Remote IP ranges of 10.10.0.40 - 10.10.0.201 on port 5889. -- All other apps on the device should be able to access only ports 80 or 443. - -## Configure traffic filters - -See [VPN profile options](vpn-profile-options.md) and [VPNv2 CSP](/windows/client-management/mdm/vpnv2-csp) for XML configuration. - -The following image shows the interface to configure traffic rules in a VPN Profile configuration policy, using Microsoft Intune. - -![Add a traffic rule.](images/vpn-traffic-rules.png) - - -## LockDown VPN - -A VPN profile configured with LockDown secures the device to only allow network traffic over the VPN interface. It has the following features: - -- The system attempts to keep the VPN connected at all times. -- The user cannot disconnect the VPN connection. -- The user cannot delete or modify the VPN profile. -- The VPN LockDown profile uses forced tunnel connection. -- If the VPN connection is not available, outbound network traffic is blocked. -- Only one VPN LockDown profile is allowed on a device. - -> [!NOTE] -> For built-in VPN, LockDown VPN is only available for the Internet Key Exchange version 2 (IKEv2) connection type. - -Deploy this feature with caution, as the resultant connection will not be able to send or receive any network traffic without the VPN being connected. - - -## Related topics - -- [VPN technical guide](vpn-guide.md) -- [VPN connection types](vpn-connection-type.md) -- [VPN routing decisions](vpn-routing.md) -- [VPN authentication options](vpn-authentication.md) -- [VPN and conditional access](vpn-conditional-access.md) -- [VPN name resolution](vpn-name-resolution.md) -- [VPN auto-triggered profile options](vpn-auto-trigger-profile.md) -- [VPN profile options](vpn-profile-options.md) diff --git a/windows/security/identity-protection/windows-credential-theft-mitigation-guide-abstract.md b/windows/security/identity-protection/windows-credential-theft-mitigation-guide-abstract.md index 5cbde2e21f..c90399660a 100644 --- a/windows/security/identity-protection/windows-credential-theft-mitigation-guide-abstract.md +++ b/windows/security/identity-protection/windows-credential-theft-mitigation-guide-abstract.md @@ -7,7 +7,7 @@ ms.date: 03/31/2023 # Windows Credential Theft Mitigation Guide Abstract -This topic provides a summary of the Windows credential theft mitigation guide, which can be downloaded from the [Microsoft Download Center](https://download.microsoft.com/download/C/1/4/C14579CA-E564-4743-8B51-61C0882662AC/Windows%2010%20credential%20theft%20mitigation%20guide.docx). +This article provides a summary of the Windows credential theft mitigation guide, which can be downloaded from the [Microsoft Download Center](https://download.microsoft.com/download/C/1/4/C14579CA-E564-4743-8B51-61C0882662AC/Windows%2010%20credential%20theft%20mitigation%20guide.docx). This guide explains how credential theft attacks occur and the strategies and countermeasures you can implement to mitigate them, following these security stages: - Identify high-value assets @@ -51,7 +51,7 @@ Many other countermeasures are also covered, such as using Microsoft Passport an ## Detecting credential attacks -This sections covers how to detect the use of stolen credentials and how to collect computer events to help you detect credential theft. +This section covers how to detect the use of stolen credentials and how to collect computer events to help you detect credential theft. ## Responding to suspicious activity diff --git a/windows/security/index.yml b/windows/security/index.yml index ce7aece4b4..8cf4624659 100644 --- a/windows/security/index.yml +++ b/windows/security/index.yml @@ -80,7 +80,7 @@ landingContent: - linkListType: overview links: - text: Overview - url: apps.md + url: application-security/index.md - linkListType: concept links: - text: Application Control and virtualization-based protection @@ -90,9 +90,9 @@ landingContent: - text: Application Guard url: threat-protection/microsoft-defender-application-guard/md-app-guard-overview.md - text: Windows Sandbox - url: threat-protection/windows-sandbox/windows-sandbox-overview.md + url: application-security\application-isolation\windows-sandbox\windows-sandbox-overview.md - text: Microsoft Defender SmartScreen - url: threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md + url: operating-system-security\virus-and-threat-protection\microsoft-defender-smartscreen\index.md - text: S/MIME for Windows url: identity-protection/configure-s-mime.md # Cards and links should be based on top customer tasks or top subjects @@ -125,10 +125,6 @@ landingContent: # Card (optional) - title: Cloud services linkLists: - - linkListType: overview - links: - - text: Overview - url: cloud.md - linkListType: concept links: - text: Mobile device management diff --git a/windows/security/information-protection/bitlocker/bcd-settings-and-bitlocker.md b/windows/security/information-protection/bitlocker/bcd-settings-and-bitlocker.md index c8a7446c07..9ed2b2769e 100644 --- a/windows/security/information-protection/bitlocker/bcd-settings-and-bitlocker.md +++ b/windows/security/information-protection/bitlocker/bcd-settings-and-bitlocker.md @@ -1,5 +1,5 @@ --- -title: BCD settings and BitLocker (Windows 10) +title: BCD settings and BitLocker description: This article for IT professionals describes the BCD settings that are used by BitLocker. ms.reviewer: ms.prod: windows-client diff --git a/windows/security/information-protection/bitlocker/bitlocker-countermeasures.md b/windows/security/information-protection/bitlocker/bitlocker-countermeasures.md index bc4ad1b106..df0af1d002 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-countermeasures.md +++ b/windows/security/information-protection/bitlocker/bitlocker-countermeasures.md @@ -1,5 +1,5 @@ --- -title: BitLocker Countermeasures (Windows 10) +title: BitLocker Countermeasures description: Windows uses technologies including TPM, Secure Boot, Trusted Boot, and Early Launch Anti-malware (ELAM) to protect against attacks on the BitLocker encryption key. ms.reviewer: ms.prod: windows-client diff --git a/windows/security/information-protection/bitlocker/bitlocker-deployment-comparison.md b/windows/security/information-protection/bitlocker/bitlocker-deployment-comparison.md index e922e90f32..99d7101e23 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-deployment-comparison.md +++ b/windows/security/information-protection/bitlocker/bitlocker-deployment-comparison.md @@ -1,5 +1,5 @@ --- -title: BitLocker deployment comparison (Windows 10) +title: BitLocker deployment comparison description: This article shows the BitLocker deployment comparison chart. ms.prod: windows-client ms.localizationpriority: medium diff --git a/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings.md b/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings.md index a70f0199da..b14f859b9a 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings.md +++ b/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings.md @@ -1,5 +1,5 @@ --- -title: BitLocker Group Policy settings (Windows 10) +title: BitLocker Group Policy settings description: This article for IT professionals describes the function, location, and effect of each Group Policy setting that is used to manage BitLocker Drive Encryption. ms.reviewer: ms.prod: windows-client diff --git a/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md b/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md index 37a5af8983..442be0541b 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md +++ b/windows/security/information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md @@ -1,5 +1,5 @@ --- -title: BitLocker - How to enable Network Unlock (Windows 10) +title: BitLocker - How to enable Network Unlock description: This article for the IT professional describes how BitLocker Network Unlock works and how to configure it. ms.reviewer: ms.prod: windows-client diff --git a/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises.md b/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises.md index 93dc998a8a..8f46db3e99 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises.md +++ b/windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises.md @@ -1,6 +1,6 @@ --- -title: BitLocker Management Recommendations for Enterprises (Windows 10) -description: Refer to relevant documentation, products, and services to learn about managing BitLocker for enterprises and see recommendations for different computers. +title: BitLocker management +description: Refer to relevant documentation, products, and services to learn about managing BitLocker and see recommendations for different computers. ms.prod: windows-client ms.localizationpriority: medium author: frankroj @@ -12,12 +12,14 @@ ms.custom: bitlocker ms.technology: itpro-security --- -# BitLocker management for enterprises +# BitLocker management The ideal solution for BitLocker management is to eliminate the need for IT administrators to set management policies using tools or other mechanisms by having Windows perform tasks that are more practical to automate. This vision leverages modern hardware developments. The growth of TPM 2.0, secure boot, and other hardware improvements, for example, have helped to alleviate the support burden on help desks and a decrease in support-call volumes, yielding improved user satisfaction. Windows continues to be the focus for new features and improvements for built-in encryption management, such as automatically enabling encryption on devices that support Modern Standby beginning with Windows 8.1. Though much Windows [BitLocker documentation](bitlocker-overview.md) has been published, customers frequently ask for recommendations and pointers to specific, task-oriented documentation that is both easy to digest and focused on how to deploy and manage BitLocker. This article links to relevant documentation, products, and services to help answer this and other related frequently asked questions, and also provides BitLocker recommendations for different types of computers. +[!INCLUDE [bitlocker](../../../../includes/licensing/bitlocker-management.md)] + ## Managing domain-joined computers and moving to cloud Companies that image their own computers using Configuration Manager can use an existing task sequence to [pre-provision BitLocker](/configmgr/osd/understand/task-sequence-steps#BKMK_PreProvisionBitLocker) encryption while in Windows Preinstallation Environment (WinPE) and can then [enable protection](/configmgr/osd/understand/task-sequence-steps#BKMK_EnableBitLocker). These steps during an operating system deployment can help ensure that computers are encrypted from the start, even before users receive them. As part of the imaging process, a company could also decide to use Configuration Manager to pre-set any desired [BitLocker Group Policy](./bitlocker-group-policy-settings.md). @@ -35,11 +37,6 @@ Starting with Windows 10 version 1703, the enablement of BitLocker can be trigge For hardware that is compliant with Modern Standby and HSTI, when using either of these features, [BitLocker Device Encryption](bitlocker-device-encryption-overview-windows-10.md#bitlocker-device-encryption) is automatically turned on whenever the user joins a device to Azure AD. Azure AD provides a portal where recovery keys are also backed up, so users can retrieve their own recovery key for self-service, if necessary. For older devices that aren't yet encrypted, beginning with Windows 10 version 1703, admins can use the [BitLocker CSP](/windows/client-management/mdm/bitlocker-csp/) to trigger encryption and store the recovery key in Azure AD. This process and feature is applicable to Azure Hybrid AD as well. -> [!NOTE] -> To manage Bitlocker via CSP (Configuration Service Provider), except to enable and disable it, regardless of your management platform, one of the following licenses must be assigned to your users: -> - Windows 10/11 Enterprise E3 or E5 (included in Microsoft 365 F3, E3, and E5). -> - Windows 10/11 Education A3 or A5 (included in Microsoft 365 A3 and A5). - ## Managing workplace-joined PCs and phones For Windows PCs and Windows Phones that are enrolled using **Connect to work or school account**, BitLocker Device Encryption is managed over MDM, the same as devices joined to Azure AD. diff --git a/windows/security/information-protection/bitlocker/bitlocker-overview.md b/windows/security/information-protection/bitlocker/bitlocker-overview.md index a3b7a72ca1..9f04e173a3 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-overview.md +++ b/windows/security/information-protection/bitlocker/bitlocker-overview.md @@ -48,9 +48,7 @@ There are two additional tools in the Remote Server Administration Tools that ca - **BitLocker Drive Encryption Tools**. BitLocker Drive Encryption Tools include the command-line tools, manage-bde and repair-bde, and the BitLocker cmdlets for Windows PowerShell. Both manage-bde and the BitLocker cmdlets can be used to perform any task that can be accomplished through the BitLocker control panel, and they're appropriate to be used for automated deployments and other scripting scenarios. Repair-bde is provided for disaster recovery scenarios in which a BitLocker-protected drive can't be unlocked normally or by using the recovery console. -## New and changed functionality - -To find out what's new in BitLocker for Windows, such as support for the XTS-AES encryption algorithm, see [What's new in Windows 10, versions 1507 and 1511 for IT Pros: BitLocker](/windows/whats-new/whats-new-windows-10-version-1507-and-1511#bitlocker). +[!INCLUDE [bitlocker](../../../../includes/licensing/bitlocker-enablement.md)] ## System requirements diff --git a/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md b/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md index ba44582914..9e538c4fef 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md +++ b/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md @@ -1,5 +1,5 @@ --- -title: BitLocker Use BitLocker Drive Encryption Tools to manage BitLocker (Windows 10) +title: BitLocker Use BitLocker Drive Encryption Tools to manage BitLocker description: This article for the IT professional describes how to use tools to manage BitLocker. ms.reviewer: ms.prod: windows-client diff --git a/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer.md b/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer.md index 1592e527a6..e96cf15557 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer.md +++ b/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer.md @@ -1,5 +1,5 @@ --- -title: BitLocker Use BitLocker Recovery Password Viewer (Windows 10) +title: BitLocker Use BitLocker Recovery Password Viewer description: This article for the IT professional describes how to use the BitLocker Recovery Password Viewer. ms.reviewer: ms.prod: windows-client diff --git a/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md b/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md index 07323ba946..415ebdab44 100644 --- a/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md +++ b/windows/security/information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md @@ -1,5 +1,5 @@ --- -title: Prepare the organization for BitLocker Planning and policies (Windows 10) +title: Prepare the organization for BitLocker Planning and policies description: This article for the IT professional explains how can to plan for a BitLocker deployment. ms.reviewer: ms.prod: windows-client diff --git a/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md b/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md index c8e7301a42..14934b6ab3 100644 --- a/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md +++ b/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md @@ -1,5 +1,5 @@ --- -title: Protecting cluster shared volumes and storage area networks with BitLocker (Windows 10) +title: Protecting cluster shared volumes and storage area networks with BitLocker description: This article for IT pros describes how to protect CSVs and SANs with BitLocker. ms.reviewer: ms.prod: windows-client diff --git a/windows/security/information-protection/encrypted-hard-drive.md b/windows/security/information-protection/encrypted-hard-drive.md index 4523cd4552..bb2fc98a8e 100644 --- a/windows/security/information-protection/encrypted-hard-drive.md +++ b/windows/security/information-protection/encrypted-hard-drive.md @@ -1,5 +1,5 @@ --- -title: Encrypted Hard Drive (Windows) +title: Encrypted Hard Drive description: Encrypted Hard Drive uses the rapid encryption that is provided by BitLocker Drive Encryption to enhance data security and management. ms.reviewer: manager: aaroncz @@ -48,6 +48,8 @@ Encrypted hard drives are supported natively in the operating system through the If you're a storage device vendor who is looking for more info on how to implement Encrypted Hard Drive, see the [Encrypted Hard Drive Device Guide](/previous-versions/windows/hardware/design/dn653989(v=vs.85)). +[!INCLUDE [encrypted-hard-drive](../../../includes/licensing/encrypted-hard-drive.md)] + ## System Requirements To use encrypted hard drives, the following system requirements apply: diff --git a/windows/security/information-protection/index.md b/windows/security/information-protection/index.md deleted file mode 100644 index f84702dd1c..0000000000 --- a/windows/security/information-protection/index.md +++ /dev/null @@ -1,24 +0,0 @@ ---- -title: Information protection (Windows 10) -description: Learn more about how to protect sensitive data across your organization. -ms.prod: windows-client -author: paolomatarazzo -ms.author: paoloma -manager: aaroncz -ms.topic: conceptual -ms.date: 03/09/2023 -ms.technology: itpro-security ---- - -# Information protection - -Learn more about how to secure documents and other data across your organization. - -| Section | Description | -|-|-| -| [BitLocker](bitlocker/bitlocker-overview.md)| Provides information about BitLocker, which is a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers. | -| [Encrypted Hard Drive](encrypted-hard-drive.md)| Encrypted Hard Drive uses the rapid encryption that is provided by BitLocker Drive Encryption to enhance data security and management. | -| [Kernel DMA Protection](kernel-dma-protection-for-thunderbolt.md)| Kernel DMA Protection protects PCs against drive-by Direct Memory Access (DMA) attacks using PCI hot plug devices connected to PCI accessible ports, such as Thunderbolt™ 3 ports. | -| [Protect your enterprise data using Windows Information Protection (WIP)](windows-information-protection/protect-enterprise-data-using-wip.md)|Provides info about how to create a Windows Information Protection policy that can help protect against potential corporate data leakage.| -| [Secure the Windows 10 boot process](secure-the-windows-10-boot-process.md)| Windows 10 supports features to help prevent rootkits and bootkits from loading during the startup process. | -| [Trusted Platform Module](tpm/trusted-platform-module-top-node.md)| Trusted Platform Module (TPM) technology is designed to provide hardware-based, security-related functions. A TPM chip is a secure crypto-processor that helps you with actions such as generating, storing, and limiting the use of cryptographic keys. | diff --git a/windows/security/information-protection/kernel-dma-protection-for-thunderbolt.md b/windows/security/information-protection/kernel-dma-protection-for-thunderbolt.md index eb8db70020..f0503ef3a9 100644 --- a/windows/security/information-protection/kernel-dma-protection-for-thunderbolt.md +++ b/windows/security/information-protection/kernel-dma-protection-for-thunderbolt.md @@ -41,6 +41,8 @@ When Kernel DMA Protection is enabled: - Peripherals with DMA Remapping-compatible device drivers will be automatically enumerated and started - Peripherals with DMA Remapping-incompatible drivers will be blocked from starting if the peripheral was plugged in before an authorized user logs in, or while the screen is locked. Once the system is unlocked, the peripheral driver will be started by the OS, and the peripheral will continue to function normally until the system is rebooted, or the peripheral is unplugged. The peripheral will continue to function normally if the user locks the screen or signs out of the system. +[!INCLUDE [kernel-direct-memory-access-dma-protection](../../../includes/licensing/kernel-direct-memory-access-dma-protection.md)] + ## System compatibility Kernel DMA Protection requires UEFI firmware support, and Virtualization-based Security (VBS) isn't required. diff --git a/windows/security/information-protection/personal-data-encryption/overview-pde.md b/windows/security/information-protection/personal-data-encryption/overview-pde.md index a88c9d276a..c7efa3d342 100644 --- a/windows/security/information-protection/personal-data-encryption/overview-pde.md +++ b/windows/security/information-protection/personal-data-encryption/overview-pde.md @@ -23,6 +23,8 @@ ms.date: 03/13/2023 [!INCLUDE [Personal Data Encryption (PDE) description](includes/pde-description.md)] +[!INCLUDE [personal-data-encryption-pde](../../../../includes/licensing/personal-data-encryption-pde.md)] + ## Prerequisites ### Required diff --git a/windows/security/information-protection/pluton/microsoft-pluton-security-processor.md b/windows/security/information-protection/pluton/microsoft-pluton-security-processor.md index 5274334565..d2d8321257 100644 --- a/windows/security/information-protection/pluton/microsoft-pluton-security-processor.md +++ b/windows/security/information-protection/pluton/microsoft-pluton-security-processor.md @@ -18,7 +18,7 @@ ms.technology: itpro-security Microsoft Pluton security processor is a chip-to-cloud security technology built with [Zero Trust](/security/zero-trust/zero-trust-overview) principles at the core. Microsoft Pluton provides hardware-based root of trust, secure identity, secure attestation, and cryptographic services. Pluton technology is a combination of a secure subsystem which is part of the System on Chip (SoC) and Microsoft authored software that runs on this integrated secure subsystem. -Microsoft Pluton is currently available on devices with Ryzen 6000 and Qualcomm Snapdragon® 8cx Gen 3 series processors. Microsoft Pluton can be enabled on devices with Pluton capable processors running Windows 11, version 22H2. +Microsoft Pluton is currently available on devices with Ryzen 6000 and Qualcomm Snapdragon® 8cx Gen 3 series processors. Microsoft Pluton can be enabled on devices with Pluton capable processors running Windows 11, version 22H2. ## What is Microsoft Pluton? @@ -46,6 +46,8 @@ When the system boots, Pluton hardware initialization is performed by loading th ![Diagram showing the Microsoft Pluton Firmware load flow](../images/pluton/pluton-firmware-load.png) +[!INCLUDE [microsoft-pluton-security-processor](../../../../includes/licensing/microsoft-pluton-security-processor.md)] + ## Related topics [Microsoft Pluton as TPM](pluton-as-tpm.md) diff --git a/windows/security/information-protection/tpm/change-the-tpm-owner-password.md b/windows/security/information-protection/tpm/change-the-tpm-owner-password.md index facc36e2eb..86b7b524ed 100644 --- a/windows/security/information-protection/tpm/change-the-tpm-owner-password.md +++ b/windows/security/information-protection/tpm/change-the-tpm-owner-password.md @@ -1,5 +1,5 @@ --- -title: Change the TPM owner password (Windows) +title: Change the TPM owner password description: This topic for the IT professional describes how to change the password or PIN for the owner of the Trusted Platform Module (TPM) that is installed on your system. ms.prod: windows-client author: paolomatarazzo diff --git a/windows/security/information-protection/tpm/manage-tpm-commands.md b/windows/security/information-protection/tpm/manage-tpm-commands.md index 24f72081df..1a2512a41f 100644 --- a/windows/security/information-protection/tpm/manage-tpm-commands.md +++ b/windows/security/information-protection/tpm/manage-tpm-commands.md @@ -1,5 +1,5 @@ --- -title: Manage TPM commands (Windows) +title: Manage TPM commands description: This article for the IT professional describes how to manage which Trusted Platform Module (TPM) commands are available to domain users and to local users. ms.prod: windows-client author: paolomatarazzo diff --git a/windows/security/information-protection/tpm/manage-tpm-lockout.md b/windows/security/information-protection/tpm/manage-tpm-lockout.md index d89f660756..ba4962a98d 100644 --- a/windows/security/information-protection/tpm/manage-tpm-lockout.md +++ b/windows/security/information-protection/tpm/manage-tpm-lockout.md @@ -1,5 +1,5 @@ --- -title: Manage TPM lockout (Windows) +title: Manage TPM lockout description: This article for the IT professional describes how to manage the lockout feature for the Trusted Platform Module (TPM) in Windows. ms.prod: windows-client author: paolomatarazzo diff --git a/windows/security/information-protection/tpm/tpm-recommendations.md b/windows/security/information-protection/tpm/tpm-recommendations.md index 49ae107749..b90c535d06 100644 --- a/windows/security/information-protection/tpm/tpm-recommendations.md +++ b/windows/security/information-protection/tpm/tpm-recommendations.md @@ -1,5 +1,5 @@ --- -title: TPM recommendations (Windows) +title: TPM recommendations description: This topic provides recommendations for Trusted Platform Module (TPM) technology for Windows. ms.prod: windows-client author: paolomatarazzo @@ -52,7 +52,7 @@ TPM 2.0 products and systems have important security advantages over TPM 1.2, in - For the list of algorithms that Windows supports in the platform cryptographic storage provider, see [CNG Cryptographic Algorithm Providers](/windows/win32/seccertenroll/cng-cryptographic-algorithm-providers). - - TPM 2.0 achieved ISO standardization ([ISO/IEC 11889:2015](https://www.microsoft.com/security/blog/2015/06/29/governments-recognize-the-importance-of-tpm-2-0-through-iso-adoption). + - TPM 2.0 achieved ISO standardization ([ISO/IEC 11889:2015](https://www.microsoft.com/security/blog/2015/06/29/governments-recognize-the-importance-of-tpm-2-0-through-iso-adoption)). - Use of TPM 2.0 may help eliminate the need for OEMs to make exception to standard configurations for certain countries and regions. diff --git a/windows/security/information-protection/tpm/trusted-platform-module-overview.md b/windows/security/information-protection/tpm/trusted-platform-module-overview.md index 2c2f23d5cb..d3a0a6e2b7 100644 --- a/windows/security/information-protection/tpm/trusted-platform-module-overview.md +++ b/windows/security/information-protection/tpm/trusted-platform-module-overview.md @@ -50,6 +50,8 @@ Anti-malware software can use the boot measurements of the operating system star The TPM has several Group Policy settings that might be useful in certain enterprise scenarios. For more info, see [TPM Group Policy Settings](trusted-platform-module-services-group-policy-settings.md). +[!INCLUDE [trusted-platform-module-tpm-20](../../../../includes/licensing/trusted-platform-module-tpm-20.md)] + ## New and changed functionality For more info on new and changed functionality for Trusted Platform Module in Windows, see [What's new in Trusted Platform Module?](/windows/whats-new/whats-new-windows-10-version-1507-and-1511#trusted-platform-module) diff --git a/windows/security/information-protection/tpm/trusted-platform-module-services-group-policy-settings.md b/windows/security/information-protection/tpm/trusted-platform-module-services-group-policy-settings.md index beefbdf4be..60774172a4 100644 --- a/windows/security/information-protection/tpm/trusted-platform-module-services-group-policy-settings.md +++ b/windows/security/information-protection/tpm/trusted-platform-module-services-group-policy-settings.md @@ -1,5 +1,5 @@ --- -title: TPM Group Policy settings (Windows) +title: TPM Group Policy settings description: This topic describes the Trusted Platform Module (TPM) Services that can be controlled centrally by using Group Policy settings. ms.prod: windows-client author: paolomatarazzo diff --git a/windows/security/information-protection/tpm/trusted-platform-module-top-node.md b/windows/security/information-protection/tpm/trusted-platform-module-top-node.md index fb8113bcd3..016df0eaf9 100644 --- a/windows/security/information-protection/tpm/trusted-platform-module-top-node.md +++ b/windows/security/information-protection/tpm/trusted-platform-module-top-node.md @@ -1,5 +1,5 @@ --- -title: Trusted Platform Module (Windows) +title: Trusted Platform Module description: This topic for the IT professional provides links to information about the Trusted Platform Module (TPM) and how Windows uses it for access control and authentication. ms.prod: windows-client author: paolomatarazzo diff --git a/windows/security/information-protection/windows-information-protection/app-behavior-with-wip.md b/windows/security/information-protection/windows-information-protection/app-behavior-with-wip.md index 9c6f0e7bf8..11f11a6ce5 100644 --- a/windows/security/information-protection/windows-information-protection/app-behavior-with-wip.md +++ b/windows/security/information-protection/windows-information-protection/app-behavior-with-wip.md @@ -1,5 +1,5 @@ --- -title: Unenlightened and enlightened app behavior while using Windows Information Protection (WIP) (Windows 10) +title: Unenlightened and enlightened app behavior while using Windows Information Protection (WIP) description: Learn how unenlightened and enlightened apps might behave, based on Windows Information Protection (WIP) network policies, app configuration, and other criteria ms.prod: windows-client ms.localizationpriority: medium diff --git a/windows/security/information-protection/windows-information-protection/collect-wip-audit-event-logs.md b/windows/security/information-protection/windows-information-protection/collect-wip-audit-event-logs.md index 57ae3bc952..5cd04b1208 100644 --- a/windows/security/information-protection/windows-information-protection/collect-wip-audit-event-logs.md +++ b/windows/security/information-protection/windows-information-protection/collect-wip-audit-event-logs.md @@ -1,5 +1,5 @@ --- -title: How to collect Windows Information Protection (WIP) audit event logs (Windows 10) +title: How to collect Windows Information Protection (WIP) audit event logs description: How to collect & understand Windows Information Protection audit event logs via the Reporting configuration service provider (CSP) or Windows Event Forwarding. ms.prod: windows-client ms.localizationpriority: medium diff --git a/windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune-azure.md index f615270cec..f912dc23f0 100644 --- a/windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune-azure.md @@ -1,5 +1,5 @@ --- -title: Associate and deploy a VPN policy for Windows Information Protection (WIP) using the Azure portal for Microsoft Intune (Windows 10) +title: Associate and deploy a VPN policy for Windows Information Protection (WIP) using the Azure portal for Microsoft Intune description: After you've created and deployed your Windows Information Protection (WIP) policy, use Microsoft Intune to link it to your Virtual Private Network (VPN) policy ms.prod: windows-client ms.localizationpriority: medium diff --git a/windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune-azure.md index 763518df61..745f01da04 100644 --- a/windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/deploy-wip-policy-using-intune-azure.md @@ -1,5 +1,5 @@ --- -title: Deploy your Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune (Windows 10) +title: Deploy your Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune description: After you've created your Windows Information Protection (WIP) policy, you'll need to deploy it to your organization's enrolled devices. ms.prod: windows-client ms.localizationpriority: medium diff --git a/windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md b/windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md index e33efd5a86..198006483b 100644 --- a/windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md +++ b/windows/security/information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md @@ -1,5 +1,5 @@ --- -title: List of enlightened Microsoft apps for use with Windows Information Protection (WIP) (Windows 10) +title: List of enlightened Microsoft apps for use with Windows Information Protection (WIP) description: Learn the difference between enlightened and unenlightened apps. Find out which enlightened apps are provided by Microsoft. Learn how to allow-list them. ms.reviewer: ms.prod: windows-client diff --git a/windows/security/information-protection/windows-information-protection/guidance-and-best-practices-wip.md b/windows/security/information-protection/windows-information-protection/guidance-and-best-practices-wip.md index d7e91a25ce..b6358e6d30 100644 --- a/windows/security/information-protection/windows-information-protection/guidance-and-best-practices-wip.md +++ b/windows/security/information-protection/windows-information-protection/guidance-and-best-practices-wip.md @@ -1,5 +1,5 @@ --- -title: General guidance and best practices for Windows Information Protection (WIP) (Windows 10) +title: General guidance and best practices for Windows Information Protection (WIP) description: Find resources about apps that can work with Windows Information Protection (WIP) to protect data. Enlightened apps can tell corporate and personal data apart. ms.prod: windows-client ms.localizationpriority: medium diff --git a/windows/security/information-protection/windows-information-protection/mandatory-settings-for-wip.md b/windows/security/information-protection/windows-information-protection/mandatory-settings-for-wip.md index 2670396304..83eea4e8b9 100644 --- a/windows/security/information-protection/windows-information-protection/mandatory-settings-for-wip.md +++ b/windows/security/information-protection/windows-information-protection/mandatory-settings-for-wip.md @@ -1,5 +1,5 @@ --- -title: Mandatory tasks and settings required to turn on Windows Information Protection (WIP) (Windows 10) +title: Mandatory tasks and settings required to turn on Windows Information Protection (WIP) description: Review all of the tasks required for Windows to turn on Windows Information Protection (WIP), formerly enterprise data protection (EDP), in your enterprise. ms.prod: windows-client ms.localizationpriority: medium diff --git a/windows/security/information-protection/windows-information-protection/overview-create-wip-policy-configmgr.md b/windows/security/information-protection/windows-information-protection/overview-create-wip-policy-configmgr.md index 1ee0d46093..529715e6d2 100644 --- a/windows/security/information-protection/windows-information-protection/overview-create-wip-policy-configmgr.md +++ b/windows/security/information-protection/windows-information-protection/overview-create-wip-policy-configmgr.md @@ -1,5 +1,5 @@ --- -title: Create a Windows Information Protection (WIP) policy using Microsoft Configuration Manager (Windows 10) +title: Create a Windows Information Protection (WIP) policy using Microsoft Configuration Manager description: Microsoft Configuration Manager helps you create and deploy your enterprise data protection (WIP) policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network. ms.prod: windows-client ms.localizationpriority: medium diff --git a/windows/security/information-protection/windows-information-protection/overview-create-wip-policy.md b/windows/security/information-protection/windows-information-protection/overview-create-wip-policy.md index 7d74fb57ea..95ecaef6c6 100644 --- a/windows/security/information-protection/windows-information-protection/overview-create-wip-policy.md +++ b/windows/security/information-protection/windows-information-protection/overview-create-wip-policy.md @@ -1,5 +1,5 @@ --- -title: Create a Windows Information Protection (WIP) policy using Microsoft Intune (Windows 10) +title: Create a Windows Information Protection (WIP) policy using Microsoft Intune description: Microsoft Intune helps you create and deploy your enterprise data protection (WIP) policy. ms.reviewer: ms.prod: windows-client diff --git a/windows/security/information-protection/windows-information-protection/recommended-network-definitions-for-wip.md b/windows/security/information-protection/windows-information-protection/recommended-network-definitions-for-wip.md index 903e701613..46f941f6f7 100644 --- a/windows/security/information-protection/windows-information-protection/recommended-network-definitions-for-wip.md +++ b/windows/security/information-protection/windows-information-protection/recommended-network-definitions-for-wip.md @@ -1,5 +1,5 @@ --- -title: Recommended URLs for Windows Information Protection (Windows 10) +title: Recommended URLs for Windows Information Protection description: Recommended URLs to add to your Enterprise Cloud Resources and Neutral Resources network settings, when used with Windows Information Protection (WIP). ms.prod: windows-client ms.localizationpriority: medium diff --git a/windows/security/information-protection/windows-information-protection/testing-scenarios-for-wip.md b/windows/security/information-protection/windows-information-protection/testing-scenarios-for-wip.md index ea2cab423d..6ae2852d49 100644 --- a/windows/security/information-protection/windows-information-protection/testing-scenarios-for-wip.md +++ b/windows/security/information-protection/windows-information-protection/testing-scenarios-for-wip.md @@ -1,5 +1,5 @@ --- -title: Testing scenarios for Windows Information Protection (WIP) (Windows 10) +title: Testing scenarios for Windows Information Protection (WIP) description: A list of suggested testing scenarios that you can use to test Windows Information Protection (WIP) in your company. ms.reviewer: ms.prod: windows-client diff --git a/windows/security/information-protection/windows-information-protection/using-owa-with-wip.md b/windows/security/information-protection/windows-information-protection/using-owa-with-wip.md index ff1df3609e..43ac28801a 100644 --- a/windows/security/information-protection/windows-information-protection/using-owa-with-wip.md +++ b/windows/security/information-protection/windows-information-protection/using-owa-with-wip.md @@ -1,5 +1,5 @@ --- -title: Using Outlook on the web with WIP (Windows 10) +title: Using Outlook on the web with WIP description: Options for using Outlook on the web with Windows Information Protection (WIP). ms.prod: windows-client ms.localizationpriority: medium diff --git a/windows/security/information-protection/windows-information-protection/wip-app-enterprise-context.md b/windows/security/information-protection/windows-information-protection/wip-app-enterprise-context.md index 7404e870dc..f2c6ad57af 100644 --- a/windows/security/information-protection/windows-information-protection/wip-app-enterprise-context.md +++ b/windows/security/information-protection/windows-information-protection/wip-app-enterprise-context.md @@ -1,5 +1,5 @@ --- -title: Determine the Enterprise Context of an app running in Windows Information Protection (WIP) (Windows 10) +title: Determine the Enterprise Context of an app running in Windows Information Protection (WIP) description: Use the Task Manager to determine whether an app is considered work, personal or exempt by Windows Information Protection (WIP). ms.prod: windows-client ms.localizationpriority: medium diff --git a/windows/security/introduction/index.md b/windows/security/introduction/index.md new file mode 100644 index 0000000000..f051acac9f --- /dev/null +++ b/windows/security/introduction/index.md @@ -0,0 +1,57 @@ +--- +title: Introduction to Windows security +description: System security book. +ms.date: 04/24/2023 +ms.topic: tutorial +ms.author: paoloma +ms.custom: ai-gen-docs +author: paolomatarazzo +appliesto: + - ✅ Windows 11 +--- + +# Introduction to Windows security + +The acceleration of digital transformation and the expansion of both remote and hybrid work brings new opportunities to organizations, communities, and individuals. This expansion introduces new threats and risks. + +Organizations worldwide are adopting a **Zero Trust** security model based on the premise that no person or device anywhere can have access until safety and integrity is proven. Windows 11 is built on Zero Trust principles to enable hybrid productivity and new experiences anywhere, without compromising security. Windows 11 raises the [security baselines](../threat-protection/windows-security-configuration-framework/windows-security-baselines.md) with new requirements for advanced hardware and software protection that extends from chip to cloud. + +## How Windows 11 enables Zero Trust protection + +A Zero Trust security model gives the right people the right access at the right time. Zero Trust security is based on three principles: + +1. Reduce risk by explicitly verifying data points such as user identity, location, and device health for every access request, without exception +1. When verified, give people and devices access to only necessary resources for the necessary amount of time +1. Use continuous analytics to drive threat detection and improve defenses + +For Windows 11, the Zero Trust principle of *verify explicitly* applies to risks introduced by both devices and people. Windows 11 provides *chip-to-cloud security*, enabling IT administrators to implement strong authorization and authentication processes with features like [Windows Hello for Business](../identity-protection/hello-for-business/hello-overview.md). IT administrators also gain attestation and measurements for determining if a device meets requirements and can be trusted. Windows 11 works out-of-the-box with Microsoft Intune and Azure Active Directory, which enable timely and seamless access decisions. Furthermore, IT administrators can easily customize Windows to meet specific user and policy requirements for access, privacy, compliance, and more. + +### Security, by default + +Windows 11 is a natural evolution of its predecessor, Windows 10. We have collaborated with our manufacturer and silicon partners to incorporate extra hardware security measures that address the increasingly complex security threats of today. These measures not only enable the hybrid work and learning that many organizations now embrace but also help bolster our already strong foundation and resilience against attacks. + +### Enhanced hardware and operating system security + +With hardware-based isolation security that begins at the chip, Windows 11 stores sensitive data behind other barriers separated from the operating system. As a result, information including encryption keys and user credentials are protected from unauthorized access and tampering. + +In Windows 11, hardware and software work together to protect the operating system. For example, new devices come with [Virtualization-based security (VBS)](/windows-hardware/design/device-experiences/oem-vbs) and [Secure Boot](../trusted-boot.md) built-in and enabled by default to contain and limit malware exploits. + +### Robust application security and privacy controls + +To help keep personal and business information protected and private, Windows 11 has multiple layers of application security that safeguard critical data and code integrity. Application isolation and controls, code integrity, privacy controls, and least-privilege principles enable developers to build in security and privacy from the ground up. This integrated security protects against breaches and malware, helps keep data private, and gives IT administrators the controls they need. + +In Windows 11, [Microsoft Defender Application Guard](/windows-hardware/design/device-experiences/oem-app-guard) uses Hyper-V virtualization technology to isolate untrusted websites and Microsoft Office files in containers, separate from and unable to access the host operating system and enterprise data. To protect privacy, Windows 11 also provides more controls over which apps and features can collect and use data such as the device's location, or access resources like camera and microphone. + +### Secured identities + +Passwords have been an important part of digital security for a long time, and they're also a top target for cybercriminals. Windows 11 provides powerful protection against credential theft with chip-level hardware security. Credentials are protected by layers of hardware and software security such as [TPM 2.0](../information-protection/tpm/trusted-platform-module-overview.md), [VBS](/windows-hardware/design/device-experiences/oem-vbs), and/or [Windows Defender Credential Guard](../identity-protection/credential-guard/credential-guard.md), making it harder for attackers to steal credentials from a device. With [Windows Hello for Business](../identity-protection/hello-for-business/hello-overview.md), users can quickly sign in with face, fingerprint, or PIN for passwordless protection. Windows 11 also supports [FIDO2 security keys](/azure/active-directory/authentication/howto-authentication-passwordless-security-key) for passwordless authentication. + +### Connecting to cloud services + +Microsoft offers comprehensive cloud services for identity, storage, and access management in addition to the tools needed to attest that Windows devices connecting to your network are trustworthy. You can also enforce compliance and conditional access with a modern device management (MDM) service such as Microsoft Intune, which works with Azure Active Directory and Microsoft Azure Attestation to control access to applications and data through the cloud. + +## Next steps + +To learn more about the security features included in Windows 11, download the [Windows 11 Security Book: Powerful security from chip to cloud](https://aka.ms/Windows11SecurityBook). + +[!INCLUDE [ai-disclaimer-generic](../../../includes/ai-disclaimer-generic.md)] \ No newline at end of file diff --git a/windows/security/introduction/security-features-edition-requirements.md b/windows/security/introduction/security-features-edition-requirements.md new file mode 100644 index 0000000000..0cffb54f8f --- /dev/null +++ b/windows/security/introduction/security-features-edition-requirements.md @@ -0,0 +1,26 @@ +--- +title: Windows security features and edition requirements +description: Learn about Windows edition requirements for the feature included in Windows. +ms.prod: windows-client +author: paolomatarazzo +ms.author: paoloma +manager: aaroncz +ms.collection: +- tier3 +ms.topic: conceptual +ms.date: 05/04/2023 +appliesto: +- ✅ Windows 11 +ms.technology: itpro-security +--- + +# Windows security features and edition requirements + +This article lists the security features that are available in Windows, and the Windows editions that support them. + +> [!NOTE] +> The **Windows edition** requirements listed in the following table may be different from the **licensing** requirements. If you're looking for licensing requirements, see [Windows security features and licensing requirements](security-features-licensing-requirements.md). + +[!INCLUDE [_edition-requirements](../../../includes/licensing/_edition-requirements.md)] + +For more information about Windows licensing, see [Windows Commercial Licensing overview](/windows/whats-new/windows-licensing). diff --git a/windows/security/introduction/security-features-licensing-requirements.md b/windows/security/introduction/security-features-licensing-requirements.md new file mode 100644 index 0000000000..df7e5bdcec --- /dev/null +++ b/windows/security/introduction/security-features-licensing-requirements.md @@ -0,0 +1,26 @@ +--- +title: Windows security features and licensing requirements +description: Learn about Windows features and licensing requirements for the feature included in Windows. +ms.prod: windows-client +author: paolomatarazzo +ms.author: paoloma +manager: aaroncz +ms.collection: +- tier3 +ms.topic: conceptual +ms.date: 04/24/2023 +appliesto: +- ✅ Windows 11 +ms.technology: itpro-security +--- + +# Windows security features and licensing requirements + +This article lists the security features that are available in Windows, and the licensing requirements to use them. + +> [!NOTE] +> The **licensing** requirements listed in the following table may be different from the **Windows edition** requirements. If you're looking for Windows edition requirements, see [Windows security features and edition requirements](security-features-edition-requirements.md). + +[!INCLUDE [_licensing-requirements](../../../includes/licensing/_licensing-requirements.md)] + +For more information about Windows licensing, see [Windows Commercial Licensing overview](/windows/whats-new/windows-licensing). diff --git a/windows/security/operating-system-security/data-protection/configure-s-mime.md b/windows/security/operating-system-security/data-protection/configure-s-mime.md new file mode 100644 index 0000000000..578fd09c36 --- /dev/null +++ b/windows/security/operating-system-security/data-protection/configure-s-mime.md @@ -0,0 +1,73 @@ +--- +title: Configure S/MIME for Windows +description: S/MIME lets users encrypt outgoing messages and attachments so that only intended recipients with a digital ID, also known as a certificate, can read them. Learn how to configure S/MIME for Windows. +ms.topic: how-to +ms.date: 05/31/2023 +author: paolomatarazzo +ms.author: paoloma +--- + + +# Configure S/MIME for Windows + +Secure/Multipurpose Internet Mail Extensions (S/MIME) provides an added layer of security for email sent to and from an Exchange ActiveSync (EAS) account. S/MIME enables users to encrypt outgoing messages and attachments so that only intended recipients can read them. To read the messages, recipients must have a digital identification (ID), also known as a certificate.\ +Users can digitally sign a message, which provides the recipients with a way to verify the identity of the sender and that the message hasn't been tampered with. + +## Message encryption + +Users can send encrypted message to recipients that have an encryption certificate.\ +Users can only read encrypted messages if the message is received on their Exchange account, and they have corresponding decryption keys. + +Encrypted messages can be read only by recipients who have a certificate. If you try to send an encrypted message to recipients whose encryption certificate isn't available, the app prompts you to remove these recipients before sending the email. + +## Digital signatures + +A digitally signed message reassures the recipient that the message hasn't been tampered with, and verifies the identity of the sender. Recipients can only verify the digital signature if they're using an email client that supports S/MIME. + +[!INCLUDE [email-encryption-smime](../../../../includes/licensing/email-encryption-smime.md)] + +## Prerequisites + +- [S/MIME is enabled for Exchange accounts](/exchange/security-and-compliance/smime-exo/smime-exo) (on-premises and Exchange Online). Users can't use S/MIME signing and encryption with a personal account such as Outlook.com +- Valid Personal Information Exchange (PFX) certificates are installed on the device + - [How to Create PFX Certificate Profiles in Configuration Manager](/previous-versions/system-center/system-center-2012-R2/mt131410(v=technet.10)) + - [Use certificates for authentication in Microsoft Intune](/mem/intune/protect/certificates-configure) + +## Choose S/MIME settings + +On the device, perform the following steps: (add select certificate) + +1. Open the Mail app +1. Open **Settings > Email security** + :::image type="content" alt-text="Screenshot of the Windows Mail app, security settings." source="images/email-security.png"::: +1. In **Select an account**, select the account for which you want to configure S/MIME options +1. Make a certificate selection for digital signature and encryption + - Select **Automatically** to let the app choose the certificate + - Select **Manually** to specify the certificate yourself from the list of valid certificates on the device +1. (Optional) Select **Always sign with S/MIME**, **Always encrypt with S/MIME**, or both, to automatically digitally sign or encrypt all outgoing messages + + > [!NOTE] + > The option to sign or encrypt can be changed for individual messages, unless EAS policies prevent it. + +1. Select the back arrow + +## Encrypt or sign individual messages + +1. While composing a message, select **Options** from the ribbon +1. Use **Sign** and **Encrypt** icons to turn on digital signature and encryption for this message + + :::image type="content" alt-text="Screenshot of the Windows Mail app, showing the options to sign or encrypt message." source="images/sign-encrypt.png"::: + +## Read signed or encrypted messages + +When you receive an encrypted message, the mail app checks whether there's a certificate available on your computer. If there's a certificate available, the message is decrypted when you open it. If your certificate is stored on a smartcard, you'll be prompted to insert the smartcard to read the message. Your smartcard may also require a PIN to access the certificate. + +## Install certificates from a received message + +When you receive a signed email, the app provides a feature to install corresponding encryption certificate on your device if the certificate is available. This certificate can then be used to send encrypted email to this person. + +1. Open a signed email +1. Select the digital signature icon in the reading pane +1. Select **Install.** + + :::image type="content" alt-text="Screenshot of the Windows Mail app, showing a message to install the sender's encryption certificate." source="images/install-cert.png"::: diff --git a/windows/security/operating-system-security/data-protection/images/email-security.png b/windows/security/operating-system-security/data-protection/images/email-security.png new file mode 100644 index 0000000000..f8157ef180 Binary files /dev/null and b/windows/security/operating-system-security/data-protection/images/email-security.png differ diff --git a/windows/security/identity-protection/images/installcert.png b/windows/security/operating-system-security/data-protection/images/install-cert.png similarity index 100% rename from windows/security/identity-protection/images/installcert.png rename to windows/security/operating-system-security/data-protection/images/install-cert.png diff --git a/windows/security/identity-protection/images/signencrypt.png b/windows/security/operating-system-security/data-protection/images/sign-encrypt.png similarity index 100% rename from windows/security/identity-protection/images/signencrypt.png rename to windows/security/operating-system-security/data-protection/images/sign-encrypt.png diff --git a/windows/security/operating-system-security/data-protection/toc.yml b/windows/security/operating-system-security/data-protection/toc.yml new file mode 100644 index 0000000000..c85fb02887 --- /dev/null +++ b/windows/security/operating-system-security/data-protection/toc.yml @@ -0,0 +1,152 @@ +items: +- name: Overview + href: ../../encryption-data-protection.md +- name: BitLocker + href: ../../information-protection/bitlocker/bitlocker-overview.md + items: + - name: Overview of BitLocker Device Encryption in Windows + href: ../../information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10.md + - name: BitLocker frequently asked questions (FAQ) + href: ../../information-protection/bitlocker/bitlocker-frequently-asked-questions.yml + items: + - name: Overview and requirements + href: ../../information-protection/bitlocker/bitlocker-overview-and-requirements-faq.yml + - name: Upgrading + href: ../../information-protection/bitlocker/bitlocker-upgrading-faq.yml + - name: Deployment and administration + href: ../../information-protection/bitlocker/bitlocker-deployment-and-administration-faq.yml + - name: Key management + href: ../../information-protection/bitlocker/bitlocker-key-management-faq.yml + - name: BitLocker To Go + href: ../../information-protection/bitlocker/bitlocker-to-go-faq.yml + - name: Active Directory Domain Services + href: ../../information-protection/bitlocker/bitlocker-and-adds-faq.yml + - name: Security + href: ../../information-protection/bitlocker/bitlocker-security-faq.yml + - name: BitLocker Network Unlock + href: ../../information-protection/bitlocker/bitlocker-network-unlock-faq.yml + - name: General + href: ../../information-protection/bitlocker/bitlocker-using-with-other-programs-faq.yml + - name: "Prepare your organization for BitLocker: Planning and policies" + href: ../../information-protection/bitlocker/prepare-your-organization-for-bitlocker-planning-and-policies.md + - name: BitLocker deployment comparison + href: ../../information-protection/bitlocker/bitlocker-deployment-comparison.md + - name: BitLocker basic deployment + href: ../../information-protection/bitlocker/bitlocker-basic-deployment.md + - name: Deploy BitLocker on Windows Server 2012 and later + href: ../../information-protection/bitlocker/bitlocker-how-to-deploy-on-windows-server.md + - name: BitLocker management + href: ../../information-protection/bitlocker/bitlocker-management-for-enterprises.md + - name: Enable Network Unlock with BitLocker + href: ../../information-protection/bitlocker/bitlocker-how-to-enable-network-unlock.md + - name: Use BitLocker Drive Encryption Tools to manage BitLocker + href: ../../information-protection/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md + - name: Use BitLocker Recovery Password Viewer + href: ../../information-protection/bitlocker/bitlocker-use-bitlocker-recovery-password-viewer.md + - name: BitLocker Group Policy settings + href: ../../information-protection/bitlocker/bitlocker-group-policy-settings.md + - name: BCD settings and BitLocker + href: ../../information-protection/bitlocker/bcd-settings-and-bitlocker.md + - name: BitLocker Recovery Guide + href: ../../information-protection/bitlocker/bitlocker-recovery-guide-plan.md + - name: BitLocker Countermeasures + href: ../../information-protection/bitlocker/bitlocker-countermeasures.md + - name: Protecting cluster shared volumes and storage area networks with BitLocker + href: ../../information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md + - name: Troubleshoot BitLocker + items: + - name: Troubleshoot BitLocker + href: /troubleshoot/windows-client/windows-security/bitlocker-issues-troubleshooting + - name: "BitLocker cannot encrypt a drive: known issues" + href: /troubleshoot/windows-client/windows-security/bitlocker-cannot-encrypt-a-drive-known-issues + - name: "Enforcing BitLocker policies by using Intune: known issues" + href: /troubleshoot/windows-client/windows-security/enforcing-bitlocker-policies-by-using-intune-known-issues + - name: "BitLocker Network Unlock: known issues" + href: /troubleshoot/windows-client/windows-security/bitlocker-network-unlock-known-issues + - name: "BitLocker recovery: known issues" + href: /troubleshoot/windows-client/windows-security/bitlocker-recovery-known-issues + - name: "BitLocker configuration: known issues" + href: /troubleshoot/windows-client/windows-security/bitlocker-configuration-known-issues + - name: Troubleshoot BitLocker and TPM issues + items: + - name: "BitLocker cannot encrypt a drive: known TPM issues" + href: /troubleshoot/windows-client/windows-security/bitlocker-cannot-encrypt-a-drive-known-tpm-issues + - name: "BitLocker and TPM: other known issues" + href: /troubleshoot/windows-client/windows-security/bitlocker-and-tpm-other-known-issues + - name: Decode Measured Boot logs to track PCR changes + href: /troubleshoot/windows-client/windows-security/decode-measured-boot-logs-to-track-pcr-changes +- name: Encrypted Hard Drive + href: ../../information-protection/encrypted-hard-drive.md +- name: Personal Data Encryption (PDE) + items: + - name: Personal Data Encryption (PDE) overview + href: ../../information-protection/personal-data-encryption/overview-pde.md + - name: Personal Data Encryption (PDE) frequently asked questions (FAQ) + href: ../../information-protection/personal-data-encryption/faq-pde.yml + - name: Configure Personal Data Encryption (PDE) in Intune + items: + - name: Configure Personal Data Encryption (PDE) in Intune + href: ../../information-protection/personal-data-encryption/configure-pde-in-intune.md + - name: Enable Personal Data Encryption (PDE) + href: ../../information-protection/personal-data-encryption/pde-in-intune/intune-enable-pde.md + - name: Disable Winlogon automatic restart sign-on (ARSO) for PDE + href: ../../information-protection/personal-data-encryption/pde-in-intune/intune-disable-arso.md + - name: Disable kernel-mode crash dumps and live dumps for PDE + href: ../../information-protection/personal-data-encryption/pde-in-intune/intune-disable-memory-dumps.md + - name: Disable Windows Error Reporting (WER)/user-mode crash dumps for PDE + href: ../../information-protection/personal-data-encryption/pde-in-intune/intune-disable-wer.md + - name: Disable hibernation for PDE + href: ../../information-protection/personal-data-encryption/pde-in-intune/intune-disable-hibernation.md + - name: Disable allowing users to select when a password is required when resuming from connected standby for PDE + href: ../../information-protection/personal-data-encryption/pde-in-intune/intune-disable-password-connected-standby.md +- name: Configure S/MIME for Windows + href: configure-s-mime.md +- name: Windows Information Protection (WIP) + href: ../../information-protection/windows-information-protection/protect-enterprise-data-using-wip.md + items: + - name: Create a WIP policy using Microsoft Intune + href: ../../information-protection/windows-information-protection/overview-create-wip-policy.md + items: + - name: Create a WIP policy in Microsoft Intune + href: ../../information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md + items: + - name: Deploy your WIP policy in Microsoft Intune + href: ../../information-protection/windows-information-protection/deploy-wip-policy-using-intune-azure.md + - name: Associate and deploy a VPN policy for WIP in Microsoft Intune + href: ../../information-protection/windows-information-protection/create-vpn-and-wip-policy-using-intune-azure.md + - name: Create and verify an EFS Data Recovery Agent (DRA) certificate + href: ../../information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md + - name: Determine the enterprise context of an app running in WIP + href: ../../information-protection/windows-information-protection/wip-app-enterprise-context.md + - name: Create a WIP policy using Microsoft Configuration Manager + href: ../../information-protection/windows-information-protection/overview-create-wip-policy-configmgr.md + items: + - name: Create and deploy a WIP policy in Configuration Manager + href: ../../information-protection/windows-information-protection/create-wip-policy-using-configmgr.md + - name: Create and verify an EFS Data Recovery Agent (DRA) certificate + href: ../../information-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate.md + - name: Determine the enterprise context of an app running in WIP + href: ../../information-protection/windows-information-protection/wip-app-enterprise-context.md + - name: Mandatory tasks and settings required to turn on WIP + href: ../../information-protection/windows-information-protection/mandatory-settings-for-wip.md + - name: Testing scenarios for WIP + href: ../../information-protection/windows-information-protection/testing-scenarios-for-wip.md + - name: Limitations while using WIP + href: ../../information-protection/windows-information-protection/limitations-with-wip.md + - name: How to collect WIP audit event logs + href: ../../information-protection/windows-information-protection/collect-wip-audit-event-logs.md + - name: General guidance and best practices for WIP + href: ../../information-protection/windows-information-protection/guidance-and-best-practices-wip.md + items: + - name: Enlightened apps for use with WIP + href: ../../information-protection/windows-information-protection/enlightened-microsoft-apps-and-wip.md + - name: Unenlightened and enlightened app behavior while using WIP + href: ../../information-protection/windows-information-protection/app-behavior-with-wip.md + - name: Recommended Enterprise Cloud Resources and Neutral Resources network settings with WIP + href: ../../information-protection/windows-information-protection/recommended-network-definitions-for-wip.md + - name: Using Outlook Web Access with WIP + href: ../../information-protection/windows-information-protection/using-owa-with-wip.md + - name: Fine-tune WIP Learning + href: ../../information-protection/windows-information-protection/wip-learning.md + - name: Disable WIP + href: ../../information-protection/windows-information-protection/how-to-disable-wip.md \ No newline at end of file diff --git a/windows/security/operating-system-security/device-management/toc.yml b/windows/security/operating-system-security/device-management/toc.yml new file mode 100644 index 0000000000..239b2eb2a6 --- /dev/null +++ b/windows/security/operating-system-security/device-management/toc.yml @@ -0,0 +1,26 @@ +items: + - name: Security policy settings + href: ../../threat-protection/security-policy-settings/security-policy-settings.md + - name: Security auditing + href: ../../threat-protection/auditing/security-auditing-overview.md + - name: Secured-core configuration lock + href: /windows/client-management/config-lock + - name: Assigned Access (kiosk mode) + href: /windows/configuration/kiosk-methods + - name: Security baselines + href: ../../threat-protection/windows-security-configuration-framework/windows-security-baselines.md + items: + - name: Security Compliance Toolkit + href: ../../threat-protection/windows-security-configuration-framework/security-compliance-toolkit-10.md + - name: Get support + href: ../../threat-protection/windows-security-configuration-framework/get-support-for-security-baselines.md + - name: Guide to removing Microsoft Baseline Security Analyzer (MBSA) + href: ../../threat-protection/mbsa-removal-and-guidance.md + - name: More Windows security + items: + - name: Override Process Mitigation Options to help enforce app-related security policies + href: ../../threat-protection/override-mitigation-options-for-app-related-security-policies.md + - name: Use Windows Event Forwarding to help with intrusion detection + href: ../../threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection.md + - name: Block untrusted fonts in an enterprise + href: ../../threat-protection/block-untrusted-fonts-in-enterprise.md \ No newline at end of file diff --git a/windows/security/operating-system-security/network-security/toc.yml b/windows/security/operating-system-security/network-security/toc.yml new file mode 100644 index 0000000000..c62a6aaad4 --- /dev/null +++ b/windows/security/operating-system-security/network-security/toc.yml @@ -0,0 +1,17 @@ +items: + - name: Transport layer security (TLS) 🔗 + href: /windows-server/security/tls/tls-ssl-schannel-ssp-overview + - name: WiFi Security + href: https://support.microsoft.com/windows/faster-and-more-secure-wi-fi-in-windows-26177a28-38ed-1a8e-7eca-66f24dc63f09 + - name: Windows Firewall 🔗 + href: windows-firewall/windows-firewall-with-advanced-security.md + - name: Virtual Private Network (VPN) + href: vpn/toc.yml + - name: Always On VPN 🔗 + href: /windows-server/remote/remote-access/vpn/always-on-vpn/ + - name: Direct Access 🔗 + href: /windows-server/remote/remote-access/directaccess/directaccess + - name: Server Message Block (SMB) file service 🔗 + href: /windows-server/storage/file-server/file-server-smb-overview + - name: Server Message Block Direct (SMB Direct) 🔗 + href: /windows-server/storage/file-server/smb-direct \ No newline at end of file diff --git a/windows/security/identity-protection/vpn/how-to-configure-diffie-hellman-protocol-over-ikev2-vpn-connections.md b/windows/security/operating-system-security/network-security/vpn/how-to-configure-diffie-hellman-protocol-over-ikev2-vpn-connections.md similarity index 100% rename from windows/security/identity-protection/vpn/how-to-configure-diffie-hellman-protocol-over-ikev2-vpn-connections.md rename to windows/security/operating-system-security/network-security/vpn/how-to-configure-diffie-hellman-protocol-over-ikev2-vpn-connections.md diff --git a/windows/security/identity-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md b/windows/security/operating-system-security/network-security/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md similarity index 100% rename from windows/security/identity-protection/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md rename to windows/security/operating-system-security/network-security/vpn/how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md diff --git a/windows/security/operating-system-security/network-security/vpn/images/vpn-app-trigger.PNG b/windows/security/operating-system-security/network-security/vpn/images/vpn-app-trigger.PNG new file mode 100644 index 0000000000..16a6bcbbfc Binary files /dev/null and b/windows/security/operating-system-security/network-security/vpn/images/vpn-app-trigger.PNG differ diff --git a/windows/security/operating-system-security/network-security/vpn/images/vpn-connection-intune.png b/windows/security/operating-system-security/network-security/vpn/images/vpn-connection-intune.png new file mode 100644 index 0000000000..f3ab76439d Binary files /dev/null and b/windows/security/operating-system-security/network-security/vpn/images/vpn-connection-intune.png differ diff --git a/windows/security/identity-protection/vpn/images/vpn-connection.png b/windows/security/operating-system-security/network-security/vpn/images/vpn-connection.png similarity index 100% rename from windows/security/identity-protection/vpn/images/vpn-connection.png rename to windows/security/operating-system-security/network-security/vpn/images/vpn-connection.png diff --git a/windows/security/identity-protection/vpn/images/vpn-custom-xml-intune.png b/windows/security/operating-system-security/network-security/vpn/images/vpn-custom-xml-intune.png similarity index 100% rename from windows/security/identity-protection/vpn/images/vpn-custom-xml-intune.png rename to windows/security/operating-system-security/network-security/vpn/images/vpn-custom-xml-intune.png diff --git a/windows/security/identity-protection/vpn/images/vpn-device-compliance.png b/windows/security/operating-system-security/network-security/vpn/images/vpn-device-compliance.png similarity index 100% rename from windows/security/identity-protection/vpn/images/vpn-device-compliance.png rename to windows/security/operating-system-security/network-security/vpn/images/vpn-device-compliance.png diff --git a/windows/security/operating-system-security/network-security/vpn/images/vpn-eap-xml.png b/windows/security/operating-system-security/network-security/vpn/images/vpn-eap-xml.png new file mode 100644 index 0000000000..fd277c80a8 Binary files /dev/null and b/windows/security/operating-system-security/network-security/vpn/images/vpn-eap-xml.png differ diff --git a/windows/security/operating-system-security/network-security/vpn/images/vpn-name-intune.png b/windows/security/operating-system-security/network-security/vpn/images/vpn-name-intune.png new file mode 100644 index 0000000000..df0922e2b6 Binary files /dev/null and b/windows/security/operating-system-security/network-security/vpn/images/vpn-name-intune.png differ diff --git a/windows/security/operating-system-security/network-security/vpn/images/vpn-split.png b/windows/security/operating-system-security/network-security/vpn/images/vpn-split.png new file mode 100644 index 0000000000..882757f1b4 Binary files /dev/null and b/windows/security/operating-system-security/network-security/vpn/images/vpn-split.png differ diff --git a/windows/security/operating-system-security/network-security/vpn/images/vpn-traffic-rules.png b/windows/security/operating-system-security/network-security/vpn/images/vpn-traffic-rules.png new file mode 100644 index 0000000000..a1cbcd3226 Binary files /dev/null and b/windows/security/operating-system-security/network-security/vpn/images/vpn-traffic-rules.png differ diff --git a/windows/security/operating-system-security/network-security/vpn/toc.yml b/windows/security/operating-system-security/network-security/vpn/toc.yml new file mode 100644 index 0000000000..d160764ee0 --- /dev/null +++ b/windows/security/operating-system-security/network-security/vpn/toc.yml @@ -0,0 +1,25 @@ +items: + - name: Overview + href: vpn-guide.md + - name: VPN connection types + href: vpn-connection-type.md + - name: VPN routing decisions + href: vpn-routing.md + - name: VPN authentication options + href: vpn-authentication.md + - name: VPN and conditional access + href: vpn-conditional-access.md + - name: VPN name resolution + href: vpn-name-resolution.md + - name: VPN auto-triggered profile options + href: vpn-auto-trigger-profile.md + - name: VPN security features + href: vpn-security-features.md + - name: VPN profile options + href: vpn-profile-options.md + - name: How to configure Diffie Hellman protocol over IKEv2 VPN connections + href: how-to-configure-diffie-hellman-protocol-over-ikev2-vpn-connections.md + - name: How to use single sign-on (SSO) over VPN and Wi-Fi connections + href: how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md + - name: Optimizing Office 365 traffic with the Windows VPN client + href: vpn-office-365-optimization.md \ No newline at end of file diff --git a/windows/security/identity-protection/vpn/vpn-authentication.md b/windows/security/operating-system-security/network-security/vpn/vpn-authentication.md similarity index 96% rename from windows/security/identity-protection/vpn/vpn-authentication.md rename to windows/security/operating-system-security/network-security/vpn/vpn-authentication.md index c74740f325..1fc65b4198 100644 --- a/windows/security/identity-protection/vpn/vpn-authentication.md +++ b/windows/security/operating-system-security/network-security/vpn/vpn-authentication.md @@ -1,5 +1,5 @@ --- -title: VPN authentication options (Windows 10 and Windows 11) +title: VPN authentication options description: Learn about the EAP authentication methods that Windows supports in VPNs to provide secure authentication using username/password and certificate-based methods. ms.date: 09/23/2021 ms.topic: conceptual @@ -74,7 +74,7 @@ For a UWP VPN plug-in, the app vendor controls the authentication method to be u See [EAP configuration](/windows/client-management/mdm/eap-configuration) for EAP XML configuration. >[!NOTE] ->To configure Windows Hello for Business authentication, follow the steps in [EAP configuration](/windows/client-management/mdm/eap-configuration) to create a smart card certificate. [Learn more about Windows Hello for Business.](../hello-for-business/hello-identity-verification.md) +>To configure Windows Hello for Business authentication, follow the steps in [EAP configuration](/windows/client-management/mdm/eap-configuration) to create a smart card certificate. [Learn more about Windows Hello for Business.](../../../identity-protection/hello-for-business/hello-identity-verification.md). The following image shows the field for EAP XML in a Microsoft Intune VPN profile. The EAP XML field only appears when you select a built-in connection type (automatic, IKEv2, L2TP, PPTP). diff --git a/windows/security/operating-system-security/network-security/vpn/vpn-auto-trigger-profile.md b/windows/security/operating-system-security/network-security/vpn/vpn-auto-trigger-profile.md new file mode 100644 index 0000000000..9af27f73a3 --- /dev/null +++ b/windows/security/operating-system-security/network-security/vpn/vpn-auto-trigger-profile.md @@ -0,0 +1,90 @@ +--- +title: VPN auto-triggered profile options +description: With auto-triggered VPN profile options, Windows can automatically establish a VPN connection based on IT admin-defined rules. Learn about the types of auto-trigger rules that you can create for VPN connections. +ms.date: 05/24/2023 +ms.topic: conceptual +--- + +# VPN auto-triggered profile options + +Windows can use different features to auto-trigger VPN, avoiding users to manually connect when VPN is needed to access necessary resources. There are three different types of auto-trigger rules: + +- Application trigger +- Name-based trigger +- Always On + +> [!NOTE] +> Auto-triggered VPN connections won't work if **Folder Redirection** for **AppData** is enabled. Either Folder Redirection for AppData must be disabled, or the auto-triggered VPN profile must be deployed in SYSTEM context, which changes the path to where the *rasphone.pbk* file is stored. + +## Application trigger + +VPN profiles can be configured to automatically connect on the execution of certain applications: + +- You can configure desktop or Universal Windows Platform (UWP) apps to trigger a VPN connection +- You can configure per-app VPN and specify traffic rules for each app + +> [!NOTE] +> The app identifier for a desktop app is a file path. The app identifier for a UWP app is a package family name. +> +> [Find a package family name (PFN) for per-app VPN configuration](/mem/configmgr/protect/deploy-use/find-a-pfn-for-per-app-vpn) + +For more information, see [Traffic filters](vpn-security-features.md#traffic-filters). + +## Name-based trigger + +You can configure a domain name-based rule so that a specific domain name triggers the VPN connection.\ +Name-based auto-trigger can be configured using the `VPNv2//DomainNameInformationList/dniRowId/AutoTrigger` setting in the [VPNv2 Configuration Service Provider (CSP)](/windows/client-management/mdm/vpnv2-csp). + +There are four types of name-based triggers: + +- Short name: for example, if *HRweb* is configured as a trigger, and the stack sees a DNS resolution request for *HRweb*, the VPN triggers +- Fully qualified domain name (FQDN): for example, if *HRweb.corp.contoso.com* is configured as a trigger, and the stack sees a DNS resolution request for *HRweb.corp.contoso.com*, the VPN triggers +- Suffix: for example, if *.corp.contoso.com* is configured as a trigger, and the stack sees a DNS resolution request with a matching suffix (such as *HRweb.corp.contoso.com*), the VPN triggers. For any short name resolution, VPN triggers, and the DNS servers are queried for the *.corp.contoso.com* +- All: if used, all DNS resolution triggers VPN + +## Always On + +Always On is a Windows feature that enables the active VPN profile to connect automatically on the following triggers: + +- User sign-in +- Network change +- Device screen on + +When the trigger occurs, VPN tries to connect. If an error occurs, or any user input is needed, the user sees a toast notification for more interaction. + +When a device has multiple profiles with Always On triggers, the user can specify the active profile in **Settings > Network & Internet > VPN > ** by selecting the **Let apps automatically use this VPN connection** checkbox. By default, the first MDM-configured profile is marked as **Active**. Devices with multiple users have the same restriction: only one profile, and therefore only one user, is able to use the Always On triggers. + +## Preserving user Always On preference + +Another Windows feature is to preserve a user's Always On preference. If a user manually unchecks the **Connect automatically** checkbox, Windows remembers the user preference for the profile name by adding the profile name to the registry value *AutoTriggerDisabledProfilesList*. + +If a management tool removes or adds the same profile name back and set **AlwaysOn** to **true**, Windows doesn't check the box if the profile name exists in the following registry value, in order to preserve user preference. + +**Key:** `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasMan\Config`\ +**Value:** `AutoTriggerDisabledProfilesList`\ +**Type:** `REG_MULTI_SZ` + +## Trusted network detection + +The **Trusted network detection** feature configures the VPN so that connection isn't triggered when a device is on a trusted network. To configure Trusted network detection, you must provide a list of DNS suffixes. The VPN stack verifies the network name of the physical interface connection profile: if it matches any of the suffixes configured in the list and the network is private or provisioned by MDM, then VPN doesn't trigger. + +Trusted network detection can be configured using the `VPNv2//TrustedNetworkDetection` setting in the [VPNv2 CSP](/windows/client-management/mdm/vpnv2-csp). + +## Configure app-triggered VPN + +See [VPN profile options](vpn-profile-options.md) and [VPNv2 CSP](/windows/client-management/mdm/vpnv2-csp) for XML configuration. + +The following image shows associating apps to a VPN connection in a VPN Profile configuration policy using Microsoft Intune. + +:::image type="content" source="images/vpn-app-trigger.png" alt-text="Creation of VPN profile in Intune: application association options." lightbox="images/vpn-app-trigger.png"::: + +## Related articles + +- [VPN technical guide](vpn-guide.md) +- [VPN connection types](vpn-connection-type.md) +- [VPN routing decisions](vpn-routing.md) +- [VPN authentication options](vpn-authentication.md) +- [VPN and conditional access](vpn-conditional-access.md) +- [VPN name resolution](vpn-name-resolution.md) +- [VPN security features](vpn-security-features.md) +- [VPN profile options](vpn-profile-options.md) diff --git a/windows/security/identity-protection/vpn/vpn-conditional-access.md b/windows/security/operating-system-security/network-security/vpn/vpn-conditional-access.md similarity index 91% rename from windows/security/identity-protection/vpn/vpn-conditional-access.md rename to windows/security/operating-system-security/network-security/vpn/vpn-conditional-access.md index 392b5cf099..3dca76e27e 100644 --- a/windows/security/identity-protection/vpn/vpn-conditional-access.md +++ b/windows/security/operating-system-security/network-security/vpn/vpn-conditional-access.md @@ -1,7 +1,7 @@ --- -title: VPN and conditional access (Windows 10 and Windows 11) -description: Learn how to integrate the VPN client with the Conditional Access Platform, so you can create access rules for Azure Active Directory (Azure AD) connected apps. -ms.date: 09/23/2021 +title: VPN and conditional access +description: Learn how to integrate the VPN client with the Conditional Access platform, and how to create access rules for Azure Active Directory (Azure AD) connected apps. +ms.date: 05/23/2023 ms.topic: conceptual --- @@ -15,30 +15,25 @@ The VPN client is now able to integrate with the cloud-based Conditional Access Conditional Access Platform components used for Device Compliance include the following cloud-based services: - [Conditional Access Framework](/archive/blogs/tip_of_the_day/tip-of-the-day-the-conditional-access-framework-and-device-compliance-for-vpn) - - [Azure AD Connect Health](/azure/active-directory/connect-health/active-directory-aadconnect-health) - -- [Windows Health Attestation Service](../../threat-protection/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md#device-health-attestation) (optional) - +- [Windows Health Attestation Service](../../../threat-protection/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md#device-health-attestation) (optional) - Azure AD Certificate Authority - It is a requirement that the client certificate used for the cloud-based device compliance solution be issued by an Azure Active Directory-based Certificate Authority (CA). An Azure AD CA is essentially a mini-CA cloud tenant in Azure. The Azure AD CA cannot be configured as part of an on-premises Enterprise CA. See also [Always On VPN deployment for Windows Server and Windows 10](/windows-server/remote/remote-access/vpn/always-on-vpn/deploy/always-on-vpn-deploy). - - Azure AD-issued short-lived certificates - When a VPN connection attempt is made, the Azure AD Token Broker on the local device communicates with Azure Active Directory, which then checks for health based on compliance rules. If compliant, Azure AD sends back a short-lived certificate that is used to authenticate the VPN. Note that certificate authentication methods such as EAP-TLS can be used. When the client reconnects and determines that the certificate has expired, the client will again check with Azure AD for health validation before a new certificate is issued. - - [Microsoft Intune device compliance policies](/mem/intune/protect/device-compliance-get-started) - Cloud-based device compliance leverages Microsoft Intune Compliance Policies, which are capable of querying the device state and define compliance rules for the following, among other things. - - - Antivirus status - - Auto-update status and update compliance - - Password policy compliance - - Encryption compliance - - Device health attestation state (validated against attestation service after query) + - Antivirus status + - Auto-update status and update compliance + - Password policy compliance + - Encryption compliance + - Device health attestation state (validated against attestation service after query) The following client-side components are also required: + - [HealthAttestation Configuration Service Provider (CSP)](/windows/client-management/mdm/healthattestation-csp) - [VPNv2 CSP](/windows/client-management/mdm/vpnv2-csp) DeviceCompliance node settings - Trusted Platform Module (TPM) -## VPN device compliance +## VPN device compliance At this time, the Azure AD certificates issued to users do not contain a CRL Distribution Point (CDP) and are not suitable for Key Distribution Centers (KDCs) to issue Kerberos tokens. For users to gain access to on-premises resources such as files on a network share, client authentication certificates must be deployed to the Windows profiles of the users, and their VPNv2 profiles must contain the <SSO> section. @@ -47,7 +42,7 @@ Server-side infrastructure requirements to support VPN device compliance include - The VPN server should be configured for certificate authentication. - The VPN server should trust the tenant-specific Azure AD CA. - For client access using Kerberos/NTLM, a domain-trusted certificate is deployed to the client device and is configured to be used for single sign-on (SSO). - + After the server side is set up, VPN admins can add the policy settings for conditional access to the VPN profile using the VPNv2 DeviceCompliance node. Two client-side configuration service providers are leveraged for VPN device compliance. @@ -90,14 +85,12 @@ See [VPN profile options](vpn-profile-options.md) and [VPNv2 CSP](/windows/clien - [Azure Active Directory conditional access](/azure/active-directory/conditional-access/overview) - [Getting started with Azure Active Directory Conditional Access](/azure/active-directory/authentication/tutorial-enable-azure-mfa) -- [Control the health of Windows 10-based devices](../../threat-protection/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md) -- Control the health of Windows 11-based devices +- [Control the health of Windows devices](../../../threat-protection/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md) - [Tip of the Day: The Conditional Access Framework and Device Compliance for VPN (Part 1)](/archive/blogs/tip_of_the_day/tip-of-the-day-the-conditional-access-framework-and-device-compliance-for-vpn) - [Tip of the Day: The Conditional Access Framework and Device Compliance for VPN (Part 2)](/archive/blogs/tip_of_the_day/tip-of-the-day-the-conditional-access-framework-and-device-compliance-for-vpn-part-2) - [Tip of the Day: The Conditional Access Framework and Device Compliance for VPN (Part 3)](/archive/blogs/tip_of_the_day/tip-of-the-day-the-conditional-access-framework-and-device-compliance-for-vpn-part-3) - [Tip of the Day: The Conditional Access Framework and Device Compliance for VPN (Part 4)](/archive/blogs/tip_of_the_day/tip-of-the-day-the-conditional-access-framework-and-device-compliance-for-vpn-part-4) - ## Related topics - [VPN technical guide](vpn-guide.md) - [VPN connection types](vpn-connection-type.md) diff --git a/windows/security/operating-system-security/network-security/vpn/vpn-connection-type.md b/windows/security/operating-system-security/network-security/vpn/vpn-connection-type.md new file mode 100644 index 0000000000..686ae5380b --- /dev/null +++ b/windows/security/operating-system-security/network-security/vpn/vpn-connection-type.md @@ -0,0 +1,57 @@ +--- +title: VPN connection types (Windows 10 and Windows 11) +description: Learn about Windows VPN platform clients and the VPN connection-type features that can be configured. +ms.date: 05/24/2022 +ms.topic: conceptual +--- + +# VPN connection types + +VPNs are point-to-point connections across a private or public network, like the Internet. A VPN client uses special TCP/IP or UDP-based protocols, called *tunneling protocols*, to make a virtual call to a virtual port on a VPN server. In a typical VPN deployment, a client initiates a virtual point-to-point connection to a remote access server over the Internet. The remote access server answers the call, authenticates the caller, and transfers data between the VPN client and the organization's private network. + +There are many options for VPN clients. In Windows, the built-in plug-in and the Universal Windows Platform (UWP) VPN plug-in platform are built on top of the Windows VPN platform. This article focuses on the Windows VPN platform clients and the features that can be configured. + +![VPN connection types.](images/vpn-connection.png) + +## Built-in VPN client + +Tunneling protocols: +- [Internet Key Exchange version 2 (IKEv2)](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ff687731(v=ws.10)): configure the IPsec/IKE tunnel cryptographic properties using the **Cryptography Suite** setting in the [VPNv2 Configuration Service Provider (CSP)](/windows/client-management/mdm/vpnv2-csp). +- [L2TP](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ff687761(v=ws.10)): L2TP with pre-shared key (PSK) authentication can be configured using the **L2tpPsk** setting in the [VPNv2 CSP](/windows/client-management/mdm/vpnv2-csp). +- [PPTP](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ff687676(v=ws.10)) +- [SSTP](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ff687819(v=ws.10)): SSTP can't be configured using MDM, but it's one of the protocols attempted in the **Automatic** option + > [!NOTE] + > When a VPN plug-in is used, the adapter will be listed as an SSTP adapter, even though the VPN protocol used is the plug-in's protocol. + +- Automatic: the **Automatic** option means that the device tries each of the built-in tunneling protocols until one succeeds. It attempts from most secure to least secure. Configure **Automatic** for the **NativeProtocolType** setting in the [VPNv2 CSP](/windows/client-management/mdm/vpnv2-csp). + +## Universal Windows Platform VPN plug-in + +Using the UWP platform, third-party VPN providers can create app-containerized plug-ins using WinRT APIs, eliminating the complexity and problems often associated with writing to system-level drivers. + +There are many Universal Windows Platform VPN applications, such as Pulse Secure, Cisco AnyConnect, F5 Access, Sonicwall Mobile Connect, and Check Point Capsule. If you want to use a UWP VPN plug-in, work with your vendor for any custom settings needed to configure your VPN solution. + +## Configure connection type + +See [VPN profile options](vpn-profile-options.md) and [VPNv2 CSP](/windows/client-management/mdm/vpnv2-csp) for XML configuration. + +The following image shows connection options in a VPN Profile configuration policy using Microsoft Intune: + +> [!div class="mx-imgBorder"] +> ![Available connection types.](images/vpn-connection-intune.png) + +In Intune, you can also include custom XML for third-party plug-in profiles: + +> [!div class="mx-imgBorder"] +> ![Custom XML.](images/vpn-custom-xml-intune.png) + +## Related articles + +- [VPN technical guide](vpn-guide.md) +- [VPN routing decisions](vpn-routing.md) +- [VPN authentication options](vpn-authentication.md) +- [VPN and conditional access](vpn-conditional-access.md) +- [VPN name resolution](vpn-name-resolution.md) +- [VPN auto-triggered profile options](vpn-auto-trigger-profile.md) +- [VPN security features](vpn-security-features.md) +- [VPN profile options](vpn-profile-options.md) diff --git a/windows/security/identity-protection/vpn/vpn-guide.md b/windows/security/operating-system-security/network-security/vpn/vpn-guide.md similarity index 60% rename from windows/security/identity-protection/vpn/vpn-guide.md rename to windows/security/operating-system-security/network-security/vpn/vpn-guide.md index 15f788082b..66e09e5a4c 100644 --- a/windows/security/identity-protection/vpn/vpn-guide.md +++ b/windows/security/operating-system-security/network-security/vpn/vpn-guide.md @@ -1,19 +1,21 @@ --- -title: Windows VPN technical guide (Windows 10 and Windows 11) -description: Learn about decisions to make for Windows 10 or Windows 11 clients in your enterprise VPN solution and how to configure your deployment. -ms.date: 02/21/2022 +title: Windows VPN technical guide +description: Learn how to plan and configure Windows devices for your organization's VPN solution. +ms.date: 05/24/2023 ms.topic: conceptual --- # Windows VPN technical guide -This guide will walk you through the decisions you will make for Windows 10 or Windows 11 clients in your enterprise VPN solution and how to configure your deployment. This guide references the [VPNv2 Configuration Service Provider (CSP)](/windows/client-management/mdm/vpnv2-csp) and provides mobile device management (MDM) configuration instructions using Microsoft Intune and the VPN Profile template for Windows 10 and Windows 11. +This guide walks you through the decisions to make for Windows clients in your organization's VPN solution, and how to configure your devices. This guide references the [VPNv2 Configuration Service Provider (CSP)](/windows/client-management/mdm/vpnv2-csp) and provides mobile device management (MDM) configuration instructions using Microsoft Intune. -To create a Windows 10 VPN device configuration profile see: [Windows 10 and Windows Holographic device settings to add VPN connections using Intune](/mem/intune/configuration/vpn-settings-windows-10). +To create a Windows VPN device configuration profile see: [Windows device settings to add VPN connections using Intune](/mem/intune/configuration/vpn-settings-windows-10). > [!NOTE] > This guide does not explain server deployment. +[!INCLUDE [virtual-private-network-vpn](../../../../../includes/licensing/virtual-private-network-vpn.md)] + ## In this guide | Article | Description | @@ -27,7 +29,6 @@ To create a Windows 10 VPN device configuration profile see: [Windows 10 and Win | [VPN security features](vpn-security-features.md) | Configure traffic filtering, connect a VPN profile to Windows Information Protection (WIP), and more | | [VPN profile options](vpn-profile-options.md) | Combine settings into single VPN profile using XML | - ## Learn more - [Create VPN profiles to connect to VPN servers in Intune](/mem/intune/configuration/vpn-settings-configure) diff --git a/windows/security/operating-system-security/network-security/vpn/vpn-name-resolution.md b/windows/security/operating-system-security/network-security/vpn/vpn-name-resolution.md new file mode 100644 index 0000000000..406f11946c --- /dev/null +++ b/windows/security/operating-system-security/network-security/vpn/vpn-name-resolution.md @@ -0,0 +1,71 @@ +--- +title: VPN name resolution +description: Learn how name resolution works when using a VPN connection. +ms.date: 05/24/2023 +ms.topic: conceptual +--- + +# VPN name resolution + +When the VPN client establishes a connection, it receives an IP address and, optionally, the IP address of one or more DNS servers. + +The name resolution setting in the VPN profile determines how name resolution works on the system when the VPN connection is established: + +1. The network stack looks at the Name Resolution Policy table (NRPT) for any matches, and tries a resolution if a match is found +1. If no match is found, the DNS suffix on the most preferred interface based on the interface metric is appended to the name (if a short name is used). A DNS query is sent to the preferred interface +1. If the query times out, the DNS suffix search list is used in order and DNS queries are sent on all interfaces + +## Name Resolution Policy table (NRPT) + +The NRPT is a table of namespaces that determines the DNS client's behavior when issuing name resolution queries and processing responses. It's the first place that the stack will look after the DNSCache. + +There are three types of name matches that can set up for NRPT: + +- Fully qualified domain name (FQDN) that can be used for direct matching to a name +- Suffix match results in either a comparison of suffixes (for FQDN resolution) or the appending of the suffix (if using short name) +- Any resolution should attempt to first resolve with the proxy server/DNS server with this entry + +NRPT is set using the `VPNv2//DomainNameInformationList` node of the [VPNv2 CSP](/windows/client-management/mdm/vpnv2-csp). You can use the same node to configure a Web proxy server or DNS. + +To learn more about NRPT, see [Introduction to the NRPT](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ee649207(v=ws.10)). + +## DNS suffix + +The DNS suffix setting is used to configure the primary DNS suffix for the VPN interface and the suffix search list after the VPN connection is established. + +Primary DNS suffix is set using the `VPNv2//DnsSuffix` node. + +[Learn more about primaryDNS suffix](/previous-versions/windows/it-pro/windows-2000-server/cc959611(v=technet.10)) + +## Persistent name resolution rules + +You can configure *persistent* name resolution rules. Name resolution for the specified items is done over the VPN. + +Persistent name resolution is set using the `VPNv2//DomainNameInformationList//Persistent` node. + +## Configure name resolution + +See [VPN profile options](vpn-profile-options.md) and [VPNv2 CSP](/windows/client-management/mdm/vpnv2-csp) for XML configuration. + +The following image shows name resolution options in a VPN Profile configuration policy using Microsoft Intune. + +:::image type="content" source="images/vpn-name-intune.png" alt-text="Creation of VPN profile in Intune: DNS options." lightbox="images/vpn-name-intune.png"::: + +The fields in **Add or edit DNS rule** in the Intune profile correspond to the XML settings shown in the following table. + +| Field | XML | +| --- | --- | +| **Name** | **VPNv2/*ProfileName*/DomainNameInformationList/*dniRowId*/DomainName** | +| **Servers (comma separated)** | **VPNv2/*ProfileName*/DomainNameInformationList/*dniRowId*/DnsServers** | +| **Proxy server** | **VPNv2/*ProfileName*/DomainNameInformationList/*dniRowId*/WebServers** | + +## Related articles + +- [VPN technical guide](vpn-guide.md) +- [VPN connection types](vpn-connection-type.md) +- [VPN routing decisions](vpn-routing.md) +- [VPN authentication options](vpn-authentication.md) +- [VPN and conditional access](vpn-conditional-access.md) +- [VPN auto-triggered profile options](vpn-auto-trigger-profile.md) +- [VPN security features](vpn-security-features.md) +- [VPN profile options](vpn-profile-options.md) \ No newline at end of file diff --git a/windows/security/identity-protection/vpn/vpn-office-365-optimization.md b/windows/security/operating-system-security/network-security/vpn/vpn-office-365-optimization.md similarity index 86% rename from windows/security/identity-protection/vpn/vpn-office-365-optimization.md rename to windows/security/operating-system-security/network-security/vpn/vpn-office-365-optimization.md index 8eb30c7bce..8a1774472f 100644 --- a/windows/security/identity-protection/vpn/vpn-office-365-optimization.md +++ b/windows/security/operating-system-security/network-security/vpn/vpn-office-365-optimization.md @@ -1,17 +1,17 @@ --- -title: Optimizing Office 365 traffic for remote workers with the native Windows VPN client -description: Learn how to optimize Office 365 traffic for remote workers with the native Windows VPN client +title: Optimize Microsoft 365 traffic for remote workers with the Windows VPN client +description: Learn how to optimize Microsoft 365 traffic for remote workers with the Windows VPN client ms.topic: article -ms.date: 09/23/2021 +ms.date: 05/24/2023 --- -# Optimizing Office 365 traffic for remote workers with the native Windows 10 and Windows 11 VPN client +# Optimize Microsoft 365 traffic for remote workers with the Windows VPN client -This article describes how to configure the recommendations in the article [Optimize Office 365 connectivity for remote users using VPN split tunneling](/office365/enterprise/office-365-vpn-split-tunnel) for the *native Windows 10 and Windows 11 VPN client*. This guidance enables VPN administrators to optimize Office 365 usage while still ensuring that all other traffic goes over the VPN connection and through existing security gateways and tooling. +This article describes how to configure the recommendations in the article [VPN split tunneling for Microsoft 365](/microsoft-365/enterprise/microsoft-365-vpn-split-tunnel) for the Windows VPN client. This guidance enables VPN administrators to optimize Microsoft 365 usage while ensuring that all other traffic goes over the VPN connection and through existing security gateways or tooling. -This can be achieved for the native/built-in Windows 10 and Windows 11 VPN client using a _Force Tunneling with Exclusions_ approach. This allows you to define IP-based exclusions *even when using force tunneling* in order to "split" certain traffic to use the physical interface while still forcing all other traffic via the VPN interface. Traffic addressed to specifically defined destinations (like those listed in the Office 365 optimize categories) will therefore follow a much more direct and efficient path, without the need to traverse or "hairpin" via the VPN tunnel and back out of the corporate network. For cloud-services like Office 365, this makes a huge difference in performance and usability for remote users. +The recommendations can be implemented for the built-in Windows VPN client using a *Force Tunneling with Exclusions* approach, defining IP-based exclusions even when using *force tunneling*. Certain traffic can be *split* to use the physical interface, while still forcing all other traffic via the VPN interface. Traffic addressed to defined destinations (like those listed in the Microsoft 365 optimized categories) follows a much more direct and efficient path, without the need to traverse or *hairpin* via the VPN tunnel and back out of the organization's network. For cloud-services like Microsoft 365, this makes a significant difference in performance and usability for remote users. > [!NOTE] -> The term _force tunneling with exclusions_ is sometimes confusingly called "split tunnels" by other vendors and in some online documentation. For Windows 10 and Windows 11 VPN, the term _split tunneling_ is defined differently as described in the article [VPN routing decisions](./vpn-routing.md#split-tunnel-configuration). +> The term *force tunneling with exclusions* is sometimes confusingly called *split tunnels* by other vendors and in some online documentation. For Windows VPN, the term *split tunneling* is defined differently, as described in the article [VPN routing decisions](./vpn-routing.md#split-tunnel-configuration). ## Solution Overview @@ -35,9 +35,9 @@ In order to define specific force tunnel exclusions, you then need to add the fo ``` -Entries defined by the `[IP Addresses or Subnet]` and `[IP Prefix]` references will consequently be added to the routing table as _more specific route entries_ that will use the Internet-connected interface as the default gateway, as opposed to using the VPN interface. You will need to define a unique and separate `` section for each required exclusion. +Entries defined by the `[IP Addresses or Subnet]` and `[IP Prefix]` references will consequently be added to the routing table as _more specific route entries_ that will use the Internet-connected interface as the default gateway, as opposed to using the VPN interface. You must define a unique and separate `` section for each required exclusion. -An example of a correctly formatted Profile XML configuration for force tunnel with exclusions is shown below: +An example of a correctly formatted Profile XML configuration for force tunnel with exclusions is the following: ```xml @@ -62,11 +62,11 @@ An example of a correctly formatted Profile XML configuration for force tunnel w ## Solution Deployment -For Office 365, it is therefore necessary to add exclusions for all IP addresses documented within the optimize categories described in [Office 365 URLs and IP address ranges](/office365/enterprise/urls-and-ip-address-ranges) to ensure that they are excluded from VPN force tunneling. +For Microsoft 365, it's therefore necessary to add exclusions for all IP addresses documented within the optimize categories described in [Office 365 URLs and IP address ranges](/microsoft-365/enterprise/urls-and-ip-address-ranges) to ensure that they're excluded from VPN force tunneling. This can be achieved manually by adding the IP addresses defined within the *optimize* category entries to an existing Profile XML (or script) file, or alternatively the following script can be used which dynamically adds the required entries to an existing PowerShell script, or XML file, based upon directly querying the REST-based web service to ensure the correct IP address ranges are always used. -An example of a PowerShell script that can be used to update a force tunnel VPN connection with Office 365 exclusions is provided below. +An example of a PowerShell script that can be used to update a force tunnel VPN connection with Microsoft 365 exclusions is provided below. ```powershell # Copyright (c) Microsoft Corporation. All rights reserved. @@ -79,9 +79,9 @@ An example of a PowerShell script that can be used to update a force tunnel VPN <# .SYNOPSIS - Applies or updates recommended Office 365 optimize IP address exclusions to an existing force tunnel Windows 10 and Windows 11 VPN profile + Applies or updates recommended Microsoft 365 optimize IP address exclusions to an existing force tunnel Windows 10 and Windows 11 VPN profile .DESCRIPTION - Connects to the Office 365 worldwide commercial service instance endpoints to obtain the latest published IP address ranges + Connects to the Microsoft 365 worldwide commercial service instance endpoints to obtain the latest published IP address ranges Compares the optimized IP addresses with those contained in the supplied VPN Profile (PowerShell or XML file) Adds or updates IP addresses as necessary and saves the resultant file with "-NEW" appended to the file name .PARAMETERS @@ -170,7 +170,7 @@ if ( $VPNprofilefile -ne "" -and $FileExtension -eq ".ps1") } } -# Define Office 365 endpoints and service URLs # +# Define Microsoft 365 endpoints and service URLs # $ws = "https://endpoints.office.com" $baseServiceUrl = "https://endpoints.office.com" @@ -198,7 +198,7 @@ if ($version[0].latest -gt $lastVersion) { Write-Host - Write-Host "A new version of Office 365 worldwide commercial service instance endpoints has been detected!" -ForegroundColor Cyan + Write-Host "A new version of Microsoft 365 worldwide commercial service instance endpoints has been detected!" -ForegroundColor Cyan # Write the new version number to the data file # @($clientRequestId, $version[0].latest) | Out-File $datapath @@ -415,29 +415,13 @@ if ($VPNprofilefile -ne "" -and $FileExtension -eq ".xml") } ``` -## Version Support - -This solution is supported with the following versions of Windows: - -- Windows 11 -- Windows 10 1903/1909 and newer: Included, no action needed -- Windows 10 1809: At least [KB4490481](https://support.microsoft.com/help/4490481/windows-10-update-kb4490481) -- Windows 10 1803: At least [KB4493437](https://support.microsoft.com/help/4493437/windows-10-update-kb4493437) -- Windows 10 1709 and lower: Exclusion routes are not supported - -- Windows 10 Enterprise 2019 LTSC: At least [KB4490481](https://support.microsoft.com/help/4490481/windows-10-update-kb4490481) -- Windows 10 Enterprise 2016 LTSC: Exclusion routes are not supported -- Windows 10 Enterprise 2015 LTSC: Exclusion routes are not supported - -Microsoft strongly recommends that the latest available Windows 10 cumulative update always be applied. - ## Other Considerations You should also be able to adapt this approach to include necessary exclusions for other cloud-services that can be defined by known/static IP addresses; exclusions required for [Cisco WebEx](https://help.webex.com/WBX000028782/Network-Requirements-for-Webex-Teams-Services) or [Zoom](https://support.zoom.us/hc/en-us/articles/201362683) are good examples. ## Examples -An example of a PowerShell script that can be used to create a force tunnel VPN connection with Office 365 exclusions is provided below, or refer to the guidance in [Create the ProfileXML configuration files](/windows-server/remote/remote-access/vpn/always-on-vpn/deploy/vpn-deploy-client-vpn-connections#create-the-profilexml-configuration-files) to create the initial PowerShell script: +An example of a PowerShell script that can be used to create a force tunnel VPN connection with Microsoft 365 exclusions is provided below, or refer to the guidance in [Create the ProfileXML configuration files](/windows-server/remote/remote-access/vpn/always-on-vpn/deploy/vpn-deploy-client-vpn-connections#create-the-profilexml-configuration-files) to create the initial PowerShell script: ```powershell # Copyright (c) Microsoft Corporation. All rights reserved. @@ -462,7 +446,7 @@ An example of a PowerShell script that can be used to create a force tunnel VPN #> <#-- Define Key VPN Profile Parameters --#> -$ProfileName = 'Contoso VPN with Office 365 Exclusions' +$ProfileName = 'Contoso VPN with Microsoft 365 Exclusions' $ProfileNameEscaped = $ProfileName -replace ' ', '%20' <#-- Define VPN ProfileXML --#> @@ -656,7 +640,7 @@ Write-Host "$Message" ``` -An example of an [Intune-ready XML file](./vpn-profile-options.md#apply-profilexml-using-intune) that can be used to create a force tunnel VPN connection with Office 365 exclusions is provided below, or refer to the guidance in [Create the ProfileXML configuration files](/windows-server/remote/remote-access/vpn/always-on-vpn/deploy/vpn-deploy-client-vpn-connections#create-the-profilexml-configuration-files) to create the initial XML file. +An example of an [Intune-ready XML file](./vpn-profile-options.md#apply-profilexml-using-intune) that can be used to create a force tunnel VPN connection with Microsoft 365 exclusions is provided below, or refer to the guidance in [Create the ProfileXML configuration files](/windows-server/remote/remote-access/vpn/always-on-vpn/deploy/vpn-deploy-client-vpn-connections#create-the-profilexml-configuration-files) to create the initial XML file. >[!NOTE] >This XML is formatted for use with Intune and cannot contain any carriage returns or whitespace. diff --git a/windows/security/identity-protection/vpn/vpn-profile-options.md b/windows/security/operating-system-security/network-security/vpn/vpn-profile-options.md similarity index 99% rename from windows/security/identity-protection/vpn/vpn-profile-options.md rename to windows/security/operating-system-security/network-security/vpn/vpn-profile-options.md index 2ebbff5348..5c344676b6 100644 --- a/windows/security/identity-protection/vpn/vpn-profile-options.md +++ b/windows/security/operating-system-security/network-security/vpn/vpn-profile-options.md @@ -1,5 +1,5 @@ --- -title: VPN profile options (Windows 10 and Windows 11) +title: VPN profile options description: Windows adds Virtual Private Network (VPN) profile options to help manage how users connect. VPNs give users secure remote access to the company network. ms.date: 05/17/2018 ms.topic: conceptual diff --git a/windows/security/operating-system-security/network-security/vpn/vpn-routing.md b/windows/security/operating-system-security/network-security/vpn/vpn-routing.md new file mode 100644 index 0000000000..6931f683fd --- /dev/null +++ b/windows/security/operating-system-security/network-security/vpn/vpn-routing.md @@ -0,0 +1,55 @@ +--- +ms.date: 05/24/2023 +title: VPN routing decisions +description: Learn about approaches that either send all data through a VPN or only selected data. The one you choose impacts capacity planning and security expectations. +ms.topic: conceptual +--- +# VPN routing decisions + +Network routes are required for the stack to understand which interface to use for outbound traffic. One of the most important decision points for VPN configuration is whether you want to send all the data through VPN (*force tunnel*) or only some data through the VPN (*split tunnel*). The decision impacts the configuration, capacity planning, and security expectations from the connection. + +## Split tunnel configuration + +In a split tunnel configuration, routes can be specified to go over VPN and all other traffic will go over the physical interface. + +Routes can be configured using the `VPNv2//RouteList` setting in the [VPNv2 Configuration Service Provider (CSP)](/windows/client-management/mdm/vpnv2-csp). + +For each route item in the list, you can configure the following options: + +- **Address**: `VPNv2//RouteList//Address` +- **Prefix size**: `VPNv2//RouteList//Prefix` +- **Exclusion route**: V`VPNv2//RouteList//ExclusionRoute` + +With Windows VPN, you can specify exclusion routes that shouldn't go over the physical interface. + +Routes can also be added at connect time through the server for UWP VPN apps. + +## Force tunnel configuration + +In a force tunnel configuration, all traffic will go over VPN. Force tunnel is the default configuration, and takes effect when no routes are specified. + +The only implication of force tunnel is the manipulation of routing entries: VPN V4 and V6 default routes (for example *0.0.0.0/0*) are added to the routing table with a lower metric than ones for other interfaces. This configuration sends traffic through the VPN as long as there isn't a specific route on the physical interface: + +- For built-in VPN, the decision is controlled using the MDM setting `VPNv2/ProfileName/NativeProfile/RoutingPolicyType` +- For a UWP VPN plug-in, the app controls the property. If the VPN plug-in indicates the default route for IPv4 and IPv6 as the only two Inclusion routes, the VPN platform marks the connection as Force Tunneled + +## Configure routing + +See [VPN profile options](vpn-profile-options.md) and [VPNv2 CSP](/windows/client-management/mdm/vpnv2-csp) for XML configuration. + +When you configure a VPN profile in Microsoft Intune, you can enable split tunnel configuration: + +![split tunnel.](images/vpn-split.png) + +Once enabled, you can add the routes that should use the VPN connection. + +## Related articles + +- [VPN technical guide](vpn-guide.md) +- [VPN connection types](vpn-connection-type.md) +- [VPN authentication options](vpn-authentication.md) +- [VPN and conditional access](vpn-conditional-access.md) +- [VPN name resolution](vpn-name-resolution.md) +- [VPN auto-triggered profile options](vpn-auto-trigger-profile.md) +- [VPN security features](vpn-security-features.md) +- [VPN profile options](vpn-profile-options.md) \ No newline at end of file diff --git a/windows/security/operating-system-security/network-security/vpn/vpn-security-features.md b/windows/security/operating-system-security/network-security/vpn/vpn-security-features.md new file mode 100644 index 0000000000..4c7d2f87b4 --- /dev/null +++ b/windows/security/operating-system-security/network-security/vpn/vpn-security-features.md @@ -0,0 +1,68 @@ +--- +title: VPN security features +description: Learn about security features for VPN, including LockDown VPN and traffic filters. +ms.date: 05/24/2023 +ms.topic: conceptual +--- + +# VPN security features + +## Hyper-V based containers and VPN + +Windows supports different kinds of Hyper-V based containers, like Microsoft Defender Application Guard and Windows Sandbox. When you use a third party VPN solution, the Hyper-V based containers may not be able to seamlessly connect to the internet, and configuration changes may be needed to resolve connectivity issues. + +For example, read about the workaround for Cisco AnyConnect VPN: [Cisco AnyConnect Secure Mobility Client Administrator Guide: Connectivity issues with VM-based subsystems](https://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect410/administration/guide/b-anyconnect-admin-guide-4-10/troubleshoot-anyconnect.html#Cisco_Task_in_List_GUI.dita_3a9a8101-f034-4e9b-b24a-486ee47b5e9f). + +## Traffic Filters + +Traffic Filters enables organizations to decide what traffic is allowed into the corporate network based on policy. IT admins can use Traffic Filters to apply interface-specific firewall rules to the VPN Interface. + +There are two types of Traffic Filter rules: + +- **App-based rules** consist of a list of applications that can be marked to only allow traffic originating from the apps to the VPN interface +- **Traffic-based rules** consist of 5-tuple policies (ports, addresses, protocol) that can be specified to only allow traffic matching the rules to go through the VPN interface + +There can be sets of rules linked by *OR*. Within each set, there can be app-based rules and traffic-based rules.\ +All the properties within the set are linked by *AND*. The rules can be applied at a per-app level or a per-device level. + +For example, an IT admin could define rules that specify: + +- An *HR App* is allowed to go through the VPN and only access port *4545* +- The *Finance apps* are allowed to through the VPN and only access the Remote IP ranges of *10.10.0.40 - 10.10.0.201* on port *5889* +- All other apps on the device can only access ports *80* or *443* + +## Configure traffic filters + +See [VPN profile options](vpn-profile-options.md) and [VPNv2 CSP](/windows/client-management/mdm/vpnv2-csp) for XML configuration. + +The following image shows the interface to configure traffic rules in a VPN Profile configuration policy, using Microsoft Intune. + +:::image type="content" source="images/vpn-traffic-rules.png" alt-text="VPN profile creation from Microsoft Intune admin center." lightbox="images/vpn-traffic-rules.png"::: + +## LockDown VPN + +A VPN profile configured with LockDown secures the device to only allow network traffic over the VPN interface. It has the following features: + +- The system attempts to always keep the VPN connected +- The user can't disconnect the VPN connection +- The user can't delete or modify the VPN profile +- The VPN LockDown profile uses forced tunnel connection +- If the VPN connection isn't available, outbound network traffic is blocked +- Only one VPN LockDown profile is allowed on a device + +> [!NOTE] +> For built-in VPN, LockDown VPN is only available for the Internet Key Exchange version 2 (IKEv2) connection type. + +> [!CAUTION] +> Be careful when deploying LockDown VPN, as the resultant connection won't be able to send or receive any network traffic without the VPN connection being established. + +## Related articles + +- [VPN technical guide](vpn-guide.md) +- [VPN connection types](vpn-connection-type.md) +- [VPN routing decisions](vpn-routing.md) +- [VPN authentication options](vpn-authentication.md) +- [VPN and conditional access](vpn-conditional-access.md) +- [VPN name resolution](vpn-name-resolution.md) +- [VPN auto-triggered profile options](vpn-auto-trigger-profile.md) +- [VPN profile options](vpn-profile-options.md) diff --git a/windows/security/operating-system-security/network-security/windows-firewall/TOC.yml b/windows/security/operating-system-security/network-security/windows-firewall/TOC.yml new file mode 100644 index 0000000000..6057d602da --- /dev/null +++ b/windows/security/operating-system-security/network-security/windows-firewall/TOC.yml @@ -0,0 +1,252 @@ +items: + - name: Overview + href: windows-firewall-with-advanced-security.md + - name: Plan deployment + items: + - name: Design guide + href: windows-firewall-with-advanced-security-design-guide.md + - name: Design process + href: understanding-the-windows-firewall-with-advanced-security-design-process.md + - name: Implementation goals + items: + - name: Identify implementation goals + href: identifying-your-windows-firewall-with-advanced-security-deployment-goals.md + - name: Protect devices from unwanted network traffic + href: protect-devices-from-unwanted-network-traffic.md + - name: Restrict access to only trusted devices + href: restrict-access-to-only-trusted-devices.md + - name: Require encryption + href: require-encryption-when-accessing-sensitive-network-resources.md + - name: Restrict access + href: restrict-access-to-only-specified-users-or-devices.md + - name: Implementation designs + items: + - name: Mapping goals to a design + href: mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md + - name: Basic firewall design + href: basic-firewall-policy-design.md + items: + - name: Basic firewall design example + href: firewall-policy-design-example.md + - name: Domain isolation design + href: domain-isolation-policy-design.md + items: + - name: Domain isolation design example + href: domain-isolation-policy-design-example.md + - name: Server isolation design + href: server-isolation-policy-design.md + items: + - name: Server Isolation design example + href: server-isolation-policy-design-example.md + - name: Certificate-based isolation design + href: certificate-based-isolation-policy-design.md + items: + - name: Certificate-based Isolation design example + href: certificate-based-isolation-policy-design-example.md + - name: Design planning + items: + - name: Planning your design + href: planning-your-windows-firewall-with-advanced-security-design.md + - name: Planning settings for a basic firewall policy + href: planning-settings-for-a-basic-firewall-policy.md + - name: Planning domain isolation zones + items: + - name: Domain isolation zones + href: planning-domain-isolation-zones.md + - name: Exemption list + href: exemption-list.md + - name: Isolated domain + href: isolated-domain.md + - name: Boundary zone + href: boundary-zone.md + - name: Encryption zone + href: encryption-zone.md + - name: Planning server isolation zones + href: planning-server-isolation-zones.md + - name: Planning certificate-based authentication + href: planning-certificate-based-authentication.md + items: + - name: Documenting the Zones + href: documenting-the-zones.md + - name: Planning group policy deployment for your isolation zones + href: planning-group-policy-deployment-for-your-isolation-zones.md + items: + - name: Planning isolation groups for the zones + href: planning-isolation-groups-for-the-zones.md + - name: Planning network access groups + href: planning-network-access-groups.md + - name: Planning the GPOs + href: planning-the-gpos.md + items: + - name: Firewall GPOs + href: firewall-gpos.md + items: + - name: GPO_DOMISO_Firewall + href: gpo-domiso-firewall.md + - name: Isolated domain GPOs + href: isolated-domain-gpos.md + items: + - name: GPO_DOMISO_IsolatedDomain_Clients + href: gpo-domiso-isolateddomain-clients.md + - name: GPO_DOMISO_IsolatedDomain_Servers + href: gpo-domiso-isolateddomain-servers.md + - name: Boundary zone GPOs + href: boundary-zone-gpos.md + items: + - name: GPO_DOMISO_Boundary + href: gpo-domiso-boundary.md + - name: Encryption zone GPOs + href: encryption-zone-gpos.md + items: + - name: GPO_DOMISO_Encryption + href: gpo-domiso-encryption.md + - name: Server isolation GPOs + href: server-isolation-gpos.md + - name: Planning GPO deployment + href: planning-gpo-deployment.md + - name: Planning to deploy + href: planning-to-deploy-windows-firewall-with-advanced-security.md + - name: Deployment guide + items: + - name: Deployment overview + href: windows-firewall-with-advanced-security-deployment-guide.md + - name: Implementing your plan + href: implementing-your-windows-firewall-with-advanced-security-design-plan.md + - name: Basic firewall deployment + items: + - name: "Checklist: Implementing a basic firewall policy design" + href: checklist-implementing-a-basic-firewall-policy-design.md + - name: Domain isolation deployment + items: + - name: "Checklist: Implementing a Domain Isolation Policy Design" + href: checklist-implementing-a-domain-isolation-policy-design.md + - name: Server isolation deployment + items: + - name: "Checklist: Implementing a Standalone Server Isolation Policy Design" + href: checklist-implementing-a-standalone-server-isolation-policy-design.md + - name: Certificate-based authentication + items: + - name: "Checklist: Implementing a Certificate-based Isolation Policy Design" + href: checklist-implementing-a-certificate-based-isolation-policy-design.md + - name: Best practices + items: + - name: Configuring the firewall + href: best-practices-configuring.md + - name: Securing IPsec + href: securing-end-to-end-ipsec-connections-by-using-ikev2.md + - name: PowerShell + href: windows-firewall-with-advanced-security-administration-with-windows-powershell.md + - name: Isolating Microsoft Store Apps on Your Network + href: isolating-apps-on-your-network.md + - name: How-to + items: + - name: Add Production devices to the membership group for a zone + href: add-production-devices-to-the-membership-group-for-a-zone.md + - name: Add test devices to the membership group for a zone + href: add-test-devices-to-the-membership-group-for-a-zone.md + - name: Assign security group filters to the GPO + href: assign-security-group-filters-to-the-gpo.md + - name: Change rules from request to require mode + href: Change-Rules-From-Request-To-Require-Mode.Md + - name: Configure authentication methods + href: Configure-authentication-methods.md + - name: Configure data protection (Quick Mode) settings + href: configure-data-protection-quick-mode-settings.md + - name: Configure Group Policy to autoenroll and deploy certificates + href: configure-group-policy-to-autoenroll-and-deploy-certificates.md + - name: Configure key exchange (main mode) settings + href: configure-key-exchange-main-mode-settings.md + - name: Configure the rules to require encryption + href: configure-the-rules-to-require-encryption.md + - name: Configure the Windows Firewall log + href: configure-the-windows-firewall-log.md + - name: Configure the workstation authentication certificate template + href: configure-the-workstation-authentication-certificate-template.md + - name: Configure Windows Firewall to suppress notifications when a program is blocked + href: configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md + - name: Confirm that certificates are deployed correctly + href: confirm-that-certificates-are-deployed-correctly.md + - name: Copy a GPO to create a new GPO + href: copy-a-gpo-to-create-a-new-gpo.md + - name: Create a Group Account in Active Directory + href: create-a-group-account-in-active-directory.md + - name: Create a Group Policy Object + href: create-a-group-policy-object.md + - name: Create an authentication exemption list rule + href: create-an-authentication-exemption-list-rule.md + - name: Create an authentication request rule + href: create-an-authentication-request-rule.md + - name: Create an inbound ICMP rule + href: create-an-inbound-icmp-rule.md + - name: Create an inbound port rule + href: create-an-inbound-port-rule.md + - name: Create an inbound program or service rule + href: create-an-inbound-program-or-service-rule.md + - name: Create an outbound port rule + href: create-an-outbound-port-rule.md + - name: Create an outbound program or service rule + href: create-an-outbound-program-or-service-rule.md + - name: Create inbound rules to support RPC + href: create-inbound-rules-to-support-rpc.md + - name: Create WMI filters for the GPO + href: create-wmi-filters-for-the-gpo.md + - name: Create Windows Firewall rules in Intune + href: create-windows-firewall-rules-in-intune.md + - name: Enable predefined inbound rules + href: enable-predefined-inbound-rules.md + - name: Enable predefined outbound rules + href: enable-predefined-outbound-rules.md + - name: Exempt ICMP from authentication + href: exempt-icmp-from-authentication.md + - name: Link the GPO to the domain + href: link-the-gpo-to-the-domain.md + - name: Modify GPO filters + href: modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md + - name: Open IP security policies + href: open-the-group-policy-management-console-to-ip-security-policies.md + - name: Open Group Policy + href: open-the-group-policy-management-console-to-windows-firewall.md + - name: Open Group Policy + href: open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md + - name: Open Windows Firewall + href: open-windows-firewall-with-advanced-security.md + - name: Restrict server access + href: restrict-server-access-to-members-of-a-group-only.md + - name: Enable Windows Firewall + href: turn-on-windows-firewall-and-configure-default-behavior.md + - name: Verify Network Traffic + href: verify-that-network-traffic-is-authenticated.md + - name: References + items: + - name: "Checklist: Creating Group Policy objects" + href: checklist-creating-group-policy-objects.md + - name: "Checklist: Creating inbound firewall rules" + href: checklist-creating-inbound-firewall-rules.md + - name: "Checklist: Creating outbound firewall rules" + href: checklist-creating-outbound-firewall-rules.md + - name: "Checklist: Configuring basic firewall settings" + href: checklist-configuring-basic-firewall-settings.md + - name: "Checklist: Configuring rules for the isolated domain" + href: checklist-configuring-rules-for-the-isolated-domain.md + - name: "Checklist: Configuring rules for the boundary zone" + href: checklist-configuring-rules-for-the-boundary-zone.md + - name: "Checklist: Configuring rules for the encryption zone" + href: checklist-configuring-rules-for-the-encryption-zone.md + - name: "Checklist: Configuring rules for an isolated server zone" + href: checklist-configuring-rules-for-an-isolated-server-zone.md + - name: "Checklist: Configuring rules for servers in a standalone isolated server zone" + href: checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md + - name: "Checklist: Creating rules for clients of a standalone isolated server zone" + href: checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md + - name: "Appendix A: Sample GPO template files for settings used in this guide" + href: appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md + - name: Troubleshooting + items: + - name: Troubleshooting UWP app connectivity issues in Windows Firewall + href: troubleshooting-uwp-firewall.md + - name: Filter origin audit log improvements + href: filter-origin-documentation.md + - name: Quarantine behavior + href: quarantine.md + - name: Firewall settings lost on upgrade + href: firewall-settings-lost-on-upgrade.md \ No newline at end of file diff --git a/windows/security/threat-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone.md b/windows/security/operating-system-security/network-security/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone.md similarity index 91% rename from windows/security/threat-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone.md rename to windows/security/operating-system-security/network-security/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone.md index 25276608c2..ffdc421b72 100644 --- a/windows/security/threat-protection/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/add-production-devices-to-the-membership-group-for-a-zone.md @@ -1,12 +1,9 @@ --- -title: Add Production Devices to the Membership Group for a Zone (Windows) +title: Add Production Devices to the Membership Group for a Zone description: Learn how to add production devices to the membership group for a zone and refresh the group policy on the devices in the membership group. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Add Production Devices to the Membership Group for a Zone diff --git a/windows/security/threat-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone.md b/windows/security/operating-system-security/network-security/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone.md similarity index 88% rename from windows/security/threat-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone.md rename to windows/security/operating-system-security/network-security/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone.md index 632879c8fa..db692b1afa 100644 --- a/windows/security/threat-protection/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/add-test-devices-to-the-membership-group-for-a-zone.md @@ -1,12 +1,9 @@ --- -title: Add Test Devices to the Membership Group for a Zone (Windows) +title: Add Test Devices to the Membership Group for a Zone description: Learn how to add devices to the group for a zone to test whether your Windows Defender Firewall with Advanced Security implementation works as expected. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Add Test Devices to the Membership Group for a Zone diff --git a/windows/security/threat-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md b/windows/security/operating-system-security/network-security/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md similarity index 92% rename from windows/security/threat-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md rename to windows/security/operating-system-security/network-security/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md index 1d83bb85fd..09b4dfb941 100644 --- a/windows/security/threat-protection/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md @@ -1,12 +1,9 @@ --- -title: Appendix A Sample GPO Template Files for Settings Used in this Guide (Windows) +title: Appendix A Sample GPO Template Files for Settings Used in this Guide description: Use sample template files import an XML file containing customized registry preferences into a Group Policy Object (GPO). ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Appendix A: Sample GPO Template Files for Settings Used in this Guide diff --git a/windows/security/threat-protection/windows-firewall/assign-security-group-filters-to-the-gpo.md b/windows/security/operating-system-security/network-security/windows-firewall/assign-security-group-filters-to-the-gpo.md similarity index 91% rename from windows/security/threat-protection/windows-firewall/assign-security-group-filters-to-the-gpo.md rename to windows/security/operating-system-security/network-security/windows-firewall/assign-security-group-filters-to-the-gpo.md index c7559e5687..ece353e83c 100644 --- a/windows/security/threat-protection/windows-firewall/assign-security-group-filters-to-the-gpo.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/assign-security-group-filters-to-the-gpo.md @@ -1,5 +1,5 @@ --- -title: Assign Security Group Filters to the GPO (Windows) +title: Assign Security Group Filters to the GPO description: Learn how to use Group Policy Management MMC to assign security group filters to a GPO to make sure that the GPO is applied to the correct computers. ms.prod: windows-client ms.collection: @@ -7,9 +7,6 @@ ms.collection: - tier3 ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Assign Security Group Filters to the GPO diff --git a/windows/security/threat-protection/windows-firewall/basic-firewall-policy-design.md b/windows/security/operating-system-security/network-security/windows-firewall/basic-firewall-policy-design.md similarity index 94% rename from windows/security/threat-protection/windows-firewall/basic-firewall-policy-design.md rename to windows/security/operating-system-security/network-security/windows-firewall/basic-firewall-policy-design.md index 5c6763d795..5733a89690 100644 --- a/windows/security/threat-protection/windows-firewall/basic-firewall-policy-design.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/basic-firewall-policy-design.md @@ -1,11 +1,8 @@ --- -title: Basic Firewall Policy Design (Windows) +title: Basic Firewall Policy Design description: Protect the devices in your organization from unwanted network traffic that gets through the perimeter defenses by using basic firewall policy design. ms.prod: windows-client ms.topic: conceptual -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later ms.date: 12/31/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/best-practices-configuring.md b/windows/security/operating-system-security/network-security/windows-firewall/best-practices-configuring.md similarity index 97% rename from windows/security/threat-protection/windows-firewall/best-practices-configuring.md rename to windows/security/operating-system-security/network-security/windows-firewall/best-practices-configuring.md index e090a1ea53..1214df4042 100644 --- a/windows/security/threat-protection/windows-firewall/best-practices-configuring.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/best-practices-configuring.md @@ -7,9 +7,6 @@ ms.collection: - highpri - tier3 ms.topic: article -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Best practices for configuring Windows Defender Firewall diff --git a/windows/security/threat-protection/windows-firewall/boundary-zone-gpos.md b/windows/security/operating-system-security/network-security/windows-firewall/boundary-zone-gpos.md similarity index 85% rename from windows/security/threat-protection/windows-firewall/boundary-zone-gpos.md rename to windows/security/operating-system-security/network-security/windows-firewall/boundary-zone-gpos.md index fc07a5e4d8..16684e9cbd 100644 --- a/windows/security/threat-protection/windows-firewall/boundary-zone-gpos.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/boundary-zone-gpos.md @@ -1,12 +1,9 @@ --- -title: Boundary Zone GPOs (Windows) +title: Boundary Zone GPOs description: Learn about GPOs to create that must align with the group you create for the boundary zone in Windows Defender Firewall with Advanced Security. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Boundary Zone GPOs diff --git a/windows/security/threat-protection/windows-firewall/boundary-zone.md b/windows/security/operating-system-security/network-security/windows-firewall/boundary-zone.md similarity index 94% rename from windows/security/threat-protection/windows-firewall/boundary-zone.md rename to windows/security/operating-system-security/network-security/windows-firewall/boundary-zone.md index 4d101a8462..36a61d385c 100644 --- a/windows/security/threat-protection/windows-firewall/boundary-zone.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/boundary-zone.md @@ -1,12 +1,9 @@ --- -title: Boundary Zone (Windows) +title: Boundary Zone description: Learn how a boundary zone supports devices that must receive traffic from beyond an isolated domain in Windows Defender Firewall with Advanced Security. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Boundary Zone diff --git a/windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design-example.md b/windows/security/operating-system-security/network-security/windows-firewall/certificate-based-isolation-policy-design-example.md similarity index 93% rename from windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design-example.md rename to windows/security/operating-system-security/network-security/windows-firewall/certificate-based-isolation-policy-design-example.md index cdcbe5df44..64cb140f2e 100644 --- a/windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design-example.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/certificate-based-isolation-policy-design-example.md @@ -1,12 +1,9 @@ --- -title: Certificate-based Isolation Policy Design Example (Windows) +title: Certificate-based Isolation Policy Design Example description: This example uses a fictitious company to illustrate certificate-based isolation policy design in Windows Defender Firewall with Advanced Security. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Certificate-based Isolation Policy Design Example diff --git a/windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design.md b/windows/security/operating-system-security/network-security/windows-firewall/certificate-based-isolation-policy-design.md similarity index 90% rename from windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design.md rename to windows/security/operating-system-security/network-security/windows-firewall/certificate-based-isolation-policy-design.md index 8d72f5d261..1af80586c7 100644 --- a/windows/security/threat-protection/windows-firewall/certificate-based-isolation-policy-design.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/certificate-based-isolation-policy-design.md @@ -1,12 +1,9 @@ --- -title: Certificate-based Isolation Policy Design (Windows) +title: Certificate-based Isolation Policy Design description: Explore the methodology behind Certificate-based Isolation Policy Design and how it defers from Domain Isolation and Server Isolation Policy Design. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Certificate-based isolation policy design diff --git a/windows/security/threat-protection/windows-firewall/change-rules-from-request-to-require-mode.md b/windows/security/operating-system-security/network-security/windows-firewall/change-rules-from-request-to-require-mode.md similarity index 86% rename from windows/security/threat-protection/windows-firewall/change-rules-from-request-to-require-mode.md rename to windows/security/operating-system-security/network-security/windows-firewall/change-rules-from-request-to-require-mode.md index 0fe1d36358..12465d4121 100644 --- a/windows/security/threat-protection/windows-firewall/change-rules-from-request-to-require-mode.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/change-rules-from-request-to-require-mode.md @@ -1,12 +1,9 @@ --- -title: Change Rules from Request to Require Mode (Windows) +title: Change Rules from Request to Require Mode description: Learn how to convert a rule from request to require mode and apply the modified GPOs to the client devices. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Change Rules from Request to Require Mode diff --git a/windows/security/threat-protection/windows-firewall/checklist-configuring-basic-firewall-settings.md b/windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-basic-firewall-settings.md similarity index 77% rename from windows/security/threat-protection/windows-firewall/checklist-configuring-basic-firewall-settings.md rename to windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-basic-firewall-settings.md index b7488176fa..4fb018d543 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-configuring-basic-firewall-settings.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-basic-firewall-settings.md @@ -1,12 +1,9 @@ --- -title: Checklist Configuring Basic Firewall Settings (Windows) +title: Checklist Configuring Basic Firewall Settings description: Configure Windows Firewall to set inbound and outbound behavior, display notifications, record log files and more of the necessary function for Firewall. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Checklist: Configuring Basic Firewall Settings diff --git a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone.md b/windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone.md similarity index 93% rename from windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone.md rename to windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone.md index a10f355d7a..bc3c7307e6 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-an-isolated-server-zone.md @@ -1,12 +1,9 @@ --- -title: Checklist Configuring Rules for an Isolated Server Zone (Windows) +title: Checklist Configuring Rules for an Isolated Server Zone description: Use these tasks to configure connection security rules and IPsec settings in GPOs for servers in an isolated server zone that are part of an isolated domain. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Checklist: Configuring Rules for an Isolated Server Zone diff --git a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md b/windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md similarity index 93% rename from windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md rename to windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md index ad3c072c15..3157528b1b 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md @@ -1,12 +1,9 @@ --- -title: Checklist Configuring Rules for Servers in a Standalone Isolated Server Zone (Windows) +title: Checklist Configuring Rules for Servers in a Standalone Isolated Server Zone description: Checklist Configuring Rules for Servers in a Standalone Isolated Server Zone ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Checklist: Configuring Rules for Servers in a Standalone Isolated Server Zone diff --git a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone.md b/windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-the-boundary-zone.md similarity index 86% rename from windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone.md rename to windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-the-boundary-zone.md index e0f4a4d830..e25ea92a07 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-boundary-zone.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-the-boundary-zone.md @@ -1,12 +1,9 @@ --- -title: Checklist Configuring Rules for the Boundary Zone (Windows) +title: Checklist Configuring Rules for the Boundary Zone description: Use these tasks to configure connection security rules and IPsec settings in your GPOs to implement the boundary zone in an isolated domain. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Checklist: Configuring Rules for the Boundary Zone diff --git a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone.md b/windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-the-encryption-zone.md similarity index 86% rename from windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone.md rename to windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-the-encryption-zone.md index e026d05ea7..50823a255b 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-encryption-zone.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-the-encryption-zone.md @@ -1,12 +1,9 @@ --- -title: Checklist Configuring Rules for the Encryption Zone (Windows) +title: Checklist Configuring Rules for the Encryption Zone description: Use these tasks to configure connection security rules and IPsec settings in your GPOs to implement the encryption zone in an isolated domain. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Checklist: Configuring Rules for the Encryption Zone diff --git a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain.md b/windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-the-isolated-domain.md similarity index 89% rename from windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain.md rename to windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-the-isolated-domain.md index 553a621f37..6b3a358d07 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-configuring-rules-for-the-isolated-domain.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/checklist-configuring-rules-for-the-isolated-domain.md @@ -1,12 +1,9 @@ --- -title: Checklist Configuring Rules for the Isolated Domain (Windows) +title: Checklist Configuring Rules for the Isolated Domain description: Use these tasks to configure connection security rules and IPsec settings in your GPOs to implement the main zone in the isolated domain. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Checklist: Configuring Rules for the Isolated Domain diff --git a/windows/security/threat-protection/windows-firewall/checklist-creating-group-policy-objects.md b/windows/security/operating-system-security/network-security/windows-firewall/checklist-creating-group-policy-objects.md similarity index 93% rename from windows/security/threat-protection/windows-firewall/checklist-creating-group-policy-objects.md rename to windows/security/operating-system-security/network-security/windows-firewall/checklist-creating-group-policy-objects.md index 2db03bf2b4..82e9ed2a65 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-creating-group-policy-objects.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/checklist-creating-group-policy-objects.md @@ -1,12 +1,9 @@ --- -title: Checklist Creating Group Policy Objects (Windows) +title: Checklist Creating Group Policy Objects description: Learn to deploy firewall settings, IPsec settings, firewall rules, or connection security rules, by using Group Policy in AD DS. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Checklist: Creating Group Policy Objects diff --git a/windows/security/threat-protection/windows-firewall/checklist-creating-inbound-firewall-rules.md b/windows/security/operating-system-security/network-security/windows-firewall/checklist-creating-inbound-firewall-rules.md similarity index 78% rename from windows/security/threat-protection/windows-firewall/checklist-creating-inbound-firewall-rules.md rename to windows/security/operating-system-security/network-security/windows-firewall/checklist-creating-inbound-firewall-rules.md index 2358c7d807..38fdcd2fc4 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-creating-inbound-firewall-rules.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/checklist-creating-inbound-firewall-rules.md @@ -1,12 +1,9 @@ --- -title: Checklist Creating Inbound Firewall Rules (Windows) +title: Checklist Creating Inbound Firewall Rules description: Use these tasks for creating inbound firewall rules in your GPOs for Windows Defender Firewall with Advanced Security. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Checklist: Creating Inbound Firewall Rules diff --git a/windows/security/threat-protection/windows-firewall/checklist-creating-outbound-firewall-rules.md b/windows/security/operating-system-security/network-security/windows-firewall/checklist-creating-outbound-firewall-rules.md similarity index 82% rename from windows/security/threat-protection/windows-firewall/checklist-creating-outbound-firewall-rules.md rename to windows/security/operating-system-security/network-security/windows-firewall/checklist-creating-outbound-firewall-rules.md index e7f1a2a9ce..88c2eccca0 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-creating-outbound-firewall-rules.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/checklist-creating-outbound-firewall-rules.md @@ -1,12 +1,9 @@ --- -title: Checklist Creating Outbound Firewall Rules (Windows) +title: Checklist Creating Outbound Firewall Rules description: Use these tasks for creating outbound firewall rules in your GPOs for Windows Defender Firewall with Advanced Security. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Checklist: Creating Outbound Firewall Rules diff --git a/windows/security/threat-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md b/windows/security/operating-system-security/network-security/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md similarity index 90% rename from windows/security/threat-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md rename to windows/security/operating-system-security/network-security/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md index 1a5e7d2ae6..ebd45a7ede 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md @@ -1,12 +1,9 @@ --- -title: Create Rules for Standalone Isolated Server Zone Clients (Windows) +title: Create Rules for Standalone Isolated Server Zone Clients description: Checklist for when creating rules for clients of a Standalone Isolated Server Zone ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Checklist: Creating Rules for Clients of a Standalone Isolated Server Zone diff --git a/windows/security/threat-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design.md b/windows/security/operating-system-security/network-security/windows-firewall/checklist-implementing-a-basic-firewall-policy-design.md similarity index 91% rename from windows/security/threat-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design.md rename to windows/security/operating-system-security/network-security/windows-firewall/checklist-implementing-a-basic-firewall-policy-design.md index 4a7816bc4d..7432f4448f 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-implementing-a-basic-firewall-policy-design.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/checklist-implementing-a-basic-firewall-policy-design.md @@ -1,12 +1,9 @@ --- -title: Checklist Implementing a Basic Firewall Policy Design (Windows) +title: Checklist Implementing a Basic Firewall Policy Design description: Follow this parent checklist for implementing a basic firewall policy design to ensure successful implementation. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Checklist: Implementing a Basic Firewall Policy Design diff --git a/windows/security/threat-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design.md b/windows/security/operating-system-security/network-security/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design.md similarity index 88% rename from windows/security/threat-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design.md rename to windows/security/operating-system-security/network-security/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design.md index 75e334503f..a0fabcc4f5 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/checklist-implementing-a-certificate-based-isolation-policy-design.md @@ -1,12 +1,9 @@ --- -title: Checklist Implementing a Certificate-based Isolation Policy Design (Windows) +title: Checklist Implementing a Certificate-based Isolation Policy Design description: Use these references to learn about using certificates as an authentication option and configure a certificate-based isolation policy design. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Checklist: Implementing a Certificate-based Isolation Policy Design diff --git a/windows/security/threat-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design.md b/windows/security/operating-system-security/network-security/windows-firewall/checklist-implementing-a-domain-isolation-policy-design.md similarity index 89% rename from windows/security/threat-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design.md rename to windows/security/operating-system-security/network-security/windows-firewall/checklist-implementing-a-domain-isolation-policy-design.md index 922dc06a9f..dfd0e45e2c 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-implementing-a-domain-isolation-policy-design.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/checklist-implementing-a-domain-isolation-policy-design.md @@ -1,12 +1,9 @@ --- -title: Checklist Implementing a Domain Isolation Policy Design (Windows) +title: Checklist Implementing a Domain Isolation Policy Design description: Use these references to learn about the domain isolation policy design and links to other checklists to complete tasks require to implement this design. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Checklist: Implementing a Domain Isolation Policy Design diff --git a/windows/security/threat-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design.md b/windows/security/operating-system-security/network-security/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design.md similarity index 90% rename from windows/security/threat-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design.md rename to windows/security/operating-system-security/network-security/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design.md index e283e43a55..f015a7e0c1 100644 --- a/windows/security/threat-protection/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/checklist-implementing-a-standalone-server-isolation-policy-design.md @@ -1,12 +1,9 @@ --- -title: Checklist Implementing a Standalone Server Isolation Policy Design (Windows) +title: Checklist Implementing a Standalone Server Isolation Policy Design description: Use these tasks to create a server isolation policy design that isn't part of an isolated domain. See references to concepts and links to other checklists. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Checklist: Implementing a Standalone Server Isolation Policy Design diff --git a/windows/security/threat-protection/windows-firewall/configure-authentication-methods.md b/windows/security/operating-system-security/network-security/windows-firewall/configure-authentication-methods.md similarity index 93% rename from windows/security/threat-protection/windows-firewall/configure-authentication-methods.md rename to windows/security/operating-system-security/network-security/windows-firewall/configure-authentication-methods.md index 5dd682de3c..96a9db2d70 100644 --- a/windows/security/threat-protection/windows-firewall/configure-authentication-methods.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/configure-authentication-methods.md @@ -1,12 +1,9 @@ --- -title: Configure Authentication Methods (Windows) +title: Configure Authentication Methods description: Learn how to configure authentication methods for devices in an isolated domain or standalone server zone in Windows Defender Firewall with Advanced Security. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Configure Authentication Methods diff --git a/windows/security/threat-protection/windows-firewall/configure-data-protection-quick-mode-settings.md b/windows/security/operating-system-security/network-security/windows-firewall/configure-data-protection-quick-mode-settings.md similarity index 93% rename from windows/security/threat-protection/windows-firewall/configure-data-protection-quick-mode-settings.md rename to windows/security/operating-system-security/network-security/windows-firewall/configure-data-protection-quick-mode-settings.md index b9b04feed8..a8f2bc0f33 100644 --- a/windows/security/threat-protection/windows-firewall/configure-data-protection-quick-mode-settings.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/configure-data-protection-quick-mode-settings.md @@ -1,12 +1,9 @@ --- -title: Configure Data Protection (Quick Mode) Settings (Windows) +title: Configure Data Protection (Quick Mode) Settings description: Learn how to configure the data protection settings for connection security rules in an isolated domain or a standalone isolated server zone. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Configure Data Protection (Quick Mode) Settings diff --git a/windows/security/threat-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates.md b/windows/security/operating-system-security/network-security/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates.md similarity index 84% rename from windows/security/threat-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates.md rename to windows/security/operating-system-security/network-security/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates.md index 365f1423db..f049b2e663 100644 --- a/windows/security/threat-protection/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/configure-group-policy-to-autoenroll-and-deploy-certificates.md @@ -1,12 +1,9 @@ --- -title: Configure Group Policy to Autoenroll and Deploy Certificates (Windows) +title: Configure Group Policy to Autoenroll and Deploy Certificates description: Learn how to configure Group Policy to automatically enroll client computer certificates and deploy them to the workstations on your network. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Configure Group Policy to Autoenroll and Deploy Certificates diff --git a/windows/security/threat-protection/windows-firewall/configure-key-exchange-main-mode-settings.md b/windows/security/operating-system-security/network-security/windows-firewall/configure-key-exchange-main-mode-settings.md similarity index 91% rename from windows/security/threat-protection/windows-firewall/configure-key-exchange-main-mode-settings.md rename to windows/security/operating-system-security/network-security/windows-firewall/configure-key-exchange-main-mode-settings.md index 83ef251330..02ffc24817 100644 --- a/windows/security/threat-protection/windows-firewall/configure-key-exchange-main-mode-settings.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/configure-key-exchange-main-mode-settings.md @@ -1,12 +1,9 @@ --- -title: Configure Key Exchange (Main Mode) Settings (Windows) +title: Configure Key Exchange (Main Mode) Settings description: Learn how to configure the main mode key exchange settings used to secure the IPsec authentication traffic in Windows Defender Firewall with Advanced Security. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Configure Key Exchange (Main Mode) Settings diff --git a/windows/security/threat-protection/windows-firewall/configure-the-rules-to-require-encryption.md b/windows/security/operating-system-security/network-security/windows-firewall/configure-the-rules-to-require-encryption.md similarity index 90% rename from windows/security/threat-protection/windows-firewall/configure-the-rules-to-require-encryption.md rename to windows/security/operating-system-security/network-security/windows-firewall/configure-the-rules-to-require-encryption.md index 1bb9ff6c3c..ce9b0f15ce 100644 --- a/windows/security/threat-protection/windows-firewall/configure-the-rules-to-require-encryption.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/configure-the-rules-to-require-encryption.md @@ -1,12 +1,9 @@ --- -title: Configure the Rules to Require Encryption (Windows) +title: Configure the Rules to Require Encryption description: Learn how to configure rules to add encryption algorithms and delete the algorithm combinations that don't use encryption for zones that require encryption. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Configure the Rules to Require Encryption diff --git a/windows/security/threat-protection/windows-firewall/configure-the-windows-firewall-log.md b/windows/security/operating-system-security/network-security/windows-firewall/configure-the-windows-firewall-log.md similarity index 88% rename from windows/security/threat-protection/windows-firewall/configure-the-windows-firewall-log.md rename to windows/security/operating-system-security/network-security/windows-firewall/configure-the-windows-firewall-log.md index 74f57aec8b..2912122082 100644 --- a/windows/security/threat-protection/windows-firewall/configure-the-windows-firewall-log.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/configure-the-windows-firewall-log.md @@ -1,12 +1,9 @@ --- -title: Configure the Windows Defender Firewall Log (Windows) +title: Configure the Windows Defender Firewall Log description: Learn how to configure Windows Defender Firewall with Advanced Security to log dropped packets or successful connections by using Group Policy Management MMC. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Configure the Windows Defender Firewall with Advanced Security Log diff --git a/windows/security/threat-protection/windows-firewall/configure-the-workstation-authentication-certificate-template.md b/windows/security/operating-system-security/network-security/windows-firewall/configure-the-workstation-authentication-certificate-template.md similarity index 88% rename from windows/security/threat-protection/windows-firewall/configure-the-workstation-authentication-certificate-template.md rename to windows/security/operating-system-security/network-security/windows-firewall/configure-the-workstation-authentication-certificate-template.md index c10e472cbc..fe9d417849 100644 --- a/windows/security/threat-protection/windows-firewall/configure-the-workstation-authentication-certificate-template.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/configure-the-workstation-authentication-certificate-template.md @@ -1,11 +1,8 @@ --- -title: Configure the Workstation Authentication Template (Windows) +title: Configure the Workstation Authentication Template description: Learn how to configure a workstation authentication certificate template, which is used for device certificates that are enrolled and deployed to workstations. ms.prod: windows-client ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later ms.topic: conceptual --- diff --git a/windows/security/threat-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md b/windows/security/operating-system-security/network-security/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md similarity index 87% rename from windows/security/threat-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md rename to windows/security/operating-system-security/network-security/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md index de731f58a0..fe75296fec 100644 --- a/windows/security/threat-protection/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md @@ -1,12 +1,9 @@ --- -title: Configure Windows Defender Firewall with Advanced Security to Suppress Notifications When a Program is Blocked (Windows) +title: Configure Windows Defender Firewall with Advanced Security to Suppress Notifications When a Program is Blocked description: Configure Windows Defender Firewall with Advanced Security to suppress notifications when a program is Blocked ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Configure Windows Defender Firewall with Advanced Security to Suppress Notifications When a Program Is Blocked diff --git a/windows/security/threat-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly.md b/windows/security/operating-system-security/network-security/windows-firewall/confirm-that-certificates-are-deployed-correctly.md similarity index 79% rename from windows/security/threat-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly.md rename to windows/security/operating-system-security/network-security/windows-firewall/confirm-that-certificates-are-deployed-correctly.md index 54b9527285..dcca043129 100644 --- a/windows/security/threat-protection/windows-firewall/confirm-that-certificates-are-deployed-correctly.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/confirm-that-certificates-are-deployed-correctly.md @@ -1,12 +1,9 @@ --- -title: Confirm That Certificates Are Deployed Correctly (Windows) +title: Confirm That Certificates Are Deployed Correctly description: Learn how to confirm that a Group Policy is being applied as expected and that the certificates are being properly installed on the workstations. ms.prod: windows-client ms.topic: conceptual ms.date: 01/24/2023 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Confirm That Certificates Are Deployed Correctly diff --git a/windows/security/threat-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo.md b/windows/security/operating-system-security/network-security/windows-firewall/copy-a-gpo-to-create-a-new-gpo.md similarity index 87% rename from windows/security/threat-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo.md rename to windows/security/operating-system-security/network-security/windows-firewall/copy-a-gpo-to-create-a-new-gpo.md index 7a95770682..2493780e6b 100644 --- a/windows/security/threat-protection/windows-firewall/copy-a-gpo-to-create-a-new-gpo.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/copy-a-gpo-to-create-a-new-gpo.md @@ -1,12 +1,9 @@ --- -title: Copy a GPO to Create a New GPO (Windows) +title: Copy a GPO to Create a New GPO description: Learn how to make a copy of a GPO by using the Active Directory Users and devices MMC snap-in to create a GPO for boundary zone devices. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Copy a GPO to Create a New GPO diff --git a/windows/security/threat-protection/windows-firewall/create-a-group-account-in-active-directory.md b/windows/security/operating-system-security/network-security/windows-firewall/create-a-group-account-in-active-directory.md similarity index 82% rename from windows/security/threat-protection/windows-firewall/create-a-group-account-in-active-directory.md rename to windows/security/operating-system-security/network-security/windows-firewall/create-a-group-account-in-active-directory.md index 6fd5ce3ffc..e323d44596 100644 --- a/windows/security/threat-protection/windows-firewall/create-a-group-account-in-active-directory.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/create-a-group-account-in-active-directory.md @@ -1,12 +1,9 @@ --- -title: Create a Group Account in Active Directory (Windows) +title: Create a Group Account in Active Directory description: Learn how to create a security group for the computers that are to receive Group Policy settings by using the Active Directory Users and Computers console. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Create a Group Account in Active Directory diff --git a/windows/security/threat-protection/windows-firewall/create-a-group-policy-object.md b/windows/security/operating-system-security/network-security/windows-firewall/create-a-group-policy-object.md similarity index 80% rename from windows/security/threat-protection/windows-firewall/create-a-group-policy-object.md rename to windows/security/operating-system-security/network-security/windows-firewall/create-a-group-policy-object.md index 2eef741da8..f5c4d18144 100644 --- a/windows/security/threat-protection/windows-firewall/create-a-group-policy-object.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/create-a-group-policy-object.md @@ -1,5 +1,5 @@ --- -title: Create a Group Policy Object (Windows) +title: Create a Group Policy Object description: Learn how to use the Active Directory Users and Computers MMC snap-in to create a GPO. You must be a member of the Domain Administrators group. ms.prod: windows-client ms.collection: @@ -7,9 +7,6 @@ ms.collection: - tier3 ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Create a Group Policy Object diff --git a/windows/security/threat-protection/windows-firewall/create-an-authentication-exemption-list-rule.md b/windows/security/operating-system-security/network-security/windows-firewall/create-an-authentication-exemption-list-rule.md similarity index 91% rename from windows/security/threat-protection/windows-firewall/create-an-authentication-exemption-list-rule.md rename to windows/security/operating-system-security/network-security/windows-firewall/create-an-authentication-exemption-list-rule.md index 8c9b8675b6..76f020233e 100644 --- a/windows/security/threat-protection/windows-firewall/create-an-authentication-exemption-list-rule.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/create-an-authentication-exemption-list-rule.md @@ -1,12 +1,9 @@ --- -title: Create an Authentication Exemption List Rule (Windows) +title: Create an Authentication Exemption List Rule description: Learn how to create rules that exempt devices that cannot communicate by using IPSec from the authentication requirements of your isolation policies. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Create an Authentication Exemption List Rule diff --git a/windows/security/threat-protection/windows-firewall/create-an-authentication-request-rule.md b/windows/security/operating-system-security/network-security/windows-firewall/create-an-authentication-request-rule.md similarity index 94% rename from windows/security/threat-protection/windows-firewall/create-an-authentication-request-rule.md rename to windows/security/operating-system-security/network-security/windows-firewall/create-an-authentication-request-rule.md index a32b7432ef..488578107f 100644 --- a/windows/security/threat-protection/windows-firewall/create-an-authentication-request-rule.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/create-an-authentication-request-rule.md @@ -1,12 +1,9 @@ --- -title: Create an Authentication Request Rule (Windows) +title: Create an Authentication Request Rule description: Create a new rule for Windows Defender Firewall with Advanced Security so devices on the network use IPsec protocols and methods before they can communicate. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Create an Authentication Request Rule diff --git a/windows/security/threat-protection/windows-firewall/create-an-inbound-icmp-rule.md b/windows/security/operating-system-security/network-security/windows-firewall/create-an-inbound-icmp-rule.md similarity index 89% rename from windows/security/threat-protection/windows-firewall/create-an-inbound-icmp-rule.md rename to windows/security/operating-system-security/network-security/windows-firewall/create-an-inbound-icmp-rule.md index 058c8148ed..b62a240cdb 100644 --- a/windows/security/threat-protection/windows-firewall/create-an-inbound-icmp-rule.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/create-an-inbound-icmp-rule.md @@ -1,12 +1,9 @@ --- -title: Create an Inbound ICMP Rule (Windows) +title: Create an Inbound ICMP Rule description: Learn how to allow inbound ICMP traffic by using the Group Policy Management MMC snap-in to create rules in Windows Defender Firewall with Advanced Security. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Create an Inbound ICMP Rule diff --git a/windows/security/threat-protection/windows-firewall/create-an-inbound-port-rule.md b/windows/security/operating-system-security/network-security/windows-firewall/create-an-inbound-port-rule.md similarity index 92% rename from windows/security/threat-protection/windows-firewall/create-an-inbound-port-rule.md rename to windows/security/operating-system-security/network-security/windows-firewall/create-an-inbound-port-rule.md index fbbf4a06b1..7ccafddaa2 100644 --- a/windows/security/threat-protection/windows-firewall/create-an-inbound-port-rule.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/create-an-inbound-port-rule.md @@ -1,5 +1,5 @@ --- -title: Create an Inbound Port Rule (Windows) +title: Create an Inbound Port Rule description: Learn to allow traffic on specific ports by using the Group Policy Management MMC snap-in to create rules in Windows Defender Firewall with Advanced Security. ms.prod: windows-client ms.collection: @@ -7,9 +7,6 @@ ms.collection: - tier3 ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Create an Inbound Port Rule diff --git a/windows/security/threat-protection/windows-firewall/create-an-inbound-program-or-service-rule.md b/windows/security/operating-system-security/network-security/windows-firewall/create-an-inbound-program-or-service-rule.md similarity index 93% rename from windows/security/threat-protection/windows-firewall/create-an-inbound-program-or-service-rule.md rename to windows/security/operating-system-security/network-security/windows-firewall/create-an-inbound-program-or-service-rule.md index d477bd3dec..0e3d5bd0c6 100644 --- a/windows/security/threat-protection/windows-firewall/create-an-inbound-program-or-service-rule.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/create-an-inbound-program-or-service-rule.md @@ -1,12 +1,9 @@ --- -title: Create an Inbound Program or Service Rule (Windows) +title: Create an Inbound Program or Service Rule description: Learn how to allow inbound traffic to a program or service by using the Group Policy Management MMC snap-in to create firewall rules. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Create an Inbound Program or Service Rule diff --git a/windows/security/threat-protection/windows-firewall/create-an-outbound-port-rule.md b/windows/security/operating-system-security/network-security/windows-firewall/create-an-outbound-port-rule.md similarity index 89% rename from windows/security/threat-protection/windows-firewall/create-an-outbound-port-rule.md rename to windows/security/operating-system-security/network-security/windows-firewall/create-an-outbound-port-rule.md index 539d7fcf90..a014376a16 100644 --- a/windows/security/threat-protection/windows-firewall/create-an-outbound-port-rule.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/create-an-outbound-port-rule.md @@ -1,12 +1,9 @@ --- -title: Create an Outbound Port Rule (Windows) +title: Create an Outbound Port Rule description: Learn to block outbound traffic on a port by using the Group Policy Management MMC snap-in to create rules in Windows Defender Firewall with Advanced Security. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Create an Outbound Port Rule diff --git a/windows/security/threat-protection/windows-firewall/create-an-outbound-program-or-service-rule.md b/windows/security/operating-system-security/network-security/windows-firewall/create-an-outbound-program-or-service-rule.md similarity index 91% rename from windows/security/threat-protection/windows-firewall/create-an-outbound-program-or-service-rule.md rename to windows/security/operating-system-security/network-security/windows-firewall/create-an-outbound-program-or-service-rule.md index 6083981a32..7893448184 100644 --- a/windows/security/threat-protection/windows-firewall/create-an-outbound-program-or-service-rule.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/create-an-outbound-program-or-service-rule.md @@ -1,12 +1,9 @@ --- -title: Create an Outbound Program or Service Rule (Windows) +title: Create an Outbound Program or Service Rule description: Use the Windows Defender Firewall with Advanced Security node in the Group Policy Management console to create firewall rules. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Create an Outbound Program or Service Rule diff --git a/windows/security/threat-protection/windows-firewall/create-inbound-rules-to-support-rpc.md b/windows/security/operating-system-security/network-security/windows-firewall/create-inbound-rules-to-support-rpc.md similarity index 93% rename from windows/security/threat-protection/windows-firewall/create-inbound-rules-to-support-rpc.md rename to windows/security/operating-system-security/network-security/windows-firewall/create-inbound-rules-to-support-rpc.md index 85de932389..e153527fbc 100644 --- a/windows/security/threat-protection/windows-firewall/create-inbound-rules-to-support-rpc.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/create-inbound-rules-to-support-rpc.md @@ -1,12 +1,9 @@ --- -title: Create Inbound Rules to Support RPC (Windows) +title: Create Inbound Rules to Support RPC description: Learn how to allow RPC network traffic by using the Group Policy Management MMC snap-in to create rules in Windows Defender Firewall with Advanced Security. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Create Inbound Rules to Support RPC diff --git a/windows/security/threat-protection/windows-firewall/create-windows-firewall-rules-in-intune.md b/windows/security/operating-system-security/network-security/windows-firewall/create-windows-firewall-rules-in-intune.md similarity index 94% rename from windows/security/threat-protection/windows-firewall/create-windows-firewall-rules-in-intune.md rename to windows/security/operating-system-security/network-security/windows-firewall/create-windows-firewall-rules-in-intune.md index 83d9d7ca2e..f2316edf7e 100644 --- a/windows/security/threat-protection/windows-firewall/create-windows-firewall-rules-in-intune.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/create-windows-firewall-rules-in-intune.md @@ -1,11 +1,8 @@ --- -title: Create Windows Firewall rules in Intune (Windows) +title: Create Windows Firewall rules in Intune description: Learn how to use Intune to create rules in Windows Defender Firewall with Advanced Security. Start by creating a profile in Device Configuration in Intune. ms.prod: windows-client ms.topic: conceptual -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later ms.date: 12/31/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/create-wmi-filters-for-the-gpo.md b/windows/security/operating-system-security/network-security/windows-firewall/create-wmi-filters-for-the-gpo.md similarity index 93% rename from windows/security/threat-protection/windows-firewall/create-wmi-filters-for-the-gpo.md rename to windows/security/operating-system-security/network-security/windows-firewall/create-wmi-filters-for-the-gpo.md index aadb54b9eb..08c06d4796 100644 --- a/windows/security/threat-protection/windows-firewall/create-wmi-filters-for-the-gpo.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/create-wmi-filters-for-the-gpo.md @@ -1,5 +1,5 @@ --- -title: Create WMI Filters for the GPO (Windows) +title: Create WMI Filters for the GPO description: Learn how to use WMI filters on a GPO to make sure that each GPO for a group can only be applied to devices running the correct version of Windows. ms.prod: windows-client ms.collection: @@ -7,9 +7,6 @@ ms.collection: - tier3 ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Create WMI Filters for the GPO diff --git a/windows/security/threat-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy.md b/windows/security/operating-system-security/network-security/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy.md similarity index 89% rename from windows/security/threat-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy.md rename to windows/security/operating-system-security/network-security/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy.md index 8df474f3c3..197d05a733 100644 --- a/windows/security/threat-protection/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/designing-a-windows-firewall-with-advanced-security-strategy.md @@ -1,12 +1,9 @@ --- -title: Designing a Windows Defender Firewall Strategy (Windows) +title: Designing a Windows Defender Firewall Strategy description: Answer the question in this article to design an effective Windows Defender Firewall with Advanced Security Strategy. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Designing a Windows Defender Firewall with Advanced Security Strategy diff --git a/windows/security/threat-protection/windows-firewall/determining-the-trusted-state-of-your-devices.md b/windows/security/operating-system-security/network-security/windows-firewall/determining-the-trusted-state-of-your-devices.md similarity index 97% rename from windows/security/threat-protection/windows-firewall/determining-the-trusted-state-of-your-devices.md rename to windows/security/operating-system-security/network-security/windows-firewall/determining-the-trusted-state-of-your-devices.md index 5089c8d823..62d1fcb8d8 100644 --- a/windows/security/threat-protection/windows-firewall/determining-the-trusted-state-of-your-devices.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/determining-the-trusted-state-of-your-devices.md @@ -1,12 +1,9 @@ --- -title: Determining the Trusted State of Your Devices (Windows) +title: Determining the Trusted State of Your Devices description: Learn how to define the trusted state of devices in your enterprise to help design your strategy for using Windows Defender Firewall with Advanced Security. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Determining the Trusted State of Your Devices diff --git a/windows/security/threat-protection/windows-firewall/documenting-the-zones.md b/windows/security/operating-system-security/network-security/windows-firewall/documenting-the-zones.md similarity index 82% rename from windows/security/threat-protection/windows-firewall/documenting-the-zones.md rename to windows/security/operating-system-security/network-security/windows-firewall/documenting-the-zones.md index 4db33e1b27..16cb030c90 100644 --- a/windows/security/threat-protection/windows-firewall/documenting-the-zones.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/documenting-the-zones.md @@ -1,12 +1,9 @@ --- -title: Documenting the Zones (Windows) +title: Documenting the Zones description: Learn how to document the zone placement of devices in your design for Windows Defender Firewall with Advanced Security. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Documenting the Zones diff --git a/windows/security/threat-protection/windows-firewall/domain-isolation-policy-design-example.md b/windows/security/operating-system-security/network-security/windows-firewall/domain-isolation-policy-design-example.md similarity index 94% rename from windows/security/threat-protection/windows-firewall/domain-isolation-policy-design-example.md rename to windows/security/operating-system-security/network-security/windows-firewall/domain-isolation-policy-design-example.md index e481999a70..c01ba555ff 100644 --- a/windows/security/threat-protection/windows-firewall/domain-isolation-policy-design-example.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/domain-isolation-policy-design-example.md @@ -1,12 +1,9 @@ --- -title: Domain Isolation Policy Design Example (Windows) +title: Domain Isolation Policy Design Example description: This example uses a fictitious company to illustrate domain isolation policy design in Windows Defender Firewall with Advanced Security. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Domain Isolation Policy Design Example diff --git a/windows/security/threat-protection/windows-firewall/domain-isolation-policy-design.md b/windows/security/operating-system-security/network-security/windows-firewall/domain-isolation-policy-design.md similarity index 94% rename from windows/security/threat-protection/windows-firewall/domain-isolation-policy-design.md rename to windows/security/operating-system-security/network-security/windows-firewall/domain-isolation-policy-design.md index 8186a03186..abb10fe004 100644 --- a/windows/security/threat-protection/windows-firewall/domain-isolation-policy-design.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/domain-isolation-policy-design.md @@ -1,12 +1,9 @@ --- -title: Domain Isolation Policy Design (Windows) +title: Domain Isolation Policy Design description: Learn how to design a domain isolation policy, based on which devices accept only connections from authenticated members of the same isolated domain. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Domain Isolation Policy Design diff --git a/windows/security/threat-protection/windows-firewall/enable-predefined-inbound-rules.md b/windows/security/operating-system-security/network-security/windows-firewall/enable-predefined-inbound-rules.md similarity index 84% rename from windows/security/threat-protection/windows-firewall/enable-predefined-inbound-rules.md rename to windows/security/operating-system-security/network-security/windows-firewall/enable-predefined-inbound-rules.md index c4377b8254..68f91e5710 100644 --- a/windows/security/threat-protection/windows-firewall/enable-predefined-inbound-rules.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/enable-predefined-inbound-rules.md @@ -1,12 +1,9 @@ --- -title: Enable Predefined Inbound Rules (Windows) +title: Enable Predefined Inbound Rules description: Learn the rules for Windows Defender Firewall with Advanced Security for common networking roles and functions. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Enable Predefined Inbound Rules diff --git a/windows/security/threat-protection/windows-firewall/enable-predefined-outbound-rules.md b/windows/security/operating-system-security/network-security/windows-firewall/enable-predefined-outbound-rules.md similarity index 85% rename from windows/security/threat-protection/windows-firewall/enable-predefined-outbound-rules.md rename to windows/security/operating-system-security/network-security/windows-firewall/enable-predefined-outbound-rules.md index 83d2eec6b3..69eaebf470 100644 --- a/windows/security/threat-protection/windows-firewall/enable-predefined-outbound-rules.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/enable-predefined-outbound-rules.md @@ -1,12 +1,9 @@ --- -title: Enable Predefined Outbound Rules (Windows) +title: Enable Predefined Outbound Rules description: Learn to deploy predefined firewall rules that block outbound network traffic for common network functions in Windows Defender Firewall with Advanced Security. ms.prod: windows-client ms.topic: conceptual ms.date: 09/07/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Enable Predefined Outbound Rules diff --git a/windows/security/threat-protection/windows-firewall/encryption-zone-gpos.md b/windows/security/operating-system-security/network-security/windows-firewall/encryption-zone-gpos.md similarity index 75% rename from windows/security/threat-protection/windows-firewall/encryption-zone-gpos.md rename to windows/security/operating-system-security/network-security/windows-firewall/encryption-zone-gpos.md index f26b60d3f2..eb9e6e58ad 100644 --- a/windows/security/threat-protection/windows-firewall/encryption-zone-gpos.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/encryption-zone-gpos.md @@ -1,12 +1,9 @@ --- -title: Encryption Zone GPOs (Windows) +title: Encryption Zone GPOs description: Learn how to add a device to an encryption zone by adding the device account to the encryption zone group in Windows Defender Firewall with Advanced Security. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Encryption Zone GPOs diff --git a/windows/security/threat-protection/windows-firewall/encryption-zone.md b/windows/security/operating-system-security/network-security/windows-firewall/encryption-zone.md similarity index 93% rename from windows/security/threat-protection/windows-firewall/encryption-zone.md rename to windows/security/operating-system-security/network-security/windows-firewall/encryption-zone.md index 4dc931b4ea..b421043953 100644 --- a/windows/security/threat-protection/windows-firewall/encryption-zone.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/encryption-zone.md @@ -1,12 +1,9 @@ --- -title: Encryption Zone (Windows) +title: Encryption Zone description: Learn how to create an encryption zone to contain devices that host sensitive data and require that the sensitive network traffic be encrypted. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Encryption Zone diff --git a/windows/security/threat-protection/windows-firewall/exempt-icmp-from-authentication.md b/windows/security/operating-system-security/network-security/windows-firewall/exempt-icmp-from-authentication.md similarity index 73% rename from windows/security/threat-protection/windows-firewall/exempt-icmp-from-authentication.md rename to windows/security/operating-system-security/network-security/windows-firewall/exempt-icmp-from-authentication.md index 410c3c56be..572b3283f3 100644 --- a/windows/security/threat-protection/windows-firewall/exempt-icmp-from-authentication.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/exempt-icmp-from-authentication.md @@ -1,12 +1,9 @@ --- -title: Exempt ICMP from Authentication (Windows) +title: Exempt ICMP from Authentication description: Learn how to add exemptions for any network traffic that uses the ICMP protocol in Windows Defender Firewall with Advanced Security. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Exempt ICMP from Authentication diff --git a/windows/security/threat-protection/windows-firewall/exemption-list.md b/windows/security/operating-system-security/network-security/windows-firewall/exemption-list.md similarity index 91% rename from windows/security/threat-protection/windows-firewall/exemption-list.md rename to windows/security/operating-system-security/network-security/windows-firewall/exemption-list.md index 52d0334bfa..cb0b5ee9e1 100644 --- a/windows/security/threat-protection/windows-firewall/exemption-list.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/exemption-list.md @@ -1,12 +1,9 @@ --- -title: Exemption List (Windows) +title: Exemption List description: Learn about reasons to add devices to an exemption list in Windows Defender Firewall with Advanced Security and the trade-offs of having too many exemptions. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Exemption List diff --git a/windows/security/threat-protection/windows-firewall/filter-origin-documentation.md b/windows/security/operating-system-security/network-security/windows-firewall/filter-origin-documentation.md similarity index 89% rename from windows/security/threat-protection/windows-firewall/filter-origin-documentation.md rename to windows/security/operating-system-security/network-security/windows-firewall/filter-origin-documentation.md index 5b4fbe6b78..ba08eadadb 100644 --- a/windows/security/threat-protection/windows-firewall/filter-origin-documentation.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/filter-origin-documentation.md @@ -3,9 +3,6 @@ title: Filter origin audit log improvements description: Filter origin documentation audit log improvements ms.prod: windows-client ms.topic: troubleshooting -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later ms.date: 12/31/2017 --- @@ -29,19 +26,19 @@ The blocking filters can be categorized under these filter origins: 2. Firewall default block filters - a. AppContainer loopback + a. AppContainer loopback - b. Boottime default + b. Boottime default - c. Quarantine default + c. Quarantine default - d. Query user default + d. Query user default - e. Stealth + e. Stealth - f. Universal Windows Platform (UWP) default + f. Universal Windows Platform (UWP) default - g. Windows Service Hardening (WSH) default + g. Windows Service Hardening (WSH) default The next section describes the improvements made to audits 5157 and 5152, and how the above filter origins are used in these events. These improvements were added in the Windows Server 2022 and Windows 11 releases. @@ -59,8 +56,8 @@ To enable a specific audit event, run the corresponding command in an administra |**Audit #**|**Enable command**|**Link**| |:-----|:-----|:-----| -|**5157**|`Auditpol /set /category:"System" /SubCategory:"Filtering Platform Connection" /success:enable /failure:enable`|[5157(F): The Windows Filtering Platform has blocked a connection.](../auditing/event-5157.md)| -|**5152**|`Auditpol /set /category:"System" /SubCategory:"Filtering Platform Packet Drop" /success:enable /failure:enable`|[5152(F): The Windows Filtering Platform blocked a packet.](../auditing/event-5152.md)| +|**5157**|`Auditpol /set /category:"System" /SubCategory:"Filtering Platform Connection" /success:enable /failure:enable`|[5157(F): The Windows Filtering Platform has blocked a connection.](../../../threat-protection/auditing/event-5157.md)| +|**5152**|`Auditpol /set /category:"System" /SubCategory:"Filtering Platform Packet Drop" /success:enable /failure:enable`|[5152(F): The Windows Filtering Platform blocked a packet.](../../../threat-protection/auditing/event-5152.md)| ## Example flow of debugging packet drops with filter origin @@ -75,13 +72,13 @@ The next sections are divided by `Filter Origin` type, the value is either a rul Run the following PowerShell command to generate the rule information using `Filter Origin`. ```Powershell -Get-NetFirewallRule -Name “” +Get-NetFirewallRule -Name "" Get-NetFirewallRule -Name " {A549B7CF-0542-4B67-93F9-EEBCDD584377} " ``` ![Firewall rule.](images/firewallrule.png) -After identifying the rule that caused the drop, the network admin can now modify/disable the rule to allow the traffic they want through command prompt or using the Windows Defender UI. The network admin can find the rule in the UI with the rule’s `DisplayName`. +After identifying the rule that caused the drop, the network admin can now modify/disable the rule to allow the traffic they want through command prompt or using the Windows Defender UI. The network admin can find the rule in the UI with the rule's `DisplayName`. >[!NOTE] > Firewall rules from Mobile Device Management (MDM) store cannot be searched using the Windows Defender UI. Additionally, the above method will not work when the `Filter Origin` is one of the default block filters, as they do not correspond to any firewall rules. @@ -161,4 +158,4 @@ For more information on how to debug drops caused by UWP default block filters, **WSH default** -Network drops from Windows Service Hardening (WSH) default filters indicate that there wasn’t an explicit Windows Service Hardening allow rule to allow network traffic for the protected service. The service owner will need to configure allow rules for the service if the block isn't expected. +Network drops from Windows Service Hardening (WSH) default filters indicate that there wasn't an explicit Windows Service Hardening allow rule to allow network traffic for the protected service. The service owner will need to configure allow rules for the service if the block isn't expected. diff --git a/windows/security/threat-protection/windows-firewall/firewall-gpos.md b/windows/security/operating-system-security/network-security/windows-firewall/firewall-gpos.md similarity index 67% rename from windows/security/threat-protection/windows-firewall/firewall-gpos.md rename to windows/security/operating-system-security/network-security/windows-firewall/firewall-gpos.md index d281e5120c..526ffd83a3 100644 --- a/windows/security/threat-protection/windows-firewall/firewall-gpos.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/firewall-gpos.md @@ -1,12 +1,9 @@ --- -title: Firewall GPOs (Windows) +title: Firewall GPOs description: In this example, a Group Policy Object is linked to the domain container because the domain controllers aren't part of the isolated domain. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Firewall GPOs diff --git a/windows/security/threat-protection/windows-firewall/firewall-policy-design-example.md b/windows/security/operating-system-security/network-security/windows-firewall/firewall-policy-design-example.md similarity index 96% rename from windows/security/threat-protection/windows-firewall/firewall-policy-design-example.md rename to windows/security/operating-system-security/network-security/windows-firewall/firewall-policy-design-example.md index 3a7fd73b29..f290a9943c 100644 --- a/windows/security/threat-protection/windows-firewall/firewall-policy-design-example.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/firewall-policy-design-example.md @@ -1,12 +1,9 @@ --- -title: Basic Firewall Policy Design Example (Windows) +title: Basic Firewall Policy Design Example description: This example features a fictitious company and illustrates firewall policy design for Windows Defender Firewall with Advanced Security. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Basic Firewall Policy Design Example diff --git a/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md b/windows/security/operating-system-security/network-security/windows-firewall/firewall-settings-lost-on-upgrade.md similarity index 88% rename from windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md rename to windows/security/operating-system-security/network-security/windows-firewall/firewall-settings-lost-on-upgrade.md index 2f28d5f315..0d63234aba 100644 --- a/windows/security/threat-protection/windows-firewall/firewall-settings-lost-on-upgrade.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/firewall-settings-lost-on-upgrade.md @@ -3,9 +3,6 @@ title: Troubleshooting Windows Firewall settings after a Windows upgrade description: Firewall settings lost on upgrade ms.prod: windows-client ms.topic: troubleshooting -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later ms.date: 12/31/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/gathering-information-about-your-active-directory-deployment.md b/windows/security/operating-system-security/network-security/windows-firewall/gathering-information-about-your-active-directory-deployment.md similarity index 91% rename from windows/security/threat-protection/windows-firewall/gathering-information-about-your-active-directory-deployment.md rename to windows/security/operating-system-security/network-security/windows-firewall/gathering-information-about-your-active-directory-deployment.md index 8f60efe829..b030f3c63a 100644 --- a/windows/security/threat-protection/windows-firewall/gathering-information-about-your-active-directory-deployment.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/gathering-information-about-your-active-directory-deployment.md @@ -1,12 +1,9 @@ --- -title: Gathering Information about Your Active Directory Deployment (Windows) +title: Gathering Information about Your Active Directory Deployment description: Learn about gathering Active Directory information, including domain layout, organizational unit architecture, and site topology, for your firewall deployment. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Gathering Information about Your Active Directory Deployment diff --git a/windows/security/threat-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure.md b/windows/security/operating-system-security/network-security/windows-firewall/gathering-information-about-your-current-network-infrastructure.md similarity index 97% rename from windows/security/threat-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure.md rename to windows/security/operating-system-security/network-security/windows-firewall/gathering-information-about-your-current-network-infrastructure.md index 3aa6cef30a..13cb71d95b 100644 --- a/windows/security/threat-protection/windows-firewall/gathering-information-about-your-current-network-infrastructure.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/gathering-information-about-your-current-network-infrastructure.md @@ -1,12 +1,9 @@ --- -title: Gathering Info about Your Network Infrastructure (Windows) +title: Gathering Info about Your Network Infrastructure description: Learn how to gather info about your network infrastructure so that you can effectively plan for Windows Defender Firewall with Advanced Security deployment. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Gathering Information about Your Current Network Infrastructure diff --git a/windows/security/threat-protection/windows-firewall/gathering-information-about-your-devices.md b/windows/security/operating-system-security/network-security/windows-firewall/gathering-information-about-your-devices.md similarity index 92% rename from windows/security/threat-protection/windows-firewall/gathering-information-about-your-devices.md rename to windows/security/operating-system-security/network-security/windows-firewall/gathering-information-about-your-devices.md index 1f0cbb3885..d650107dd8 100644 --- a/windows/security/threat-protection/windows-firewall/gathering-information-about-your-devices.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/gathering-information-about-your-devices.md @@ -1,12 +1,9 @@ --- -title: Gathering Information about Your Devices (Windows) +title: Gathering Information about Your Devices description: Learn what information to gather about the devices in your enterprise to plan your Windows Defender Firewall with Advanced Security deployment. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Gathering Information about Your Devices diff --git a/windows/security/threat-protection/windows-firewall/gathering-other-relevant-information.md b/windows/security/operating-system-security/network-security/windows-firewall/gathering-other-relevant-information.md similarity index 95% rename from windows/security/threat-protection/windows-firewall/gathering-other-relevant-information.md rename to windows/security/operating-system-security/network-security/windows-firewall/gathering-other-relevant-information.md index a4fa1bcbac..f57dfc3116 100644 --- a/windows/security/threat-protection/windows-firewall/gathering-other-relevant-information.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/gathering-other-relevant-information.md @@ -1,12 +1,9 @@ --- -title: Gathering Other Relevant Information (Windows) +title: Gathering Other Relevant Information description: Learn about additional information you may need to gather to deploy Windows Defender Firewall with Advanced Security policies in your organization. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Gathering Other Relevant Information diff --git a/windows/security/threat-protection/windows-firewall/gathering-the-information-you-need.md b/windows/security/operating-system-security/network-security/windows-firewall/gathering-the-information-you-need.md similarity index 79% rename from windows/security/threat-protection/windows-firewall/gathering-the-information-you-need.md rename to windows/security/operating-system-security/network-security/windows-firewall/gathering-the-information-you-need.md index 69323a3def..b82d977445 100644 --- a/windows/security/threat-protection/windows-firewall/gathering-the-information-you-need.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/gathering-the-information-you-need.md @@ -1,12 +1,9 @@ --- -title: Gathering the Information You Need (Windows) +title: Gathering the Information You Need description: Collect and analyze information about your network, directory services, and devices to prepare for Windows Defender Firewall with Advanced Security deployment. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Gathering the Information You Need diff --git a/windows/security/threat-protection/windows-firewall/gpo-domiso-boundary.md b/windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-boundary.md similarity index 87% rename from windows/security/threat-protection/windows-firewall/gpo-domiso-boundary.md rename to windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-boundary.md index 08115f7e6c..741f91081d 100644 --- a/windows/security/threat-protection/windows-firewall/gpo-domiso-boundary.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-boundary.md @@ -1,12 +1,9 @@ --- -title: GPO\_DOMISO\_Boundary (Windows) +title: GPO\_DOMISO\_Boundary description: This example GPO supports devices that aren't part of the isolated domain to access specific servers that must be available to those untrusted devices. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # GPO\_DOMISO\_Boundary diff --git a/windows/security/threat-protection/windows-firewall/gpo-domiso-encryption.md b/windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-encryption.md similarity index 88% rename from windows/security/threat-protection/windows-firewall/gpo-domiso-encryption.md rename to windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-encryption.md index e25451e208..b5d7b1384b 100644 --- a/windows/security/threat-protection/windows-firewall/gpo-domiso-encryption.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-encryption.md @@ -1,12 +1,9 @@ --- -title: GPO\_DOMISO\_Encryption\_WS2008 (Windows) +title: GPO\_DOMISO\_Encryption\_WS2008 description: This example GPO supports the ability for servers that contain sensitive data to require encryption for all connection requests. ms.topic: conceptual ms.prod: windows-client ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # GPO\_DOMISO\_Encryption\_WS2008 diff --git a/windows/security/threat-protection/windows-firewall/gpo-domiso-firewall.md b/windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-firewall.md similarity index 88% rename from windows/security/threat-protection/windows-firewall/gpo-domiso-firewall.md rename to windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-firewall.md index 8f51e224f1..057cf7bdf5 100644 --- a/windows/security/threat-protection/windows-firewall/gpo-domiso-firewall.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-firewall.md @@ -1,12 +1,9 @@ --- -title: GPO\_DOMISO\_Firewall (Windows) +title: GPO\_DOMISO\_Firewall description: Learn about the settings and rules in this example GPO, which is authored by using the Group Policy editing tools. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # GPO\_DOMISO\_Firewall diff --git a/windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-clients.md b/windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-isolateddomain-clients.md similarity index 91% rename from windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-clients.md rename to windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-isolateddomain-clients.md index b2372a88c2..1f72fa6064 100644 --- a/windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-clients.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-isolateddomain-clients.md @@ -1,12 +1,9 @@ --- -title: GPO\_DOMISO\_IsolatedDomain\_Clients (Windows) +title: GPO\_DOMISO\_IsolatedDomain\_Clients description: Author this GPO by using Windows Defender Firewall with Advanced Security interface in the Group Policy editing tools. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # GPO\_DOMISO\_IsolatedDomain\_Clients diff --git a/windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-servers.md b/windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-isolateddomain-servers.md similarity index 82% rename from windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-servers.md rename to windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-isolateddomain-servers.md index 100d7233bc..2ca05d9120 100644 --- a/windows/security/threat-protection/windows-firewall/gpo-domiso-isolateddomain-servers.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/gpo-domiso-isolateddomain-servers.md @@ -1,12 +1,9 @@ --- -title: GPO\_DOMISO\_IsolatedDomain\_Servers (Windows) +title: GPO\_DOMISO\_IsolatedDomain\_Servers description: Author this GPO by using the Windows Defender Firewall with Advanced Security interface in the Group Policy editing tools. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # GPO\_DOMISO\_IsolatedDomain\_Servers diff --git a/windows/security/threat-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md b/windows/security/operating-system-security/network-security/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md similarity index 93% rename from windows/security/threat-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md rename to windows/security/operating-system-security/network-security/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md index d4e5b71479..c36d7effdf 100644 --- a/windows/security/threat-protection/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/identifying-your-windows-firewall-with-advanced-security-deployment-goals.md @@ -1,12 +1,9 @@ --- -title: Identify implementation goals for Windows Defender Firewall with Advanced Security Deployment (Windows) +title: Identify implementation goals for Windows Defender Firewall with Advanced Security Deployment description: Identifying Your Windows Defender Firewall with Advanced Security (WFAS) implementation goals ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Identifying Windows Defender Firewall with Advanced Security implementation goals diff --git a/windows/security/threat-protection/windows-firewall/images/corpnet.gif b/windows/security/operating-system-security/network-security/windows-firewall/images/corpnet.gif similarity index 100% rename from windows/security/threat-protection/windows-firewall/images/corpnet.gif rename to windows/security/operating-system-security/network-security/windows-firewall/images/corpnet.gif diff --git a/windows/security/threat-protection/windows-firewall/images/createipsecrule.gif b/windows/security/operating-system-security/network-security/windows-firewall/images/createipsecrule.gif similarity index 100% rename from windows/security/threat-protection/windows-firewall/images/createipsecrule.gif rename to windows/security/operating-system-security/network-security/windows-firewall/images/createipsecrule.gif diff --git a/windows/security/threat-protection/windows-firewall/images/event-audit-5157.png b/windows/security/operating-system-security/network-security/windows-firewall/images/event-audit-5157.png similarity index 100% rename from windows/security/threat-protection/windows-firewall/images/event-audit-5157.png rename to windows/security/operating-system-security/network-security/windows-firewall/images/event-audit-5157.png diff --git a/windows/security/threat-protection/windows-firewall/images/event-properties-5157.png b/windows/security/operating-system-security/network-security/windows-firewall/images/event-properties-5157.png similarity index 100% rename from windows/security/threat-protection/windows-firewall/images/event-properties-5157.png rename to windows/security/operating-system-security/network-security/windows-firewall/images/event-properties-5157.png diff --git a/windows/security/threat-protection/windows-firewall/images/firewallrule.png b/windows/security/operating-system-security/network-security/windows-firewall/images/firewallrule.png similarity index 100% rename from windows/security/threat-protection/windows-firewall/images/firewallrule.png rename to windows/security/operating-system-security/network-security/windows-firewall/images/firewallrule.png diff --git a/windows/security/threat-protection/windows-firewall/images/fw01-profiles.png b/windows/security/operating-system-security/network-security/windows-firewall/images/fw01-profiles.png similarity index 100% rename from windows/security/threat-protection/windows-firewall/images/fw01-profiles.png rename to windows/security/operating-system-security/network-security/windows-firewall/images/fw01-profiles.png diff --git a/windows/security/threat-protection/windows-firewall/images/fw02-createrule.png b/windows/security/operating-system-security/network-security/windows-firewall/images/fw02-createrule.png similarity index 100% rename from windows/security/threat-protection/windows-firewall/images/fw02-createrule.png rename to windows/security/operating-system-security/network-security/windows-firewall/images/fw02-createrule.png diff --git a/windows/security/threat-protection/windows-firewall/images/fw03-defaults.png b/windows/security/operating-system-security/network-security/windows-firewall/images/fw03-defaults.png similarity index 100% rename from windows/security/threat-protection/windows-firewall/images/fw03-defaults.png rename to windows/security/operating-system-security/network-security/windows-firewall/images/fw03-defaults.png diff --git a/windows/security/threat-protection/windows-firewall/images/fw04-userquery.png b/windows/security/operating-system-security/network-security/windows-firewall/images/fw04-userquery.png similarity index 100% rename from windows/security/threat-protection/windows-firewall/images/fw04-userquery.png rename to windows/security/operating-system-security/network-security/windows-firewall/images/fw04-userquery.png diff --git a/windows/security/threat-protection/windows-firewall/images/fw05-rulemerge.png b/windows/security/operating-system-security/network-security/windows-firewall/images/fw05-rulemerge.png similarity index 100% rename from windows/security/threat-protection/windows-firewall/images/fw05-rulemerge.png rename to windows/security/operating-system-security/network-security/windows-firewall/images/fw05-rulemerge.png diff --git a/windows/security/threat-protection/windows-firewall/images/fw06-block.png b/windows/security/operating-system-security/network-security/windows-firewall/images/fw06-block.png similarity index 100% rename from windows/security/threat-protection/windows-firewall/images/fw06-block.png rename to windows/security/operating-system-security/network-security/windows-firewall/images/fw06-block.png diff --git a/windows/security/threat-protection/windows-firewall/images/fw07-legacy.png b/windows/security/operating-system-security/network-security/windows-firewall/images/fw07-legacy.png similarity index 100% rename from windows/security/threat-protection/windows-firewall/images/fw07-legacy.png rename to windows/security/operating-system-security/network-security/windows-firewall/images/fw07-legacy.png diff --git a/windows/security/threat-protection/windows-firewall/images/grouppolicy-paste.png b/windows/security/operating-system-security/network-security/windows-firewall/images/grouppolicy-paste.png similarity index 100% rename from windows/security/threat-protection/windows-firewall/images/grouppolicy-paste.png rename to windows/security/operating-system-security/network-security/windows-firewall/images/grouppolicy-paste.png diff --git a/windows/security/threat-protection/windows-firewall/images/powershelllogosmall.gif b/windows/security/operating-system-security/network-security/windows-firewall/images/powershelllogosmall.gif similarity index 100% rename from windows/security/threat-protection/windows-firewall/images/powershelllogosmall.gif rename to windows/security/operating-system-security/network-security/windows-firewall/images/powershelllogosmall.gif diff --git a/windows/security/threat-protection/windows-firewall/images/qmcryptoset.gif b/windows/security/operating-system-security/network-security/windows-firewall/images/qmcryptoset.gif similarity index 100% rename from windows/security/threat-protection/windows-firewall/images/qmcryptoset.gif rename to windows/security/operating-system-security/network-security/windows-firewall/images/qmcryptoset.gif diff --git a/windows/security/threat-protection/windows-firewall/images/quarantine-default-block-filter.png b/windows/security/operating-system-security/network-security/windows-firewall/images/quarantine-default-block-filter.png similarity index 100% rename from windows/security/threat-protection/windows-firewall/images/quarantine-default-block-filter.png rename to windows/security/operating-system-security/network-security/windows-firewall/images/quarantine-default-block-filter.png diff --git a/windows/security/threat-protection/windows-firewall/images/quarantine-default1.png b/windows/security/operating-system-security/network-security/windows-firewall/images/quarantine-default1.png similarity index 100% rename from windows/security/threat-protection/windows-firewall/images/quarantine-default1.png rename to windows/security/operating-system-security/network-security/windows-firewall/images/quarantine-default1.png diff --git a/windows/security/threat-protection/windows-firewall/images/quarantine-interfaceindex1.png b/windows/security/operating-system-security/network-security/windows-firewall/images/quarantine-interfaceindex1.png similarity index 100% rename from windows/security/threat-protection/windows-firewall/images/quarantine-interfaceindex1.png rename to windows/security/operating-system-security/network-security/windows-firewall/images/quarantine-interfaceindex1.png diff --git a/windows/security/threat-protection/windows-firewall/images/query-user-default-block-filters.png b/windows/security/operating-system-security/network-security/windows-firewall/images/query-user-default-block-filters.png similarity index 100% rename from windows/security/threat-protection/windows-firewall/images/query-user-default-block-filters.png rename to windows/security/operating-system-security/network-security/windows-firewall/images/query-user-default-block-filters.png diff --git a/windows/security/threat-protection/windows-firewall/images/wfas-design2example1.gif b/windows/security/operating-system-security/network-security/windows-firewall/images/wfas-design2example1.gif similarity index 100% rename from windows/security/threat-protection/windows-firewall/images/wfas-design2example1.gif rename to windows/security/operating-system-security/network-security/windows-firewall/images/wfas-design2example1.gif diff --git a/windows/security/threat-protection/windows-firewall/images/wfas-design3example1.gif b/windows/security/operating-system-security/network-security/windows-firewall/images/wfas-design3example1.gif similarity index 100% rename from windows/security/threat-protection/windows-firewall/images/wfas-design3example1.gif rename to windows/security/operating-system-security/network-security/windows-firewall/images/wfas-design3example1.gif diff --git a/windows/security/threat-protection/windows-firewall/images/wfas-designexample1.gif b/windows/security/operating-system-security/network-security/windows-firewall/images/wfas-designexample1.gif similarity index 100% rename from windows/security/threat-protection/windows-firewall/images/wfas-designexample1.gif rename to windows/security/operating-system-security/network-security/windows-firewall/images/wfas-designexample1.gif diff --git a/windows/security/threat-protection/windows-firewall/images/wfas-designflowchart1.gif b/windows/security/operating-system-security/network-security/windows-firewall/images/wfas-designflowchart1.gif similarity index 100% rename from windows/security/threat-protection/windows-firewall/images/wfas-designflowchart1.gif rename to windows/security/operating-system-security/network-security/windows-firewall/images/wfas-designflowchart1.gif diff --git a/windows/security/threat-protection/windows-firewall/images/wfas-domainiso.gif b/windows/security/operating-system-security/network-security/windows-firewall/images/wfas-domainiso.gif similarity index 100% rename from windows/security/threat-protection/windows-firewall/images/wfas-domainiso.gif rename to windows/security/operating-system-security/network-security/windows-firewall/images/wfas-domainiso.gif diff --git a/windows/security/threat-protection/windows-firewall/images/wfas-domainisoencrypt.gif b/windows/security/operating-system-security/network-security/windows-firewall/images/wfas-domainisoencrypt.gif similarity index 100% rename from windows/security/threat-protection/windows-firewall/images/wfas-domainisoencrypt.gif rename to windows/security/operating-system-security/network-security/windows-firewall/images/wfas-domainisoencrypt.gif diff --git a/windows/security/threat-protection/windows-firewall/images/wfas-domainisohighsec.gif b/windows/security/operating-system-security/network-security/windows-firewall/images/wfas-domainisohighsec.gif similarity index 100% rename from windows/security/threat-protection/windows-firewall/images/wfas-domainisohighsec.gif rename to windows/security/operating-system-security/network-security/windows-firewall/images/wfas-domainisohighsec.gif diff --git a/windows/security/threat-protection/windows-firewall/images/wfas-domainnag.gif b/windows/security/operating-system-security/network-security/windows-firewall/images/wfas-domainnag.gif similarity index 100% rename from windows/security/threat-protection/windows-firewall/images/wfas-domainnag.gif rename to windows/security/operating-system-security/network-security/windows-firewall/images/wfas-domainnag.gif diff --git a/windows/security/threat-protection/windows-firewall/images/wfas-implement.gif b/windows/security/operating-system-security/network-security/windows-firewall/images/wfas-implement.gif similarity index 100% rename from windows/security/threat-protection/windows-firewall/images/wfas-implement.gif rename to windows/security/operating-system-security/network-security/windows-firewall/images/wfas-implement.gif diff --git a/windows/security/threat-protection/windows-firewall/images/wfasdomainisoboundary.gif b/windows/security/operating-system-security/network-security/windows-firewall/images/wfasdomainisoboundary.gif similarity index 100% rename from windows/security/threat-protection/windows-firewall/images/wfasdomainisoboundary.gif rename to windows/security/operating-system-security/network-security/windows-firewall/images/wfasdomainisoboundary.gif diff --git a/windows/security/threat-protection/windows-firewall/images/windows-firewall-intune.png b/windows/security/operating-system-security/network-security/windows-firewall/images/windows-firewall-intune.png similarity index 100% rename from windows/security/threat-protection/windows-firewall/images/windows-firewall-intune.png rename to windows/security/operating-system-security/network-security/windows-firewall/images/windows-firewall-intune.png diff --git a/windows/security/threat-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan.md b/windows/security/operating-system-security/network-security/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan.md similarity index 92% rename from windows/security/threat-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan.md rename to windows/security/operating-system-security/network-security/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan.md index 86253b807a..8f0342581b 100644 --- a/windows/security/threat-protection/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/implementing-your-windows-firewall-with-advanced-security-design-plan.md @@ -1,12 +1,9 @@ --- -title: Implementing Your Windows Defender Firewall with Advanced Security Design Plan (Windows) +title: Implementing Your Windows Defender Firewall with Advanced Security Design Plan description: Implementing Your Windows Defender Firewall with Advanced Security Design Plan ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Implementing Your Windows Defender Firewall with Advanced Security Design Plan diff --git a/windows/security/threat-protection/windows-firewall/isolated-domain-gpos.md b/windows/security/operating-system-security/network-security/windows-firewall/isolated-domain-gpos.md similarity index 78% rename from windows/security/threat-protection/windows-firewall/isolated-domain-gpos.md rename to windows/security/operating-system-security/network-security/windows-firewall/isolated-domain-gpos.md index 4cab3c840b..bc7273b8b5 100644 --- a/windows/security/threat-protection/windows-firewall/isolated-domain-gpos.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/isolated-domain-gpos.md @@ -1,12 +1,9 @@ --- -title: Isolated Domain GPOs (Windows) +title: Isolated Domain GPOs description: Learn about GPOs for isolated domains in this example configuration of Windows Defender Firewall with Advanced Security. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Isolated Domain GPOs diff --git a/windows/security/threat-protection/windows-firewall/isolated-domain.md b/windows/security/operating-system-security/network-security/windows-firewall/isolated-domain.md similarity index 94% rename from windows/security/threat-protection/windows-firewall/isolated-domain.md rename to windows/security/operating-system-security/network-security/windows-firewall/isolated-domain.md index d11cfd0fa4..9925b88452 100644 --- a/windows/security/threat-protection/windows-firewall/isolated-domain.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/isolated-domain.md @@ -1,12 +1,9 @@ --- -title: Isolated Domain (Windows) +title: Isolated Domain description: Learn about the isolated domain, which is the primary zone for trusted devices, which use connection security and firewall rules to control communication. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Isolated Domain diff --git a/windows/security/threat-protection/windows-firewall/isolating-apps-on-your-network.md b/windows/security/operating-system-security/network-security/windows-firewall/isolating-apps-on-your-network.md similarity index 97% rename from windows/security/threat-protection/windows-firewall/isolating-apps-on-your-network.md rename to windows/security/operating-system-security/network-security/windows-firewall/isolating-apps-on-your-network.md index 6d41f4d5e5..225ddf3542 100644 --- a/windows/security/threat-protection/windows-firewall/isolating-apps-on-your-network.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/isolating-apps-on-your-network.md @@ -1,12 +1,9 @@ --- -title: Isolating Microsoft Store Apps on Your Network (Windows) +title: Isolating Microsoft Store Apps on Your Network description: Learn how to customize your firewall configuration to isolate the network access of the new Microsoft Store apps that run on devices added to your network. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Isolating Microsoft Store Apps on Your Network diff --git a/windows/security/threat-protection/windows-firewall/link-the-gpo-to-the-domain.md b/windows/security/operating-system-security/network-security/windows-firewall/link-the-gpo-to-the-domain.md similarity index 83% rename from windows/security/threat-protection/windows-firewall/link-the-gpo-to-the-domain.md rename to windows/security/operating-system-security/network-security/windows-firewall/link-the-gpo-to-the-domain.md index f875516002..ca38900f59 100644 --- a/windows/security/threat-protection/windows-firewall/link-the-gpo-to-the-domain.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/link-the-gpo-to-the-domain.md @@ -1,12 +1,9 @@ --- -title: Link the GPO to the Domain (Windows) +title: Link the GPO to the Domain description: Learn how to link a GPO to the Active Directory container for the target devices, after you configure it in Windows Defender Firewall with Advanced Security. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Link the GPO to the Domain diff --git a/windows/security/threat-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md b/windows/security/operating-system-security/network-security/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md similarity index 87% rename from windows/security/threat-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md rename to windows/security/operating-system-security/network-security/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md index 12d13c2b22..438921b4cf 100644 --- a/windows/security/threat-protection/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md @@ -1,12 +1,9 @@ --- -title: Mapping your implementation goals to a Windows Firewall with Advanced Security design (Windows) +title: Mapping your implementation goals to a Windows Firewall with Advanced Security design description: Mapping your implementation goals to a Windows Firewall with Advanced Security design ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Mapping your implementation goals to a Windows Firewall with Advanced Security design diff --git a/windows/security/threat-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md b/windows/security/operating-system-security/network-security/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md similarity index 90% rename from windows/security/threat-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md rename to windows/security/operating-system-security/network-security/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md index d5f3a66214..90d89139a8 100644 --- a/windows/security/threat-protection/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md @@ -1,12 +1,9 @@ --- -title: Modify GPO Filters (Windows) +title: Modify GPO Filters description: Learn how to modify GPO filters to apply to a different zone or version of windows in Windows Defender Firewall with Advanced Security. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Modify GPO Filters to Apply to a Different Zone or Version of Windows diff --git a/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies.md b/windows/security/operating-system-security/network-security/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies.md similarity index 78% rename from windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies.md rename to windows/security/operating-system-security/network-security/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies.md index 992acb97d6..a9137e37d3 100644 --- a/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/open-the-group-policy-management-console-to-ip-security-policies.md @@ -1,12 +1,9 @@ --- -title: Open the Group Policy Management Console to IP Security Policies (Windows) +title: Open the Group Policy Management Console to IP Security Policies description: Learn how to open the Group Policy Management Console to IP Security Policies to configure GPOs for earlier versions of the Windows operating system. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Open the Group Policy Management Console to IP Security Policies diff --git a/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md b/windows/security/operating-system-security/network-security/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md similarity index 76% rename from windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md rename to windows/security/operating-system-security/network-security/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md index 4752a0a65d..874e99e9c0 100644 --- a/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md @@ -1,5 +1,5 @@ --- -title: Group Policy Management of Windows Firewall with Advanced Security (Windows) +title: Group Policy Management of Windows Firewall with Advanced Security description: Group Policy Management of Windows Firewall with Advanced Security ms.prod: windows-client ms.collection: @@ -7,9 +7,6 @@ ms.collection: - tier3 ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Group Policy Management of Windows Firewall with Advanced Security diff --git a/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall.md b/windows/security/operating-system-security/network-security/windows-firewall/open-the-group-policy-management-console-to-windows-firewall.md similarity index 66% rename from windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall.md rename to windows/security/operating-system-security/network-security/windows-firewall/open-the-group-policy-management-console-to-windows-firewall.md index ce8f5b6d70..9ba7d78ace 100644 --- a/windows/security/threat-protection/windows-firewall/open-the-group-policy-management-console-to-windows-firewall.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/open-the-group-policy-management-console-to-windows-firewall.md @@ -1,12 +1,9 @@ --- -title: Group Policy Management of Windows Defender Firewall (Windows) +title: Group Policy Management of Windows Defender Firewall description: Group Policy Management of Windows Defender Firewall with Advanced Security ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Group Policy Management of Windows Defender Firewall diff --git a/windows/security/threat-protection/windows-firewall/open-windows-firewall-with-advanced-security.md b/windows/security/operating-system-security/network-security/windows-firewall/open-windows-firewall-with-advanced-security.md similarity index 74% rename from windows/security/threat-protection/windows-firewall/open-windows-firewall-with-advanced-security.md rename to windows/security/operating-system-security/network-security/windows-firewall/open-windows-firewall-with-advanced-security.md index ff0894fbe9..8440460338 100644 --- a/windows/security/threat-protection/windows-firewall/open-windows-firewall-with-advanced-security.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/open-windows-firewall-with-advanced-security.md @@ -1,12 +1,9 @@ --- -title: Open Windows Defender Firewall with Advanced Security (Windows) +title: Open Windows Defender Firewall with Advanced Security description: Learn how to open the Windows Defender Firewall with Advanced Security console. You must be a member of the Administrators group. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Open Windows Defender Firewall with Advanced Security diff --git a/windows/security/threat-protection/windows-firewall/planning-certificate-based-authentication.md b/windows/security/operating-system-security/network-security/windows-firewall/planning-certificate-based-authentication.md similarity index 92% rename from windows/security/threat-protection/windows-firewall/planning-certificate-based-authentication.md rename to windows/security/operating-system-security/network-security/windows-firewall/planning-certificate-based-authentication.md index 0d2b6f0d17..da42f627c0 100644 --- a/windows/security/threat-protection/windows-firewall/planning-certificate-based-authentication.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/planning-certificate-based-authentication.md @@ -1,12 +1,9 @@ --- -title: Planning Certificate-based Authentication (Windows) +title: Planning Certificate-based Authentication description: Learn how a device unable to join an Active Directory domain can still participate in an isolated domain by using certificate-based authentication. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Planning Certificate-based Authentication diff --git a/windows/security/threat-protection/windows-firewall/planning-domain-isolation-zones.md b/windows/security/operating-system-security/network-security/windows-firewall/planning-domain-isolation-zones.md similarity index 74% rename from windows/security/threat-protection/windows-firewall/planning-domain-isolation-zones.md rename to windows/security/operating-system-security/network-security/windows-firewall/planning-domain-isolation-zones.md index b9416b2c65..70214d68c5 100644 --- a/windows/security/threat-protection/windows-firewall/planning-domain-isolation-zones.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/planning-domain-isolation-zones.md @@ -1,12 +1,9 @@ --- -title: Planning Domain Isolation Zones (Windows) +title: Planning Domain Isolation Zones description: Learn how to use information you've gathered to make decisions about isolation zones for your environment in Windows Defender Firewall with Advanced Security. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Planning Domain Isolation Zones diff --git a/windows/security/threat-protection/windows-firewall/planning-gpo-deployment.md b/windows/security/operating-system-security/network-security/windows-firewall/planning-gpo-deployment.md similarity index 96% rename from windows/security/threat-protection/windows-firewall/planning-gpo-deployment.md rename to windows/security/operating-system-security/network-security/windows-firewall/planning-gpo-deployment.md index 13d93e09de..0370e8cb08 100644 --- a/windows/security/threat-protection/windows-firewall/planning-gpo-deployment.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/planning-gpo-deployment.md @@ -1,12 +1,9 @@ --- -title: Planning GPO Deployment (Windows) +title: Planning GPO Deployment description: Learn how to use security group filtering and WMI filtering to provide the most flexible options for applying GPOs to devices in Active Directory. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Planning GPO Deployment diff --git a/windows/security/threat-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones.md b/windows/security/operating-system-security/network-security/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones.md similarity index 80% rename from windows/security/threat-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones.md rename to windows/security/operating-system-security/network-security/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones.md index 8fd656a093..2dc15edfc9 100644 --- a/windows/security/threat-protection/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/planning-group-policy-deployment-for-your-isolation-zones.md @@ -1,12 +1,9 @@ --- -title: Planning Group Policy Deployment for Your Isolation Zones (Windows) +title: Planning Group Policy Deployment for Your Isolation Zones description: Learn how to plan a group policy deployment for your isolation zones after you determine the best logical design for your isolation environment. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Planning Group Policy Deployment for Your Isolation Zones diff --git a/windows/security/threat-protection/windows-firewall/planning-isolation-groups-for-the-zones.md b/windows/security/operating-system-security/network-security/windows-firewall/planning-isolation-groups-for-the-zones.md similarity index 91% rename from windows/security/threat-protection/windows-firewall/planning-isolation-groups-for-the-zones.md rename to windows/security/operating-system-security/network-security/windows-firewall/planning-isolation-groups-for-the-zones.md index 1c78f627e8..b58bf3b769 100644 --- a/windows/security/threat-protection/windows-firewall/planning-isolation-groups-for-the-zones.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/planning-isolation-groups-for-the-zones.md @@ -1,12 +1,9 @@ --- -title: Planning Isolation Groups for the Zones (Windows) +title: Planning Isolation Groups for the Zones description: Learn about planning isolation groups for the zones in Microsoft Firewall, including information on universal groups and GPOs. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Planning Isolation Groups for the Zones diff --git a/windows/security/threat-protection/windows-firewall/planning-network-access-groups.md b/windows/security/operating-system-security/network-security/windows-firewall/planning-network-access-groups.md similarity index 88% rename from windows/security/threat-protection/windows-firewall/planning-network-access-groups.md rename to windows/security/operating-system-security/network-security/windows-firewall/planning-network-access-groups.md index a347ceb834..436bc55bbd 100644 --- a/windows/security/threat-protection/windows-firewall/planning-network-access-groups.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/planning-network-access-groups.md @@ -1,12 +1,9 @@ --- -title: Planning Network Access Groups (Windows) +title: Planning Network Access Groups description: Learn how to implement a network access group for users and devices that can access an isolated server in Windows Defender Firewall with Advanced Security. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Planning Network Access Groups diff --git a/windows/security/threat-protection/windows-firewall/planning-server-isolation-zones.md b/windows/security/operating-system-security/network-security/windows-firewall/planning-server-isolation-zones.md similarity index 95% rename from windows/security/threat-protection/windows-firewall/planning-server-isolation-zones.md rename to windows/security/operating-system-security/network-security/windows-firewall/planning-server-isolation-zones.md index 07b4cbd666..c729611dac 100644 --- a/windows/security/threat-protection/windows-firewall/planning-server-isolation-zones.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/planning-server-isolation-zones.md @@ -1,12 +1,9 @@ --- -title: Planning Server Isolation Zones (Windows) +title: Planning Server Isolation Zones description: Learn how to restrict access to a server to approved users by using a server isolation zone in Windows Defender Firewall with Advanced Security. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Planning Server Isolation Zones diff --git a/windows/security/threat-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy.md b/windows/security/operating-system-security/network-security/windows-firewall/planning-settings-for-a-basic-firewall-policy.md similarity index 93% rename from windows/security/threat-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy.md rename to windows/security/operating-system-security/network-security/windows-firewall/planning-settings-for-a-basic-firewall-policy.md index 44044b6641..98e6a224a8 100644 --- a/windows/security/threat-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/planning-settings-for-a-basic-firewall-policy.md @@ -1,12 +1,9 @@ --- -title: Planning Settings for a Basic Firewall Policy (Windows) +title: Planning Settings for a Basic Firewall Policy description: Learn how to design a basic policy for Windows Defender Firewall with Advanced Security, the settings and rules that enforce your requirements on devices. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Planning Settings for a Basic Firewall Policy diff --git a/windows/security/threat-protection/windows-firewall/planning-the-gpos.md b/windows/security/operating-system-security/network-security/windows-firewall/planning-the-gpos.md similarity index 93% rename from windows/security/threat-protection/windows-firewall/planning-the-gpos.md rename to windows/security/operating-system-security/network-security/windows-firewall/planning-the-gpos.md index 1a3b157e57..88716eaf2a 100644 --- a/windows/security/threat-protection/windows-firewall/planning-the-gpos.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/planning-the-gpos.md @@ -1,12 +1,9 @@ --- -title: Planning the GPOs (Windows) +title: Planning the GPOs description: Learn about planning Group Policy Objects for your isolation zones in Windows Defender Firewall with Advanced Security, after you design the zone layout. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Planning the GPOs diff --git a/windows/security/threat-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security.md b/windows/security/operating-system-security/network-security/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security.md similarity index 91% rename from windows/security/threat-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security.md rename to windows/security/operating-system-security/network-security/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security.md index 1e06c6b8aa..7e7bff476d 100644 --- a/windows/security/threat-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security.md @@ -1,12 +1,9 @@ --- -title: Plan to Deploy Windows Defender Firewall with Advanced Security (Windows) +title: Plan to Deploy Windows Defender Firewall with Advanced Security description: Use the design information in this article to plan for the deployment of Windows Defender Firewall with Advanced Security in your organization. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Planning to Deploy Windows Defender Firewall with Advanced Security diff --git a/windows/security/threat-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design.md b/windows/security/operating-system-security/network-security/windows-firewall/planning-your-windows-firewall-with-advanced-security-design.md similarity index 94% rename from windows/security/threat-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design.md rename to windows/security/operating-system-security/network-security/windows-firewall/planning-your-windows-firewall-with-advanced-security-design.md index 8909eac102..e048764374 100644 --- a/windows/security/threat-protection/windows-firewall/planning-your-windows-firewall-with-advanced-security-design.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/planning-your-windows-firewall-with-advanced-security-design.md @@ -1,12 +1,9 @@ --- -title: Planning Your Windows Defender Firewall with Advanced Security Design (Windows) +title: Planning Your Windows Defender Firewall with Advanced Security Design description: After you gather the relevant information, select the design or combination of designs for Windows Defender Firewall with Advanced Security in your environment. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Planning Your Windows Defender Firewall with Advanced Security Design diff --git a/windows/security/threat-protection/windows-firewall/protect-devices-from-unwanted-network-traffic.md b/windows/security/operating-system-security/network-security/windows-firewall/protect-devices-from-unwanted-network-traffic.md similarity index 90% rename from windows/security/threat-protection/windows-firewall/protect-devices-from-unwanted-network-traffic.md rename to windows/security/operating-system-security/network-security/windows-firewall/protect-devices-from-unwanted-network-traffic.md index 9fcf79f2f1..ee0412021e 100644 --- a/windows/security/threat-protection/windows-firewall/protect-devices-from-unwanted-network-traffic.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/protect-devices-from-unwanted-network-traffic.md @@ -1,12 +1,9 @@ --- -title: Protect devices from unwanted network traffic (Windows) +title: Protect devices from unwanted network traffic description: Learn how running a host-based firewall on every device in your organization can help protect against attacks as part of a defense-in-depth security strategy. ms.prod: windows-client ms.topic: conceptual ms.date: 01/18/2022 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Protect devices from unwanted network traffic diff --git a/windows/security/threat-protection/windows-firewall/quarantine.md b/windows/security/operating-system-security/network-security/windows-firewall/quarantine.md similarity index 96% rename from windows/security/threat-protection/windows-firewall/quarantine.md rename to windows/security/operating-system-security/network-security/windows-firewall/quarantine.md index 5b7c793f7f..093f4274fb 100644 --- a/windows/security/threat-protection/windows-firewall/quarantine.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/quarantine.md @@ -4,9 +4,6 @@ description: Quarantine behavior is explained in detail. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Quarantine behavior diff --git a/windows/security/threat-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources.md b/windows/security/operating-system-security/network-security/windows-firewall/require-encryption-when-accessing-sensitive-network-resources.md similarity index 91% rename from windows/security/threat-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources.md rename to windows/security/operating-system-security/network-security/windows-firewall/require-encryption-when-accessing-sensitive-network-resources.md index 44cc1d2090..1070cb1a65 100644 --- a/windows/security/threat-protection/windows-firewall/require-encryption-when-accessing-sensitive-network-resources.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/require-encryption-when-accessing-sensitive-network-resources.md @@ -1,12 +1,9 @@ --- -title: Require Encryption When Accessing Sensitive Network Resources (Windows) +title: Require Encryption When Accessing Sensitive Network Resources description: Windows Defender Firewall with Advanced Security allows you to require that all network traffic in an isolated domain be encrypted. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Require Encryption When Accessing Sensitive Network Resources diff --git a/windows/security/threat-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices.md b/windows/security/operating-system-security/network-security/windows-firewall/restrict-access-to-only-specified-users-or-devices.md similarity index 91% rename from windows/security/threat-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices.md rename to windows/security/operating-system-security/network-security/windows-firewall/restrict-access-to-only-specified-users-or-devices.md index 54222bff1a..28c8049c79 100644 --- a/windows/security/threat-protection/windows-firewall/restrict-access-to-only-specified-users-or-devices.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/restrict-access-to-only-specified-users-or-devices.md @@ -1,12 +1,9 @@ --- -title: Restrict Access to Only Specified Users or Devices (Windows) +title: Restrict Access to Only Specified Users or Devices description: Restrict access to devices and users that are members of domain groups authorized to access that device using Windows Defender Firewall with Advanced Security. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Restrict Access to Only Specified Users or Computers diff --git a/windows/security/threat-protection/windows-firewall/restrict-access-to-only-trusted-devices.md b/windows/security/operating-system-security/network-security/windows-firewall/restrict-access-to-only-trusted-devices.md similarity index 93% rename from windows/security/threat-protection/windows-firewall/restrict-access-to-only-trusted-devices.md rename to windows/security/operating-system-security/network-security/windows-firewall/restrict-access-to-only-trusted-devices.md index c2298b824a..f02e9c5708 100644 --- a/windows/security/threat-protection/windows-firewall/restrict-access-to-only-trusted-devices.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/restrict-access-to-only-trusted-devices.md @@ -1,12 +1,9 @@ --- -title: Restrict access to only trusted devices (Windows) +title: Restrict access to only trusted devices description: Windows Defender Firewall with Advanced Security enables you to isolate devices you trust and restrict access of untrusted devices to trusted devices. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Restrict access to only trusted devices diff --git a/windows/security/threat-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only.md b/windows/security/operating-system-security/network-security/windows-firewall/restrict-server-access-to-members-of-a-group-only.md similarity index 87% rename from windows/security/threat-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only.md rename to windows/security/operating-system-security/network-security/windows-firewall/restrict-server-access-to-members-of-a-group-only.md index 5132add40c..70a23e653f 100644 --- a/windows/security/threat-protection/windows-firewall/restrict-server-access-to-members-of-a-group-only.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/restrict-server-access-to-members-of-a-group-only.md @@ -1,12 +1,9 @@ --- -title: Restrict Server Access to Members of a Group Only (Windows) +title: Restrict Server Access to Members of a Group Only description: Create a firewall rule to access isolated servers running Windows Server 2008 or later and restrict server access to members of a group. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Restrict Server Access to Members of a Group Only diff --git a/windows/security/threat-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2.md b/windows/security/operating-system-security/network-security/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2.md similarity index 96% rename from windows/security/threat-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2.md rename to windows/security/operating-system-security/network-security/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2.md index 8f7f607d58..43e2f9523d 100644 --- a/windows/security/threat-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2.md @@ -1,12 +1,9 @@ --- -title: Securing End-to-End IPsec Connections by Using IKEv2 in Windows Server 2012 (Windows) +title: Securing End-to-End IPsec Connections by Using IKEv2 in Windows Server 2012 description: Securing End-to-End IPsec Connections by Using IKEv2 in Windows Server 2012 ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Securing End-to-End IPsec connections by using IKEv2 diff --git a/windows/security/threat-protection/windows-firewall/server-isolation-gpos.md b/windows/security/operating-system-security/network-security/windows-firewall/server-isolation-gpos.md similarity index 85% rename from windows/security/threat-protection/windows-firewall/server-isolation-gpos.md rename to windows/security/operating-system-security/network-security/windows-firewall/server-isolation-gpos.md index 11d7750b21..4cf32d44c0 100644 --- a/windows/security/threat-protection/windows-firewall/server-isolation-gpos.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/server-isolation-gpos.md @@ -1,12 +1,9 @@ --- -title: Server Isolation GPOs (Windows) +title: Server Isolation GPOs description: Learn about required GPOs for isolation zones and how many server isolation zones you need in Windows Defender Firewall with Advanced Security. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Server Isolation GPOs diff --git a/windows/security/threat-protection/windows-firewall/server-isolation-policy-design-example.md b/windows/security/operating-system-security/network-security/windows-firewall/server-isolation-policy-design-example.md similarity index 95% rename from windows/security/threat-protection/windows-firewall/server-isolation-policy-design-example.md rename to windows/security/operating-system-security/network-security/windows-firewall/server-isolation-policy-design-example.md index 41824b3e09..e1129a36b1 100644 --- a/windows/security/threat-protection/windows-firewall/server-isolation-policy-design-example.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/server-isolation-policy-design-example.md @@ -1,12 +1,9 @@ --- -title: Server Isolation Policy Design Example (Windows) +title: Server Isolation Policy Design Example description: Learn about server isolation policy design in Windows Defender Firewall with Advanced Security by referring to this example of a fictitious company. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Server Isolation Policy Design Example diff --git a/windows/security/threat-protection/windows-firewall/server-isolation-policy-design.md b/windows/security/operating-system-security/network-security/windows-firewall/server-isolation-policy-design.md similarity index 93% rename from windows/security/threat-protection/windows-firewall/server-isolation-policy-design.md rename to windows/security/operating-system-security/network-security/windows-firewall/server-isolation-policy-design.md index f2bedf42fb..327863f5ac 100644 --- a/windows/security/threat-protection/windows-firewall/server-isolation-policy-design.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/server-isolation-policy-design.md @@ -1,12 +1,9 @@ --- -title: Server Isolation Policy Design (Windows) +title: Server Isolation Policy Design description: Learn about server isolation policy design, where you assign servers to a zone that allows access only to members of an approved network access group. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Server Isolation Policy Design diff --git a/windows/security/threat-protection/windows-firewall/troubleshooting-uwp-firewall.md b/windows/security/operating-system-security/network-security/windows-firewall/troubleshooting-uwp-firewall.md similarity index 99% rename from windows/security/threat-protection/windows-firewall/troubleshooting-uwp-firewall.md rename to windows/security/operating-system-security/network-security/windows-firewall/troubleshooting-uwp-firewall.md index 2716e511cc..e120af6116 100644 --- a/windows/security/threat-protection/windows-firewall/troubleshooting-uwp-firewall.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/troubleshooting-uwp-firewall.md @@ -3,9 +3,6 @@ title: Troubleshooting UWP App Connectivity Issues in Windows Firewall description: Troubleshooting UWP App Connectivity Issues in Windows Firewall ms.prod: windows-client ms.topic: troubleshooting -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later ms.date: 12/31/2017 --- diff --git a/windows/security/threat-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior.md b/windows/security/operating-system-security/network-security/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior.md similarity index 82% rename from windows/security/threat-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior.md rename to windows/security/operating-system-security/network-security/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior.md index b51780f073..91091b431c 100644 --- a/windows/security/threat-protection/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/turn-on-windows-firewall-and-configure-default-behavior.md @@ -1,12 +1,9 @@ --- -title: Turn on Windows Defender Firewall with Advanced Security and Configure Default Behavior (Windows) +title: Turn on Windows Defender Firewall with Advanced Security and Configure Default Behavior description: Turn on Windows Defender Firewall with Advanced Security and Configure Default Behavior ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Turn on Windows Defender Firewall with Advanced Security and Configure Default Behavior diff --git a/windows/security/threat-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process.md b/windows/security/operating-system-security/network-security/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process.md similarity index 79% rename from windows/security/threat-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process.md rename to windows/security/operating-system-security/network-security/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process.md index 0658883723..e397c3d8a7 100644 --- a/windows/security/threat-protection/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/understanding-the-windows-firewall-with-advanced-security-design-process.md @@ -1,12 +1,9 @@ --- -title: Understand WFAS Deployment (Windows) +title: Understand WFAS Deployment description: Resources for helping you understand the Windows Defender Firewall with Advanced Security (WFAS) Design Process ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Understanding the Windows Defender Firewall with Advanced Security Design Process diff --git a/windows/security/threat-protection/windows-firewall/verify-that-network-traffic-is-authenticated.md b/windows/security/operating-system-security/network-security/windows-firewall/verify-that-network-traffic-is-authenticated.md similarity index 93% rename from windows/security/threat-protection/windows-firewall/verify-that-network-traffic-is-authenticated.md rename to windows/security/operating-system-security/network-security/windows-firewall/verify-that-network-traffic-is-authenticated.md index c535da432a..686e2d1efc 100644 --- a/windows/security/threat-protection/windows-firewall/verify-that-network-traffic-is-authenticated.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/verify-that-network-traffic-is-authenticated.md @@ -1,12 +1,9 @@ --- -title: Verify That Network Traffic Is Authenticated (Windows) +title: Verify That Network Traffic Is Authenticated description: Learn how to confirm that network traffic is being protected by IPsec authentication after you configure your domain isolation rule to require authentication. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Verify That Network Traffic Is Authenticated diff --git a/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell.md b/windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell.md similarity index 99% rename from windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell.md rename to windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell.md index db4d835bdb..6bf60cec66 100644 --- a/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security-administration-with-windows-powershell.md @@ -1,12 +1,9 @@ --- -title: Windows Defender Firewall with Advanced Security Administration with Windows PowerShell (Windows) +title: Windows Defender Firewall with Advanced Security Administration with Windows PowerShell description: Windows Defender Firewall with Advanced Security Administration with Windows PowerShell ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Windows Defender Firewall with Advanced Security Administration with Windows PowerShell diff --git a/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md b/windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md similarity index 93% rename from windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md rename to windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md index 708fe115d7..7e97506932 100644 --- a/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md @@ -1,12 +1,9 @@ --- -title: Windows Defender Firewall with Advanced Security deployment overview (Windows) +title: Windows Defender Firewall with Advanced Security deployment overview description: Use this guide to deploy Windows Defender Firewall with Advanced Security for your enterprise to help protect devices and data that they share across a network. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Windows Defender Firewall with Advanced Security deployment overview diff --git a/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide.md b/windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security-design-guide.md similarity index 97% rename from windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide.md rename to windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security-design-guide.md index 75c5a94168..02d6c56ae0 100644 --- a/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-design-guide.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security-design-guide.md @@ -1,12 +1,9 @@ --- -title: Windows Defender Firewall with Advanced Security design guide (Windows) +title: Windows Defender Firewall with Advanced Security design guide description: Learn about common goals for using Windows Defender Firewall with Advanced Security to choose or create a design for deploying the firewall in your enterprise. ms.prod: windows-client ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Windows Defender Firewall with Advanced Security design guide diff --git a/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security.md b/windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security.md similarity index 91% rename from windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security.md rename to windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security.md index 282125d3bd..83418c0d85 100644 --- a/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security.md @@ -1,5 +1,5 @@ --- -title: Windows Defender Firewall with Advanced Security (Windows) +title: Windows Defender Firewall with Advanced Security description: Learn overview information about the Windows Defender Firewall with Advanced Security (WFAS) and Internet Protocol security (IPsec) features. ms.prod: windows-client ms.collection: @@ -7,9 +7,6 @@ ms.collection: - tier3 ms.topic: conceptual ms.date: 09/08/2021 -appliesto: - - ✅ Windows 10 and later - - ✅ Windows Server 2016 and later --- # Windows Defender Firewall with Advanced Security @@ -23,7 +20,7 @@ Windows Defender Firewall in Windows 8, Windows 7, Windows Vista, Windows Serv The Windows Defender Firewall with Advanced Security MMC snap-in is more flexible and provides much more functionality than the consumer-friendly Windows Defender Firewall interface found in the Control Panel. Both interfaces interact with the same underlying services, but provide different levels of control over those services. While the Windows Defender Firewall Control Panel program can protect a single device in a home environment, it doesn't provide enough centralized management or security features to help secure more complex network traffic found in a typical business enterprise environment. - +[!INCLUDE [windows-firewall](../../../../../includes/licensing/windows-firewall.md)] ## Feature description diff --git a/windows/security/operating-system-security/system-security/toc.yml b/windows/security/operating-system-security/system-security/toc.yml new file mode 100644 index 0000000000..86abf54e55 --- /dev/null +++ b/windows/security/operating-system-security/system-security/toc.yml @@ -0,0 +1,28 @@ +items: +- name: Secure the Windows boot process + href: ../../information-protection/secure-the-windows-10-boot-process.md +- name: Secure Boot and Trusted Boot + href: ../../trusted-boot.md +- name: Measured Boot + href: /windows/compatibility/measured-boot +- name: Device health attestation service + href: ../../threat-protection/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md +- name: Cryptography and certificate management + href: ../../cryptography-certificate-mgmt.md +- name: The Windows Security app + href: ../../threat-protection/windows-defender-security-center/windows-defender-security-center.md + items: + - name: Virus & threat protection + href: ../../threat-protection\windows-defender-security-center\wdsc-virus-threat-protection.md + - name: Account protection + href: ../../threat-protection\windows-defender-security-center\wdsc-account-protection.md + - name: Firewall & network protection + href: ../../threat-protection\windows-defender-security-center\wdsc-firewall-network-protection.md + - name: App & browser control + href: ../../threat-protection\windows-defender-security-center\wdsc-app-browser-control.md + - name: Device security + href: ../../threat-protection\windows-defender-security-center\wdsc-device-security.md + - name: Device performance & health + href: ../../threat-protection\windows-defender-security-center\wdsc-device-performance-health.md + - name: Family options + href: ../../threat-protection\windows-defender-security-center\wdsc-family-options.md \ No newline at end of file diff --git a/windows/security/operating-system-security/toc.yml b/windows/security/operating-system-security/toc.yml new file mode 100644 index 0000000000..a0ee50c4bb --- /dev/null +++ b/windows/security/operating-system-security/toc.yml @@ -0,0 +1,13 @@ +items: +- name: Overview + href: ../operating-system.md +- name: System security + href: system-security/toc.yml +- name: Virus and threat protection + href: virus-and-threat-protection/toc.yml +- name: Network security + href: network-security/toc.yml +- name: Data protection + href: data-protection/toc.yml +- name: Device management + href: device-management/toc.yml \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md b/windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/available-settings.md similarity index 99% rename from windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md rename to windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/available-settings.md index 3c1ed6dcea..18f1795945 100644 --- a/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md +++ b/windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/available-settings.md @@ -4,7 +4,7 @@ description: A list of all available settings for Microsoft Defender SmartScreen ms.prod: windows-client author: vinaypamnani-msft ms.localizationpriority: medium -ms.date: 09/28/2020 +ms.date: 05/31/2023 ms.reviewer: manager: aaroncz ms.author: vinpa diff --git a/windows/security/threat-protection/microsoft-defender-smartscreen/phishing-protection-microsoft-defender-smartscreen.md b/windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/enhanced-phishing-protection.md similarity index 95% rename from windows/security/threat-protection/microsoft-defender-smartscreen/phishing-protection-microsoft-defender-smartscreen.md rename to windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/enhanced-phishing-protection.md index aa2ffc3b9d..74a3cd15d9 100644 --- a/windows/security/threat-protection/microsoft-defender-smartscreen/phishing-protection-microsoft-defender-smartscreen.md +++ b/windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/enhanced-phishing-protection.md @@ -8,7 +8,7 @@ ms.author: vinpa ms.reviewer: paoloma manager: aaroncz ms.localizationpriority: medium -ms.date: 10/07/2022 +ms.date: 05/31/2023 adobe-target: true appliesto: - ✅ Windows 11, version 22H2 @@ -19,12 +19,15 @@ ms.topic: conceptual Starting in Windows 11, version 22H2, Enhanced Phishing Protection in Microsoft Defender SmartScreen helps protect Microsoft school or work passwords against phishing and unsafe usage on sites and apps. -Enhanced Phishing Protection works alongside Windows security protections, and helps protect typed work or school passwords used to sign into Windows 11 in these ways: +If a user signs into Windows using a password, Enhanced Phishing Protection works alongside Windows security protections, and helps protect typed work or school password used to sign into Windows 11 in these ways: - If users type their work or school password on any Chromium browser, into a site deemed malicious by Microsoft Defender SmartScreen, Enhanced Phishing Protection alerts them. It also prompts them to change their password so attackers can't gain access to their account. - Reusing work or school passwords makes it easy for attackers who compromise a user's password to gain access to their other accounts. Enhanced Phishing Protection can warn users if they reuse their work or school Microsoft account password on sites and apps and prompt them to change their password. - Since it's unsafe to store plaintext passwords in text editors, Enhanced Phishing Protection can warn users if they store their work or school password in Notepad, Word, or any Microsoft 365 Office app, and recommends they delete their password from the file. +> [!NOTE] +> When a user signs-in to a device using a Windows Hello for Business PIN or biometric, Enhanced Phishing Protection does not alert the user or send events to Microsoft Defender for Endpoint. + ## Benefits of Enhanced Phishing Protection in Microsoft Defender SmartScreen Enhanced Phishing Protection provides robust phishing protections for work or school passwords that are used to sign into Windows 11. The benefits of Enhanced Phishing Protection are: @@ -37,6 +40,8 @@ Enhanced Phishing Protection provides robust phishing protections for work or sc - **Easy management through Group Policy and Microsoft Intune:** Enhanced Phishing Protection works with Group Policy and mobile device management (MDM) settings to help you manage your organization's computer settings. Based on how you set up Enhanced Phishing Protection, you can customize which phishing protection scenarios show users warning dialogs. For example, the Service Enabled setting determines whether the Enhanced Phishing Protection service is on or off. The feature is in audit mode if the other settings, which correspond to notification policies, aren't enabled. +[!INCLUDE [enhanced-phishing-protection-with-smartscreen](../../../../../includes/licensing/enhanced-phishing-protection-with-smartscreen.md)] + ## Configure Enhanced Phishing Protection for your organization Enhanced Phishing Protection can be configured via Microsoft Intune, Group Policy Objects (GPO) or Configuration Service Providers (CSP) with an MDM service. Follow these instructions to configure your devices using either Microsoft Intune, GPO or CSP. @@ -116,11 +121,10 @@ To better help you protect your organization, we recommend turning on and using ## Related articles - [SmartScreen Frequently Asked Questions](https://fb.smartscreen.microsoft.com/smartscreenfaq.aspx) -- [Threat protection](../index.md) -- [Configuration service provider reference](/windows/client-management/mdm/configuration-service-provider-reference) +- [WebThreatDefense CSP][WIN-1] +- [Threat protection](index.md) ------------- + [WIN-1]: /windows/client-management/mdm/policy-csp-webthreatdefense - -[MEM-2]: /mem/intune/configuration/settings-catalog \ No newline at end of file +[MEM-2]: /mem/intune/configuration/settings-catalog diff --git a/windows/security/threat-protection/microsoft-defender-smartscreen/images/Microsoft-Defender-Smartscreen-submission.png b/windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/images/Microsoft-Defender-Smartscreen-submission.png similarity index 100% rename from windows/security/threat-protection/microsoft-defender-smartscreen/images/Microsoft-Defender-Smartscreen-submission.png rename to windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/images/Microsoft-Defender-Smartscreen-submission.png diff --git a/windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/images/icons/group-policy.svg b/windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/images/icons/group-policy.svg new file mode 100644 index 0000000000..ace95add6b --- /dev/null +++ b/windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/images/icons/group-policy.svg @@ -0,0 +1,3 @@ + + + \ No newline at end of file diff --git a/windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/images/icons/intune.svg b/windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/images/icons/intune.svg new file mode 100644 index 0000000000..6e0d938aed --- /dev/null +++ b/windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/images/icons/intune.svg @@ -0,0 +1,24 @@ + + + + + + + + + + + + + + + + Icon-intune-329 + + + + + + + + \ No newline at end of file diff --git a/windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/images/icons/windows-os.svg b/windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/images/icons/windows-os.svg new file mode 100644 index 0000000000..da64baf975 --- /dev/null +++ b/windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/images/icons/windows-os.svg @@ -0,0 +1,3 @@ + + + \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md b/windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/index.md similarity index 95% rename from windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md rename to windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/index.md index e7f02d821d..8b326614fd 100644 --- a/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md +++ b/windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/index.md @@ -12,7 +12,7 @@ adobe-target: true ms.collection: - tier2 - highpri -ms.date: 03/20/2023 +ms.date: 05/31/2023 ms.topic: article appliesto: - ✅ Windows 11 @@ -42,12 +42,14 @@ Microsoft Defender SmartScreen provide an early warning system against websites - **Reputation-based URL and app protection:** Microsoft Defender SmartScreen evaluates a website's URLs to determine if they're known to distribute or host unsafe content. It also provides reputation checks for apps, checking downloaded programs and the digital signature used to sign a file. If a URL, a file, an app, or a certificate has an established reputation, users don't see any warnings. If there's no reputation, the item is marked as a higher risk and presents a warning to the user. - **Operating system integration:** Microsoft Defender SmartScreen is integrated into the Windows 10 operating system. It checks any files an app (including 3rd-party browsers and email clients) that attempts to download and run. - **Improved heuristics and diagnostic data:** Microsoft Defender SmartScreen is constantly learning and endeavoring to stay up to date, so it can help to protect you against potentially malicious sites and files. -- **Management through group policy and Microsoft Intune:** Microsoft Defender SmartScreen supports using both group policy and Microsoft Intune settings. For more info about all available settings, see [Available Microsoft Defender SmartScreen group policy and mobile device management (MDM) settings](microsoft-defender-smartscreen-available-settings.md). +- **Management through group policy and Microsoft Intune:** Microsoft Defender SmartScreen supports using both group policy and Microsoft Intune settings. For more info about all available settings, see [Available Microsoft Defender SmartScreen group policy and mobile device management (MDM) settings](available-settings.md). - **Blocking URLs associated with potentially unwanted applications:** In Microsoft Edge (based on Chromium), SmartScreen blocks URLs associated with potentially unwanted applications, or PUAs. For more information on blocking URLs associated with PUAs, see [Detect and block potentially unwanted applications](/microsoft-365/security/defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus). > [!IMPORTANT] > SmartScreen protects against malicious files from the internet. It does not protect against malicious files on internal locations or network shares, such as shared folders with UNC paths or SMB/CIFS shares. +[!INCLUDE [microsoft-defender-smartscreen](../../../../../includes/licensing/microsoft-defender-smartscreen.md)] + ## Submit files to Microsoft Defender SmartScreen for review If you believe a warning or block was incorrectly shown for a file or application, or if you believe an undetected file is malware, you can [submit a file](https://www.microsoft.com/wdsi/filesubmission/) to Microsoft for review. For more information, see [Submit files for analysis](/microsoft-365/security/intelligence/submission-guide). @@ -59,5 +61,4 @@ When submitting a file for Microsoft Defender SmartScreen, make sure to select * ## Related articles - [SmartScreen frequently asked questions](https://fb.smartscreen.microsoft.com/smartscreenfaq.aspx) -- [Available Microsoft Defender SmartScreen group policy and mobile device management (MDM) settings](microsoft-defender-smartscreen-available-settings.md) - [Configuration service provider reference](/windows/client-management/mdm/configuration-service-provider-reference) diff --git a/windows/security/operating-system-security/virus-and-threat-protection/toc.yml b/windows/security/operating-system-security/virus-and-threat-protection/toc.yml new file mode 100644 index 0000000000..9f7c2d6f2f --- /dev/null +++ b/windows/security/operating-system-security/virus-and-threat-protection/toc.yml @@ -0,0 +1,25 @@ +items: + - name: Microsoft Defender Antivirus 🔗 + href: /microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-windows + - name: Configuring LSA Protection + href: /windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection?toc=/windows/security/toc.json&bc=/windows/security/breadcrumb/toc.json + - name: Attack surface reduction (ASR) 🔗 + href: /microsoft-365/security/defender-endpoint/attack-surface-reduction + - name: Tamper protection for MDE 🔗 + href: /microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection + - name: Microsoft Vulnerable Driver Blocklist 🔗 + href: ../../threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules.md + - name: Controlled folder access 🔗 + href: /microsoft-365/security/defender-endpoint/controlled-folders + - name: Exploit protection 🔗 + href: /microsoft-365/security/defender-endpoint/exploit-protection + - name: Microsoft Defender SmartScreen + items: + - name: Overview + href: microsoft-defender-smartscreen/index.md + - name: Available settings + href: microsoft-defender-smartscreen/available-settings.md + - name: Enhanced Phishing Protection + href: microsoft-defender-smartscreen/enhanced-phishing-protection.md + - name: Microsoft Defender for Endpoint 🔗 + href: /microsoft-365/security/defender-endpoint diff --git a/windows/security/operating-system.md b/windows/security/operating-system.md index 5a71a44832..d5a1753a2a 100644 --- a/windows/security/operating-system.md +++ b/windows/security/operating-system.md @@ -23,18 +23,19 @@ Use the links in the following table to learn more about the operating system se |:---|:---| | Secure Boot and Trusted Boot | Secure Boot and Trusted Boot help prevent malware and corrupted components from loading when a Windows device is starting. Secure Boot starts with initial boot-up protection, and then Trusted Boot picks up the process. Together, Secure Boot and Trusted Boot help to ensure your Windows system boots up safely and securely.

                  Learn more [Secure Boot and Trusted Boot](trusted-boot.md). | Cryptography and certificate management|Cryptography uses code to convert data so that only a specific recipient can read it by using a key. Cryptography enforces privacy to prevent anyone except the intended recipient from reading data, integrity to ensure data is free of tampering, and authentication that verifies identity to ensure that communication is secure.

                  Learn more about [Cryptography and certificate management](cryptography-certificate-mgmt.md).

                  | -Windows Security app | The Windows built-in security application found in settings provides an at-a-glance view of the security status and health of your device. These insights help you identify issues and take action to make sure you’re protected. You can quickly see the status of your virus and threat protection, firewall and network security, device security controls, and more.

                  Learn more about the [Windows Security app](threat-protection/windows-defender-security-center/windows-defender-security-center.md).| +Windows Security app | The Windows built-in security application found in settings provides an at-a-glance view of the security status and health of your device. These insights help you identify issues and take action to make sure you're protected. You can quickly see the status of your virus and threat protection, firewall and network security, device security controls, and more.

                  Learn more about the [Windows Security app](threat-protection/windows-defender-security-center/windows-defender-security-center.md).| | Encryption and data protection | Wherever confidential data is stored, it must be protected against unauthorized access, whether through physical device theft or from malicious applications. Windows provides strong at-rest data-protection solutions that guard against nefarious attackers.

                  Learn more about [Encryption](encryption-data-protection.md). | BitLocker | BitLocker Drive Encryption is a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers. BitLocker provides the most protection when used with a Trusted Platform Module (TPM) version 1.2 or later.

                  Learn more about [BitLocker](information-protection/bitlocker/bitlocker-overview.md). | -| Encrypted Hard Drive | Encrypted Hard Drive uses the rapid encryption that is provided by BitLocker Drive Encryption to enhance data security and management.
                  By offloading the cryptographic operations to hardware, Encrypted Hard Drives increase BitLocker performance and reduce CPU usage and power consumption. Because Encrypted Hard Drives encrypt data quickly, enterprise devices can expand BitLocker deployment with minimal impact on productivity.

                  Learn more about [Encrypted Hard Drives](information-protection/encrypted-hard-drive.md).

                  | +| Encrypted Hard Drive | Encrypted Hard Drive uses the rapid encryption that is provided by BitLocker Drive Encryption to enhance data security and management.
                  By offloading the cryptographic operations to hardware, Encrypted Hard Drives increase BitLocker performance and reduce CPU usage and power consumption. Because Encrypted Hard Drives encrypt data quickly, enterprise devices can expand BitLocker deployment with minimal impact on productivity.

                  Learn more about [Encrypted Hard Drives](information-protection/encrypted-hard-drive.md).| +| S/MIME | S/MIME lets users encrypt outgoing messages and attachments so that only intended recipients who have a digital identification (ID), also known as a certificate, can read them. Users can digitally sign a message, which provides the recipients with a way to verify the identity of the sender and that the message hasn't been tampered with.

                  Learn more about [S/MIME for Windows](operating-system-security/data-protection/configure-s-mime.md).| | Security baselines | A security baseline is a group of Microsoft-recommended configuration settings that explains their security impact. These settings are based on feedback from Microsoft security engineering teams, product groups, partners, and customers.

                  Security baselines are included in the [Security Compliance Toolkit](threat-protection/windows-security-configuration-framework/security-compliance-toolkit-10.md) that you can download from the Microsoft Download Center.

                  Learn more about [security baselines](threat-protection/windows-security-configuration-framework/windows-security-baselines.md). | | Virtual Private Network | Virtual private networks (VPNs) are point-to-point connections across a private or public network, such as the Internet. A VPN client uses special TCP/IP or UDP-based protocols, called tunneling protocols, to make a virtual call to a virtual port on a VPN server.

                  Learn more about [Virtual Private Networks](identity-protection/vpn/vpn-guide.md).

                  | | Windows Defender Firewall | Windows Defender Firewall is a stateful host firewall that helps secure the device by allowing you to create rules that determine which network traffic is permitted to enter the device from the network and which network traffic the device is allowed to send to the network. Windows Defender Firewall also supports Internet Protocol security (IPsec), which you can use to require authentication from any device that is attempting to communicate with your device.

                  Learn more about [Windows Defender Firewall with advanced security](threat-protection/windows-firewall/windows-firewall-with-advanced-security.md).

                  | Antivirus & antimalware protection | Microsoft Defender Antivirus is included in all versions of Windows 10, Windows Server 2016 and later, and Windows 11. If you have another antivirus app installed and turned on, Microsoft Defender Antivirus will turn off automatically. If you uninstall the other app, Microsoft Defender Antivirus will turn back on.

                  From the moment you boot Windows, Microsoft Defender Antivirus continually monitors for malware, viruses, and security threats. Updates are downloaded automatically to help protect your device from threats. Microsoft Defender Antivirus continually scans for malware and threats, and also detects and blocks [potentially unwanted applications](/microsoft-365/security/defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus) (applications that can negatively impact your device even though they are not considered malware).

                  Microsoft Defender Antivirus integrates with [cloud-delivered protection](/microsoft-365/security/defender-endpoint/cloud-protection-microsoft-defender-antivirus), which helps ensure near-instant detection and blocking of new and emerging threats.

                  Learn more about [next-generation protection and Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-windows).| | Attack surface reduction rules | Your attack surfaces are the places and ways you are vulnerable to a cyber attack. Attack surface reduction rules are built into Windows and Windows Server to prevent and block certain behaviors that are often abused to compromise your device or network. Such behaviors can include launching scripts or executables that attempt to download or run other files, running suspicious scripts, or performing other behaviors that apps don't typically initiate during normal work. You can configure your attack surface reduction rules to protect against these risky behaviors.

                  Learn more about [Attack surface reduction rules](/microsoft-365/security/defender-endpoint/attack-surface-reduction) | -| Anti-tampering protection | During cyber attacks (like ransomware attempts), bad actors attempt to disable security features, such as antivirus protection on targeted devices. Bad actors like to disable security features to get easier access to user’s data, to install malware, or to otherwise exploit user’s data, identity, and devices without fear of being blocked. Tamper protection helps prevent these kinds of activities.

                  With tamper protection, malware is prevented from taking actions such as:
                  - Disabling virus and threat protection
                  - Disabling real-time protection
                  - Turning off behavior monitoring
                  - Disabling antivirus (such as IOfficeAntivirus (IOAV))
                  - Disabling cloud-delivered protection
                  - Removing security intelligence updates

                  Learn more about [Tamper protection](/microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection). | +| Anti-tampering protection | During cyber attacks (like ransomware attempts), bad actors attempt to disable security features, such as antivirus protection on targeted devices. Bad actors like to disable security features to get easier access to user's data, to install malware, or to otherwise exploit user's data, identity, and devices without fear of being blocked. Tamper protection helps prevent these kinds of activities.

                  With tamper protection, malware is prevented from taking actions such as:
                  - Disabling virus and threat protection
                  - Disabling real-time protection
                  - Turning off behavior monitoring
                  - Disabling antivirus (such as IOfficeAntivirus (IOAV))
                  - Disabling cloud-delivered protection
                  - Removing security intelligence updates

                  Learn more about [Tamper protection](/microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection). | | Network protection | Network protection in Windows helps prevent users from accessing dangerous IP addresses and domains that may host phishing scams, exploits, and other malicious content on the Internet. Network protection is part of attack surface reduction and helps provide an extra layer of protection for a user. Using reputation-based services, network protection blocks access to potentially harmful, low-reputation based domains and IP addresses.

                  In enterprise environments, network protection works best with [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/), which provides detailed reporting into protection events as part of larger investigation scenarios.

                  Learn more about [Network protection](/microsoft-365/security/defender-endpoint/network-protection). | -| Controlled folder access | With controlled folder access, you can protect your valuable information in specific folders by managing apps’ access to specific folders. Only trusted apps can access protected folders, which are specified when controlled folder access is configured. Typically, commonly used folders, such as those used for documents, pictures, downloads, are included in the list of controlled folders. Controlled folder access helps protect valuable data from malicious apps and threats, such as ransomware.

                  Learn more about [Controlled folder access](/microsoft-365/security/defender-endpoint/controlled-folders). | +| Controlled folder access | With controlled folder access, you can protect your valuable information in specific folders by managing apps' access to specific folders. Only trusted apps can access protected folders, which are specified when controlled folder access is configured. Typically, commonly used folders, such as those used for documents, pictures, downloads, are included in the list of controlled folders. Controlled folder access helps protect valuable data from malicious apps and threats, such as ransomware.

                  Learn more about [Controlled folder access](/microsoft-365/security/defender-endpoint/controlled-folders). | | Exploit protection | Exploit protection, available in Windows 10, version 1709 and later, automatically applies several exploit mitigation techniques to operating system processes and apps. Exploit protection works best with Microsoft Defender for Endpoint, which gives organizations detailed reporting into exploit protection events and blocks as part of typical alert investigation scenarios.

                  You can enable exploit protection on an individual device, and then use Group Policy to distribute the XML file to multiple devices simultaneously. When a mitigation is encountered on the device, a notification will be displayed from the Action Center. You can customize the notification with your company details and contact information. You can also enable the rules individually to customize which techniques the feature monitors.

                  Learn more about [Exploit protection](/microsoft-365/security/defender-endpoint/exploit-protection). | | Microsoft Defender for Endpoint | Windows E5 customers benefit from [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint), an enterprise endpoint detection and response capability that helps enterprise security teams detect, investigate, and respond to advanced threats. With rich event data and attack insights, Defender for Endpoint enables your security team to investigate incidents and take remediation actions effectively and efficiently.

                  Defender for Endpoint also is part of [Microsoft 365 Defender](/microsoft-365/security/defender/), a unified pre- and post-breach enterprise defense suite that natively coordinates detection, prevention, investigation, and response across endpoints, identities, email, and applications to provide integrated protection against sophisticated attacks.

                  Learn more about [Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint) and [Microsoft 365 Defender](/microsoft-365/security/defender/). | diff --git a/windows/security/security-foundations/certification/toc.yml b/windows/security/security-foundations/certification/toc.yml new file mode 100644 index 0000000000..70d9d800b8 --- /dev/null +++ b/windows/security/security-foundations/certification/toc.yml @@ -0,0 +1,5 @@ +items: +- name: FIPS 140-2 Validation + href: ../../threat-protection/fips-140-validation.md +- name: Common Criteria Certifications + href: ../../threat-protection/windows-platform-common-criteria.md \ No newline at end of file diff --git a/windows/security/security-foundations/toc.yml b/windows/security/security-foundations/toc.yml new file mode 100644 index 0000000000..d52c477387 --- /dev/null +++ b/windows/security/security-foundations/toc.yml @@ -0,0 +1,7 @@ +items: +- name: Overview + href: ../security-foundations.md +- name: Microsoft Security Development Lifecycle + href: ../threat-protection/msft-security-dev-lifecycle.md +- name: Certification + href: certification/toc.yml \ No newline at end of file diff --git a/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings.md b/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings.md index b4b43624b2..457a454e3b 100644 --- a/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings.md +++ b/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings.md @@ -1,5 +1,5 @@ --- -title: Advanced security audit policy settings (Windows 10) +title: Advanced security audit policy settings description: This reference for IT professionals provides information about the advanced audit policy settings that are available in Windows and the audit events that they generate. ms.assetid: 93b28b92-796f-4036-a53b-8b9e80f9f171 ms.reviewer: This reference for IT professionals provides information about the advanced audit policy settings that are available in Windows and the audit events that they generate. diff --git a/windows/security/threat-protection/auditing/advanced-security-auditing.md b/windows/security/threat-protection/auditing/advanced-security-auditing.md index 37031d5f88..61475f808a 100644 --- a/windows/security/threat-protection/auditing/advanced-security-auditing.md +++ b/windows/security/threat-protection/auditing/advanced-security-auditing.md @@ -1,5 +1,5 @@ --- -title: Advanced security audit policies (Windows 10) +title: Advanced security audit policies description: Advanced security audit policy settings may appear to overlap with basic policies, but they are recorded and applied differently. Learn more about them here. ms.assetid: 6FE8AC10-F48E-4BBF-979B-43A5DFDC5DFC ms.reviewer: diff --git a/windows/security/threat-protection/auditing/appendix-a-security-monitoring-recommendations-for-many-audit-events.md b/windows/security/threat-protection/auditing/appendix-a-security-monitoring-recommendations-for-many-audit-events.md index eb734ebf54..95dffa1f91 100644 --- a/windows/security/threat-protection/auditing/appendix-a-security-monitoring-recommendations-for-many-audit-events.md +++ b/windows/security/threat-protection/auditing/appendix-a-security-monitoring-recommendations-for-many-audit-events.md @@ -1,5 +1,5 @@ --- -title: Appendix A, Security monitoring recommendations for many audit events (Windows 10) +title: Appendix A, Security monitoring recommendations for many audit events description: Learn about recommendations for the type of monitoring required for certain classes of security audit events. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md index 1ab3f3f08e..eb01843ba1 100644 --- a/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md +++ b/windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md @@ -1,5 +1,5 @@ --- -title: Apply a basic audit policy on a file or folder (Windows 10) +title: Apply a basic audit policy on a file or folder description: Apply audit policies to individual files and folders on your computer by setting the permission type to record access attempts in the security log. ms.assetid: 565E7249-5CD0-4B2E-B2C0-B3A0793A51E2 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-account-lockout.md b/windows/security/threat-protection/auditing/audit-account-lockout.md index f2cf0cc5ec..75f5a3fd62 100644 --- a/windows/security/threat-protection/auditing/audit-account-lockout.md +++ b/windows/security/threat-protection/auditing/audit-account-lockout.md @@ -1,5 +1,5 @@ --- -title: Audit Account Lockout (Windows 10) +title: Audit Account Lockout description: The policy setting, Audit Account Lockout, enables you to audit security events generated by a failed attempt to log on to an account that is locked out. ms.assetid: da68624b-a174-482c-9bc5-ddddab38e589 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-application-generated.md b/windows/security/threat-protection/auditing/audit-application-generated.md index 36f8f451a0..8d219480b0 100644 --- a/windows/security/threat-protection/auditing/audit-application-generated.md +++ b/windows/security/threat-protection/auditing/audit-application-generated.md @@ -1,5 +1,5 @@ --- -title: Audit Application Generated (Windows 10) +title: Audit Application Generated description: The policy setting, Audit Application Generated, determines if audit events are generated when applications attempt to use the Windows Auditing APIs. ms.assetid: 6c58a365-b25b-42b8-98ab-819002e31871 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-application-group-management.md b/windows/security/threat-protection/auditing/audit-application-group-management.md index cb91f3fa61..aae81ccb4f 100644 --- a/windows/security/threat-protection/auditing/audit-application-group-management.md +++ b/windows/security/threat-protection/auditing/audit-application-group-management.md @@ -1,5 +1,5 @@ --- -title: Audit Application Group Management (Windows 10) +title: Audit Application Group Management description: The policy setting, Audit Application Group Management, determines if audit events are generated when application group management tasks are performed. ms.assetid: 1bcaa41e-5027-4a86-96b7-f04eaf1c0606 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-audit-policy-change.md b/windows/security/threat-protection/auditing/audit-audit-policy-change.md index 74134a5bd9..bf1ae6aef5 100644 --- a/windows/security/threat-protection/auditing/audit-audit-policy-change.md +++ b/windows/security/threat-protection/auditing/audit-audit-policy-change.md @@ -1,5 +1,5 @@ --- -title: Audit Audit Policy Change (Windows 10) +title: Audit Audit Policy Change description: The Advanced Security Audit policy setting, Audit Audit Policy Change, determines if audit events are generated when changes are made to audit policy. ms.assetid: 7153bf75-6978-4d7e-a821-59a699efb8a9 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-authentication-policy-change.md b/windows/security/threat-protection/auditing/audit-authentication-policy-change.md index 318f08b516..969c9e4655 100644 --- a/windows/security/threat-protection/auditing/audit-authentication-policy-change.md +++ b/windows/security/threat-protection/auditing/audit-authentication-policy-change.md @@ -1,5 +1,5 @@ --- -title: Audit Authentication Policy Change (Windows 10) +title: Audit Authentication Policy Change description: The Advanced Security Audit policy setting, Audit Authentication Policy Change, determines if audit events are generated when authentication policy is changed. ms.assetid: aa9cea7a-aadf-47b7-b704-ac253b8e79be ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-authorization-policy-change.md b/windows/security/threat-protection/auditing/audit-authorization-policy-change.md index caa5d33848..e2548c51f2 100644 --- a/windows/security/threat-protection/auditing/audit-authorization-policy-change.md +++ b/windows/security/threat-protection/auditing/audit-authorization-policy-change.md @@ -1,5 +1,5 @@ --- -title: Audit Authorization Policy Change (Windows 10) +title: Audit Authorization Policy Change description: The policy setting, Audit Authorization Policy Change, determines if audit events are generated when specific changes are made to the authorization policy. ms.assetid: ca0587a2-a2b3-4300-aa5d-48b4553c3b36 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-central-access-policy-staging.md b/windows/security/threat-protection/auditing/audit-central-access-policy-staging.md index 62ac5c925c..6e0cbcb9f3 100644 --- a/windows/security/threat-protection/auditing/audit-central-access-policy-staging.md +++ b/windows/security/threat-protection/auditing/audit-central-access-policy-staging.md @@ -1,5 +1,5 @@ --- -title: Audit Central Access Policy Staging (Windows 10) +title: Audit Central Access Policy Staging description: The Advanced Security Audit policy setting, Audit Central Access Policy Staging, determines permissions on a Central Access Policy. ms.assetid: D9BB11CE-949A-4B48-82BF-30DC5E6FC67D ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-certification-services.md b/windows/security/threat-protection/auditing/audit-certification-services.md index 889edc295b..5461b50847 100644 --- a/windows/security/threat-protection/auditing/audit-certification-services.md +++ b/windows/security/threat-protection/auditing/audit-certification-services.md @@ -1,5 +1,5 @@ --- -title: Audit Certification Services (Windows 10) +title: Audit Certification Services description: The policy setting, Audit Certification Services, decides if events are generated when Active Directory Certificate Services (ADA CS) operations are performed. ms.assetid: cdefc34e-fb1f-4eff-b766-17713c5a1b03 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-computer-account-management.md b/windows/security/threat-protection/auditing/audit-computer-account-management.md index 63ad7eaac9..30a8dc2162 100644 --- a/windows/security/threat-protection/auditing/audit-computer-account-management.md +++ b/windows/security/threat-protection/auditing/audit-computer-account-management.md @@ -1,5 +1,5 @@ --- -title: Audit Computer Account Management (Windows 10) +title: Audit Computer Account Management description: The policy setting, Audit Computer Account Management, determines if audit events are generated when a computer account is created, changed, or deleted. ms.assetid: 6c406693-57bf-4411-bb6c-ff83ce548991 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-credential-validation.md b/windows/security/threat-protection/auditing/audit-credential-validation.md index a5a9dc7158..ca9006d297 100644 --- a/windows/security/threat-protection/auditing/audit-credential-validation.md +++ b/windows/security/threat-protection/auditing/audit-credential-validation.md @@ -1,5 +1,5 @@ --- -title: Audit Credential Validation (Windows 10) +title: Audit Credential Validation description: The policy setting, Audit Credential Validation, determines if audit events are generated when user account logon request credentials are submitted. ms.assetid: 6654b33a-922e-4a43-8223-ec5086dfc926 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-detailed-directory-service-replication.md b/windows/security/threat-protection/auditing/audit-detailed-directory-service-replication.md index 7fffbad3df..a90af61434 100644 --- a/windows/security/threat-protection/auditing/audit-detailed-directory-service-replication.md +++ b/windows/security/threat-protection/auditing/audit-detailed-directory-service-replication.md @@ -1,5 +1,5 @@ --- -title: Audit Detailed Directory Service Replication (Windows 10) +title: Audit Detailed Directory Service Replication description: The Audit Detailed Directory Service Replication setting decides if audit events contain detailed tracking info about data replicated between domain controllers ms.assetid: 1b89c8f5-bce7-4b20-8701-42585c7ab993 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-detailed-file-share.md b/windows/security/threat-protection/auditing/audit-detailed-file-share.md index 9ec6b5c148..e836a65007 100644 --- a/windows/security/threat-protection/auditing/audit-detailed-file-share.md +++ b/windows/security/threat-protection/auditing/audit-detailed-file-share.md @@ -1,5 +1,5 @@ --- -title: Audit Detailed File Share (Windows 10) +title: Audit Detailed File Share description: The Advanced Security Audit policy setting, Audit Detailed File Share, allows you to audit attempts to access files and folders on a shared folder. ms.assetid: 60310104-b820-4033-a1cb-022a34f064ae ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-directory-service-access.md b/windows/security/threat-protection/auditing/audit-directory-service-access.md index e58853650d..5d052e1b17 100644 --- a/windows/security/threat-protection/auditing/audit-directory-service-access.md +++ b/windows/security/threat-protection/auditing/audit-directory-service-access.md @@ -1,5 +1,5 @@ --- -title: Audit Directory Service Access (Windows 10) +title: Audit Directory Service Access description: The policy setting Audit Directory Service Access determines if audit events are generated when an Active Directory Domain Services (AD DS) object is accessed. ms.assetid: ba2562ba-4282-4588-b87c-a3fcb771c7d0 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-directory-service-changes.md b/windows/security/threat-protection/auditing/audit-directory-service-changes.md index c9485389e9..18879247a3 100644 --- a/windows/security/threat-protection/auditing/audit-directory-service-changes.md +++ b/windows/security/threat-protection/auditing/audit-directory-service-changes.md @@ -1,5 +1,5 @@ --- -title: Audit Directory Service Changes (Windows 10) +title: Audit Directory Service Changes description: The policy setting Audit Directory Service Changes determines if audit events are generated when objects in Active Directory Domain Services (AD DS) are changed ms.assetid: 9f7c0dd4-3977-47dd-a0fb-ec2f17cad05e ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-directory-service-replication.md b/windows/security/threat-protection/auditing/audit-directory-service-replication.md index 046dd9a1e7..096a8c7235 100644 --- a/windows/security/threat-protection/auditing/audit-directory-service-replication.md +++ b/windows/security/threat-protection/auditing/audit-directory-service-replication.md @@ -1,5 +1,5 @@ --- -title: Audit Directory Service Replication (Windows 10) +title: Audit Directory Service Replication description: Audit Directory Service Replication is a policy setting that decides if audit events are created when replication between two domain controllers begins or ends. ms.assetid: b95d296c-7993-4e8d-8064-a8bbe284bd56 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-distribution-group-management.md b/windows/security/threat-protection/auditing/audit-distribution-group-management.md index 8eb5bb988c..79dc631db9 100644 --- a/windows/security/threat-protection/auditing/audit-distribution-group-management.md +++ b/windows/security/threat-protection/auditing/audit-distribution-group-management.md @@ -1,5 +1,5 @@ --- -title: Audit Distribution Group Management (Windows 10) +title: Audit Distribution Group Management description: The policy setting, Audit Distribution Group Management, determines if audit events are generated for specific distribution-group management tasks. ms.assetid: d46693a4-5887-4a58-85db-2f6cba224a66 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-dpapi-activity.md b/windows/security/threat-protection/auditing/audit-dpapi-activity.md index 79dbf17692..c86719486a 100644 --- a/windows/security/threat-protection/auditing/audit-dpapi-activity.md +++ b/windows/security/threat-protection/auditing/audit-dpapi-activity.md @@ -1,5 +1,5 @@ --- -title: Audit DPAPI Activity (Windows 10) +title: Audit DPAPI Activity description: The policy setting, Audit DPAPI Activity, decides if encryption/decryption calls to the data protection application interface (DPAPI) generate audit events. ms.assetid: be4d4c83-c857-4e3d-a84e-8bcc3f2c99cd ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-file-share.md b/windows/security/threat-protection/auditing/audit-file-share.md index 577c138f46..3970447680 100644 --- a/windows/security/threat-protection/auditing/audit-file-share.md +++ b/windows/security/threat-protection/auditing/audit-file-share.md @@ -1,5 +1,5 @@ --- -title: Audit File Share (Windows 10) +title: Audit File Share description: The Advanced Security Audit policy setting, Audit File Share, determines if the operating system generates audit events when a file share is accessed. ms.assetid: 9ea985f8-8936-4b79-abdb-35cbb7138f78 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-file-system.md b/windows/security/threat-protection/auditing/audit-file-system.md index 037faaf8f4..1ecd400b99 100644 --- a/windows/security/threat-protection/auditing/audit-file-system.md +++ b/windows/security/threat-protection/auditing/audit-file-system.md @@ -1,5 +1,5 @@ --- -title: Audit File System (Windows 10) +title: Audit File System description: The Advanced Security Audit policy setting, Audit File System, determines if audit events are generated when users attempt to access file system objects. ms.assetid: 6a71f283-b8e5-41ac-b348-0b7ec6ea0b1f ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-filtering-platform-connection.md b/windows/security/threat-protection/auditing/audit-filtering-platform-connection.md index 5877ab26f1..541a9ea9fa 100644 --- a/windows/security/threat-protection/auditing/audit-filtering-platform-connection.md +++ b/windows/security/threat-protection/auditing/audit-filtering-platform-connection.md @@ -1,5 +1,5 @@ --- -title: Audit Filtering Platform Connection (Windows 10) +title: Audit Filtering Platform Connection description: The policy setting, Audit Filtering Platform Connection, decides if audit events are generated when connections are allow/blocked by Windows Filtering Platform. ms.assetid: d72936e9-ff01-4d18-b864-a4958815df59 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-filtering-platform-packet-drop.md b/windows/security/threat-protection/auditing/audit-filtering-platform-packet-drop.md index 9003cab47c..49924db420 100644 --- a/windows/security/threat-protection/auditing/audit-filtering-platform-packet-drop.md +++ b/windows/security/threat-protection/auditing/audit-filtering-platform-packet-drop.md @@ -1,5 +1,5 @@ --- -title: Audit Filtering Platform Packet Drop (Windows 10) +title: Audit Filtering Platform Packet Drop description: The policy setting, Audit Filtering Platform Packet Drop, determines if audit events are generated when packets are dropped by the Windows Filtering Platform. ms.assetid: 95457601-68d1-4385-af20-87916ddab906 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-filtering-platform-policy-change.md b/windows/security/threat-protection/auditing/audit-filtering-platform-policy-change.md index 1a4cab1153..828e0a1f16 100644 --- a/windows/security/threat-protection/auditing/audit-filtering-platform-policy-change.md +++ b/windows/security/threat-protection/auditing/audit-filtering-platform-policy-change.md @@ -1,5 +1,5 @@ --- -title: Audit Filtering Platform Policy Change (Windows 10) +title: Audit Filtering Platform Policy Change description: The policy setting, Audit Filtering Platform Policy Change, determines if audit events are generated for certain IPsec and Windows Filtering Platform actions. ms.assetid: 0eaf1c56-672b-4ea9-825a-22dc03eb4041 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-group-membership.md b/windows/security/threat-protection/auditing/audit-group-membership.md index 9f32d9d336..11fc2eca97 100644 --- a/windows/security/threat-protection/auditing/audit-group-membership.md +++ b/windows/security/threat-protection/auditing/audit-group-membership.md @@ -1,5 +1,5 @@ --- -title: Audit Group Membership (Windows 10) +title: Audit Group Membership description: Using the advanced security audit policy setting, Audit Group Membership, you can audit group memberships when they're enumerated on the client PC. ms.assetid: 1CD7B014-FBD9-44B9-9274-CC5715DE58B9 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-handle-manipulation.md b/windows/security/threat-protection/auditing/audit-handle-manipulation.md index 50470902eb..feb17cf68e 100644 --- a/windows/security/threat-protection/auditing/audit-handle-manipulation.md +++ b/windows/security/threat-protection/auditing/audit-handle-manipulation.md @@ -1,5 +1,5 @@ --- -title: Audit Handle Manipulation (Windows 10) +title: Audit Handle Manipulation description: The Advanced Security Audit policy setting, Audit Handle Manipulation, determines if audit events are generated when a handle to an object is opened or closed. ms.assetid: 1fbb004a-ccdc-4c80-b3da-a4aa7a9f4091 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-ipsec-driver.md b/windows/security/threat-protection/auditing/audit-ipsec-driver.md index cfcefafd36..c289430fe3 100644 --- a/windows/security/threat-protection/auditing/audit-ipsec-driver.md +++ b/windows/security/threat-protection/auditing/audit-ipsec-driver.md @@ -1,5 +1,5 @@ --- -title: Audit IPsec Driver (Windows 10) +title: Audit IPsec Driver description: The Advanced Security Audit policy setting, Audit IPsec Driver, determines if audit events are generated for the activities of the IPsec driver. ms.assetid: c8b8c02f-5ad0-4ee5-9123-ea8cdae356a5 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-ipsec-extended-mode.md b/windows/security/threat-protection/auditing/audit-ipsec-extended-mode.md index 33bfbb485d..ce2626dfde 100644 --- a/windows/security/threat-protection/auditing/audit-ipsec-extended-mode.md +++ b/windows/security/threat-protection/auditing/audit-ipsec-extended-mode.md @@ -1,5 +1,5 @@ --- -title: Audit IPsec Extended Mode (Windows 10) +title: Audit IPsec Extended Mode description: The setting, Audit IPsec Extended Mode, determines if audit events are generated for the results of IKE protocol and AuthIP during Extended Mode negotiations. ms.assetid: 2b4fee9e-482a-4181-88a8-6a79d8fc8049 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-ipsec-main-mode.md b/windows/security/threat-protection/auditing/audit-ipsec-main-mode.md index 7f1d59e38c..b9833c2182 100644 --- a/windows/security/threat-protection/auditing/audit-ipsec-main-mode.md +++ b/windows/security/threat-protection/auditing/audit-ipsec-main-mode.md @@ -1,5 +1,5 @@ --- -title: Audit IPsec Main Mode (Windows 10) +title: Audit IPsec Main Mode description: Learn about the policy setting, Audit IPsec Main Mode, which determines if the results of certain protocols generate events during Main Mode negotiations. ms.assetid: 06ed26ec-3620-4ef4-a47a-c70df9c8827b ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-ipsec-quick-mode.md b/windows/security/threat-protection/auditing/audit-ipsec-quick-mode.md index 869e1f4dcf..2c4b89bde5 100644 --- a/windows/security/threat-protection/auditing/audit-ipsec-quick-mode.md +++ b/windows/security/threat-protection/auditing/audit-ipsec-quick-mode.md @@ -1,5 +1,5 @@ --- -title: Audit IPsec Quick Mode (Windows 10) +title: Audit IPsec Quick Mode description: The policy setting, Audit IPsec Quick Mode, decides if audit events are generated for the results of the IKE protocol and AuthIP during Quick Mode negotiations. ms.assetid: 7be67a15-c2ce-496a-9719-e25ac7699114 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-kerberos-authentication-service.md b/windows/security/threat-protection/auditing/audit-kerberos-authentication-service.md index 4ed0bce866..f65c550e3a 100644 --- a/windows/security/threat-protection/auditing/audit-kerberos-authentication-service.md +++ b/windows/security/threat-protection/auditing/audit-kerberos-authentication-service.md @@ -1,5 +1,5 @@ --- -title: Audit Kerberos Authentication Service (Windows 10) +title: Audit Kerberos Authentication Service description: The policy setting Audit Kerberos Authentication Service decides if audit events are generated for Kerberos authentication ticket-granting ticket (TGT) requests ms.assetid: 990dd6d9-1a1f-4cce-97ba-5d7e0a7db859 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-kerberos-service-ticket-operations.md b/windows/security/threat-protection/auditing/audit-kerberos-service-ticket-operations.md index ed3c49dfef..1d333d9f8e 100644 --- a/windows/security/threat-protection/auditing/audit-kerberos-service-ticket-operations.md +++ b/windows/security/threat-protection/auditing/audit-kerberos-service-ticket-operations.md @@ -1,5 +1,5 @@ --- -title: Audit Kerberos Service Ticket Operations (Windows 10) +title: Audit Kerberos Service Ticket Operations description: The policy setting, Audit Kerberos Service Ticket Operations, determines if security audit events are generated for Kerberos service ticket requests. ms.assetid: ddc0abef-ac7f-4849-b90d-66700470ccd6 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-kernel-object.md b/windows/security/threat-protection/auditing/audit-kernel-object.md index 0dd8928c22..b2c76daf1a 100644 --- a/windows/security/threat-protection/auditing/audit-kernel-object.md +++ b/windows/security/threat-protection/auditing/audit-kernel-object.md @@ -1,5 +1,5 @@ --- -title: Audit Kernel Object (Windows 10) +title: Audit Kernel Object description: The policy setting, Audit Kernel Object, decides if user attempts to access the system kernel (which includes mutexes and semaphores) generate audit events. ms.assetid: 75619d8b-b1eb-445b-afc9-0f9053be97fb ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-logoff.md b/windows/security/threat-protection/auditing/audit-logoff.md index 6a1f7f33ef..81a615fbd6 100644 --- a/windows/security/threat-protection/auditing/audit-logoff.md +++ b/windows/security/threat-protection/auditing/audit-logoff.md @@ -1,5 +1,5 @@ --- -title: Audit Logoff (Windows 10) +title: Audit Logoff description: The Advanced Security Audit policy setting, Audit Logoff, determines if audit events are generated when logon sessions are terminated. ms.assetid: 681e51f2-ba06-46f5-af8c-d9c48d515432 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-logon.md b/windows/security/threat-protection/auditing/audit-logon.md index 4b78d70722..2f4de511f2 100644 --- a/windows/security/threat-protection/auditing/audit-logon.md +++ b/windows/security/threat-protection/auditing/audit-logon.md @@ -1,5 +1,5 @@ --- -title: Audit Logon (Windows 10) +title: Audit Logon description: The Advanced Security Audit policy setting, Audit Logon, determines if audit events are generated when a user attempts to log on to a computer. ms.assetid: ca968d03-7d52-48c4-ba0e-2bcd2937231b ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-mpssvc-rule-level-policy-change.md b/windows/security/threat-protection/auditing/audit-mpssvc-rule-level-policy-change.md index 4081cf31a9..8fd95ccf30 100644 --- a/windows/security/threat-protection/auditing/audit-mpssvc-rule-level-policy-change.md +++ b/windows/security/threat-protection/auditing/audit-mpssvc-rule-level-policy-change.md @@ -1,5 +1,5 @@ --- -title: Audit MPSSVC Rule-Level Policy Change (Windows 10) +title: Audit MPSSVC Rule-Level Policy Change description: Audit MPSSVC Rule-Level Policy Change determines if audit events are generated when policy rules are altered for the Microsoft Protection Service (MPSSVC.exe). ms.assetid: 263461b3-c61c-4ec3-9dee-851164845019 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-network-policy-server.md b/windows/security/threat-protection/auditing/audit-network-policy-server.md index 2501fecc08..44e3ef4880 100644 --- a/windows/security/threat-protection/auditing/audit-network-policy-server.md +++ b/windows/security/threat-protection/auditing/audit-network-policy-server.md @@ -1,5 +1,5 @@ --- -title: Audit Network Policy Server (Windows 10) +title: Audit Network Policy Server description: The policy setting, Audit Network Policy Server, determines if audit events are generated for RADIUS (IAS) and NAP activity on user access requests. ms.assetid: 43b2aea4-26df-46da-b761-2b30f51a80f7 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-non-sensitive-privilege-use.md b/windows/security/threat-protection/auditing/audit-non-sensitive-privilege-use.md index 01b3fb153f..990e574f0c 100644 --- a/windows/security/threat-protection/auditing/audit-non-sensitive-privilege-use.md +++ b/windows/security/threat-protection/auditing/audit-non-sensitive-privilege-use.md @@ -1,5 +1,5 @@ --- -title: Audit Non-Sensitive Privilege Use (Windows 10) +title: Audit Non-Sensitive Privilege Use description: This article for the IT professional describes the Advanced Security Audit policy setting, Audit Non-Sensitive Privilege Use, which determines whether the operating system generates audit events when non-sensitive privileges (user rights) are used. ms.assetid: 8fd74783-1059-443e-aa86-566d78606627 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-other-account-logon-events.md b/windows/security/threat-protection/auditing/audit-other-account-logon-events.md index 23ee128d63..ed3f8fa3f2 100644 --- a/windows/security/threat-protection/auditing/audit-other-account-logon-events.md +++ b/windows/security/threat-protection/auditing/audit-other-account-logon-events.md @@ -1,5 +1,5 @@ --- -title: Audit Other Account Logon Events (Windows 10) +title: Audit Other Account Logon Events description: The policy setting, Audit Other Account Logon Events allows you to audit events when generated by responses to credential requests for certain kinds of user logons. ms.assetid: c8c6bfe0-33d2-4600-bb1a-6afa840d75b3 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-other-account-management-events.md b/windows/security/threat-protection/auditing/audit-other-account-management-events.md index 8f3d985309..1a3cee2068 100644 --- a/windows/security/threat-protection/auditing/audit-other-account-management-events.md +++ b/windows/security/threat-protection/auditing/audit-other-account-management-events.md @@ -1,5 +1,5 @@ --- -title: Audit Other Account Management Events (Windows 10) +title: Audit Other Account Management Events description: The Advanced Security Audit policy setting, Audit Other Account Management Events, determines if user account management audit events are generated. ms.assetid: 4ce22eeb-a96f-4cf9-a46d-6642961a31d5 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-other-logonlogoff-events.md b/windows/security/threat-protection/auditing/audit-other-logonlogoff-events.md index 789ab297be..4fdbf61cac 100644 --- a/windows/security/threat-protection/auditing/audit-other-logonlogoff-events.md +++ b/windows/security/threat-protection/auditing/audit-other-logonlogoff-events.md @@ -1,5 +1,5 @@ --- -title: Audit Other Logon/Logoff Events (Windows 10) +title: Audit Other Logon/Logoff Events description: The Advanced Security Audit policy setting, Audit Other Logon/Logoff Events, determines if Windows generates audit events for other logon or logoff events. ms.assetid: 76d987cd-1917-4907-a739-dd642609a458 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-other-object-access-events.md b/windows/security/threat-protection/auditing/audit-other-object-access-events.md index 5dc0923e42..dd8800acac 100644 --- a/windows/security/threat-protection/auditing/audit-other-object-access-events.md +++ b/windows/security/threat-protection/auditing/audit-other-object-access-events.md @@ -1,5 +1,5 @@ --- -title: Audit Other Object Access Events (Windows 10) +title: Audit Other Object Access Events description: The policy setting, Audit Other Object Access Events, determines if audit events are generated for the management of Task Scheduler jobs or COM+ objects. ms.assetid: b9774595-595d-4199-b0c5-8dbc12b6c8b2 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-other-policy-change-events.md b/windows/security/threat-protection/auditing/audit-other-policy-change-events.md index d088e9f929..c3e7f98b0a 100644 --- a/windows/security/threat-protection/auditing/audit-other-policy-change-events.md +++ b/windows/security/threat-protection/auditing/audit-other-policy-change-events.md @@ -1,5 +1,5 @@ --- -title: Audit Other Policy Change Events (Windows 10) +title: Audit Other Policy Change Events description: The policy setting, Audit Other Policy Change Events, determines if audit events are generated for security policy changes that are not otherwise audited. ms.assetid: 8618502e-c21c-41cc-8a49-3dc1eb359e60 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-other-privilege-use-events.md b/windows/security/threat-protection/auditing/audit-other-privilege-use-events.md index c2487a6b33..b395ef62a2 100644 --- a/windows/security/threat-protection/auditing/audit-other-privilege-use-events.md +++ b/windows/security/threat-protection/auditing/audit-other-privilege-use-events.md @@ -1,5 +1,5 @@ --- -title: Audit Other Privilege Use Events (Windows 10) +title: Audit Other Privilege Use Events description: Learn about the audit other privilege use events, an auditing subcategory that should not have any events in it but enables generation of event 4985(S). ms.assetid: 5f7f5b25-42a6-499f-8aa2-01ac79a2a63c ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-other-system-events.md b/windows/security/threat-protection/auditing/audit-other-system-events.md index 63cfb375b0..d129bae159 100644 --- a/windows/security/threat-protection/auditing/audit-other-system-events.md +++ b/windows/security/threat-protection/auditing/audit-other-system-events.md @@ -1,5 +1,5 @@ --- -title: Audit Other System Events (Windows 10) +title: Audit Other System Events description: The Advanced Security Audit policy setting, Audit Other System Events, determines if the operating system audits various system events. ms.assetid: 2401e4cc-d94e-41ec-82a7-e10914295f8b ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-pnp-activity.md b/windows/security/threat-protection/auditing/audit-pnp-activity.md index 224eae5fcb..9c1c5cbed6 100644 --- a/windows/security/threat-protection/auditing/audit-pnp-activity.md +++ b/windows/security/threat-protection/auditing/audit-pnp-activity.md @@ -1,5 +1,5 @@ --- -title: Audit PNP Activity (Windows 10) +title: Audit PNP Activity description: The advanced security audit policy setting, Audit PNP Activity, determines when plug and play detects an external device. ms.assetid: A3D87B3B-EBBE-442A-953B-9EB75A5F600E ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-process-creation.md b/windows/security/threat-protection/auditing/audit-process-creation.md index 07b283ace9..6b204e6613 100644 --- a/windows/security/threat-protection/auditing/audit-process-creation.md +++ b/windows/security/threat-protection/auditing/audit-process-creation.md @@ -1,5 +1,5 @@ --- -title: Audit Process Creation (Windows 10) +title: Audit Process Creation description: The Advanced Security Audit policy setting, Audit Process Creation, determines if audit events are generated when a process is created (starts). ms.assetid: 67e39fcd-ded6-45e8-b1b6-d411e4e93019 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-process-termination.md b/windows/security/threat-protection/auditing/audit-process-termination.md index b156ba658a..863513add3 100644 --- a/windows/security/threat-protection/auditing/audit-process-termination.md +++ b/windows/security/threat-protection/auditing/audit-process-termination.md @@ -1,5 +1,5 @@ --- -title: Audit Process Termination (Windows 10) +title: Audit Process Termination description: The Advanced Security Audit policy setting, Audit Process Termination, determines if audit events are generated when an attempt is made to end a process. ms.assetid: 65d88e53-14aa-48a4-812b-557cebbf9e50 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-registry.md b/windows/security/threat-protection/auditing/audit-registry.md index a4423aeb52..3403bd8748 100644 --- a/windows/security/threat-protection/auditing/audit-registry.md +++ b/windows/security/threat-protection/auditing/audit-registry.md @@ -1,5 +1,5 @@ --- -title: Audit Registry (Windows 10) +title: Audit Registry description: The Advanced Security Audit policy setting, Audit Registry, determines if audit events are generated when users attempt to access registry objects. ms.assetid: 02bcc23b-4823-46ac-b822-67beedf56b32 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-removable-storage.md b/windows/security/threat-protection/auditing/audit-removable-storage.md index c9d2586107..f244e92a4c 100644 --- a/windows/security/threat-protection/auditing/audit-removable-storage.md +++ b/windows/security/threat-protection/auditing/audit-removable-storage.md @@ -1,5 +1,5 @@ --- -title: Audit Removable Storage (Windows 10) +title: Audit Removable Storage description: The Advanced Security Audit policy setting, Audit Removable Storage, determines when there is a read or a write to a removable drive. ms.assetid: 1746F7B3-8B41-4661-87D8-12F734AFFB26 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-rpc-events.md b/windows/security/threat-protection/auditing/audit-rpc-events.md index bee389855a..ec13a2b45c 100644 --- a/windows/security/threat-protection/auditing/audit-rpc-events.md +++ b/windows/security/threat-protection/auditing/audit-rpc-events.md @@ -1,5 +1,5 @@ --- -title: Audit RPC Events (Windows 10) +title: Audit RPC Events description: Audit RPC Events is an audit policy setting that determines if audit events are generated when inbound remote procedure call (RPC) connections are made. ms.assetid: 868aec2d-93b4-4bc8-a150-941f88838ba6 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-sam.md b/windows/security/threat-protection/auditing/audit-sam.md index c92e7d5ba5..b2cacec3a5 100644 --- a/windows/security/threat-protection/auditing/audit-sam.md +++ b/windows/security/threat-protection/auditing/audit-sam.md @@ -1,5 +1,5 @@ --- -title: Audit SAM (Windows 10) +title: Audit SAM description: The Advanced Security Audit policy setting, Audit SAM, enables you to audit events generated by attempts to access Security Account Manager (SAM) objects. ms.assetid: 1d00f955-383d-4c95-bbd1-fab4a991a46e ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-security-group-management.md b/windows/security/threat-protection/auditing/audit-security-group-management.md index 0564c257b6..eb76f1d581 100644 --- a/windows/security/threat-protection/auditing/audit-security-group-management.md +++ b/windows/security/threat-protection/auditing/audit-security-group-management.md @@ -1,5 +1,5 @@ --- -title: Audit Security Group Management (Windows 10) +title: Audit Security Group Management description: The policy setting, Audit Security Group Management, determines if audit events are generated when specific security group management tasks are performed. ms.assetid: ac2ee101-557b-4c84-b9fa-4fb23331f1aa ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-security-state-change.md b/windows/security/threat-protection/auditing/audit-security-state-change.md index 25686b4f33..a9b4d3ea8f 100644 --- a/windows/security/threat-protection/auditing/audit-security-state-change.md +++ b/windows/security/threat-protection/auditing/audit-security-state-change.md @@ -1,5 +1,5 @@ --- -title: Audit Security State Change (Windows 10) +title: Audit Security State Change description: The policy setting, Audit Security State Change, which determines whether Windows generates audit events for changes in the security state of a system. ms.assetid: decb3218-a67d-4efa-afc0-337c79a89a2d ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-security-system-extension.md b/windows/security/threat-protection/auditing/audit-security-system-extension.md index 72a72a15aa..3a230a5cfe 100644 --- a/windows/security/threat-protection/auditing/audit-security-system-extension.md +++ b/windows/security/threat-protection/auditing/audit-security-system-extension.md @@ -1,5 +1,5 @@ --- -title: Audit Security System Extension (Windows 10) +title: Audit Security System Extension description: The Advanced Security Audit policy setting, Audit Security System Extension, determines if audit events related to security system extensions are generated. ms.assetid: 9f3c6bde-42b2-4a0a-b353-ed3106ebc005 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-sensitive-privilege-use.md b/windows/security/threat-protection/auditing/audit-sensitive-privilege-use.md index c79520f698..3773c3c44d 100644 --- a/windows/security/threat-protection/auditing/audit-sensitive-privilege-use.md +++ b/windows/security/threat-protection/auditing/audit-sensitive-privilege-use.md @@ -1,5 +1,5 @@ --- -title: Audit Sensitive Privilege Use (Windows 10) +title: Audit Sensitive Privilege Use description: The policy setting, Audit Sensitive Privilege Use, determines if the operating system generates audit events when sensitive privileges (user rights) are used. ms.assetid: 915abf50-42d2-45f6-9fd1-e7bd201b193d ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-special-logon.md b/windows/security/threat-protection/auditing/audit-special-logon.md index e9958ffa2e..4b1edc838c 100644 --- a/windows/security/threat-protection/auditing/audit-special-logon.md +++ b/windows/security/threat-protection/auditing/audit-special-logon.md @@ -1,5 +1,5 @@ --- -title: Audit Special Logon (Windows 10) +title: Audit Special Logon description: The Advanced Security Audit policy setting, Audit Special Logon, determines if audit events are generated under special sign in (or logon) circumstances. ms.assetid: e1501bac-1d09-4593-8ebb-f311231567d3 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-system-integrity.md b/windows/security/threat-protection/auditing/audit-system-integrity.md index 4a313d8ae0..58d0a44687 100644 --- a/windows/security/threat-protection/auditing/audit-system-integrity.md +++ b/windows/security/threat-protection/auditing/audit-system-integrity.md @@ -1,5 +1,5 @@ --- -title: Audit System Integrity (Windows 10) +title: Audit System Integrity description: The policy setting, Audit System Integrity, determines if the operating system audits events that violate the integrity of the security subsystem. ms.assetid: 942a9a7f-fa31-4067-88c7-f73978bf2034 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-token-right-adjusted.md b/windows/security/threat-protection/auditing/audit-token-right-adjusted.md index d0969156b5..fd97b2de5e 100644 --- a/windows/security/threat-protection/auditing/audit-token-right-adjusted.md +++ b/windows/security/threat-protection/auditing/audit-token-right-adjusted.md @@ -1,5 +1,5 @@ --- -title: Audit Token Right Adjusted (Windows 10) +title: Audit Token Right Adjusted description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Token Right Adjusted, which determines whether the operating system generates audit events when specific changes are made to the privileges of a token. manager: aaroncz author: vinaypamnani-msft diff --git a/windows/security/threat-protection/auditing/audit-user-account-management.md b/windows/security/threat-protection/auditing/audit-user-account-management.md index 2faba55a60..74dc66d2c4 100644 --- a/windows/security/threat-protection/auditing/audit-user-account-management.md +++ b/windows/security/threat-protection/auditing/audit-user-account-management.md @@ -1,5 +1,5 @@ --- -title: Audit User Account Management (Windows 10) +title: Audit User Account Management description: Audit User Account Management is an audit policy setting that determines if the operating system generates audit events when certain tasks are performed. ms.assetid: f7e72998-3858-4197-a443-19586ecc4bfb ms.reviewer: diff --git a/windows/security/threat-protection/auditing/audit-user-device-claims.md b/windows/security/threat-protection/auditing/audit-user-device-claims.md index e22930f47a..08a53b6cd8 100644 --- a/windows/security/threat-protection/auditing/audit-user-device-claims.md +++ b/windows/security/threat-protection/auditing/audit-user-device-claims.md @@ -1,5 +1,5 @@ --- -title: Audit User/Device Claims (Windows 10) +title: Audit User/Device Claims description: Audit User/Device Claims is an audit policy setting that enables you to audit security events that are generated by user and device claims. ms.assetid: D3D2BFAF-F2C0-462A-9377-673DB49D5486 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/basic-audit-account-logon-events.md b/windows/security/threat-protection/auditing/basic-audit-account-logon-events.md index da74741832..7623c4fb3c 100644 --- a/windows/security/threat-protection/auditing/basic-audit-account-logon-events.md +++ b/windows/security/threat-protection/auditing/basic-audit-account-logon-events.md @@ -1,5 +1,5 @@ --- -title: Audit account logon events (Windows 10) +title: Audit account logon events description: Determines whether to audit each instance of a user logging on to or logging off from another device in which this device is used to validate the account. ms.assetid: 84B44181-E325-49A1-8398-AECC3CE0A516 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/basic-audit-account-management.md b/windows/security/threat-protection/auditing/basic-audit-account-management.md index 22824ae059..7059ff21f3 100644 --- a/windows/security/threat-protection/auditing/basic-audit-account-management.md +++ b/windows/security/threat-protection/auditing/basic-audit-account-management.md @@ -1,5 +1,5 @@ --- -title: Audit account management (Windows 10) +title: Audit account management description: Determines whether to audit each event of account management on a device. ms.assetid: 369197E1-7E0E-45A4-89EA-16D91EF01689 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/basic-audit-directory-service-access.md b/windows/security/threat-protection/auditing/basic-audit-directory-service-access.md index e9bd4f0117..a77f8d8468 100644 --- a/windows/security/threat-protection/auditing/basic-audit-directory-service-access.md +++ b/windows/security/threat-protection/auditing/basic-audit-directory-service-access.md @@ -1,5 +1,5 @@ --- -title: Basic audit directory service access (Windows 10) +title: Basic audit directory service access description: Determines whether to audit the event of a user accessing an Active Directory object that has its own system access control list (SACL) specified. ms.assetid: 52F02EED-3CFE-4307-8D06-CF1E27693D09 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/basic-audit-logon-events.md b/windows/security/threat-protection/auditing/basic-audit-logon-events.md index 45ec095169..075921f764 100644 --- a/windows/security/threat-protection/auditing/basic-audit-logon-events.md +++ b/windows/security/threat-protection/auditing/basic-audit-logon-events.md @@ -1,5 +1,5 @@ --- -title: Audit logon events (Windows 10) +title: Audit logon events description: Determines whether to audit each instance of a user logging on to or logging off from a device. ms.assetid: 78B5AFCB-0BBD-4C38-9FE9-6B4571B94A35 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/basic-audit-object-access.md b/windows/security/threat-protection/auditing/basic-audit-object-access.md index 1b5014823a..1376b57216 100644 --- a/windows/security/threat-protection/auditing/basic-audit-object-access.md +++ b/windows/security/threat-protection/auditing/basic-audit-object-access.md @@ -1,5 +1,5 @@ --- -title: Audit object access (Windows 10) +title: Audit object access description: The policy setting, Audit object access, determines whether to audit the event generated when a user accesses an object that has its own SACL specified. ms.assetid: D15B6D67-7886-44C2-9972-3F192D5407EA ms.reviewer: diff --git a/windows/security/threat-protection/auditing/basic-audit-policy-change.md b/windows/security/threat-protection/auditing/basic-audit-policy-change.md index e698be1f37..feb9487f03 100644 --- a/windows/security/threat-protection/auditing/basic-audit-policy-change.md +++ b/windows/security/threat-protection/auditing/basic-audit-policy-change.md @@ -1,5 +1,5 @@ --- -title: Audit policy change (Windows 10) +title: Audit policy change description: Determines whether to audit every incident of a change to user rights assignment policies, audit policies, or trust policies. ms.assetid: 1025A648-6B22-4C85-9F47-FE0897F1FA31 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/basic-audit-privilege-use.md b/windows/security/threat-protection/auditing/basic-audit-privilege-use.md index 4e70e2b0f1..c459cc1086 100644 --- a/windows/security/threat-protection/auditing/basic-audit-privilege-use.md +++ b/windows/security/threat-protection/auditing/basic-audit-privilege-use.md @@ -1,5 +1,5 @@ --- -title: Audit privilege use (Windows 10) +title: Audit privilege use description: Determines whether to audit each instance of a user exercising a user right. ms.assetid: C5C6DAAF-8B58-4DFB-B1CE-F0675AE0E9F8 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/basic-audit-process-tracking.md b/windows/security/threat-protection/auditing/basic-audit-process-tracking.md index e2d32e164d..8adcb1235c 100644 --- a/windows/security/threat-protection/auditing/basic-audit-process-tracking.md +++ b/windows/security/threat-protection/auditing/basic-audit-process-tracking.md @@ -1,5 +1,5 @@ --- -title: Audit process tracking (Windows 10) +title: Audit process tracking description: Determines whether to audit detailed tracking information for events such as program activation, process exit, handle duplication, and indirect object access. ms.assetid: 91AC5C1E-F4DA-4B16-BEE2-C92D66E4CEEA ms.reviewer: diff --git a/windows/security/threat-protection/auditing/basic-audit-system-events.md b/windows/security/threat-protection/auditing/basic-audit-system-events.md index e1c1c1a64c..9ea0655ee8 100644 --- a/windows/security/threat-protection/auditing/basic-audit-system-events.md +++ b/windows/security/threat-protection/auditing/basic-audit-system-events.md @@ -1,5 +1,5 @@ --- -title: Audit system events (Windows 10) +title: Audit system events description: Determines whether to audit when a user restarts or shuts down the computer or when an event occurs that affects either the system security or the security log. ms.assetid: BF27588C-2AA7-4365-A4BF-3BB377916447 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/basic-security-audit-policies.md b/windows/security/threat-protection/auditing/basic-security-audit-policies.md index 5a4bec26db..e8e67ff791 100644 --- a/windows/security/threat-protection/auditing/basic-security-audit-policies.md +++ b/windows/security/threat-protection/auditing/basic-security-audit-policies.md @@ -1,5 +1,5 @@ --- -title: Basic security audit policies (Windows 10) +title: Basic security audit policies description: Learn about basic security audit policies that specify the categories of security-related events that you want to audit for the needs of your organization. ms.assetid: 3B678568-7AD7-4734-9BB4-53CF5E04E1D3 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/basic-security-audit-policy-settings.md b/windows/security/threat-protection/auditing/basic-security-audit-policy-settings.md index aa0e4c7ea2..85d95b74f6 100644 --- a/windows/security/threat-protection/auditing/basic-security-audit-policy-settings.md +++ b/windows/security/threat-protection/auditing/basic-security-audit-policy-settings.md @@ -1,5 +1,5 @@ --- -title: Basic security audit policy settings (Windows 10) +title: Basic security audit policy settings description: Basic security audit policy settings are found under Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Audit Policy. ms.assetid: 31C2C453-2CFC-4D9E-BC88-8CE1C1A8F900 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/create-a-basic-audit-policy-settings-for-an-event-category.md b/windows/security/threat-protection/auditing/create-a-basic-audit-policy-settings-for-an-event-category.md index f27b911fa2..9b03c40bbf 100644 --- a/windows/security/threat-protection/auditing/create-a-basic-audit-policy-settings-for-an-event-category.md +++ b/windows/security/threat-protection/auditing/create-a-basic-audit-policy-settings-for-an-event-category.md @@ -1,5 +1,5 @@ --- -title: Create a basic audit policy for an event category (Windows 10) +title: Create a basic audit policy for an event category description: By defining auditing settings for specific event categories, you can create an auditing policy that suits the security needs of your organization. ms.assetid: C9F52751-B40D-482E-BE9D-2C61098249D3 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/event-1100.md b/windows/security/threat-protection/auditing/event-1100.md index b0606e87da..5757c2d6ae 100644 --- a/windows/security/threat-protection/auditing/event-1100.md +++ b/windows/security/threat-protection/auditing/event-1100.md @@ -1,5 +1,5 @@ --- -title: 1100(S) The event logging service has shut down. (Windows 10) +title: 1100(S) The event logging service has shut down. description: Describes security event 1100(S) The event logging service has shut down. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-1102.md b/windows/security/threat-protection/auditing/event-1102.md index c319070f2a..16c59d4352 100644 --- a/windows/security/threat-protection/auditing/event-1102.md +++ b/windows/security/threat-protection/auditing/event-1102.md @@ -1,5 +1,5 @@ --- -title: 1102(S) The audit log was cleared. (Windows 10) +title: 1102(S) The audit log was cleared. description: Though you shouldn't normally see it, this event generates every time Windows Security audit log is cleared. This is for event 1102(S). ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-1104.md b/windows/security/threat-protection/auditing/event-1104.md index 7768b7a43a..3f61cee0ab 100644 --- a/windows/security/threat-protection/auditing/event-1104.md +++ b/windows/security/threat-protection/auditing/event-1104.md @@ -1,5 +1,5 @@ --- -title: 1104(S) The security log is now full. (Windows 10) +title: 1104(S) The security log is now full. description: This event generates every time Windows security log becomes full and the event log retention method is set to Do not overwrite events. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-1105.md b/windows/security/threat-protection/auditing/event-1105.md index 2c10dd205e..cac285228f 100644 --- a/windows/security/threat-protection/auditing/event-1105.md +++ b/windows/security/threat-protection/auditing/event-1105.md @@ -1,5 +1,5 @@ --- -title: 1105(S) Event log automatic backup. (Windows 10) +title: 1105(S) Event log automatic backup. description: This event generates every time Windows security log becomes full and new event log file was created. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-1108.md b/windows/security/threat-protection/auditing/event-1108.md index 3412104704..68ae9463dc 100644 --- a/windows/security/threat-protection/auditing/event-1108.md +++ b/windows/security/threat-protection/auditing/event-1108.md @@ -1,5 +1,5 @@ --- -title: The event logging service encountered an error (Windows 10) +title: The event logging service encountered an error description: Describes security event 1108(S) The event logging service encountered an error while processing an incoming event published from %1. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4608.md b/windows/security/threat-protection/auditing/event-4608.md index bbcb45e073..8c603dd52e 100644 --- a/windows/security/threat-protection/auditing/event-4608.md +++ b/windows/security/threat-protection/auditing/event-4608.md @@ -1,5 +1,5 @@ --- -title: 4608(S) Windows is starting up. (Windows 10) +title: 4608(S) Windows is starting up. description: Describes security event 4608(S) Windows is starting up. This event is logged when the LSASS.EXE process starts and the auditing subsystem is initialized. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4610.md b/windows/security/threat-protection/auditing/event-4610.md index 2307a50732..714b4c0d5a 100644 --- a/windows/security/threat-protection/auditing/event-4610.md +++ b/windows/security/threat-protection/auditing/event-4610.md @@ -1,5 +1,5 @@ --- -title: 4610(S) An authentication package has been loaded by the Local Security Authority. (Windows 10) +title: 4610(S) An authentication package has been loaded by the Local Security Authority. description: Describes security event 4610(S) An authentication package has been loaded by the Local Security Authority. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4611.md b/windows/security/threat-protection/auditing/event-4611.md index 54b57cc223..6c30ed7235 100644 --- a/windows/security/threat-protection/auditing/event-4611.md +++ b/windows/security/threat-protection/auditing/event-4611.md @@ -1,5 +1,5 @@ --- -title: 4611(S) A trusted logon process has been registered with the Local Security Authority. (Windows 10) +title: 4611(S) A trusted logon process has been registered with the Local Security Authority. description: Describes security event 4611(S) A trusted logon process has been registered with the Local Security Authority. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4612.md b/windows/security/threat-protection/auditing/event-4612.md index 111fa80c83..70ee3338ae 100644 --- a/windows/security/threat-protection/auditing/event-4612.md +++ b/windows/security/threat-protection/auditing/event-4612.md @@ -1,5 +1,5 @@ --- -title: 4612(S) Internal resources allocated for the queuing of audit messages have been exhausted, leading to the loss of some audits. (Windows 10) +title: 4612(S) Internal resources allocated for the queuing of audit messages have been exhausted, leading to the loss of some audits. description: Describes security event 4612(S) Internal resources allocated for the queuing of audit messages have been exhausted, leading to the loss of some audits. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4614.md b/windows/security/threat-protection/auditing/event-4614.md index edb915b91d..5a7d10d8a8 100644 --- a/windows/security/threat-protection/auditing/event-4614.md +++ b/windows/security/threat-protection/auditing/event-4614.md @@ -1,5 +1,5 @@ --- -title: 4614(S) A notification package has been loaded by the Security Account Manager. (Windows 10) +title: 4614(S) A notification package has been loaded by the Security Account Manager. description: Describes security event 4614(S) A notification package has been loaded by the Security Account Manager. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4615.md b/windows/security/threat-protection/auditing/event-4615.md index f74209909e..92134c76a4 100644 --- a/windows/security/threat-protection/auditing/event-4615.md +++ b/windows/security/threat-protection/auditing/event-4615.md @@ -1,5 +1,5 @@ --- -title: 4615(S) Invalid use of LPC port. (Windows 10) +title: 4615(S) Invalid use of LPC port. description: Describes security event 4615(S) Invalid use of LPC port. It appears that the Invalid use of LPC port event never occurs. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4616.md b/windows/security/threat-protection/auditing/event-4616.md index 166b695ebb..fa1166e46d 100644 --- a/windows/security/threat-protection/auditing/event-4616.md +++ b/windows/security/threat-protection/auditing/event-4616.md @@ -1,5 +1,5 @@ --- -title: 4616(S) The system time was changed. (Windows 10) +title: 4616(S) The system time was changed. description: Describes security event 4616(S) The system time was changed. This event is generated every time system time is changed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4618.md b/windows/security/threat-protection/auditing/event-4618.md index f35815a20c..8d50584182 100644 --- a/windows/security/threat-protection/auditing/event-4618.md +++ b/windows/security/threat-protection/auditing/event-4618.md @@ -1,5 +1,5 @@ --- -title: 4618(S) A monitored security event pattern has occurred. (Windows 10) +title: 4618(S) A monitored security event pattern has occurred. description: Describes security event 4618(S) A monitored security event pattern has occurred. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4621.md b/windows/security/threat-protection/auditing/event-4621.md index 64e4f81134..56fa6c3379 100644 --- a/windows/security/threat-protection/auditing/event-4621.md +++ b/windows/security/threat-protection/auditing/event-4621.md @@ -1,5 +1,5 @@ --- -title: 4621(S) Administrator recovered system from CrashOnAuditFail. (Windows 10) +title: 4621(S) Administrator recovered system from CrashOnAuditFail. description: Describes security event 4621(S) Administrator recovered system from CrashOnAuditFail. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4622.md b/windows/security/threat-protection/auditing/event-4622.md index 5dc147c077..50bec63d42 100644 --- a/windows/security/threat-protection/auditing/event-4622.md +++ b/windows/security/threat-protection/auditing/event-4622.md @@ -1,5 +1,5 @@ --- -title: 4622(S) A security package has been loaded by the Local Security Authority. (Windows 10) +title: 4622(S) A security package has been loaded by the Local Security Authority. description: Describes security event 4622(S) A security package has been loaded by the Local Security Authority. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4624.md b/windows/security/threat-protection/auditing/event-4624.md index e081fcb3f0..ad06ba99ab 100644 --- a/windows/security/threat-protection/auditing/event-4624.md +++ b/windows/security/threat-protection/auditing/event-4624.md @@ -1,5 +1,5 @@ --- -title: 4624(S) An account was successfully logged on. (Windows 10) +title: 4624(S) An account was successfully logged on. description: Describes security event 4624(S) An account was successfully logged on. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4625.md b/windows/security/threat-protection/auditing/event-4625.md index 45f8a019b0..2379077b79 100644 --- a/windows/security/threat-protection/auditing/event-4625.md +++ b/windows/security/threat-protection/auditing/event-4625.md @@ -1,5 +1,5 @@ --- -title: 4625(F) An account failed to log on. (Windows 10) +title: 4625(F) An account failed to log on. description: Describes security event 4625(F) An account failed to log on. This event is generated if an account logon attempt failed for a locked out account. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4626.md b/windows/security/threat-protection/auditing/event-4626.md index addb26abce..804389426d 100644 --- a/windows/security/threat-protection/auditing/event-4626.md +++ b/windows/security/threat-protection/auditing/event-4626.md @@ -1,5 +1,5 @@ --- -title: 4626(S) User/Device claims information. (Windows 10) +title: 4626(S) User/Device claims information. description: Describes security event 4626(S) User/Device claims information. This event is generated for new account logons. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4627.md b/windows/security/threat-protection/auditing/event-4627.md index 0da1f08aee..111b2523c8 100644 --- a/windows/security/threat-protection/auditing/event-4627.md +++ b/windows/security/threat-protection/auditing/event-4627.md @@ -1,5 +1,5 @@ --- -title: 4627(S) Group membership information. (Windows 10) +title: 4627(S) Group membership information. description: Describes security event 4627(S) Group membership information. This event is generated with event 4624(S) An account was successfully logged on. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4634.md b/windows/security/threat-protection/auditing/event-4634.md index 6d8ed22539..086b8f85cf 100644 --- a/windows/security/threat-protection/auditing/event-4634.md +++ b/windows/security/threat-protection/auditing/event-4634.md @@ -1,5 +1,5 @@ --- -title: 4634(S) An account was logged off. (Windows 10) +title: 4634(S) An account was logged off. description: Describes security event 4634(S) An account was logged off. This event is generated when a logon session is terminated and no longer exists. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4647.md b/windows/security/threat-protection/auditing/event-4647.md index 64c7e02466..05586a8c05 100644 --- a/windows/security/threat-protection/auditing/event-4647.md +++ b/windows/security/threat-protection/auditing/event-4647.md @@ -1,5 +1,5 @@ --- -title: 4647(S) User initiated logoff. (Windows 10) +title: 4647(S) User initiated logoff. description: Describes security event 4647(S) User initiated logoff. This event is generated when a logoff is initiated. No further user-initiated activity can occur. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4648.md b/windows/security/threat-protection/auditing/event-4648.md index 5ffebb9c04..73012d0cf2 100644 --- a/windows/security/threat-protection/auditing/event-4648.md +++ b/windows/security/threat-protection/auditing/event-4648.md @@ -1,5 +1,5 @@ --- -title: 4648(S) A logon was attempted using explicit credentials. (Windows 10) +title: 4648(S) A logon was attempted using explicit credentials. description: Describes security event 4648(S) A logon was attempted using explicit credentials. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4649.md b/windows/security/threat-protection/auditing/event-4649.md index 98a1c9ad18..c4caa3d98d 100644 --- a/windows/security/threat-protection/auditing/event-4649.md +++ b/windows/security/threat-protection/auditing/event-4649.md @@ -1,5 +1,5 @@ --- -title: 4649(S) A replay attack was detected. (Windows 10) +title: 4649(S) A replay attack was detected. description: Describes security event 4649(S) A replay attack was detected. This event is generated when a KRB_AP_ERR_REPEAT Kerberos response is sent to the client. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4656.md b/windows/security/threat-protection/auditing/event-4656.md index 7d974fa3fa..81803532eb 100644 --- a/windows/security/threat-protection/auditing/event-4656.md +++ b/windows/security/threat-protection/auditing/event-4656.md @@ -1,5 +1,5 @@ --- -title: 4656(S, F) A handle to an object was requested. (Windows 10) +title: 4656(S, F) A handle to an object was requested. description: Describes security event 4656(S, F) A handle to an object was requested. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4657.md b/windows/security/threat-protection/auditing/event-4657.md index cb4ecc3ae1..73a89ae5ff 100644 --- a/windows/security/threat-protection/auditing/event-4657.md +++ b/windows/security/threat-protection/auditing/event-4657.md @@ -1,5 +1,5 @@ --- -title: 4657(S) A registry value was modified. (Windows 10) +title: 4657(S) A registry value was modified. description: Describes security event 4657(S) A registry value was modified. This event is generated when a registry key value is modified. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4658.md b/windows/security/threat-protection/auditing/event-4658.md index 532558cd00..95ec14dff4 100644 --- a/windows/security/threat-protection/auditing/event-4658.md +++ b/windows/security/threat-protection/auditing/event-4658.md @@ -1,5 +1,5 @@ --- -title: 4658(S) The handle to an object was closed. (Windows 10) +title: 4658(S) The handle to an object was closed. description: Describes security event 4658(S) The handle to an object was closed. This event is generated when the handle to an object is closed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4660.md b/windows/security/threat-protection/auditing/event-4660.md index b0124437c6..348903da4c 100644 --- a/windows/security/threat-protection/auditing/event-4660.md +++ b/windows/security/threat-protection/auditing/event-4660.md @@ -1,5 +1,5 @@ --- -title: 4660(S) An object was deleted. (Windows 10) +title: 4660(S) An object was deleted. description: Describes security event 4660(S) An object was deleted. This event is generated when an object is deleted. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4661.md b/windows/security/threat-protection/auditing/event-4661.md index 6cc68892c8..cbafd424c3 100644 --- a/windows/security/threat-protection/auditing/event-4661.md +++ b/windows/security/threat-protection/auditing/event-4661.md @@ -1,5 +1,5 @@ --- -title: 4661(S, F) A handle to an object was requested. (Windows 10) +title: 4661(S, F) A handle to an object was requested. description: Describes security event 4661(S, F) A handle to an object was requested. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4662.md b/windows/security/threat-protection/auditing/event-4662.md index cf19827489..1b85e12b87 100644 --- a/windows/security/threat-protection/auditing/event-4662.md +++ b/windows/security/threat-protection/auditing/event-4662.md @@ -1,5 +1,5 @@ --- -title: 4662(S, F) An operation was performed on an object. (Windows 10) +title: 4662(S, F) An operation was performed on an object. description: Describes security event 4662(S, F) An operation was performed on an object. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4663.md b/windows/security/threat-protection/auditing/event-4663.md index cf790af491..5a1134b2d1 100644 --- a/windows/security/threat-protection/auditing/event-4663.md +++ b/windows/security/threat-protection/auditing/event-4663.md @@ -1,5 +1,5 @@ --- -title: 4663(S) An attempt was made to access an object. (Windows 10) +title: 4663(S) An attempt was made to access an object. description: Describes security event 4663(S) An attempt was made to access an object. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4664.md b/windows/security/threat-protection/auditing/event-4664.md index 0a27e27f7d..b6673c7380 100644 --- a/windows/security/threat-protection/auditing/event-4664.md +++ b/windows/security/threat-protection/auditing/event-4664.md @@ -1,5 +1,5 @@ --- -title: 4664(S) An attempt was made to create a hard link. (Windows 10) +title: 4664(S) An attempt was made to create a hard link. description: Describes security event 4664(S) An attempt was made to create a hard link. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4670.md b/windows/security/threat-protection/auditing/event-4670.md index f20653ded7..d0e48676ce 100644 --- a/windows/security/threat-protection/auditing/event-4670.md +++ b/windows/security/threat-protection/auditing/event-4670.md @@ -1,5 +1,5 @@ --- -title: 4670(S) Permissions on an object were changed. (Windows 10) +title: 4670(S) Permissions on an object were changed. description: Describes security event 4670(S) Permissions on an object were changed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4671.md b/windows/security/threat-protection/auditing/event-4671.md index 3215da12d8..5e922fa30c 100644 --- a/windows/security/threat-protection/auditing/event-4671.md +++ b/windows/security/threat-protection/auditing/event-4671.md @@ -1,5 +1,5 @@ --- -title: 4671(-) An application attempted to access a blocked ordinal through the TBS. (Windows 10) +title: 4671(-) An application attempted to access a blocked ordinal through the TBS. description: Describes security event 4671(-) An application attempted to access a blocked ordinal through the TBS. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4672.md b/windows/security/threat-protection/auditing/event-4672.md index 3b61e352a2..c2f050300a 100644 --- a/windows/security/threat-protection/auditing/event-4672.md +++ b/windows/security/threat-protection/auditing/event-4672.md @@ -1,5 +1,5 @@ --- -title: 4672(S) Special privileges assigned to new logon. (Windows 10) +title: 4672(S) Special privileges assigned to new logon. description: Describes security event 4672(S) Special privileges assigned to new logon. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4673.md b/windows/security/threat-protection/auditing/event-4673.md index e63486e9fa..bb5004ff58 100644 --- a/windows/security/threat-protection/auditing/event-4673.md +++ b/windows/security/threat-protection/auditing/event-4673.md @@ -1,5 +1,5 @@ --- -title: 4673(S, F) A privileged service was called. (Windows 10) +title: 4673(S, F) A privileged service was called. description: Describes security event 4673(S, F) A privileged service was called. This event is generated for an attempt to perform privileged system service operations. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4674.md b/windows/security/threat-protection/auditing/event-4674.md index 11f8c3fb62..df0a45b3a2 100644 --- a/windows/security/threat-protection/auditing/event-4674.md +++ b/windows/security/threat-protection/auditing/event-4674.md @@ -1,5 +1,5 @@ --- -title: 4674(S, F) An operation was attempted on a privileged object. (Windows 10) +title: 4674(S, F) An operation was attempted on a privileged object. description: Describes security event 4674(S, F) An operation was attempted on a privileged object. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4675.md b/windows/security/threat-protection/auditing/event-4675.md index 6daf08eef3..0b62ce8d8a 100644 --- a/windows/security/threat-protection/auditing/event-4675.md +++ b/windows/security/threat-protection/auditing/event-4675.md @@ -1,5 +1,5 @@ --- -title: 4675(S) SIDs were filtered. (Windows 10) +title: 4675(S) SIDs were filtered. description: Describes security event 4675(S) SIDs were filtered. This event is generated when SIDs were filtered for a specific Active Directory trust. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4688.md b/windows/security/threat-protection/auditing/event-4688.md index 5742fbd554..45d85659b3 100644 --- a/windows/security/threat-protection/auditing/event-4688.md +++ b/windows/security/threat-protection/auditing/event-4688.md @@ -1,5 +1,5 @@ --- -title: 4688(S) A new process has been created. (Windows 10) +title: 4688(S) A new process has been created. description: Describes security event 4688(S) A new process has been created. This event is generated when a new process starts. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4689.md b/windows/security/threat-protection/auditing/event-4689.md index f2014c9a1e..3d1ab863dd 100644 --- a/windows/security/threat-protection/auditing/event-4689.md +++ b/windows/security/threat-protection/auditing/event-4689.md @@ -1,5 +1,5 @@ --- -title: 4689(S) A process has exited. (Windows 10) +title: 4689(S) A process has exited. description: Describes security event 4689(S) A process has exited. This event is generates when a process exits. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4690.md b/windows/security/threat-protection/auditing/event-4690.md index e0b54b2afe..c019ad6c0e 100644 --- a/windows/security/threat-protection/auditing/event-4690.md +++ b/windows/security/threat-protection/auditing/event-4690.md @@ -1,5 +1,5 @@ --- -title: 4690(S) An attempt was made to duplicate a handle to an object. (Windows 10) +title: 4690(S) An attempt was made to duplicate a handle to an object. description: Describes security event 4690(S) An attempt was made to duplicate a handle to an object. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4691.md b/windows/security/threat-protection/auditing/event-4691.md index 9f88bf0d9b..6a3f99ac6d 100644 --- a/windows/security/threat-protection/auditing/event-4691.md +++ b/windows/security/threat-protection/auditing/event-4691.md @@ -1,5 +1,5 @@ --- -title: 4691(S) Indirect access to an object was requested. (Windows 10) +title: 4691(S) Indirect access to an object was requested. description: Describes security event 4691(S) Indirect access to an object was requested. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4692.md b/windows/security/threat-protection/auditing/event-4692.md index fb56e8e4c9..d439754ca0 100644 --- a/windows/security/threat-protection/auditing/event-4692.md +++ b/windows/security/threat-protection/auditing/event-4692.md @@ -1,5 +1,5 @@ --- -title: 4692(S, F) Backup of data protection master key was attempted. (Windows 10) +title: 4692(S, F) Backup of data protection master key was attempted. description: Describes security event 4692(S, F) Backup of data protection master key was attempted. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4693.md b/windows/security/threat-protection/auditing/event-4693.md index bd99d76424..3c3ccec111 100644 --- a/windows/security/threat-protection/auditing/event-4693.md +++ b/windows/security/threat-protection/auditing/event-4693.md @@ -1,5 +1,5 @@ --- -title: 4693(S, F) Recovery of data protection master key was attempted. (Windows 10) +title: 4693(S, F) Recovery of data protection master key was attempted. description: Describes security event 4693(S, F) Recovery of data protection master key was attempted. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4694.md b/windows/security/threat-protection/auditing/event-4694.md index f66fb36e4d..c32e3f5f45 100644 --- a/windows/security/threat-protection/auditing/event-4694.md +++ b/windows/security/threat-protection/auditing/event-4694.md @@ -1,5 +1,5 @@ --- -title: 4694(S, F) Protection of auditable protected data was attempted. (Windows 10) +title: 4694(S, F) Protection of auditable protected data was attempted. description: Describes security event 4694(S, F) Protection of auditable protected data was attempted. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4695.md b/windows/security/threat-protection/auditing/event-4695.md index 68c0ac644a..56c60185f8 100644 --- a/windows/security/threat-protection/auditing/event-4695.md +++ b/windows/security/threat-protection/auditing/event-4695.md @@ -1,5 +1,5 @@ --- -title: 4695(S, F) Unprotection of auditable protected data was attempted. (Windows 10) +title: 4695(S, F) Unprotection of auditable protected data was attempted. description: Describes security event 4695(S, F) Unprotection of auditable protected data was attempted. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4696.md b/windows/security/threat-protection/auditing/event-4696.md index fc3d8432ee..9168383e9a 100644 --- a/windows/security/threat-protection/auditing/event-4696.md +++ b/windows/security/threat-protection/auditing/event-4696.md @@ -1,5 +1,5 @@ --- -title: 4696(S) A primary token was assigned to process. (Windows 10) +title: 4696(S) A primary token was assigned to process. description: Describes security event 4696(S) A primary token was assigned to process. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4697.md b/windows/security/threat-protection/auditing/event-4697.md index 5d1072f99b..216ab77c68 100644 --- a/windows/security/threat-protection/auditing/event-4697.md +++ b/windows/security/threat-protection/auditing/event-4697.md @@ -1,5 +1,5 @@ --- -title: 4697(S) A service was installed in the system. (Windows 10) +title: 4697(S) A service was installed in the system. description: Describes security event 4697(S) A service was installed in the system. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4698.md b/windows/security/threat-protection/auditing/event-4698.md index cfbe0e3f96..faf3e412ad 100644 --- a/windows/security/threat-protection/auditing/event-4698.md +++ b/windows/security/threat-protection/auditing/event-4698.md @@ -1,5 +1,5 @@ --- -title: 4698(S) A scheduled task was created. (Windows 10) +title: 4698(S) A scheduled task was created. description: Describes security event 4698(S) A scheduled task was created. This event is generated when a scheduled task is created. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4699.md b/windows/security/threat-protection/auditing/event-4699.md index 56935a1da0..449c346434 100644 --- a/windows/security/threat-protection/auditing/event-4699.md +++ b/windows/security/threat-protection/auditing/event-4699.md @@ -1,5 +1,5 @@ --- -title: 4699(S) A scheduled task was deleted. (Windows 10) +title: 4699(S) A scheduled task was deleted. description: Describes security event 4699(S) A scheduled task was deleted. This event is generated every time a scheduled task is deleted. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4700.md b/windows/security/threat-protection/auditing/event-4700.md index 3c45c92cf4..c1593bb721 100644 --- a/windows/security/threat-protection/auditing/event-4700.md +++ b/windows/security/threat-protection/auditing/event-4700.md @@ -1,5 +1,5 @@ --- -title: 4700(S) A scheduled task was enabled. (Windows 10) +title: 4700(S) A scheduled task was enabled. description: Describes security event 4700(S) A scheduled task was enabled. This event is generated every time a scheduled task is enabled. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4701.md b/windows/security/threat-protection/auditing/event-4701.md index 0a9639837b..106ed9b28e 100644 --- a/windows/security/threat-protection/auditing/event-4701.md +++ b/windows/security/threat-protection/auditing/event-4701.md @@ -1,5 +1,5 @@ --- -title: 4701(S) A scheduled task was disabled. (Windows 10) +title: 4701(S) A scheduled task was disabled. description: Describes security event 4701(S) A scheduled task was disabled. This event is generated every time a scheduled task is disabled. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4702.md b/windows/security/threat-protection/auditing/event-4702.md index 96c7f0b93b..e51feda768 100644 --- a/windows/security/threat-protection/auditing/event-4702.md +++ b/windows/security/threat-protection/auditing/event-4702.md @@ -1,5 +1,5 @@ --- -title: 4702(S) A scheduled task was updated. (Windows 10) +title: 4702(S) A scheduled task was updated. description: Describes security event 4702(S) A scheduled task was updated. This event is generated when a scheduled task is updated/changed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4703.md b/windows/security/threat-protection/auditing/event-4703.md index f10d935aa1..3f5d60a214 100644 --- a/windows/security/threat-protection/auditing/event-4703.md +++ b/windows/security/threat-protection/auditing/event-4703.md @@ -1,5 +1,5 @@ --- -title: 4703(S) A user right was adjusted. (Windows 10) +title: 4703(S) A user right was adjusted. description: Describes security event 4703(S) A user right was adjusted. This event is generated when token privileges are enabled or disabled for a specific account. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4704.md b/windows/security/threat-protection/auditing/event-4704.md index 4b0b4ef478..8baf62d9d3 100644 --- a/windows/security/threat-protection/auditing/event-4704.md +++ b/windows/security/threat-protection/auditing/event-4704.md @@ -1,5 +1,5 @@ --- -title: 4704(S) A user right was assigned. (Windows 10) +title: 4704(S) A user right was assigned. description: Describes security event 4704(S) A user right was assigned. This event is generated when a user right is assigned to an account. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4705.md b/windows/security/threat-protection/auditing/event-4705.md index c66295ce0d..3efba6fe63 100644 --- a/windows/security/threat-protection/auditing/event-4705.md +++ b/windows/security/threat-protection/auditing/event-4705.md @@ -1,5 +1,5 @@ --- -title: 4705(S) A user right was removed. (Windows 10) +title: 4705(S) A user right was removed. description: Describes security event 4705(S) A user right was removed. This event is generated when a user right is removed from an account. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4706.md b/windows/security/threat-protection/auditing/event-4706.md index 01ce8db4cd..f326216f0e 100644 --- a/windows/security/threat-protection/auditing/event-4706.md +++ b/windows/security/threat-protection/auditing/event-4706.md @@ -1,5 +1,5 @@ --- -title: 4706(S) A new trust was created to a domain. (Windows 10) +title: 4706(S) A new trust was created to a domain. description: Describes security event 4706(S) A new trust was created to a domain. This event is generated when a new trust is created for a domain. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4707.md b/windows/security/threat-protection/auditing/event-4707.md index a47a9ea3ea..55d9629ffc 100644 --- a/windows/security/threat-protection/auditing/event-4707.md +++ b/windows/security/threat-protection/auditing/event-4707.md @@ -1,5 +1,5 @@ --- -title: 4707(S) A trust to a domain was removed. (Windows 10) +title: 4707(S) A trust to a domain was removed. description: Describes security event 4707(S) A trust to a domain was removed. This event is generated when a domain trust is removed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4713.md b/windows/security/threat-protection/auditing/event-4713.md index 218134046e..20b49c9c8b 100644 --- a/windows/security/threat-protection/auditing/event-4713.md +++ b/windows/security/threat-protection/auditing/event-4713.md @@ -1,5 +1,5 @@ --- -title: 4713(S) Kerberos policy was changed. (Windows 10) +title: 4713(S) Kerberos policy was changed. description: Describes security event 4713(S) Kerberos policy was changed. This event is generated when Kerberos policy is changed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4714.md b/windows/security/threat-protection/auditing/event-4714.md index fc40a49c6e..f266113293 100644 --- a/windows/security/threat-protection/auditing/event-4714.md +++ b/windows/security/threat-protection/auditing/event-4714.md @@ -1,5 +1,5 @@ --- -title: 4714(S) Encrypted data recovery policy was changed. (Windows 10) +title: 4714(S) Encrypted data recovery policy was changed. description: Describes security event 4714(S) Encrypted data recovery policy was changed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4715.md b/windows/security/threat-protection/auditing/event-4715.md index f128397767..ab59295e22 100644 --- a/windows/security/threat-protection/auditing/event-4715.md +++ b/windows/security/threat-protection/auditing/event-4715.md @@ -1,5 +1,5 @@ --- -title: 4715(S) The audit policy (SACL) on an object was changed. (Windows 10) +title: 4715(S) The audit policy (SACL) on an object was changed. description: Describes security event 4715(S) The audit policy (SACL) on an object was changed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4716.md b/windows/security/threat-protection/auditing/event-4716.md index 3d1ec5f975..1c77e985f8 100644 --- a/windows/security/threat-protection/auditing/event-4716.md +++ b/windows/security/threat-protection/auditing/event-4716.md @@ -1,5 +1,5 @@ --- -title: 4716(S) Trusted domain information was modified. (Windows 10) +title: 4716(S) Trusted domain information was modified. description: Describes security event 4716(S) Trusted domain information was modified. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4717.md b/windows/security/threat-protection/auditing/event-4717.md index 8a1f14e022..d72fd9ca59 100644 --- a/windows/security/threat-protection/auditing/event-4717.md +++ b/windows/security/threat-protection/auditing/event-4717.md @@ -1,5 +1,5 @@ --- -title: 4717(S) System security access was granted to an account. (Windows 10) +title: 4717(S) System security access was granted to an account. description: Describes security event 4717(S) System security access was granted to an account. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4718.md b/windows/security/threat-protection/auditing/event-4718.md index e8ec6b8039..03b924f369 100644 --- a/windows/security/threat-protection/auditing/event-4718.md +++ b/windows/security/threat-protection/auditing/event-4718.md @@ -1,5 +1,5 @@ --- -title: 4718(S) System security access was removed from an account. (Windows 10) +title: 4718(S) System security access was removed from an account. description: Describes security event 4718(S) System security access was removed from an account. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4719.md b/windows/security/threat-protection/auditing/event-4719.md index dae615acf4..b05dbcbc20 100644 --- a/windows/security/threat-protection/auditing/event-4719.md +++ b/windows/security/threat-protection/auditing/event-4719.md @@ -1,5 +1,5 @@ --- -title: 4719(S) System audit policy was changed. (Windows 10) +title: 4719(S) System audit policy was changed. description: Describes security event 4719(S) System audit policy was changed. This event is generated when the computer audit policy changes. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4720.md b/windows/security/threat-protection/auditing/event-4720.md index b53966664d..e1cfbc29b4 100644 --- a/windows/security/threat-protection/auditing/event-4720.md +++ b/windows/security/threat-protection/auditing/event-4720.md @@ -1,5 +1,5 @@ --- -title: 4720(S) A user account was created. (Windows 10) +title: 4720(S) A user account was created. description: Describes security event 4720(S) A user account was created. This event is generated a user object is created. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4722.md b/windows/security/threat-protection/auditing/event-4722.md index 4388873aa0..c8c30f7220 100644 --- a/windows/security/threat-protection/auditing/event-4722.md +++ b/windows/security/threat-protection/auditing/event-4722.md @@ -1,5 +1,5 @@ --- -title: 4722(S) A user account was enabled. (Windows 10) +title: 4722(S) A user account was enabled. description: Describes security event 4722(S) A user account was enabled. This event is generated when a user or computer object is enabled. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4723.md b/windows/security/threat-protection/auditing/event-4723.md index 8b8b7975a1..ac4e3d2e04 100644 --- a/windows/security/threat-protection/auditing/event-4723.md +++ b/windows/security/threat-protection/auditing/event-4723.md @@ -1,5 +1,5 @@ --- -title: 4723(S, F) An attempt was made to change an account's password. (Windows 10) +title: 4723(S, F) An attempt was made to change an account's password. description: Describes security event 4723(S, F) An attempt was made to change an account's password. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4724.md b/windows/security/threat-protection/auditing/event-4724.md index 00c98b63e4..09d1e8a757 100644 --- a/windows/security/threat-protection/auditing/event-4724.md +++ b/windows/security/threat-protection/auditing/event-4724.md @@ -1,5 +1,5 @@ --- -title: 4724(S, F) An attempt was made to reset an account's password. (Windows 10) +title: 4724(S, F) An attempt was made to reset an account's password. description: Describes security event 4724(S, F) An attempt was made to reset an account's password. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4725.md b/windows/security/threat-protection/auditing/event-4725.md index ad5b546a6d..84bed2bd84 100644 --- a/windows/security/threat-protection/auditing/event-4725.md +++ b/windows/security/threat-protection/auditing/event-4725.md @@ -1,5 +1,5 @@ --- -title: 4725(S) A user account was disabled. (Windows 10) +title: 4725(S) A user account was disabled. description: Describes security event 4725(S) A user account was disabled. This event is generated when a user or computer object is disabled. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4726.md b/windows/security/threat-protection/auditing/event-4726.md index 7df0779c4a..ed6d64686d 100644 --- a/windows/security/threat-protection/auditing/event-4726.md +++ b/windows/security/threat-protection/auditing/event-4726.md @@ -1,5 +1,5 @@ --- -title: 4726(S) A user account was deleted. (Windows 10) +title: 4726(S) A user account was deleted. description: Describes security event 4726(S) A user account was deleted. This event is generated when a user object is deleted. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4731.md b/windows/security/threat-protection/auditing/event-4731.md index ca1c673af4..c288f85c6f 100644 --- a/windows/security/threat-protection/auditing/event-4731.md +++ b/windows/security/threat-protection/auditing/event-4731.md @@ -1,5 +1,5 @@ --- -title: 4731(S) A security-enabled local group was created. (Windows 10) +title: 4731(S) A security-enabled local group was created. description: Describes security event 4731(S) A security-enabled local group was created. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4732.md b/windows/security/threat-protection/auditing/event-4732.md index 8afb300906..11c945bcea 100644 --- a/windows/security/threat-protection/auditing/event-4732.md +++ b/windows/security/threat-protection/auditing/event-4732.md @@ -1,5 +1,5 @@ --- -title: 4732(S) A member was added to a security-enabled local group. (Windows 10) +title: 4732(S) A member was added to a security-enabled local group. description: Describes security event 4732(S) A member was added to a security-enabled local group. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4733.md b/windows/security/threat-protection/auditing/event-4733.md index 3a24b2ef0f..e158ac5a84 100644 --- a/windows/security/threat-protection/auditing/event-4733.md +++ b/windows/security/threat-protection/auditing/event-4733.md @@ -1,5 +1,5 @@ --- -title: 4733(S) A member was removed from a security-enabled local group. (Windows 10) +title: 4733(S) A member was removed from a security-enabled local group. description: Describes security event 4733(S) A member was removed from a security-enabled local group. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4734.md b/windows/security/threat-protection/auditing/event-4734.md index ac2c5d7b93..2e81dd497b 100644 --- a/windows/security/threat-protection/auditing/event-4734.md +++ b/windows/security/threat-protection/auditing/event-4734.md @@ -1,5 +1,5 @@ --- -title: 4734(S) A security-enabled local group was deleted. (Windows 10) +title: 4734(S) A security-enabled local group was deleted. description: Describes security event 4734(S) A security-enabled local group was deleted. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4735.md b/windows/security/threat-protection/auditing/event-4735.md index 4842263179..2e4ba076bf 100644 --- a/windows/security/threat-protection/auditing/event-4735.md +++ b/windows/security/threat-protection/auditing/event-4735.md @@ -1,5 +1,5 @@ --- -title: 4735(S) A security-enabled local group was changed. (Windows 10) +title: 4735(S) A security-enabled local group was changed. description: Describes security event 4735(S) A security-enabled local group was changed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4738.md b/windows/security/threat-protection/auditing/event-4738.md index 63352ed67e..de8fcd1cdc 100644 --- a/windows/security/threat-protection/auditing/event-4738.md +++ b/windows/security/threat-protection/auditing/event-4738.md @@ -1,5 +1,5 @@ --- -title: 4738(S) A user account was changed. (Windows 10) +title: 4738(S) A user account was changed. description: Describes security event 4738(S) A user account was changed. This event is generated when a user object is changed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4739.md b/windows/security/threat-protection/auditing/event-4739.md index d43bdb27e2..cfafc9acff 100644 --- a/windows/security/threat-protection/auditing/event-4739.md +++ b/windows/security/threat-protection/auditing/event-4739.md @@ -1,5 +1,5 @@ --- -title: 4739(S) Domain Policy was changed. (Windows 10) +title: 4739(S) Domain Policy was changed. description: Describes security event 4739(S) Domain Policy was changed. This event is generated when certain changes are made to the local computer security policy. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4740.md b/windows/security/threat-protection/auditing/event-4740.md index 46c0cdcb9d..82bd56c48f 100644 --- a/windows/security/threat-protection/auditing/event-4740.md +++ b/windows/security/threat-protection/auditing/event-4740.md @@ -1,5 +1,5 @@ --- -title: 4740(S) A user account was locked out. (Windows 10) +title: 4740(S) A user account was locked out. description: Describes security event 4740(S) A user account was locked out. This event is generated every time a user account is locked out. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4741.md b/windows/security/threat-protection/auditing/event-4741.md index 5245280f11..b7f36e0237 100644 --- a/windows/security/threat-protection/auditing/event-4741.md +++ b/windows/security/threat-protection/auditing/event-4741.md @@ -1,5 +1,5 @@ --- -title: 4741(S) A computer account was created. (Windows 10) +title: 4741(S) A computer account was created. description: Describes security event 4741(S) A computer account was created. This event is generated every time a computer object is created. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4742.md b/windows/security/threat-protection/auditing/event-4742.md index 3f5f9c2eb6..d9c538c5a2 100644 --- a/windows/security/threat-protection/auditing/event-4742.md +++ b/windows/security/threat-protection/auditing/event-4742.md @@ -1,5 +1,5 @@ --- -title: 4742(S) A computer account was changed. (Windows 10) +title: 4742(S) A computer account was changed. description: Describes security event 4742(S) A computer account was changed. This event is generated every time a computer object is changed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4743.md b/windows/security/threat-protection/auditing/event-4743.md index 50411689a9..465301edbd 100644 --- a/windows/security/threat-protection/auditing/event-4743.md +++ b/windows/security/threat-protection/auditing/event-4743.md @@ -1,5 +1,5 @@ --- -title: 4743(S) A computer account was deleted. (Windows 10) +title: 4743(S) A computer account was deleted. description: Describes security event 4743(S) A computer account was deleted. This event is generated every time a computer object is deleted. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4749.md b/windows/security/threat-protection/auditing/event-4749.md index 8293c95b2b..de945822b8 100644 --- a/windows/security/threat-protection/auditing/event-4749.md +++ b/windows/security/threat-protection/auditing/event-4749.md @@ -1,5 +1,5 @@ --- -title: 4749(S) A security-disabled global group was created. (Windows 10) +title: 4749(S) A security-disabled global group was created. description: Describes security event 4749(S) A security-disabled global group was created. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4750.md b/windows/security/threat-protection/auditing/event-4750.md index d106e10077..d976995cab 100644 --- a/windows/security/threat-protection/auditing/event-4750.md +++ b/windows/security/threat-protection/auditing/event-4750.md @@ -1,5 +1,5 @@ --- -title: 4750(S) A security-disabled global group was changed. (Windows 10) +title: 4750(S) A security-disabled global group was changed. description: Describes security event 4750(S) A security-disabled global group was changed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4751.md b/windows/security/threat-protection/auditing/event-4751.md index e3bdca780e..7417a17f37 100644 --- a/windows/security/threat-protection/auditing/event-4751.md +++ b/windows/security/threat-protection/auditing/event-4751.md @@ -1,5 +1,5 @@ --- -title: 4751(S) A member was added to a security-disabled global group. (Windows 10) +title: 4751(S) A member was added to a security-disabled global group. description: Describes security event 4751(S) A member was added to a security-disabled global group. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4752.md b/windows/security/threat-protection/auditing/event-4752.md index f6b4fc37dd..e76939b914 100644 --- a/windows/security/threat-protection/auditing/event-4752.md +++ b/windows/security/threat-protection/auditing/event-4752.md @@ -1,5 +1,5 @@ --- -title: 4752(S) A member was removed from a security-disabled global group. (Windows 10) +title: 4752(S) A member was removed from a security-disabled global group. description: Describes security event 4752(S) A member was removed from a security-disabled global group. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4753.md b/windows/security/threat-protection/auditing/event-4753.md index 6bdf28a86b..b8ac802619 100644 --- a/windows/security/threat-protection/auditing/event-4753.md +++ b/windows/security/threat-protection/auditing/event-4753.md @@ -1,5 +1,5 @@ --- -title: 4753(S) A security-disabled global group was deleted. (Windows 10) +title: 4753(S) A security-disabled global group was deleted. description: Describes security event 4753(S) A security-disabled global group was deleted. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4764.md b/windows/security/threat-protection/auditing/event-4764.md index f959fc103a..c730eb1235 100644 --- a/windows/security/threat-protection/auditing/event-4764.md +++ b/windows/security/threat-protection/auditing/event-4764.md @@ -1,5 +1,5 @@ --- -title: 4764(S) A group's type was changed. (Windows 10) +title: 4764(S) A group's type was changed. description: Describes security event 4764(S) A group's type was changed. This event is generated when the type of a group is changed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4765.md b/windows/security/threat-protection/auditing/event-4765.md index 5789319e57..3c87e554ae 100644 --- a/windows/security/threat-protection/auditing/event-4765.md +++ b/windows/security/threat-protection/auditing/event-4765.md @@ -1,5 +1,5 @@ --- -title: 4765(S) SID History was added to an account. (Windows 10) +title: 4765(S) SID History was added to an account. description: Describes security event 4765(S) SID History was added to an account. This event is generated when SID History is added to an account. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4766.md b/windows/security/threat-protection/auditing/event-4766.md index 4d0ec7ae25..2108a07108 100644 --- a/windows/security/threat-protection/auditing/event-4766.md +++ b/windows/security/threat-protection/auditing/event-4766.md @@ -1,5 +1,5 @@ --- -title: 4766(F) An attempt to add SID History to an account failed. (Windows 10) +title: 4766(F) An attempt to add SID History to an account failed. description: Describes security event 4766(F) An attempt to add SID History to an account failed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4767.md b/windows/security/threat-protection/auditing/event-4767.md index 9dbf921ebf..e106edc272 100644 --- a/windows/security/threat-protection/auditing/event-4767.md +++ b/windows/security/threat-protection/auditing/event-4767.md @@ -1,5 +1,5 @@ --- -title: 4767(S) A user account was unlocked. (Windows 10) +title: 4767(S) A user account was unlocked. description: Describes security event 4767(S) A user account was unlocked. This event is generated every time a user account is unlocked. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4768.md b/windows/security/threat-protection/auditing/event-4768.md index 825ba47534..037a6989a1 100644 --- a/windows/security/threat-protection/auditing/event-4768.md +++ b/windows/security/threat-protection/auditing/event-4768.md @@ -1,5 +1,5 @@ --- -title: 4768(S, F) A Kerberos authentication ticket (TGT) was requested. (Windows 10) +title: 4768(S, F) A Kerberos authentication ticket (TGT) was requested. description: Describes security event 4768(S, F) A Kerberos authentication ticket (TGT) was requested. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4769.md b/windows/security/threat-protection/auditing/event-4769.md index ea8fbab15b..a3b8c712ac 100644 --- a/windows/security/threat-protection/auditing/event-4769.md +++ b/windows/security/threat-protection/auditing/event-4769.md @@ -1,5 +1,5 @@ --- -title: 4769(S, F) A Kerberos service ticket was requested. (Windows 10) +title: 4769(S, F) A Kerberos service ticket was requested. description: Describes security event 4769(S, F) A Kerberos service ticket was requested. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4770.md b/windows/security/threat-protection/auditing/event-4770.md index 2027d8504f..4cc852f971 100644 --- a/windows/security/threat-protection/auditing/event-4770.md +++ b/windows/security/threat-protection/auditing/event-4770.md @@ -1,5 +1,5 @@ --- -title: 4770(S) A Kerberos service ticket was renewed. (Windows 10) +title: 4770(S) A Kerberos service ticket was renewed. description: Describes security event 4770(S) A Kerberos service ticket was renewed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4771.md b/windows/security/threat-protection/auditing/event-4771.md index 2cefaaced0..2613c3b467 100644 --- a/windows/security/threat-protection/auditing/event-4771.md +++ b/windows/security/threat-protection/auditing/event-4771.md @@ -1,5 +1,5 @@ --- -title: 4771(F) Kerberos pre-authentication failed. (Windows 10) +title: 4771(F) Kerberos pre-authentication failed. description: Describes security event 4771(F) Kerberos pre-authentication failed. This event is generated when the Key Distribution Center fails to issue a Kerberos TGT. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4772.md b/windows/security/threat-protection/auditing/event-4772.md index 3c378ccc0b..345f69caeb 100644 --- a/windows/security/threat-protection/auditing/event-4772.md +++ b/windows/security/threat-protection/auditing/event-4772.md @@ -1,5 +1,5 @@ --- -title: 4772(F) A Kerberos authentication ticket request failed. (Windows 10) +title: 4772(F) A Kerberos authentication ticket request failed. description: Describes security event 4772(F) A Kerberos authentication ticket request failed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4773.md b/windows/security/threat-protection/auditing/event-4773.md index 30c32b9f8d..da91824310 100644 --- a/windows/security/threat-protection/auditing/event-4773.md +++ b/windows/security/threat-protection/auditing/event-4773.md @@ -1,5 +1,5 @@ --- -title: 4773(F) A Kerberos service ticket request failed. (Windows 10) +title: 4773(F) A Kerberos service ticket request failed. description: Describes security event 4773(F) A Kerberos service ticket request failed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4774.md b/windows/security/threat-protection/auditing/event-4774.md index 2f9b37c352..d0f52fad53 100644 --- a/windows/security/threat-protection/auditing/event-4774.md +++ b/windows/security/threat-protection/auditing/event-4774.md @@ -1,5 +1,5 @@ --- -title: 4774(S, F) An account was mapped for logon. (Windows 10) +title: 4774(S, F) An account was mapped for logon. description: Describes security event 4774(S, F) An account was mapped for logon. This event is generated when an account is mapped for logon. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4775.md b/windows/security/threat-protection/auditing/event-4775.md index 8281bb27e5..0d7bcb316f 100644 --- a/windows/security/threat-protection/auditing/event-4775.md +++ b/windows/security/threat-protection/auditing/event-4775.md @@ -1,5 +1,5 @@ --- -title: 4775(F) An account could not be mapped for logon. (Windows 10) +title: 4775(F) An account could not be mapped for logon. description: Describes security event 4775(F) An account could not be mapped for logon. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4776.md b/windows/security/threat-protection/auditing/event-4776.md index ad57e347c4..c8a9ec6ea6 100644 --- a/windows/security/threat-protection/auditing/event-4776.md +++ b/windows/security/threat-protection/auditing/event-4776.md @@ -1,5 +1,5 @@ --- -title: 4776(S, F) The computer attempted to validate the credentials for an account. (Windows 10) +title: 4776(S, F) The computer attempted to validate the credentials for an account. description: Describes security event 4776(S, F) The computer attempted to validate the credentials for an account. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4777.md b/windows/security/threat-protection/auditing/event-4777.md index e534dbee25..faf25d8424 100644 --- a/windows/security/threat-protection/auditing/event-4777.md +++ b/windows/security/threat-protection/auditing/event-4777.md @@ -1,5 +1,5 @@ --- -title: 4777(F) The domain controller failed to validate the credentials for an account. (Windows 10) +title: 4777(F) The domain controller failed to validate the credentials for an account. description: Describes security event 4777(F) The domain controller failed to validate the credentials for an account. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4778.md b/windows/security/threat-protection/auditing/event-4778.md index 76aac3738e..d8e0a7e284 100644 --- a/windows/security/threat-protection/auditing/event-4778.md +++ b/windows/security/threat-protection/auditing/event-4778.md @@ -1,5 +1,5 @@ --- -title: 4778(S) A session was reconnected to a Window Station. (Windows 10) +title: 4778(S) A session was reconnected to a Window Station. description: Describes security event 4778(S) A session was reconnected to a Window Station. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4779.md b/windows/security/threat-protection/auditing/event-4779.md index 7f6568c1cb..8630dfd13b 100644 --- a/windows/security/threat-protection/auditing/event-4779.md +++ b/windows/security/threat-protection/auditing/event-4779.md @@ -1,5 +1,5 @@ --- -title: 4779(S) A session was disconnected from a Window Station. (Windows 10) +title: 4779(S) A session was disconnected from a Window Station. description: Describes security event 4779(S) A session was disconnected from a Window Station. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4780.md b/windows/security/threat-protection/auditing/event-4780.md index 5195929a0e..6cbf2068a6 100644 --- a/windows/security/threat-protection/auditing/event-4780.md +++ b/windows/security/threat-protection/auditing/event-4780.md @@ -1,5 +1,5 @@ --- -title: 4780(S) The ACL was set on accounts which are members of administrators groups. (Windows 10) +title: 4780(S) The ACL was set on accounts which are members of administrators groups. description: Describes security event 4780(S) The ACL was set on accounts which are members of administrators groups. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4781.md b/windows/security/threat-protection/auditing/event-4781.md index fc2aaffc53..79a8d4b9d9 100644 --- a/windows/security/threat-protection/auditing/event-4781.md +++ b/windows/security/threat-protection/auditing/event-4781.md @@ -1,5 +1,5 @@ --- -title: 4781(S) The name of an account was changed. (Windows 10) +title: 4781(S) The name of an account was changed. description: Describes security event 4781(S) The name of an account was changed. This event is generated every time a user or computer account name is changed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4782.md b/windows/security/threat-protection/auditing/event-4782.md index a0615135c6..4bc46fec39 100644 --- a/windows/security/threat-protection/auditing/event-4782.md +++ b/windows/security/threat-protection/auditing/event-4782.md @@ -1,5 +1,5 @@ --- -title: 4782(S) The password hash of an account was accessed. (Windows 10) +title: 4782(S) The password hash of an account was accessed. description: Describes security event 4782(S) The password hash of an account was accessed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4793.md b/windows/security/threat-protection/auditing/event-4793.md index cc197ccb60..b12af0683a 100644 --- a/windows/security/threat-protection/auditing/event-4793.md +++ b/windows/security/threat-protection/auditing/event-4793.md @@ -1,5 +1,5 @@ --- -title: 4793(S) The Password Policy Checking API was called. (Windows 10) +title: 4793(S) The Password Policy Checking API was called. description: Describes security event 4793(S) The Password Policy Checking API was called. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4794.md b/windows/security/threat-protection/auditing/event-4794.md index 6bcb12e02c..4484b2fda8 100644 --- a/windows/security/threat-protection/auditing/event-4794.md +++ b/windows/security/threat-protection/auditing/event-4794.md @@ -1,5 +1,5 @@ --- -title: 4794(S, F) An attempt was made to set the Directory Services Restore Mode administrator password. (Windows 10) +title: 4794(S, F) An attempt was made to set the Directory Services Restore Mode administrator password. description: Describes security event 4794(S, F) An attempt was made to set the Directory Services Restore Mode administrator password. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4798.md b/windows/security/threat-protection/auditing/event-4798.md index 696366f22d..980d130473 100644 --- a/windows/security/threat-protection/auditing/event-4798.md +++ b/windows/security/threat-protection/auditing/event-4798.md @@ -1,5 +1,5 @@ --- -title: 4798(S) A user's local group membership was enumerated. (Windows 10) +title: 4798(S) A user's local group membership was enumerated. description: Describes security event 4798(S) A user's local group membership was enumerated. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4799.md b/windows/security/threat-protection/auditing/event-4799.md index 1cf362be1d..0da5ecd1cd 100644 --- a/windows/security/threat-protection/auditing/event-4799.md +++ b/windows/security/threat-protection/auditing/event-4799.md @@ -1,5 +1,5 @@ --- -title: 4799(S) A security-enabled local group membership was enumerated. (Windows 10) +title: 4799(S) A security-enabled local group membership was enumerated. description: Describes security event 4799(S) A security-enabled local group membership was enumerated. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4800.md b/windows/security/threat-protection/auditing/event-4800.md index 89c94ade64..7df74117a0 100644 --- a/windows/security/threat-protection/auditing/event-4800.md +++ b/windows/security/threat-protection/auditing/event-4800.md @@ -1,5 +1,5 @@ --- -title: 4800(S) The workstation was locked. (Windows 10) +title: 4800(S) The workstation was locked. description: Describes security event 4800(S) The workstation was locked. This event is generated when a workstation is locked. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4801.md b/windows/security/threat-protection/auditing/event-4801.md index 906e46fcd3..c85128fdc2 100644 --- a/windows/security/threat-protection/auditing/event-4801.md +++ b/windows/security/threat-protection/auditing/event-4801.md @@ -1,5 +1,5 @@ --- -title: 4801(S) The workstation was unlocked. (Windows 10) +title: 4801(S) The workstation was unlocked. description: Describes security event 4801(S) The workstation was unlocked. This event is generated when workstation is unlocked. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4802.md b/windows/security/threat-protection/auditing/event-4802.md index 1b423f29ee..db0f725fb8 100644 --- a/windows/security/threat-protection/auditing/event-4802.md +++ b/windows/security/threat-protection/auditing/event-4802.md @@ -1,5 +1,5 @@ --- -title: 4802(S) The screen saver was invoked. (Windows 10) +title: 4802(S) The screen saver was invoked. description: Describes security event 4802(S) The screen saver was invoked. This event is generated when screen saver is invoked. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4803.md b/windows/security/threat-protection/auditing/event-4803.md index 247e3c704d..f802b88740 100644 --- a/windows/security/threat-protection/auditing/event-4803.md +++ b/windows/security/threat-protection/auditing/event-4803.md @@ -1,5 +1,5 @@ --- -title: 4803(S) The screen saver was dismissed. (Windows 10) +title: 4803(S) The screen saver was dismissed. description: Describes security event 4803(S) The screen saver was dismissed. This event is generated when screen saver is dismissed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4816.md b/windows/security/threat-protection/auditing/event-4816.md index 8636e1abef..d0218f8b0d 100644 --- a/windows/security/threat-protection/auditing/event-4816.md +++ b/windows/security/threat-protection/auditing/event-4816.md @@ -1,5 +1,5 @@ --- -title: 4816(S) RPC detected an integrity violation while decrypting an incoming message. (Windows 10) +title: 4816(S) RPC detected an integrity violation while decrypting an incoming message. description: Describes security event 4816(S) RPC detected an integrity violation while decrypting an incoming message. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4817.md b/windows/security/threat-protection/auditing/event-4817.md index ff20520062..56eff0bfbe 100644 --- a/windows/security/threat-protection/auditing/event-4817.md +++ b/windows/security/threat-protection/auditing/event-4817.md @@ -1,5 +1,5 @@ --- -title: 4817(S) Auditing settings on object were changed. (Windows 10) +title: 4817(S) Auditing settings on object were changed. description: Describes security event 4817(S) Auditing settings on object were changed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4818.md b/windows/security/threat-protection/auditing/event-4818.md index c884c2e7a8..802e07d8d9 100644 --- a/windows/security/threat-protection/auditing/event-4818.md +++ b/windows/security/threat-protection/auditing/event-4818.md @@ -1,5 +1,5 @@ --- -title: 4818(S) Proposed Central Access Policy does not grant the same access permissions as the current Central Access Policy. (Windows 10) +title: 4818(S) Proposed Central Access Policy does not grant the same access permissions as the current Central Access Policy. description: Describes security event 4818(S) Proposed Central Access Policy does not grant the same access permissions as the current Central Access Policy. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4819.md b/windows/security/threat-protection/auditing/event-4819.md index e8bca4427e..ff590bf233 100644 --- a/windows/security/threat-protection/auditing/event-4819.md +++ b/windows/security/threat-protection/auditing/event-4819.md @@ -1,5 +1,5 @@ --- -title: 4819(S) Central Access Policies on the machine have been changed. (Windows 10) +title: 4819(S) Central Access Policies on the machine have been changed. description: Describes security event 4819(S) Central Access Policies on the machine have been changed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4826.md b/windows/security/threat-protection/auditing/event-4826.md index 001e6c6026..186973544b 100644 --- a/windows/security/threat-protection/auditing/event-4826.md +++ b/windows/security/threat-protection/auditing/event-4826.md @@ -1,5 +1,5 @@ --- -title: 4826(S) Boot Configuration Data loaded. (Windows 10) +title: 4826(S) Boot Configuration Data loaded. description: Describes security event 4826(S) Boot Configuration Data loaded. This event is generated every time system starts and loads Boot Configuration Data settings. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4864.md b/windows/security/threat-protection/auditing/event-4864.md index a26b552f4a..7cbe35ae7d 100644 --- a/windows/security/threat-protection/auditing/event-4864.md +++ b/windows/security/threat-protection/auditing/event-4864.md @@ -1,5 +1,5 @@ --- -title: 4864(S) A namespace collision was detected. (Windows 10) +title: 4864(S) A namespace collision was detected. description: Describes security event 4864(S) A namespace collision was detected. This event is generated when a namespace collision is detected. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4865.md b/windows/security/threat-protection/auditing/event-4865.md index aa44c9bb6a..2ee1eee9d2 100644 --- a/windows/security/threat-protection/auditing/event-4865.md +++ b/windows/security/threat-protection/auditing/event-4865.md @@ -1,5 +1,5 @@ --- -title: 4865(S) A trusted forest information entry was added. (Windows 10) +title: 4865(S) A trusted forest information entry was added. description: Describes security event 4865(S) A trusted forest information entry was added. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4866.md b/windows/security/threat-protection/auditing/event-4866.md index 1fcc07f446..93bcff89c1 100644 --- a/windows/security/threat-protection/auditing/event-4866.md +++ b/windows/security/threat-protection/auditing/event-4866.md @@ -1,5 +1,5 @@ --- -title: 4866(S) A trusted forest information entry was removed. (Windows 10) +title: 4866(S) A trusted forest information entry was removed. description: Describes security event 4866(S) A trusted forest information entry was removed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4867.md b/windows/security/threat-protection/auditing/event-4867.md index ce30699bfa..5188e70e84 100644 --- a/windows/security/threat-protection/auditing/event-4867.md +++ b/windows/security/threat-protection/auditing/event-4867.md @@ -1,5 +1,5 @@ --- -title: 4867(S) A trusted forest information entry was modified. (Windows 10) +title: 4867(S) A trusted forest information entry was modified. description: Describes security event 4867(S) A trusted forest information entry was modified. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4902.md b/windows/security/threat-protection/auditing/event-4902.md index 7185b9f3da..c9723497d5 100644 --- a/windows/security/threat-protection/auditing/event-4902.md +++ b/windows/security/threat-protection/auditing/event-4902.md @@ -1,5 +1,5 @@ --- -title: 4902(S) The Per-user audit policy table was created. (Windows 10) +title: 4902(S) The Per-user audit policy table was created. description: Describes security event 4902(S) The Per-user audit policy table was created. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4904.md b/windows/security/threat-protection/auditing/event-4904.md index 90858c5844..2108eb415c 100644 --- a/windows/security/threat-protection/auditing/event-4904.md +++ b/windows/security/threat-protection/auditing/event-4904.md @@ -1,5 +1,5 @@ --- -title: 4904(S) An attempt was made to register a security event source. (Windows 10) +title: 4904(S) An attempt was made to register a security event source. description: Describes security event 4904(S) An attempt was made to register a security event source. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4905.md b/windows/security/threat-protection/auditing/event-4905.md index 14eb6cfa8b..af4f74d165 100644 --- a/windows/security/threat-protection/auditing/event-4905.md +++ b/windows/security/threat-protection/auditing/event-4905.md @@ -1,5 +1,5 @@ --- -title: 4905(S) An attempt was made to unregister a security event source. (Windows 10) +title: 4905(S) An attempt was made to unregister a security event source. description: Describes security event 4905(S) An attempt was made to unregister a security event source. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4906.md b/windows/security/threat-protection/auditing/event-4906.md index 2058342aa0..9208e75d52 100644 --- a/windows/security/threat-protection/auditing/event-4906.md +++ b/windows/security/threat-protection/auditing/event-4906.md @@ -1,5 +1,5 @@ --- -title: 4906(S) The CrashOnAuditFail value has changed. (Windows 10) +title: 4906(S) The CrashOnAuditFail value has changed. description: Describes security event 4906(S) The CrashOnAuditFail value has changed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4907.md b/windows/security/threat-protection/auditing/event-4907.md index c38b66d51b..71c6f4389e 100644 --- a/windows/security/threat-protection/auditing/event-4907.md +++ b/windows/security/threat-protection/auditing/event-4907.md @@ -1,5 +1,5 @@ --- -title: 4907(S) Auditing settings on object were changed. (Windows 10) +title: 4907(S) Auditing settings on object were changed. description: Describes security event 4907(S) Auditing settings on object were changed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4908.md b/windows/security/threat-protection/auditing/event-4908.md index 3314e94436..a7e2609569 100644 --- a/windows/security/threat-protection/auditing/event-4908.md +++ b/windows/security/threat-protection/auditing/event-4908.md @@ -1,5 +1,5 @@ --- -title: 4908(S) Special Groups Logon table modified. (Windows 10) +title: 4908(S) Special Groups Logon table modified. description: Describes security event 4908(S) Special Groups Logon table modified. This event is generated when the Special Groups Logon table is modified. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4909.md b/windows/security/threat-protection/auditing/event-4909.md index 8a8631489a..a08a312aa7 100644 --- a/windows/security/threat-protection/auditing/event-4909.md +++ b/windows/security/threat-protection/auditing/event-4909.md @@ -1,5 +1,5 @@ --- -title: 4909(-) The local policy settings for the TBS were changed. (Windows 10) +title: 4909(-) The local policy settings for the TBS were changed. description: Describes security event 4909(-) The local policy settings for the TBS were changed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4910.md b/windows/security/threat-protection/auditing/event-4910.md index 15276f29ce..a42f7d4976 100644 --- a/windows/security/threat-protection/auditing/event-4910.md +++ b/windows/security/threat-protection/auditing/event-4910.md @@ -1,5 +1,5 @@ --- -title: 4910(-) The group policy settings for the TBS were changed. (Windows 10) +title: 4910(-) The group policy settings for the TBS were changed. description: Describes security event 4910(-) The group policy settings for the TBS were changed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4911.md b/windows/security/threat-protection/auditing/event-4911.md index abc112dbb4..62d52c4a39 100644 --- a/windows/security/threat-protection/auditing/event-4911.md +++ b/windows/security/threat-protection/auditing/event-4911.md @@ -1,5 +1,5 @@ --- -title: 4911(S) Resource attributes of the object were changed. (Windows 10) +title: 4911(S) Resource attributes of the object were changed. description: Describes security event 4911(S) Resource attributes of the object were changed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4912.md b/windows/security/threat-protection/auditing/event-4912.md index 0c0e66f90e..497e033748 100644 --- a/windows/security/threat-protection/auditing/event-4912.md +++ b/windows/security/threat-protection/auditing/event-4912.md @@ -1,5 +1,5 @@ --- -title: 4912(S) Per User Audit Policy was changed. (Windows 10) +title: 4912(S) Per User Audit Policy was changed. description: Describes security event 4912(S) Per User Audit Policy was changed. This event is generated every time Per User Audit Policy is changed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4913.md b/windows/security/threat-protection/auditing/event-4913.md index e15a691617..249b87fddf 100644 --- a/windows/security/threat-protection/auditing/event-4913.md +++ b/windows/security/threat-protection/auditing/event-4913.md @@ -1,5 +1,5 @@ --- -title: 4913(S) Central Access Policy on the object was changed. (Windows 10) +title: 4913(S) Central Access Policy on the object was changed. description: Describes security event 4913(S) Central Access Policy on the object was changed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4928.md b/windows/security/threat-protection/auditing/event-4928.md index 902113bb5c..87aa133b56 100644 --- a/windows/security/threat-protection/auditing/event-4928.md +++ b/windows/security/threat-protection/auditing/event-4928.md @@ -1,5 +1,5 @@ --- -title: 4928(S, F) An Active Directory replica source naming context was established. (Windows 10) +title: 4928(S, F) An Active Directory replica source naming context was established. description: Describes security event 4928(S, F) An Active Directory replica source naming context was established. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4929.md b/windows/security/threat-protection/auditing/event-4929.md index 3fd978d0e3..9e2cebecfa 100644 --- a/windows/security/threat-protection/auditing/event-4929.md +++ b/windows/security/threat-protection/auditing/event-4929.md @@ -1,5 +1,5 @@ --- -title: 4929(S, F) An Active Directory replica source naming context was removed. (Windows 10) +title: 4929(S, F) An Active Directory replica source naming context was removed. description: Describes security event 4929(S, F) An Active Directory replica source naming context was removed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4930.md b/windows/security/threat-protection/auditing/event-4930.md index 1b7bee26bf..d3358dfb20 100644 --- a/windows/security/threat-protection/auditing/event-4930.md +++ b/windows/security/threat-protection/auditing/event-4930.md @@ -1,5 +1,5 @@ --- -title: 4930(S, F) An Active Directory replica source naming context was modified. (Windows 10) +title: 4930(S, F) An Active Directory replica source naming context was modified. description: Describes security event 4930(S, F) An Active Directory replica source naming context was modified. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4931.md b/windows/security/threat-protection/auditing/event-4931.md index 75acecb89f..a7194bed81 100644 --- a/windows/security/threat-protection/auditing/event-4931.md +++ b/windows/security/threat-protection/auditing/event-4931.md @@ -1,5 +1,5 @@ --- -title: 4931(S, F) An Active Directory replica destination naming context was modified. (Windows 10) +title: 4931(S, F) An Active Directory replica destination naming context was modified. description: Describes security event 4931(S, F) An Active Directory replica destination naming context was modified. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4932.md b/windows/security/threat-protection/auditing/event-4932.md index 4cdd6b7bdd..e93c24be96 100644 --- a/windows/security/threat-protection/auditing/event-4932.md +++ b/windows/security/threat-protection/auditing/event-4932.md @@ -1,5 +1,5 @@ --- -title: 4932(S) Synchronization of a replica of an Active Directory naming context has begun. (Windows 10) +title: 4932(S) Synchronization of a replica of an Active Directory naming context has begun. description: Describes security event 4932(S) Synchronization of a replica of an Active Directory naming context has begun. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4933.md b/windows/security/threat-protection/auditing/event-4933.md index b1636e8e63..74f78f813e 100644 --- a/windows/security/threat-protection/auditing/event-4933.md +++ b/windows/security/threat-protection/auditing/event-4933.md @@ -1,5 +1,5 @@ --- -title: 4933(S, F) Synchronization of a replica of an Active Directory naming context has ended. (Windows 10) +title: 4933(S, F) Synchronization of a replica of an Active Directory naming context has ended. description: Describes security event 4933(S, F) Synchronization of a replica of an Active Directory naming context has ended. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4934.md b/windows/security/threat-protection/auditing/event-4934.md index efafcb9b79..19906099da 100644 --- a/windows/security/threat-protection/auditing/event-4934.md +++ b/windows/security/threat-protection/auditing/event-4934.md @@ -1,5 +1,5 @@ --- -title: 4934(S) Attributes of an Active Directory object were replicated. (Windows 10) +title: 4934(S) Attributes of an Active Directory object were replicated. description: Describes security event 4934(S) Attributes of an Active Directory object were replicated. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4935.md b/windows/security/threat-protection/auditing/event-4935.md index a126742afb..4e0c3d1f56 100644 --- a/windows/security/threat-protection/auditing/event-4935.md +++ b/windows/security/threat-protection/auditing/event-4935.md @@ -1,5 +1,5 @@ --- -title: 4935(F) Replication failure begins. (Windows 10) +title: 4935(F) Replication failure begins. description: Describes security event 4935(F) Replication failure begins. This event is generated when Active Directory replication failure begins. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4936.md b/windows/security/threat-protection/auditing/event-4936.md index e2818ec6ee..01eda75a08 100644 --- a/windows/security/threat-protection/auditing/event-4936.md +++ b/windows/security/threat-protection/auditing/event-4936.md @@ -1,5 +1,5 @@ --- -title: 4936(S) Replication failure ends. (Windows 10) +title: 4936(S) Replication failure ends. description: Describes security event 4936(S) Replication failure ends. This event is generated when Active Directory replication failure ends. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4937.md b/windows/security/threat-protection/auditing/event-4937.md index 8296ce75c4..fa37062d68 100644 --- a/windows/security/threat-protection/auditing/event-4937.md +++ b/windows/security/threat-protection/auditing/event-4937.md @@ -1,5 +1,5 @@ --- -title: 4937(S) A lingering object was removed from a replica. (Windows 10) +title: 4937(S) A lingering object was removed from a replica. description: Describes security event 4937(S) A lingering object was removed from a replica. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4944.md b/windows/security/threat-protection/auditing/event-4944.md index bb08c3a077..d152fa7bd0 100644 --- a/windows/security/threat-protection/auditing/event-4944.md +++ b/windows/security/threat-protection/auditing/event-4944.md @@ -1,5 +1,5 @@ --- -title: 4944(S) The following policy was active when the Windows Firewall started. (Windows 10) +title: 4944(S) The following policy was active when the Windows Firewall started. description: Describes security event 4944(S) The following policy was active when the Windows Firewall started. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4945.md b/windows/security/threat-protection/auditing/event-4945.md index 852ed5f03e..93de0900e5 100644 --- a/windows/security/threat-protection/auditing/event-4945.md +++ b/windows/security/threat-protection/auditing/event-4945.md @@ -1,5 +1,5 @@ --- -title: 4945(S) A rule was listed when the Windows Firewall started. (Windows 10) +title: 4945(S) A rule was listed when the Windows Firewall started. description: Describes security event 4945(S) A rule was listed when the Windows Firewall started. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4946.md b/windows/security/threat-protection/auditing/event-4946.md index ab355b85c1..987fcd7711 100644 --- a/windows/security/threat-protection/auditing/event-4946.md +++ b/windows/security/threat-protection/auditing/event-4946.md @@ -1,5 +1,5 @@ --- -title: 4946(S) A change has been made to Windows Firewall exception list. A rule was added. (Windows 10) +title: 4946(S) A change has been made to Windows Firewall exception list. A rule was added. description: Describes security event 4946(S) A change has been made to Windows Firewall exception list. A rule was added. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4947.md b/windows/security/threat-protection/auditing/event-4947.md index 284d2d4303..5a37c3b10a 100644 --- a/windows/security/threat-protection/auditing/event-4947.md +++ b/windows/security/threat-protection/auditing/event-4947.md @@ -1,5 +1,5 @@ --- -title: 4947(S) A change has been made to Windows Firewall exception list. A rule was modified. (Windows 10) +title: 4947(S) A change has been made to Windows Firewall exception list. A rule was modified. description: Describes security event 4947(S) A change has been made to Windows Firewall exception list. A rule was modified. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4948.md b/windows/security/threat-protection/auditing/event-4948.md index da8f423b29..72913611bc 100644 --- a/windows/security/threat-protection/auditing/event-4948.md +++ b/windows/security/threat-protection/auditing/event-4948.md @@ -1,5 +1,5 @@ --- -title: 4948(S) A change has been made to Windows Firewall exception list. A rule was deleted. (Windows 10) +title: 4948(S) A change has been made to Windows Firewall exception list. A rule was deleted. description: Describes security event 4948(S) A change has been made to Windows Firewall exception list. A rule was deleted. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4949.md b/windows/security/threat-protection/auditing/event-4949.md index 528ad262bb..76dd0e123b 100644 --- a/windows/security/threat-protection/auditing/event-4949.md +++ b/windows/security/threat-protection/auditing/event-4949.md @@ -1,5 +1,5 @@ --- -title: 4949(S) Windows Firewall settings were restored to the default values. (Windows 10) +title: 4949(S) Windows Firewall settings were restored to the default values. description: Describes security event 4949(S) Windows Firewall settings were restored to the default values. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4950.md b/windows/security/threat-protection/auditing/event-4950.md index 8a3aa4274a..1ec890e457 100644 --- a/windows/security/threat-protection/auditing/event-4950.md +++ b/windows/security/threat-protection/auditing/event-4950.md @@ -1,5 +1,5 @@ --- -title: 4950(S) A Windows Firewall setting has changed. (Windows 10) +title: 4950(S) A Windows Firewall setting has changed. description: Describes security event 4950(S) A Windows Firewall setting has changed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4951.md b/windows/security/threat-protection/auditing/event-4951.md index 7addb69d77..00b861d546 100644 --- a/windows/security/threat-protection/auditing/event-4951.md +++ b/windows/security/threat-protection/auditing/event-4951.md @@ -1,5 +1,5 @@ --- -title: 4951(F) A rule has been ignored because its major version number wasn't recognized by Windows Firewall. (Windows 10) +title: 4951(F) A rule has been ignored because its major version number wasn't recognized by Windows Firewall. description: Describes security event 4951(F) A rule has been ignored because its major version number wasn't recognized by Windows Firewall. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4952.md b/windows/security/threat-protection/auditing/event-4952.md index 1dd166db54..68ff52f7f0 100644 --- a/windows/security/threat-protection/auditing/event-4952.md +++ b/windows/security/threat-protection/auditing/event-4952.md @@ -1,5 +1,5 @@ --- -title: 4952(F) Parts of a rule have been ignored because its minor version number was not recognized by Windows Firewall. The other parts of the rule will be enforced. (Windows 10) +title: 4952(F) Parts of a rule have been ignored because its minor version number was not recognized by Windows Firewall. The other parts of the rule will be enforced. description: Security event 4952(F) Parts of a rule have been ignored because its minor version number was not recognized by Windows Firewall. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4953.md b/windows/security/threat-protection/auditing/event-4953.md index 5a5a97d56a..7e81b25fcc 100644 --- a/windows/security/threat-protection/auditing/event-4953.md +++ b/windows/security/threat-protection/auditing/event-4953.md @@ -1,5 +1,5 @@ --- -title: 4953(F) Windows Firewall ignored a rule because it couldn't be parsed. (Windows 10) +title: 4953(F) Windows Firewall ignored a rule because it couldn't be parsed. description: Describes security event 4953(F) Windows Firewall ignored a rule because it couldn't be parsed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4954.md b/windows/security/threat-protection/auditing/event-4954.md index 07977d6aff..695bfd873d 100644 --- a/windows/security/threat-protection/auditing/event-4954.md +++ b/windows/security/threat-protection/auditing/event-4954.md @@ -1,5 +1,5 @@ --- -title: 4954(S) Windows Firewall Group Policy settings have changed. The new settings have been applied. (Windows 10) +title: 4954(S) Windows Firewall Group Policy settings have changed. The new settings have been applied. description: Describes security event 4954(S) Windows Firewall Group Policy settings have changed. The new settings have been applied. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4956.md b/windows/security/threat-protection/auditing/event-4956.md index 105b780984..d3a52d5b51 100644 --- a/windows/security/threat-protection/auditing/event-4956.md +++ b/windows/security/threat-protection/auditing/event-4956.md @@ -1,5 +1,5 @@ --- -title: 4956(S) Windows Firewall has changed the active profile. (Windows 10) +title: 4956(S) Windows Firewall has changed the active profile. description: Describes security event 4956(S) Windows Firewall has changed the active profile. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4957.md b/windows/security/threat-protection/auditing/event-4957.md index 49fae3fef5..2aeb05c373 100644 --- a/windows/security/threat-protection/auditing/event-4957.md +++ b/windows/security/threat-protection/auditing/event-4957.md @@ -1,5 +1,5 @@ --- -title: 4957(F) Windows Firewall did not apply the following rule. (Windows 10) +title: 4957(F) Windows Firewall did not apply the following rule. description: Describes security event 4957(F) Windows Firewall didn't apply the following rule. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4958.md b/windows/security/threat-protection/auditing/event-4958.md index 45964176a6..5db7fef518 100644 --- a/windows/security/threat-protection/auditing/event-4958.md +++ b/windows/security/threat-protection/auditing/event-4958.md @@ -1,5 +1,5 @@ --- -title: 4958(F) Windows Firewall did not apply the following rule because the rule referred to items not configured on this computer. (Windows 10) +title: 4958(F) Windows Firewall did not apply the following rule because the rule referred to items not configured on this computer. description: Describes security event 4958(F) Windows Firewall didn't apply the following rule because the rule referred to items not configured on this computer. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4964.md b/windows/security/threat-protection/auditing/event-4964.md index 51893d2572..e7947201b5 100644 --- a/windows/security/threat-protection/auditing/event-4964.md +++ b/windows/security/threat-protection/auditing/event-4964.md @@ -1,5 +1,5 @@ --- -title: 4964(S) Special groups have been assigned to a new logon. (Windows 10) +title: 4964(S) Special groups have been assigned to a new logon. description: Describes security event 4964(S) Special groups have been assigned to a new logon. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-4985.md b/windows/security/threat-protection/auditing/event-4985.md index 8150e62b11..57d8caa9b1 100644 --- a/windows/security/threat-protection/auditing/event-4985.md +++ b/windows/security/threat-protection/auditing/event-4985.md @@ -1,5 +1,5 @@ --- -title: 4985(S) The state of a transaction has changed. (Windows 10) +title: 4985(S) The state of a transaction has changed. description: Describes security event 4985(S) The state of a transaction has changed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5024.md b/windows/security/threat-protection/auditing/event-5024.md index 9e06608869..57a2f34679 100644 --- a/windows/security/threat-protection/auditing/event-5024.md +++ b/windows/security/threat-protection/auditing/event-5024.md @@ -1,5 +1,5 @@ --- -title: 5024(S) The Windows Firewall Service has started successfully. (Windows 10) +title: 5024(S) The Windows Firewall Service has started successfully. description: Describes security event 5024(S) The Windows Firewall Service has started successfully. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5025.md b/windows/security/threat-protection/auditing/event-5025.md index 9ae2fe14d0..5cc6c360e1 100644 --- a/windows/security/threat-protection/auditing/event-5025.md +++ b/windows/security/threat-protection/auditing/event-5025.md @@ -1,5 +1,5 @@ --- -title: 5025(S) The Windows Firewall Service has been stopped. (Windows 10) +title: 5025(S) The Windows Firewall Service has been stopped. description: Describes security event 5025(S) The Windows Firewall Service has been stopped. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5027.md b/windows/security/threat-protection/auditing/event-5027.md index d654b82a01..cb0c821e16 100644 --- a/windows/security/threat-protection/auditing/event-5027.md +++ b/windows/security/threat-protection/auditing/event-5027.md @@ -1,5 +1,5 @@ --- -title: 5027(F) The Windows Firewall Service was unable to retrieve the security policy from the local storage. The service will continue enforcing the current policy. (Windows 10) +title: 5027(F) The Windows Firewall Service was unable to retrieve the security policy from the local storage. The service will continue enforcing the current policy. description: Details on security event 5027(F) The Windows Firewall Service was unable to retrieve the security policy from the local storage. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5028.md b/windows/security/threat-protection/auditing/event-5028.md index bf9c62d91a..b4cf9d9daf 100644 --- a/windows/security/threat-protection/auditing/event-5028.md +++ b/windows/security/threat-protection/auditing/event-5028.md @@ -1,5 +1,5 @@ --- -title: 5028(F) The Windows Firewall Service was unable to parse the new security policy. The service will continue with currently enforced policy. (Windows 10) +title: 5028(F) The Windows Firewall Service was unable to parse the new security policy. The service will continue with currently enforced policy. description: Describes security event 5028(F) The Windows Firewall Service was unable to parse the new security policy. The service will continue with currently enforced policy. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5029.md b/windows/security/threat-protection/auditing/event-5029.md index 4a36c10d4d..727e18d0b8 100644 --- a/windows/security/threat-protection/auditing/event-5029.md +++ b/windows/security/threat-protection/auditing/event-5029.md @@ -1,5 +1,5 @@ --- -title: 5029(F) The Windows Firewall Service failed to initialize the driver. The service will continue to enforce the current policy. (Windows 10) +title: 5029(F) The Windows Firewall Service failed to initialize the driver. The service will continue to enforce the current policy. description: Describes security event 5029(F) The Windows Firewall Service failed to initialize the driver. The service will continue to enforce the current policy. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5030.md b/windows/security/threat-protection/auditing/event-5030.md index aa78cb3b62..cf0d618c0c 100644 --- a/windows/security/threat-protection/auditing/event-5030.md +++ b/windows/security/threat-protection/auditing/event-5030.md @@ -1,5 +1,5 @@ --- -title: 5030(F) The Windows Firewall Service failed to start. (Windows 10) +title: 5030(F) The Windows Firewall Service failed to start. description: Describes security event 5030(F) The Windows Firewall Service failed to start. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5031.md b/windows/security/threat-protection/auditing/event-5031.md index 04c03b1ee6..577a8d4b8a 100644 --- a/windows/security/threat-protection/auditing/event-5031.md +++ b/windows/security/threat-protection/auditing/event-5031.md @@ -1,5 +1,5 @@ --- -title: 5031(F) The Windows Firewall Service blocked an application from accepting incoming connections on the network. (Windows 10) +title: 5031(F) The Windows Firewall Service blocked an application from accepting incoming connections on the network. ms.reviewer: manager: aaroncz ms.author: vinpa diff --git a/windows/security/threat-protection/auditing/event-5032.md b/windows/security/threat-protection/auditing/event-5032.md index af43e8ea73..c03cf24c26 100644 --- a/windows/security/threat-protection/auditing/event-5032.md +++ b/windows/security/threat-protection/auditing/event-5032.md @@ -1,5 +1,5 @@ --- -title: 5032(F) Windows Firewall was unable to notify the user that it blocked an application from accepting incoming connections on the network. (Windows 10) +title: 5032(F) Windows Firewall was unable to notify the user that it blocked an application from accepting incoming connections on the network. description: Describes security event 5032(F) Windows Firewall was unable to notify the user that it blocked an application from accepting incoming connections on the network. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5033.md b/windows/security/threat-protection/auditing/event-5033.md index 467ba04e40..720d4db20a 100644 --- a/windows/security/threat-protection/auditing/event-5033.md +++ b/windows/security/threat-protection/auditing/event-5033.md @@ -1,5 +1,5 @@ --- -title: 5033(S) The Windows Firewall Driver has started successfully. (Windows 10) +title: 5033(S) The Windows Firewall Driver has started successfully. description: Describes security event 5033(S) The Windows Firewall Driver has started successfully. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5034.md b/windows/security/threat-protection/auditing/event-5034.md index dc2d097c4a..f1bbdec7bb 100644 --- a/windows/security/threat-protection/auditing/event-5034.md +++ b/windows/security/threat-protection/auditing/event-5034.md @@ -1,5 +1,5 @@ --- -title: 5034(S) The Windows Firewall Driver was stopped. (Windows 10) +title: 5034(S) The Windows Firewall Driver was stopped. description: Describes security event 5034(S) The Windows Firewall Driver was stopped. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5035.md b/windows/security/threat-protection/auditing/event-5035.md index 88a49892a6..9884e30c6f 100644 --- a/windows/security/threat-protection/auditing/event-5035.md +++ b/windows/security/threat-protection/auditing/event-5035.md @@ -1,5 +1,5 @@ --- -title: 5035(F) The Windows Firewall Driver failed to start. (Windows 10) +title: 5035(F) The Windows Firewall Driver failed to start. description: Describes security event 5035(F) The Windows Firewall Driver failed to start. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5037.md b/windows/security/threat-protection/auditing/event-5037.md index f25a054fe7..b33b0b7f4e 100644 --- a/windows/security/threat-protection/auditing/event-5037.md +++ b/windows/security/threat-protection/auditing/event-5037.md @@ -1,5 +1,5 @@ --- -title: 5037(F) The Windows Firewall Driver detected critical runtime error. Terminating. (Windows 10) +title: 5037(F) The Windows Firewall Driver detected critical runtime error. Terminating. description: Describes security event 5037(F) The Windows Firewall Driver detected critical runtime error. Terminating. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5038.md b/windows/security/threat-protection/auditing/event-5038.md index e824e93afe..8fc4f1ce69 100644 --- a/windows/security/threat-protection/auditing/event-5038.md +++ b/windows/security/threat-protection/auditing/event-5038.md @@ -1,5 +1,5 @@ --- -title: 5038(F) Code integrity determined that the image hash of a file is not valid. (Windows 10) +title: 5038(F) Code integrity determined that the image hash of a file is not valid. description: Describes security event 5038(F) Code integrity determined that the image hash of a file isn't valid. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5039.md b/windows/security/threat-protection/auditing/event-5039.md index 7bf2bf5471..a69a2f51d9 100644 --- a/windows/security/threat-protection/auditing/event-5039.md +++ b/windows/security/threat-protection/auditing/event-5039.md @@ -1,5 +1,5 @@ --- -title: 5039(-) A registry key was virtualized. (Windows 10) +title: 5039(-) A registry key was virtualized. description: Describes security event 5039(-) A registry key was virtualized. This event is generated when a registry key is virtualized using LUAFV. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5051.md b/windows/security/threat-protection/auditing/event-5051.md index 38a07353b3..cbd5e8cd4f 100644 --- a/windows/security/threat-protection/auditing/event-5051.md +++ b/windows/security/threat-protection/auditing/event-5051.md @@ -1,5 +1,5 @@ --- -title: 5051(-) A file was virtualized. (Windows 10) +title: 5051(-) A file was virtualized. description: Describes security event 5051(-) A file was virtualized. This event is generated when a file is virtualized using LUAFV. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5056.md b/windows/security/threat-protection/auditing/event-5056.md index 3711acef2d..d79db9f877 100644 --- a/windows/security/threat-protection/auditing/event-5056.md +++ b/windows/security/threat-protection/auditing/event-5056.md @@ -1,5 +1,5 @@ --- -title: 5056(S) A cryptographic self-test was performed. (Windows 10) +title: 5056(S) A cryptographic self-test was performed. description: Describes security event 5056(S) A cryptographic self-test was performed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5057.md b/windows/security/threat-protection/auditing/event-5057.md index 4fc7113c1b..a9c17ce454 100644 --- a/windows/security/threat-protection/auditing/event-5057.md +++ b/windows/security/threat-protection/auditing/event-5057.md @@ -1,5 +1,5 @@ --- -title: 5057(F) A cryptographic primitive operation failed. (Windows 10) +title: 5057(F) A cryptographic primitive operation failed. description: Describes security event 5057(F) A cryptographic primitive operation failed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5058.md b/windows/security/threat-protection/auditing/event-5058.md index b95c545e7c..b5420ecbbb 100644 --- a/windows/security/threat-protection/auditing/event-5058.md +++ b/windows/security/threat-protection/auditing/event-5058.md @@ -1,5 +1,5 @@ --- -title: 5058(S, F) Key file operation. (Windows 10) +title: 5058(S, F) Key file operation. description: Describes security event 5058(S, F) Key file operation. This event is generated when an operation is performed on a file that contains a KSP key. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5059.md b/windows/security/threat-protection/auditing/event-5059.md index cdbae47721..9fd58f5976 100644 --- a/windows/security/threat-protection/auditing/event-5059.md +++ b/windows/security/threat-protection/auditing/event-5059.md @@ -1,5 +1,5 @@ --- -title: 5059(S, F) Key migration operation. (Windows 10) +title: 5059(S, F) Key migration operation. description: Describes security event 5059(S, F) Key migration operation. This event is generated when a cryptographic key is exported/imported using a Key Storage Provider. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5060.md b/windows/security/threat-protection/auditing/event-5060.md index 60ec2cbd3e..56c8924e9c 100644 --- a/windows/security/threat-protection/auditing/event-5060.md +++ b/windows/security/threat-protection/auditing/event-5060.md @@ -1,5 +1,5 @@ --- -title: 5060(F) Verification operation failed. (Windows 10) +title: 5060(F) Verification operation failed. description: Describes security event 5060(F) Verification operation failed. This event is generated when the CNG verification operation fails. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5061.md b/windows/security/threat-protection/auditing/event-5061.md index 802ee6cc60..26630fa96f 100644 --- a/windows/security/threat-protection/auditing/event-5061.md +++ b/windows/security/threat-protection/auditing/event-5061.md @@ -1,5 +1,5 @@ --- -title: 5061(S, F) Cryptographic operation. (Windows 10) +title: 5061(S, F) Cryptographic operation. description: Describes security event 5061(S, F) Cryptographic operation. This event is generated when a cryptographic operation is performed using a Key Storage Provider. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5062.md b/windows/security/threat-protection/auditing/event-5062.md index a76dabb95e..99771cf63c 100644 --- a/windows/security/threat-protection/auditing/event-5062.md +++ b/windows/security/threat-protection/auditing/event-5062.md @@ -1,5 +1,5 @@ --- -title: 5062(S) A kernel-mode cryptographic self-test was performed. (Windows 10) +title: 5062(S) A kernel-mode cryptographic self-test was performed. description: Describes security event 5062(S) A kernel-mode cryptographic self-test was performed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5063.md b/windows/security/threat-protection/auditing/event-5063.md index 41ac047786..7b1e2f20be 100644 --- a/windows/security/threat-protection/auditing/event-5063.md +++ b/windows/security/threat-protection/auditing/event-5063.md @@ -1,5 +1,5 @@ --- -title: 5063(S, F) A cryptographic provider operation was attempted. (Windows 10) +title: 5063(S, F) A cryptographic provider operation was attempted. description: Describes security event 5063(S, F) A cryptographic provider operation was attempted. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5064.md b/windows/security/threat-protection/auditing/event-5064.md index 3467a2816a..50967e8e1d 100644 --- a/windows/security/threat-protection/auditing/event-5064.md +++ b/windows/security/threat-protection/auditing/event-5064.md @@ -1,5 +1,5 @@ --- -title: 5064(S, F) A cryptographic context operation was attempted. (Windows 10) +title: 5064(S, F) A cryptographic context operation was attempted. description: Describes security event 5064(S, F) A cryptographic context operation was attempted. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5065.md b/windows/security/threat-protection/auditing/event-5065.md index 66bfddb1d1..607adf75b2 100644 --- a/windows/security/threat-protection/auditing/event-5065.md +++ b/windows/security/threat-protection/auditing/event-5065.md @@ -1,5 +1,5 @@ --- -title: 5065(S, F) A cryptographic context modification was attempted. (Windows 10) +title: 5065(S, F) A cryptographic context modification was attempted. description: Describes security event 5065(S, F) A cryptographic context modification was attempted. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5066.md b/windows/security/threat-protection/auditing/event-5066.md index 62a0920fb7..a77382fdbd 100644 --- a/windows/security/threat-protection/auditing/event-5066.md +++ b/windows/security/threat-protection/auditing/event-5066.md @@ -1,5 +1,5 @@ --- -title: 5066(S, F) A cryptographic function operation was attempted. (Windows 10) +title: 5066(S, F) A cryptographic function operation was attempted. description: Describes security event 5066(S, F) A cryptographic function operation was attempted. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5067.md b/windows/security/threat-protection/auditing/event-5067.md index 78cd9d24aa..83a9960d2c 100644 --- a/windows/security/threat-protection/auditing/event-5067.md +++ b/windows/security/threat-protection/auditing/event-5067.md @@ -1,5 +1,5 @@ --- -title: 5067(S, F) A cryptographic function modification was attempted. (Windows 10) +title: 5067(S, F) A cryptographic function modification was attempted. description: Describes security event 5067(S, F) A cryptographic function modification was attempted. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5068.md b/windows/security/threat-protection/auditing/event-5068.md index 791301bc3b..1eec94b8e7 100644 --- a/windows/security/threat-protection/auditing/event-5068.md +++ b/windows/security/threat-protection/auditing/event-5068.md @@ -1,5 +1,5 @@ --- -title: 5068(S, F) A cryptographic function provider operation was attempted. (Windows 10) +title: 5068(S, F) A cryptographic function provider operation was attempted. description: Describes security event 5068(S, F) A cryptographic function provider operation was attempted. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5069.md b/windows/security/threat-protection/auditing/event-5069.md index 9894285dad..d8914e5d08 100644 --- a/windows/security/threat-protection/auditing/event-5069.md +++ b/windows/security/threat-protection/auditing/event-5069.md @@ -1,5 +1,5 @@ --- -title: 5069(S, F) A cryptographic function property operation was attempted. (Windows 10) +title: 5069(S, F) A cryptographic function property operation was attempted. description: Describes security event 5069(S, F) A cryptographic function property operation was attempted. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5070.md b/windows/security/threat-protection/auditing/event-5070.md index ba4785e01b..1e2423d3f3 100644 --- a/windows/security/threat-protection/auditing/event-5070.md +++ b/windows/security/threat-protection/auditing/event-5070.md @@ -1,5 +1,5 @@ --- -title: 5070(S, F) A cryptographic function property modification was attempted. (Windows 10) +title: 5070(S, F) A cryptographic function property modification was attempted. description: Describes security event 5070(S, F) A cryptographic function property modification was attempted. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5136.md b/windows/security/threat-protection/auditing/event-5136.md index e935d656d9..cdebfbac73 100644 --- a/windows/security/threat-protection/auditing/event-5136.md +++ b/windows/security/threat-protection/auditing/event-5136.md @@ -1,5 +1,5 @@ --- -title: 5136(S) A directory service object was modified. (Windows 10) +title: 5136(S) A directory service object was modified. description: Describes security event 5136(S) A directory service object was modified. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5137.md b/windows/security/threat-protection/auditing/event-5137.md index bed5eae208..540d0187a2 100644 --- a/windows/security/threat-protection/auditing/event-5137.md +++ b/windows/security/threat-protection/auditing/event-5137.md @@ -1,5 +1,5 @@ --- -title: 5137(S) A directory service object was created. (Windows 10) +title: 5137(S) A directory service object was created. description: Describes security event 5137(S) A directory service object was created. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5138.md b/windows/security/threat-protection/auditing/event-5138.md index 12d981909a..09c8e7ddeb 100644 --- a/windows/security/threat-protection/auditing/event-5138.md +++ b/windows/security/threat-protection/auditing/event-5138.md @@ -1,5 +1,5 @@ --- -title: 5138(S) A directory service object was undeleted. (Windows 10) +title: 5138(S) A directory service object was undeleted. description: Describes security event 5138(S) A directory service object was undeleted. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5139.md b/windows/security/threat-protection/auditing/event-5139.md index 6799a4e50d..2e65bd8c4c 100644 --- a/windows/security/threat-protection/auditing/event-5139.md +++ b/windows/security/threat-protection/auditing/event-5139.md @@ -1,5 +1,5 @@ --- -title: 5139(S) A directory service object was moved. (Windows 10) +title: 5139(S) A directory service object was moved. description: Describes security event 5139(S) A directory service object was moved. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5140.md b/windows/security/threat-protection/auditing/event-5140.md index 602e1d4024..e04f04c79d 100644 --- a/windows/security/threat-protection/auditing/event-5140.md +++ b/windows/security/threat-protection/auditing/event-5140.md @@ -1,5 +1,5 @@ --- -title: 5140(S, F) A network share object was accessed. (Windows 10) +title: 5140(S, F) A network share object was accessed. description: Describes security event 5140(S, F) A network share object was accessed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5141.md b/windows/security/threat-protection/auditing/event-5141.md index 046ca20f9d..5204b0bc87 100644 --- a/windows/security/threat-protection/auditing/event-5141.md +++ b/windows/security/threat-protection/auditing/event-5141.md @@ -1,5 +1,5 @@ --- -title: 5141(S) A directory service object was deleted. (Windows 10) +title: 5141(S) A directory service object was deleted. description: Describes security event 5141(S) A directory service object was deleted. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5142.md b/windows/security/threat-protection/auditing/event-5142.md index 3a69208c29..9f5e758229 100644 --- a/windows/security/threat-protection/auditing/event-5142.md +++ b/windows/security/threat-protection/auditing/event-5142.md @@ -1,5 +1,5 @@ --- -title: 5142(S) A network share object was added. (Windows 10) +title: 5142(S) A network share object was added. description: Describes security event 5142(S) A network share object was added. This event is generated when a network share object is added. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5143.md b/windows/security/threat-protection/auditing/event-5143.md index e92068c93a..fb42c41529 100644 --- a/windows/security/threat-protection/auditing/event-5143.md +++ b/windows/security/threat-protection/auditing/event-5143.md @@ -1,5 +1,5 @@ --- -title: 5143(S) A network share object was modified. (Windows 10) +title: 5143(S) A network share object was modified. description: Describes security event 5143(S) A network share object was modified. This event is generated when a network share object is modified. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5144.md b/windows/security/threat-protection/auditing/event-5144.md index da401f212d..b9b86c4142 100644 --- a/windows/security/threat-protection/auditing/event-5144.md +++ b/windows/security/threat-protection/auditing/event-5144.md @@ -1,5 +1,5 @@ --- -title: 5144(S) A network share object was deleted. (Windows 10) +title: 5144(S) A network share object was deleted. description: Describes security event 5144(S) A network share object was deleted. This event is generated when a network share object is deleted. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5145.md b/windows/security/threat-protection/auditing/event-5145.md index 7b34010d4c..191b70ddbe 100644 --- a/windows/security/threat-protection/auditing/event-5145.md +++ b/windows/security/threat-protection/auditing/event-5145.md @@ -1,5 +1,5 @@ --- -title: 5145(S, F) A network share object was checked to see whether client can be granted desired access. (Windows 10) +title: 5145(S, F) A network share object was checked to see whether client can be granted desired access. description: Describes security event 5145(S, F) A network share object was checked to see whether client can be granted desired access. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5148.md b/windows/security/threat-protection/auditing/event-5148.md index 5442a8a705..25114d8d2b 100644 --- a/windows/security/threat-protection/auditing/event-5148.md +++ b/windows/security/threat-protection/auditing/event-5148.md @@ -1,5 +1,5 @@ --- -title: 5148(F) The Windows Filtering Platform has detected a DoS attack and entered a defensive mode; packets associated with this attack will be discarded. (Windows 10) +title: 5148(F) The Windows Filtering Platform has detected a DoS attack and entered a defensive mode; packets associated with this attack will be discarded. description: Details on Security event 5148(F), The Windows Filtering Platform has detected a DoS attack and entered a defensive mode. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5149.md b/windows/security/threat-protection/auditing/event-5149.md index 7e0dc6dd45..adb0eeb2cc 100644 --- a/windows/security/threat-protection/auditing/event-5149.md +++ b/windows/security/threat-protection/auditing/event-5149.md @@ -1,5 +1,5 @@ --- -title: 5149(F) The DoS attack has subsided and normal processing is being resumed. (Windows 10) +title: 5149(F) The DoS attack has subsided and normal processing is being resumed. description: Describes security event 5149(F) The DoS attack has subsided and normal processing is being resumed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5150.md b/windows/security/threat-protection/auditing/event-5150.md index 80c82d807e..9dce2ef7fe 100644 --- a/windows/security/threat-protection/auditing/event-5150.md +++ b/windows/security/threat-protection/auditing/event-5150.md @@ -1,5 +1,5 @@ --- -title: 5150(-) The Windows Filtering Platform blocked a packet. (Windows 10) +title: 5150(-) The Windows Filtering Platform blocked a packet. description: Describes security event 5150(-) The Windows Filtering Platform blocked a packet. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5151.md b/windows/security/threat-protection/auditing/event-5151.md index 6b7d1453bf..acf986a555 100644 --- a/windows/security/threat-protection/auditing/event-5151.md +++ b/windows/security/threat-protection/auditing/event-5151.md @@ -1,5 +1,5 @@ --- -title: 5151(-) A more restrictive Windows Filtering Platform filter has blocked a packet. (Windows 10) +title: 5151(-) A more restrictive Windows Filtering Platform filter has blocked a packet. description: Describes security event 5151(-) A more restrictive Windows Filtering Platform filter has blocked a packet. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5152.md b/windows/security/threat-protection/auditing/event-5152.md index e5a76da383..c051185452 100644 --- a/windows/security/threat-protection/auditing/event-5152.md +++ b/windows/security/threat-protection/auditing/event-5152.md @@ -1,5 +1,5 @@ --- -title: 5152(F) The Windows Filtering Platform blocked a packet. (Windows 10) +title: 5152(F) The Windows Filtering Platform blocked a packet. description: Describes security event 5152(F) The Windows Filtering Platform blocked a packet. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5153.md b/windows/security/threat-protection/auditing/event-5153.md index a321b76f20..e969dc8a2e 100644 --- a/windows/security/threat-protection/auditing/event-5153.md +++ b/windows/security/threat-protection/auditing/event-5153.md @@ -1,5 +1,5 @@ --- -title: 5153(S) A more restrictive Windows Filtering Platform filter has blocked a packet. (Windows 10) +title: 5153(S) A more restrictive Windows Filtering Platform filter has blocked a packet. description: Describes security event 5153(S) A more restrictive Windows Filtering Platform filter has blocked a packet. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5154.md b/windows/security/threat-protection/auditing/event-5154.md index 9b2425ff9c..ac6d1c65ff 100644 --- a/windows/security/threat-protection/auditing/event-5154.md +++ b/windows/security/threat-protection/auditing/event-5154.md @@ -1,5 +1,5 @@ --- -title: 5154(S) The Windows Filtering Platform has permitted an application or service to listen on a port for incoming connections. (Windows 10) +title: 5154(S) The Windows Filtering Platform has permitted an application or service to listen on a port for incoming connections. description: Describes security event 5154(S) The Windows Filtering Platform has permitted an application or service to listen on a port for incoming connections. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5155.md b/windows/security/threat-protection/auditing/event-5155.md index e6efebdae1..5bf71f6985 100644 --- a/windows/security/threat-protection/auditing/event-5155.md +++ b/windows/security/threat-protection/auditing/event-5155.md @@ -1,5 +1,5 @@ --- -title: 5155(F) The Windows Filtering Platform has blocked an application or service from listening on a port for incoming connections. (Windows 10) +title: 5155(F) The Windows Filtering Platform has blocked an application or service from listening on a port for incoming connections. description: Describes security event 5155(F) The Windows Filtering Platform has blocked an application or service from listening on a port for incoming connections. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5156.md b/windows/security/threat-protection/auditing/event-5156.md index 3d56301b24..724eaef46c 100644 --- a/windows/security/threat-protection/auditing/event-5156.md +++ b/windows/security/threat-protection/auditing/event-5156.md @@ -1,5 +1,5 @@ --- -title: 5156(S) The Windows Filtering Platform has permitted a connection. (Windows 10) +title: 5156(S) The Windows Filtering Platform has permitted a connection. description: Describes security event 5156(S) The Windows Filtering Platform has permitted a connection. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5157.md b/windows/security/threat-protection/auditing/event-5157.md index 4f62c99d51..1e39f7ffb8 100644 --- a/windows/security/threat-protection/auditing/event-5157.md +++ b/windows/security/threat-protection/auditing/event-5157.md @@ -1,5 +1,5 @@ --- -title: 5157(F) The Windows Filtering Platform has blocked a connection. (Windows 10) +title: 5157(F) The Windows Filtering Platform has blocked a connection. description: Describes security event 5157(F) The Windows Filtering Platform has blocked a connection. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5158.md b/windows/security/threat-protection/auditing/event-5158.md index cbc0d2d4ee..38240c1959 100644 --- a/windows/security/threat-protection/auditing/event-5158.md +++ b/windows/security/threat-protection/auditing/event-5158.md @@ -1,5 +1,5 @@ --- -title: 5158(S) The Windows Filtering Platform has permitted a bind to a local port. (Windows 10) +title: 5158(S) The Windows Filtering Platform has permitted a bind to a local port. description: Describes security event 5158(S) The Windows Filtering Platform has permitted a bind to a local port. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5159.md b/windows/security/threat-protection/auditing/event-5159.md index ffe34518c5..ac4d655290 100644 --- a/windows/security/threat-protection/auditing/event-5159.md +++ b/windows/security/threat-protection/auditing/event-5159.md @@ -1,5 +1,5 @@ --- -title: 5159(F) The Windows Filtering Platform has blocked a bind to a local port. (Windows 10) +title: 5159(F) The Windows Filtering Platform has blocked a bind to a local port. description: Describes security event 5159(F) The Windows Filtering Platform has blocked a bind to a local port. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5168.md b/windows/security/threat-protection/auditing/event-5168.md index f0ae1f47a8..6e3c96eb23 100644 --- a/windows/security/threat-protection/auditing/event-5168.md +++ b/windows/security/threat-protection/auditing/event-5168.md @@ -1,5 +1,5 @@ --- -title: 5168(F) SPN check for SMB/SMB2 failed. (Windows 10) +title: 5168(F) SPN check for SMB/SMB2 failed. description: Describes security event 5168(F) SPN check for SMB/SMB2 failed. This event is generated when an SMB SPN check fails. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5376.md b/windows/security/threat-protection/auditing/event-5376.md index ee08c45c93..a16faf1299 100644 --- a/windows/security/threat-protection/auditing/event-5376.md +++ b/windows/security/threat-protection/auditing/event-5376.md @@ -1,5 +1,5 @@ --- -title: 5376(S) Credential Manager credentials were backed up. (Windows 10) +title: 5376(S) Credential Manager credentials were backed up. description: Describes security event 5376(S) Credential Manager credentials were backed up. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5377.md b/windows/security/threat-protection/auditing/event-5377.md index a6f12f74f5..3507bd16cb 100644 --- a/windows/security/threat-protection/auditing/event-5377.md +++ b/windows/security/threat-protection/auditing/event-5377.md @@ -1,5 +1,5 @@ --- -title: 5377(S) Credential Manager credentials were restored from a backup. (Windows 10) +title: 5377(S) Credential Manager credentials were restored from a backup. description: Describes security event 5377(S) Credential Manager credentials were restored from a backup. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5378.md b/windows/security/threat-protection/auditing/event-5378.md index b6391769da..fe25938e5e 100644 --- a/windows/security/threat-protection/auditing/event-5378.md +++ b/windows/security/threat-protection/auditing/event-5378.md @@ -1,5 +1,5 @@ --- -title: 5378(F) The requested credentials delegation was disallowed by policy. (Windows 10) +title: 5378(F) The requested credentials delegation was disallowed by policy. description: Describes security event 5378(F) The requested credentials delegation was disallowed by policy. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5447.md b/windows/security/threat-protection/auditing/event-5447.md index 96b013cf8c..0acc7c3617 100644 --- a/windows/security/threat-protection/auditing/event-5447.md +++ b/windows/security/threat-protection/auditing/event-5447.md @@ -1,5 +1,5 @@ --- -title: 5447(S) A Windows Filtering Platform filter has been changed. (Windows 10) +title: 5447(S) A Windows Filtering Platform filter has been changed. description: Describes security event 5447(S) A Windows Filtering Platform filter has been changed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5632.md b/windows/security/threat-protection/auditing/event-5632.md index 676a79172e..4318afccfa 100644 --- a/windows/security/threat-protection/auditing/event-5632.md +++ b/windows/security/threat-protection/auditing/event-5632.md @@ -1,5 +1,5 @@ --- -title: 5632(S, F) A request was made to authenticate to a wireless network. (Windows 10) +title: 5632(S, F) A request was made to authenticate to a wireless network. description: Describes security event 5632(S, F) A request was made to authenticate to a wireless network. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5633.md b/windows/security/threat-protection/auditing/event-5633.md index e661c80301..e1c83e2ce0 100644 --- a/windows/security/threat-protection/auditing/event-5633.md +++ b/windows/security/threat-protection/auditing/event-5633.md @@ -1,5 +1,5 @@ --- -title: 5633(S, F) A request was made to authenticate to a wired network. (Windows 10) +title: 5633(S, F) A request was made to authenticate to a wired network. description: Describes security event 5633(S, F) A request was made to authenticate to a wired network. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5712.md b/windows/security/threat-protection/auditing/event-5712.md index 32d5ba732a..a16b225c22 100644 --- a/windows/security/threat-protection/auditing/event-5712.md +++ b/windows/security/threat-protection/auditing/event-5712.md @@ -1,5 +1,5 @@ --- -title: 5712(S) A Remote Procedure Call (RPC) was attempted. (Windows 10) +title: 5712(S) A Remote Procedure Call (RPC) was attempted. description: Describes security event 5712(S) A Remote Procedure Call (RPC) was attempted. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5888.md b/windows/security/threat-protection/auditing/event-5888.md index 72e18b5e28..9883763620 100644 --- a/windows/security/threat-protection/auditing/event-5888.md +++ b/windows/security/threat-protection/auditing/event-5888.md @@ -1,5 +1,5 @@ --- -title: 5888(S) An object in the COM+ Catalog was modified. (Windows 10) +title: 5888(S) An object in the COM+ Catalog was modified. description: Describes security event 5888(S) An object in the COM+ Catalog was modified. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5889.md b/windows/security/threat-protection/auditing/event-5889.md index 178ec29a4f..35333b2c0a 100644 --- a/windows/security/threat-protection/auditing/event-5889.md +++ b/windows/security/threat-protection/auditing/event-5889.md @@ -1,5 +1,5 @@ --- -title: 5889(S) An object was deleted from the COM+ Catalog. (Windows 10) +title: 5889(S) An object was deleted from the COM+ Catalog. description: Describes security event 5889(S) An object was deleted from the COM+ Catalog. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-5890.md b/windows/security/threat-protection/auditing/event-5890.md index 4f473d2a4e..62ffc37aef 100644 --- a/windows/security/threat-protection/auditing/event-5890.md +++ b/windows/security/threat-protection/auditing/event-5890.md @@ -1,5 +1,5 @@ --- -title: 5890(S) An object was added to the COM+ Catalog. (Windows 10) +title: 5890(S) An object was added to the COM+ Catalog. description: Describes security event 5890(S) An object was added to the COM+ Catalog. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-6144.md b/windows/security/threat-protection/auditing/event-6144.md index 3eb1181321..f48236f8f6 100644 --- a/windows/security/threat-protection/auditing/event-6144.md +++ b/windows/security/threat-protection/auditing/event-6144.md @@ -1,5 +1,5 @@ --- -title: 6144(S) Security policy in the group policy objects has been applied successfully. (Windows 10) +title: 6144(S) Security policy in the group policy objects has been applied successfully. description: Describes security event 6144(S) Security policy in the group policy objects has been applied successfully. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-6145.md b/windows/security/threat-protection/auditing/event-6145.md index b062b5e023..6b7c90a16e 100644 --- a/windows/security/threat-protection/auditing/event-6145.md +++ b/windows/security/threat-protection/auditing/event-6145.md @@ -1,5 +1,5 @@ --- -title: 6145(F) One or more errors occurred while processing security policy in the group policy objects. (Windows 10) +title: 6145(F) One or more errors occurred while processing security policy in the group policy objects. description: Describes security event 6145(F) One or more errors occurred while processing security policy in the group policy objects. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-6281.md b/windows/security/threat-protection/auditing/event-6281.md index 38f432d51a..574a3854b0 100644 --- a/windows/security/threat-protection/auditing/event-6281.md +++ b/windows/security/threat-protection/auditing/event-6281.md @@ -1,5 +1,5 @@ --- -title: 6281(F) Code Integrity determined that the page hashes of an image file aren't valid. (Windows 10) +title: 6281(F) Code Integrity determined that the page hashes of an image file aren't valid. description: Describes security event 6281(F) Code Integrity determined that the page hashes of an image file aren't valid. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-6400.md b/windows/security/threat-protection/auditing/event-6400.md index a588c35204..dc64fd05a5 100644 --- a/windows/security/threat-protection/auditing/event-6400.md +++ b/windows/security/threat-protection/auditing/event-6400.md @@ -1,5 +1,5 @@ --- -title: 6400(-) BranchCache Received an incorrectly formatted response while discovering availability of content. (Windows 10) +title: 6400(-) BranchCache Received an incorrectly formatted response while discovering availability of content. description: Describes security event 6400(-) BranchCache Received an incorrectly formatted response while discovering availability of content. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-6401.md b/windows/security/threat-protection/auditing/event-6401.md index 82502eb7ff..94f6633a46 100644 --- a/windows/security/threat-protection/auditing/event-6401.md +++ b/windows/security/threat-protection/auditing/event-6401.md @@ -1,5 +1,5 @@ --- -title: 6401(-) BranchCache Received invalid data from a peer. Data discarded. (Windows 10) +title: 6401(-) BranchCache Received invalid data from a peer. Data discarded. description: Describes security event 6401(-) BranchCache Received invalid data from a peer. Data discarded. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-6402.md b/windows/security/threat-protection/auditing/event-6402.md index d5d3febf63..73129dfd29 100644 --- a/windows/security/threat-protection/auditing/event-6402.md +++ b/windows/security/threat-protection/auditing/event-6402.md @@ -1,5 +1,5 @@ --- -title: 6402(-) BranchCache The message to the hosted cache offering it data is incorrectly formatted. (Windows 10) +title: 6402(-) BranchCache The message to the hosted cache offering it data is incorrectly formatted. description: Describes security event 6402(-) BranchCache The message to the hosted cache offering it data is incorrectly formatted. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-6403.md b/windows/security/threat-protection/auditing/event-6403.md index 2f9d945388..58d24830a0 100644 --- a/windows/security/threat-protection/auditing/event-6403.md +++ b/windows/security/threat-protection/auditing/event-6403.md @@ -1,5 +1,5 @@ --- -title: 6403(-) BranchCache The hosted cache sent an incorrectly formatted response to the client. (Windows 10) +title: 6403(-) BranchCache The hosted cache sent an incorrectly formatted response to the client. description: Describes security event 6403(-) BranchCache The hosted cache sent an incorrectly formatted response to the client. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-6404.md b/windows/security/threat-protection/auditing/event-6404.md index f37bea1b9e..dbe0f13d14 100644 --- a/windows/security/threat-protection/auditing/event-6404.md +++ b/windows/security/threat-protection/auditing/event-6404.md @@ -1,5 +1,5 @@ --- -title: 6404(-) BranchCache Hosted cache could not be authenticated using the provisioned SSL certificate. (Windows 10) +title: 6404(-) BranchCache Hosted cache could not be authenticated using the provisioned SSL certificate. description: Describes security event 6404(-) BranchCache Hosted cache could not be authenticated using the provisioned SSL certificate. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-6405.md b/windows/security/threat-protection/auditing/event-6405.md index 1feed0f6a6..a4f439d202 100644 --- a/windows/security/threat-protection/auditing/event-6405.md +++ b/windows/security/threat-protection/auditing/event-6405.md @@ -1,5 +1,5 @@ --- -title: 6405(-) BranchCache %2 instance(s) of event id %1 occurred. (Windows 10) +title: 6405(-) BranchCache %2 instance(s) of event id %1 occurred. description: Describes security event 6405(-) BranchCache %2 instance(s) of event id %1 occurred. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-6406.md b/windows/security/threat-protection/auditing/event-6406.md index fdd75af38b..f0c92f84f6 100644 --- a/windows/security/threat-protection/auditing/event-6406.md +++ b/windows/security/threat-protection/auditing/event-6406.md @@ -1,5 +1,5 @@ --- -title: 6406(-) %1 registered to Windows Firewall to control filtering for the following %2. (Windows 10) +title: 6406(-) %1 registered to Windows Firewall to control filtering for the following %2. description: Describes security event 6406(-) %1 registered to Windows Firewall to control filtering for the following %2. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-6407.md b/windows/security/threat-protection/auditing/event-6407.md index c2f279466e..5341074ad2 100644 --- a/windows/security/threat-protection/auditing/event-6407.md +++ b/windows/security/threat-protection/auditing/event-6407.md @@ -1,5 +1,5 @@ --- -title: 6407(-) 1%. (Windows 10) +title: 6407(-) 1%. description: Describes security event 6407(-) 1%. This event is a BranchCache event, which is outside the scope of this document. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-6408.md b/windows/security/threat-protection/auditing/event-6408.md index 36f25a9b69..aafcea4c9c 100644 --- a/windows/security/threat-protection/auditing/event-6408.md +++ b/windows/security/threat-protection/auditing/event-6408.md @@ -1,5 +1,5 @@ --- -title: 6408(-) Registered product %1 failed and Windows Firewall is now controlling the filtering for %2. (Windows 10) +title: 6408(-) Registered product %1 failed and Windows Firewall is now controlling the filtering for %2. description: Describes security event 6408(-) Registered product %1 failed and Windows Firewall is now controlling the filtering for %2. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-6409.md b/windows/security/threat-protection/auditing/event-6409.md index 3f406625b5..4b002854ab 100644 --- a/windows/security/threat-protection/auditing/event-6409.md +++ b/windows/security/threat-protection/auditing/event-6409.md @@ -1,5 +1,5 @@ --- -title: 6409(-) BranchCache A service connection point object could not be parsed. (Windows 10) +title: 6409(-) BranchCache A service connection point object could not be parsed. description: Describes security event 6409(-) BranchCache A service connection point object could not be parsed. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-6410.md b/windows/security/threat-protection/auditing/event-6410.md index 958db95565..26fa20d6b1 100644 --- a/windows/security/threat-protection/auditing/event-6410.md +++ b/windows/security/threat-protection/auditing/event-6410.md @@ -1,5 +1,5 @@ --- -title: 6410(F) Code integrity determined that a file doesn't meet the security requirements to load into a process. (Windows 10) +title: 6410(F) Code integrity determined that a file doesn't meet the security requirements to load into a process. description: Describes security event 6410(F) Code integrity determined that a file doesn't meet the security requirements to load into a process. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-6416.md b/windows/security/threat-protection/auditing/event-6416.md index 64cdb17ee1..01223f3581 100644 --- a/windows/security/threat-protection/auditing/event-6416.md +++ b/windows/security/threat-protection/auditing/event-6416.md @@ -1,5 +1,5 @@ --- -title: 6416(S) A new external device was recognized by the System. (Windows 10) +title: 6416(S) A new external device was recognized by the System. description: Describes security event 6416(S) A new external device was recognized by the System. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-6419.md b/windows/security/threat-protection/auditing/event-6419.md index 7368059899..447bcd58dc 100644 --- a/windows/security/threat-protection/auditing/event-6419.md +++ b/windows/security/threat-protection/auditing/event-6419.md @@ -1,5 +1,5 @@ --- -title: 6419(S) A request was made to disable a device. (Windows 10) +title: 6419(S) A request was made to disable a device. description: Describes security event 6419(S) A request was made to disable a device. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-6420.md b/windows/security/threat-protection/auditing/event-6420.md index 2c7166a78d..80521a6822 100644 --- a/windows/security/threat-protection/auditing/event-6420.md +++ b/windows/security/threat-protection/auditing/event-6420.md @@ -1,5 +1,5 @@ --- -title: 6420(S) A device was disabled. (Windows 10) +title: 6420(S) A device was disabled. description: Describes security event 6420(S) A device was disabled. This event is generated when a specific device is disabled. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-6421.md b/windows/security/threat-protection/auditing/event-6421.md index ae72b11254..aa1d7704f1 100644 --- a/windows/security/threat-protection/auditing/event-6421.md +++ b/windows/security/threat-protection/auditing/event-6421.md @@ -1,5 +1,5 @@ --- -title: 6421(S) A request was made to enable a device. (Windows 10) +title: 6421(S) A request was made to enable a device. description: Describes security event 6421(S) A request was made to enable a device. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-6422.md b/windows/security/threat-protection/auditing/event-6422.md index bf594b6937..1a6e391654 100644 --- a/windows/security/threat-protection/auditing/event-6422.md +++ b/windows/security/threat-protection/auditing/event-6422.md @@ -1,5 +1,5 @@ --- -title: 6422(S) A device was enabled. (Windows 10) +title: 6422(S) A device was enabled. description: Describes security event 6422(S) A device was enabled. This event is generated when a specific device is enabled. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-6423.md b/windows/security/threat-protection/auditing/event-6423.md index 4f7fcb614c..4b1f78c094 100644 --- a/windows/security/threat-protection/auditing/event-6423.md +++ b/windows/security/threat-protection/auditing/event-6423.md @@ -1,5 +1,5 @@ --- -title: 6423(S) The installation of this device is forbidden by system policy. (Windows 10) +title: 6423(S) The installation of this device is forbidden by system policy. description: Describes security event 6423(S) The installation of this device is forbidden by system policy. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/event-6424.md b/windows/security/threat-protection/auditing/event-6424.md index 10d33c2820..81cd90103b 100644 --- a/windows/security/threat-protection/auditing/event-6424.md +++ b/windows/security/threat-protection/auditing/event-6424.md @@ -1,5 +1,5 @@ --- -title: 6424(S) The installation of this device was allowed, after having previously been forbidden by policy. (Windows 10) +title: 6424(S) The installation of this device was allowed, after having previously been forbidden by policy. description: Describes security event 6424(S) The installation of this device was allowed, after having previously been forbidden by policy. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/file-system-global-object-access-auditing.md b/windows/security/threat-protection/auditing/file-system-global-object-access-auditing.md index 90b8df1a2d..a248fd4f79 100644 --- a/windows/security/threat-protection/auditing/file-system-global-object-access-auditing.md +++ b/windows/security/threat-protection/auditing/file-system-global-object-access-auditing.md @@ -1,5 +1,5 @@ --- -title: File System (Global Object Access Auditing) (Windows 10) +title: File System (Global Object Access Auditing) description: The policy setting, File System (Global Object Access Auditing), enables you to configure a global system access control list (SACL) for an entire computer. ms.assetid: 4f215d61-0e23-46e4-9e58-08511105d25b ms.reviewer: diff --git a/windows/security/threat-protection/auditing/how-to-list-xml-elements-in-eventdata.md b/windows/security/threat-protection/auditing/how-to-list-xml-elements-in-eventdata.md index d2af1d3d31..c9acfc2f7a 100644 --- a/windows/security/threat-protection/auditing/how-to-list-xml-elements-in-eventdata.md +++ b/windows/security/threat-protection/auditing/how-to-list-xml-elements-in-eventdata.md @@ -1,5 +1,5 @@ --- -title: How to get a list of XML data name elements in (Windows 10) +title: How to get a list of XML data name elements in description: This reference article for the IT professional explains how to use PowerShell to get a list of XML data name elements that can appear in . ms.prod: windows-client ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/auditing/monitor-central-access-policy-and-rule-definitions.md b/windows/security/threat-protection/auditing/monitor-central-access-policy-and-rule-definitions.md index 9b6b271da7..471ed8c690 100644 --- a/windows/security/threat-protection/auditing/monitor-central-access-policy-and-rule-definitions.md +++ b/windows/security/threat-protection/auditing/monitor-central-access-policy-and-rule-definitions.md @@ -1,5 +1,5 @@ --- -title: Monitor central access policy and rule definitions (Windows 10) +title: Monitor central access policy and rule definitions description: Learn how to use advanced security auditing options to monitor changes to central access policy and central access rule definitions. ms.assetid: 553f98a6-7606-4518-a3c5-347a33105130 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/monitor-claim-types.md b/windows/security/threat-protection/auditing/monitor-claim-types.md index a7c3aa44fe..541639f07d 100644 --- a/windows/security/threat-protection/auditing/monitor-claim-types.md +++ b/windows/security/threat-protection/auditing/monitor-claim-types.md @@ -1,5 +1,5 @@ --- -title: Monitor claim types (Windows 10) +title: Monitor claim types description: Learn how to monitor changes to claim types that are associated with dynamic access control when you're using advanced security auditing options. ms.assetid: 426084da-4eef-44af-aeec-e7ab4d4e2439 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/monitor-resource-attribute-definitions.md b/windows/security/threat-protection/auditing/monitor-resource-attribute-definitions.md index 91265a3f10..d9e2b2025d 100644 --- a/windows/security/threat-protection/auditing/monitor-resource-attribute-definitions.md +++ b/windows/security/threat-protection/auditing/monitor-resource-attribute-definitions.md @@ -1,5 +1,5 @@ --- -title: Monitor resource attribute definitions (Windows 10) +title: Monitor resource attribute definitions description: Learn how to monitor changes to resource attribute definitions when you're using advanced security auditing options to monitor dynamic access control objects. ms.assetid: aace34b0-123a-4b83-9e09-f269220e79de ms.reviewer: diff --git a/windows/security/threat-protection/auditing/monitor-the-central-access-policies-associated-with-files-and-folders.md b/windows/security/threat-protection/auditing/monitor-the-central-access-policies-associated-with-files-and-folders.md index 179df431d4..806cdbef89 100644 --- a/windows/security/threat-protection/auditing/monitor-the-central-access-policies-associated-with-files-and-folders.md +++ b/windows/security/threat-protection/auditing/monitor-the-central-access-policies-associated-with-files-and-folders.md @@ -1,5 +1,5 @@ --- -title: Monitor central access policies for files or folders (Windows 10) +title: Monitor central access policies for files or folders description: Monitor changes to central access policies associated with files and folders, when using advanced security auditing options for dynamic access control objects. ms.assetid: 2ea8fc23-b3ac-432f-87b0-6a16506e8eed ms.reviewer: diff --git a/windows/security/threat-protection/auditing/monitor-the-central-access-policies-that-apply-on-a-file-server.md b/windows/security/threat-protection/auditing/monitor-the-central-access-policies-that-apply-on-a-file-server.md index 1e95dc5887..c3c6bd7919 100644 --- a/windows/security/threat-protection/auditing/monitor-the-central-access-policies-that-apply-on-a-file-server.md +++ b/windows/security/threat-protection/auditing/monitor-the-central-access-policies-that-apply-on-a-file-server.md @@ -1,5 +1,5 @@ --- -title: Monitor central access policies on a file server (Windows 10) +title: Monitor central access policies on a file server description: Learn how to monitor changes to the central access policies that apply to a file server when using advanced security auditing options. ms.assetid: 126b051e-c20d-41f1-b42f-6cff24dcf20c ms.reviewer: diff --git a/windows/security/threat-protection/auditing/monitor-the-resource-attributes-on-files-and-folders.md b/windows/security/threat-protection/auditing/monitor-the-resource-attributes-on-files-and-folders.md index 5bbd6fa638..4008b0c158 100644 --- a/windows/security/threat-protection/auditing/monitor-the-resource-attributes-on-files-and-folders.md +++ b/windows/security/threat-protection/auditing/monitor-the-resource-attributes-on-files-and-folders.md @@ -1,5 +1,5 @@ --- -title: Monitor the resource attributes on files and folders (Windows 10) +title: Monitor the resource attributes on files and folders description: Learn how to use advanced security auditing options to monitor attempts to change settings on the resource attributes of files. ms.assetid: 4944097b-320f-44c7-88ed-bf55946a358b ms.reviewer: diff --git a/windows/security/threat-protection/auditing/monitor-the-use-of-removable-storage-devices.md b/windows/security/threat-protection/auditing/monitor-the-use-of-removable-storage-devices.md index 659d01dc6b..5142eff8ca 100644 --- a/windows/security/threat-protection/auditing/monitor-the-use-of-removable-storage-devices.md +++ b/windows/security/threat-protection/auditing/monitor-the-use-of-removable-storage-devices.md @@ -1,5 +1,5 @@ --- -title: Monitor the use of removable storage devices (Windows 10) +title: Monitor the use of removable storage devices description: Learn how advanced security auditing options can be used to monitor attempts to use removable storage devices to access network resources. ms.assetid: b0a9e4a5-b7ff-41c6-96ff-0228d4ba5da8 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/monitor-user-and-device-claims-during-sign-in.md b/windows/security/threat-protection/auditing/monitor-user-and-device-claims-during-sign-in.md index 70ff402a9c..d97b9e646f 100644 --- a/windows/security/threat-protection/auditing/monitor-user-and-device-claims-during-sign-in.md +++ b/windows/security/threat-protection/auditing/monitor-user-and-device-claims-during-sign-in.md @@ -1,5 +1,5 @@ --- -title: Monitor user and device claims during sign-in (Windows 10) +title: Monitor user and device claims during sign-in description: Learn how to monitor user and device claims that are associated with a user’s security token. This advice assumes you have deployed Dynamic Access Control. ms.assetid: 71796ea9-5fe4-4183-8475-805c3c1f319f ms.reviewer: diff --git a/windows/security/threat-protection/auditing/other-events.md b/windows/security/threat-protection/auditing/other-events.md index 800961629e..86ef4c8957 100644 --- a/windows/security/threat-protection/auditing/other-events.md +++ b/windows/security/threat-protection/auditing/other-events.md @@ -1,5 +1,5 @@ --- -title: Other Events (Windows 10) +title: Other Events description: Describes the Other Events auditing subcategory, which includes events that are generated automatically and enabled by default. ms.pagetype: security ms.prod: windows-client diff --git a/windows/security/threat-protection/auditing/planning-and-deploying-advanced-security-audit-policies.md b/windows/security/threat-protection/auditing/planning-and-deploying-advanced-security-audit-policies.md index ca4a732ae0..9c710c203e 100644 --- a/windows/security/threat-protection/auditing/planning-and-deploying-advanced-security-audit-policies.md +++ b/windows/security/threat-protection/auditing/planning-and-deploying-advanced-security-audit-policies.md @@ -1,5 +1,5 @@ --- -title: Plan and deploy advanced security audit policies (Windows 10) +title: Plan and deploy advanced security audit policies description: Learn to deploy an effective security audit policy in a network that includes advanced security audit policies. ms.assetid: 7428e1db-aba8-407b-a39e-509671e5a442 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/registry-global-object-access-auditing.md b/windows/security/threat-protection/auditing/registry-global-object-access-auditing.md index ddb00eb78b..ac19f5355d 100644 --- a/windows/security/threat-protection/auditing/registry-global-object-access-auditing.md +++ b/windows/security/threat-protection/auditing/registry-global-object-access-auditing.md @@ -1,5 +1,5 @@ --- -title: Registry (Global Object Access Auditing) (Windows 10) +title: Registry (Global Object Access Auditing) description: The Advanced Security Audit policy setting, Registry (Global Object Access Auditing), enables you to configure a global system access control list (SACL). ms.assetid: 953bb1c1-3f76-43be-ba17-4aed2304f578 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/security-auditing-overview.md b/windows/security/threat-protection/auditing/security-auditing-overview.md index 6b11aea8c2..90e0745872 100644 --- a/windows/security/threat-protection/auditing/security-auditing-overview.md +++ b/windows/security/threat-protection/auditing/security-auditing-overview.md @@ -1,5 +1,5 @@ --- -title: Security auditing (Windows 10) +title: Security auditing description: Learn about security auditing features in Windows, and how your organization can benefit from using them to make your network more secure and easily managed. ms.assetid: 2d9b8142-49bd-4a33-b246-3f0c2a5f32d4 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects.md b/windows/security/threat-protection/auditing/using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects.md index 1b69753395..0d0c6e1fb7 100644 --- a/windows/security/threat-protection/auditing/using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects.md +++ b/windows/security/threat-protection/auditing/using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects.md @@ -1,5 +1,5 @@ --- -title: Using advanced security auditing options to monitor dynamic access control objects (Windows 10) +title: Using advanced security auditing options to monitor dynamic access control objects description: Domain admins can set up advanced security audit options in Windows 10 to target specific users, or monitor potentially significant activity on multiple devices ms.assetid: 0d2c28ea-bdaf-47fd-bca2-a07dce5fed37 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/view-the-security-event-log.md b/windows/security/threat-protection/auditing/view-the-security-event-log.md index 3985c12068..25265ee877 100644 --- a/windows/security/threat-protection/auditing/view-the-security-event-log.md +++ b/windows/security/threat-protection/auditing/view-the-security-event-log.md @@ -1,5 +1,5 @@ --- -title: View the security event log (Windows 10) +title: View the security event log description: The security log records each event as defined by the audit policies you set on each object. ms.assetid: 20DD2ACD-241A-45C5-A92F-4BE0D9F198B9 ms.reviewer: diff --git a/windows/security/threat-protection/auditing/which-editions-of-windows-support-advanced-audit-policy-configuration.md b/windows/security/threat-protection/auditing/which-editions-of-windows-support-advanced-audit-policy-configuration.md index bb0933cca6..ef99d2c066 100644 --- a/windows/security/threat-protection/auditing/which-editions-of-windows-support-advanced-audit-policy-configuration.md +++ b/windows/security/threat-protection/auditing/which-editions-of-windows-support-advanced-audit-policy-configuration.md @@ -1,5 +1,5 @@ --- -title: Which editions of Windows support advanced audit policy configuration (Windows 10) +title: Which editions of Windows support advanced audit policy configuration description: This reference topic for the IT professional describes which versions of the Windows operating systems support advanced security auditing policies. ms.assetid: 87c71cc5-522d-4771-ac78-34a2a0825f31 ms.reviewer: diff --git a/windows/security/threat-protection/block-untrusted-fonts-in-enterprise.md b/windows/security/threat-protection/block-untrusted-fonts-in-enterprise.md index ceffd83425..76f980c27e 100644 --- a/windows/security/threat-protection/block-untrusted-fonts-in-enterprise.md +++ b/windows/security/threat-protection/block-untrusted-fonts-in-enterprise.md @@ -1,5 +1,5 @@ --- -title: Block untrusted fonts in an enterprise (Windows 10) +title: Block untrusted fonts in an enterprise description: To help protect your company from attacks that may originate from untrusted or attacker controlled font files, we've created the Blocking Untrusted Fonts feature. ms.reviewer: ms.prod: windows-client diff --git a/windows/security/threat-protection/index.md b/windows/security/threat-protection/index.md index dfaa642ba7..83cd0757b5 100644 --- a/windows/security/threat-protection/index.md +++ b/windows/security/threat-protection/index.md @@ -12,13 +12,7 @@ ms.date: 12/31/2017 # Windows threat protection -**Applies to:** -- Windows 10 -- Windows 11 - -In Windows client, hardware and software work together to help protect you from new and emerging threats. Expanded security protections in Windows 11 help boost security from the chip, to the cloud. - -## Windows threat protection +In Windows client, hardware and software work together to help protect you from new and emerging threats. Expanded security protections in Windows 11 help boost security from the chip, to the cloud. See the following articles to learn more about the different areas of Windows threat protection: @@ -28,15 +22,16 @@ See the following articles to learn more about the different areas of Windows th - [Exploit Protection](/microsoft-365/security/defender-endpoint/exploit-protection) - [Microsoft Defender Application Guard](/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-overview) - [Microsoft Defender Device Guard](device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md) -- [Microsoft Defender SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview) +- [Microsoft Defender SmartScreen](/windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/) - [Network Protection](/microsoft-365/security/defender-endpoint/network-protection) - [Virtualization-Based Protection of Code Integrity](/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity) - [Web Protection](/microsoft-365/security/defender-endpoint/web-protection-overview) - [Windows Firewall](windows-firewall/windows-firewall-with-advanced-security.md) - [Windows Sandbox](/windows/security/threat-protection/windows-sandbox/windows-sandbox-overview) -### Next-generation protection -Next-generation protection is designed to identify and block new and emerging threats. Powered by the cloud and machine learning, Microsoft Defender Antivirus can help stop attacks in real-time. +## Next-generation protection + +Next-generation protection is designed to identify and block new and emerging threats. Powered by the cloud and machine learning, Microsoft Defender Antivirus can help stop attacks in real-time. - [Automated sandbox service](/microsoft-365/security/defender-endpoint/configure-block-at-first-sight-microsoft-defender-antivirus) - [Behavior monitoring](/microsoft-365/security/defender-endpoint/configure-real-time-protection-microsoft-defender-antivirus) diff --git a/windows/security/threat-protection/microsoft-defender-application-guard/configure-md-app-guard.md b/windows/security/threat-protection/microsoft-defender-application-guard/configure-md-app-guard.md index 5ab3f50909..8fbd730b70 100644 --- a/windows/security/threat-protection/microsoft-defender-application-guard/configure-md-app-guard.md +++ b/windows/security/threat-protection/microsoft-defender-application-guard/configure-md-app-guard.md @@ -1,5 +1,5 @@ --- -title: Configure the Group Policy settings for Microsoft Defender Application Guard (Windows) +title: Configure the Group Policy settings for Microsoft Defender Application Guard description: Learn about the available Group Policy settings for Microsoft Defender Application Guard. ms.prod: windows-client ms.mktglfcycl: manage @@ -27,6 +27,10 @@ Microsoft Defender Application Guard (Application Guard) works with Group Policy Application Guard uses both network isolation and application-specific settings. +[!INCLUDE [microsoft-defender-application-guard-mdag-for-edge-enterprise-mode-and-enterprise-management](../../../../includes/licensing/microsoft-defender-application-guard-mdag-for-edge-enterprise-mode-and-enterprise-management.md)] + +For more information about Microsoft Defender Application Guard (MDAG) for Edge in stand-alone mode, see [Microsoft Defender Application Guard overview](/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-overview). + ## Network isolation settings These settings, located at `Computer Configuration\Administrative Templates\Network\Network Isolation`, help you define and manage your organization's network boundaries. Application Guard uses this information to automatically transfer any requests to access the non-corporate resources into the Application Guard container. @@ -36,7 +40,7 @@ These settings, located at `Computer Configuration\Administrative Templates\Netw > [!NOTE] > You must configure either the Enterprise resource domains hosted in the cloud or Private network ranges for apps settings on your employee devices to successfully turn on Application Guard using enterprise mode. Proxy servers must be a neutral resource listed in the **Domains categorized as both work and personal** policy. - + |Policy name|Supported versions|Description| |-----------|------------------|-----------| |Private network ranges for apps | At least Windows Server 2012, Windows 8, or Windows RT| A comma-separated list of IP address ranges that are in your corporate network. Included endpoints or endpoints that are included within a specified IP address range, are rendered using Microsoft Edge and won't be accessible from the Application Guard environment.| @@ -62,13 +66,13 @@ These settings, located at `Computer Configuration\Administrative Templates\Wind |Allow Persistence|Windows 10 Enterprise, 1709 or higher

                  Windows 11 Enterprise|Determines whether data persists across different sessions in Microsoft Defender Application Guard.|**Enabled.** This is effective only in managed mode. Application Guard saves user-downloaded files and other items (such as, cookies, Favorites, and so on) for use in future Application Guard sessions.

                  **Disabled or not configured.** All user data within Application Guard is reset between sessions.

                  **NOTE**: If you later decide to stop supporting data persistence for your employees, you can use our Windows-provided utility to reset the container and to discard any personal data.

                  **To reset the container:**
                  1. Open a command-line program and navigate to `Windows/System32`.
                  2. Type `wdagtool.exe cleanup`. The container environment is reset, retaining only the employee-generated data.
                  3. Type `wdagtool.exe cleanup RESET_PERSISTENCE_LAYER`. The container environment is reset, including discarding all employee-generated data.| |Turn on Microsoft Defender Application Guard in Managed Mode|Windows 10 Enterprise, 1809 or higher

                  Windows 11 Enterprise|Determines whether to turn on Application Guard for Microsoft Edge and Microsoft Office.|**Enabled.** Turns on Application Guard for Microsoft Edge and/or Microsoft Office, honoring the network isolation settings, rendering untrusted content in the Application Guard container. Application Guard won't actually be turned on unless the required prerequisites and network isolation settings are already set on the device. Available options:
                  - Enable Microsoft Defender Application Guard only for Microsoft Edge
                  - Enable Microsoft Defender Application Guard only for Microsoft Office
                  - Enable Microsoft Defender Application Guard for both Microsoft Edge and Microsoft Office

                  **Disabled.** Turns off Application Guard, allowing all apps to run in Microsoft Edge and Microsoft Office.

                  **Note:** For Windows 10, if you have KB5014666 installed, and for Windows 11, if you have KB5014668 installed, you are no longer required to configure network isolation policy to enable Application Guard for Edge.| |Allow files to download to host operating system|Windows 10 Enterprise or Pro, 1803 or higher

                  Windows 11 Enterprise or Pro|Determines whether to save downloaded files to the host operating system from the Microsoft Defender Application Guard container.|**Enabled.** Allows users to save downloaded files from the Microsoft Defender Application Guard container to the host operating system. This action creates a share between the host and container that also allows for uploads from the host to the Application Guard container.

                  **Disabled or not configured.** Users aren't able to save downloaded files from Application Guard to the host operating system.| -|Allow hardware-accelerated rendering for Microsoft Defender Application Guard|Windows 10 Enterprise, 1803 or higher

                  Windows 11 Enterprise|Determines whether Microsoft Defender Application Guard renders graphics using hardware or software acceleration.|**Enabled.** This is effective only in managed mode. Microsoft Defender Application Guard uses Hyper-V to access supported, high-security rendering graphics hardware (GPUs). These GPUs improve rendering performance and battery life while using Microsoft Defender Application Guard, particularly for video playback and other graphics-intensive use cases. If this setting is enabled without connecting any high-security rendering graphics hardware, Microsoft Defender Application Guard will automatically revert to software-based (CPU) rendering. **Important:** Enabling this setting with potentially compromised graphics devices or drivers might pose a risk to the host device.

                  **Disabled or not configured.** Microsoft Defender Application Guard uses software-based (CPU) rendering and won’t load any third-party graphics drivers or interact with any connected graphics hardware.| +|Allow hardware-accelerated rendering for Microsoft Defender Application Guard|Windows 10 Enterprise, 1803 or higher

                  Windows 11 Enterprise|Determines whether Microsoft Defender Application Guard renders graphics using hardware or software acceleration.|**Enabled.** This is effective only in managed mode. Microsoft Defender Application Guard uses Hyper-V to access supported, high-security rendering graphics hardware (GPUs). These GPUs improve rendering performance and battery life while using Microsoft Defender Application Guard, particularly for video playback and other graphics-intensive use cases. If this setting is enabled without connecting any high-security rendering graphics hardware, Microsoft Defender Application Guard will automatically revert to software-based (CPU) rendering. **Important:** Enabling this setting with potentially compromised graphics devices or drivers might pose a risk to the host device.

                  **Disabled or not configured.** Microsoft Defender Application Guard uses software-based (CPU) rendering and won't load any third-party graphics drivers or interact with any connected graphics hardware.| |Allow camera and microphone access in Microsoft Defender Application Guard|Windows 10 Enterprise, 1809 or higher

                  Windows 11 Enterprise|Determines whether to allow camera and microphone access inside Microsoft Defender Application Guard.|**Enabled.** This is effective only in managed mode. Applications inside Microsoft Defender Application Guard are able to access the camera and microphone on the user's device. **Important:** Enabling this policy with a potentially compromised container could bypass camera and microphone permissions and access the camera and microphone without the user's knowledge.

                  **Disabled or not configured.** Applications inside Microsoft Defender Application Guard are unable to access the camera and microphone on the user's device.| |Allow Microsoft Defender Application Guard to use Root Certificate Authorities from a user's device|Windows 10 Enterprise or Pro, 1809 or higher

                  Windows 11 Enterprise or Pro|Determines whether Root Certificates are shared with Microsoft Defender Application Guard.|**Enabled.** Certificates matching the specified thumbprint are transferred into the container. Use a comma to separate multiple certificates.

                  **Disabled or not configured.** Certificates aren't shared with Microsoft Defender Application Guard.| |Allow auditing events in Microsoft Defender Application Guard|Windows 10 Enterprise, 1809 or higher

                  Windows 11 Enterprise|This policy setting allows you to decide whether auditing events can be collected from Microsoft Defender Application Guard.|**Enabled.** This is effective only in managed mode. Application Guard inherits auditing policies from your device and logs system events from the Application Guard container to your host.

                  **Disabled or not configured.** Event logs aren't collected from your Application Guard container.| - ## Application Guard support dialog settings These settings are located at `Administrative Templates\Windows Components\Windows Security\Enterprise Customization`. If an error is encountered, you're presented with a dialog box. By default, this dialog box only contains the error information and a button for you to report it to Microsoft via the feedback hub. However, it's possible to provide additional information in the dialog box. [Use Group Policy to enable and customize contact information](/windows/security/threat-protection/windows-defender-security-center/wdsc-customize-contact-information#use-group-policy-to-enable-and-customize-contact-information). + diff --git a/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-overview.md b/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-overview.md index afc6aaef79..1f4264f709 100644 --- a/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-overview.md +++ b/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-overview.md @@ -1,5 +1,5 @@ --- -title: Microsoft Defender Application Guard (Windows 10 or Windows 11) +title: Microsoft Defender Application Guard description: Learn about Microsoft Defender Application Guard and how it helps combat malicious content and malware out on the Internet. ms.prod: windows-client ms.mktglfcycl: manage @@ -8,7 +8,7 @@ ms.pagetype: security ms.localizationpriority: medium author: vinaypamnani-msft ms.author: vinpa -ms.date: 09/09/2021 +ms.date: 05/01/2023 ms.reviewer: manager: aaroncz ms.custom: asr @@ -26,7 +26,7 @@ ms.topic: conceptual - Windows 10 - Windows 11 -Microsoft Defender Application Guard (Application Guard) is designed to help prevent old and newly emerging attacks to help keep employees productive. Using our unique hardware isolation approach, our goal is to destroy the playbook that attackers use by making current attack methods obsolete. +Microsoft Defender Application Guard (MDAG) is designed to help prevent old and newly emerging attacks to help keep employees productive. Using our unique hardware isolation approach, our goal is to destroy the playbook that attackers use by making current attack methods obsolete. ## What is Application Guard and how does it work? @@ -34,7 +34,6 @@ For Microsoft Edge, Application Guard helps to isolate enterprise-defined untrus For Microsoft Office, Application Guard helps prevents untrusted Word, PowerPoint and Excel files from accessing trusted resources. Application Guard opens untrusted files in an isolated Hyper-V-enabled container. The isolated Hyper-V container is separate from the host operating system. This container isolation means that if the untrusted site or file turns out to be malicious, the host device is protected, and the attacker can't get to your enterprise data. For example, this approach makes the isolated container anonymous, so an attacker can't get to your employee's enterprise credentials. - ![Hardware isolation diagram.](images/appguard-hardware-isolation.png) ### What types of devices should use Application Guard? @@ -49,6 +48,10 @@ Application Guard has been created to target several types of devices: - **Personal devices**. These personally owned desktops or mobile laptops aren't domain-joined or managed by an organization. The user is an admin on the device and uses a high-bandwidth wireless personal network while at home or a comparable public network while outside. +[!INCLUDE [microsoft-defender-application-guard-mdag-for-edge-standalone-mode](../../../../includes/licensing/microsoft-defender-application-guard-mdag-for-edge-standalone-mode.md)] + +For more information about Microsoft Defender Application Guard (MDAG) for Edge enterprise mode, [Configure Microsoft Defender Application Guard policy settings.](/windows/security/threat-protection/microsoft-defender-application-guard/configure-md-app-guard) + ## Related articles |Article |Description | @@ -61,3 +64,4 @@ Application Guard has been created to target several types of devices: | [Microsoft Defender Application Guard for Microsoft Office](/microsoft-365/security/office-365-security/install-app-guard) | Describes Application Guard for Microsoft Office, including minimum hardware requirements, configuration, and a troubleshooting guide | |[Frequently asked questions - Microsoft Defender Application Guard](faq-md-app-guard.yml)|Provides answers to frequently asked questions about Application Guard features, integration with the Windows operating system, and general configuration.| |[Use a network boundary to add trusted sites on Windows devices in Microsoft Intune](/mem/intune/configuration/network-boundary-windows)|Network boundary, a feature that helps you protect your environment from sites that aren't trusted by your organization.| + diff --git a/windows/security/threat-protection/override-mitigation-options-for-app-related-security-policies.md b/windows/security/threat-protection/override-mitigation-options-for-app-related-security-policies.md index 08382b7bd7..9ce8d9bfcc 100644 --- a/windows/security/threat-protection/override-mitigation-options-for-app-related-security-policies.md +++ b/windows/security/threat-protection/override-mitigation-options-for-app-related-security-policies.md @@ -1,5 +1,5 @@ --- -title: Override Process Mitigation Options (Windows 10) +title: Override Process Mitigation Options description: How to use Group Policy to override individual Process Mitigation Options settings and to help enforce specific app-related security policies. ms.prod: windows-client author: aczechowski diff --git a/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md b/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md index 3532aaf393..29afee340a 100644 --- a/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md +++ b/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md @@ -1,5 +1,5 @@ --- -title: Mitigate threats by using Windows 10 security features (Windows 10) +title: Mitigate threats by using Windows 10 security features description: An overview of software and firmware threats faced in the current security landscape, and the mitigations that Windows 10 offers in response to these threats. ms.prod: windows-client ms.localizationpriority: medium @@ -84,7 +84,7 @@ Windows Defender SmartScreen notifies users if they click on reported phishing a For Windows 10, Microsoft improved SmartScreen (now called Windows Defender SmartScreen) protection capability by integrating its app reputation abilities into the operating system itself, which allows Windows Defender SmartScreen to check the reputation of files downloaded from the Internet and warn users when they're about to run a high-risk downloaded file. The first time a user runs an app that originates from the Internet, Windows Defender SmartScreen checks the reputation of the application by using digital signatures and other factors against a service that Microsoft maintains. If the app lacks a reputation or is known to be malicious, Windows Defender SmartScreen warns the user or blocks execution entirely, depending on how the administrator has configured Microsoft Intune or Group Policy settings. -For more information, see [Microsoft Defender SmartScreen overview](microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md). +For more information, see [Microsoft Defender SmartScreen overview](/windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/). ### Microsoft Defender Antivirus @@ -124,7 +124,7 @@ Data Execution Prevention (DEP) does exactly that, by substantially reducing the 5. Click **OK**. -You can now see which processes have DEP enabled. +You can now see which processes have DEP enabled. @@ -296,7 +296,7 @@ Some of the protections available in Windows 10 are provided through functions t | Extension point disable to block the use of certain third-party extension points | [UpdateProcThreadAttribute function](/windows/win32/api/processthreadsapi/nf-processthreadsapi-updateprocthreadattribute)
                  \[PROCESS\_CREATION\_MITIGATION\_POLICY\_EXTENSION\_POINT\_DISABLE\_ALWAYS\_ON\] | | Heap terminate on corruption to protect the system against a corrupted heap | [UpdateProcThreadAttribute function](/windows/win32/api/processthreadsapi/nf-processthreadsapi-updateprocthreadattribute)
                  \[PROCESS\_CREATION\_MITIGATION\_POLICY\_HEAP\_TERMINATE\_ALWAYS\_ON\] | -## Understanding Windows 10 in relation to the Enhanced Mitigation Experience Toolkit +## Understanding Windows 10 in relation to the Enhanced Mitigation Experience Toolkit You might already be familiar with the [Enhanced Mitigation Experience Toolkit (EMET)](https://support.microsoft.com/topic/emet-mitigations-guidelines-b529d543-2a81-7b5a-d529-84b30e1ecee0), which has since 2009 offered various exploit mitigations, and an interface for configuring those mitigations. You can use this section to understand how EMET mitigations relate to those mitigations in Windows 10. Many of EMET's mitigations have been built into Windows 10, some with extra improvements. However, some EMET mitigations carry high-performance cost, or appear to be relatively ineffective against modern threats, and therefore haven't been brought into Windows 10. @@ -322,7 +322,7 @@ One of EMET's strengths is that it allows you to import and export configuration Install-Module -Name ProcessMitigations ``` -The Get-ProcessMitigation cmdlet gets the current mitigation settings from the registry or from a running process, or it can save all settings to an XML file. +The Get-ProcessMitigation cmdlet gets the current mitigation settings from the registry or from a running process, or it can save all settings to an XML file. To get the current settings on all running instances of notepad.exe: @@ -377,7 +377,7 @@ ConvertTo-ProcessMitigationPolicy -EMETFilePath -OutputFilePath Hardware requirements The following table details the hardware requirements for both virtualization-based security services and the health attestation feature. For more information, see [Minimum hardware requirements](/windows-hardware/design/minimum/minimum-hardware-requirements-overview). diff --git a/windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller.md b/windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller.md index 5ac230e0ed..dc6bf37ae5 100644 --- a/windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller.md +++ b/windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller.md @@ -1,5 +1,5 @@ --- -title: Access Credential Manager as a trusted caller (Windows 10) +title: Access Credential Manager as a trusted caller description: Describes best practices, security considerations, and more for the security policy setting, Access Credential Manager as a trusted caller. ms.assetid: a51820d2-ca5b-47dd-8e9b-d7008603db88 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md b/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md index 7f643514fc..b5ace4fc62 100644 --- a/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md +++ b/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md @@ -1,5 +1,5 @@ --- -title: Access this computer from the network - security policy setting (Windows 10) +title: Access this computer from the network - security policy setting description: Describes the best practices, location, values, policy management, and security considerations for the Access this computer from the network security policy setting. ms.assetid: f6767bc2-83d1-45f1-847c-54f5362db022 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/account-lockout-duration.md b/windows/security/threat-protection/security-policy-settings/account-lockout-duration.md index 713bd9297b..89634c3e27 100644 --- a/windows/security/threat-protection/security-policy-settings/account-lockout-duration.md +++ b/windows/security/threat-protection/security-policy-settings/account-lockout-duration.md @@ -1,5 +1,5 @@ --- -title: Account lockout duration (Windows 10) +title: Account lockout duration description: Describes the best practices, location, values, and security considerations for the Account lockout duration security policy setting. ms.assetid: a4167bf4-27c3-4a9b-8ef0-04e3c6ec3aa4 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/account-lockout-policy.md b/windows/security/threat-protection/security-policy-settings/account-lockout-policy.md index 03d4f6bba0..fe39bbcede 100644 --- a/windows/security/threat-protection/security-policy-settings/account-lockout-policy.md +++ b/windows/security/threat-protection/security-policy-settings/account-lockout-policy.md @@ -1,5 +1,5 @@ --- -title: Account Lockout Policy (Windows 10) +title: Account Lockout Policy description: Describes the Account Lockout Policy settings and links to information about each policy setting. ms.assetid: eb968c28-17c5-405f-b413-50728cb7b724 ms.reviewer: @@ -32,6 +32,8 @@ The following topics provide a discussion of each policy setting's implementatio >[!NOTE] >Account lockout settings for remote access clients can be configured separately by editing the Registry on the server that manages the remote access. For more information, see [How to configure remote access client account lockout](/troubleshoot/windows-server/networking/configure-remote-access-client-account-lockout). +[!INCLUDE [account-lockout-policy](../../../../includes/licensing/account-lockout-policy.md)] + ## In this section | Topic | Description | diff --git a/windows/security/threat-protection/security-policy-settings/account-lockout-threshold.md b/windows/security/threat-protection/security-policy-settings/account-lockout-threshold.md index 1aa90a6526..9681c928ff 100644 --- a/windows/security/threat-protection/security-policy-settings/account-lockout-threshold.md +++ b/windows/security/threat-protection/security-policy-settings/account-lockout-threshold.md @@ -1,5 +1,5 @@ --- -title: Account lockout threshold (Windows 10) +title: Account lockout threshold description: Describes the best practices, location, values, and security considerations for the Account lockout threshold security policy setting. ms.assetid: 4904bb40-a2bd-4fef-a102-260ba8d74e30 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/account-policies.md b/windows/security/threat-protection/security-policy-settings/account-policies.md index b3031beef7..a3fdbe5a3f 100644 --- a/windows/security/threat-protection/security-policy-settings/account-policies.md +++ b/windows/security/threat-protection/security-policy-settings/account-policies.md @@ -1,5 +1,5 @@ --- -title: Account Policies (Windows 10) +title: Account Policies description: An overview of account policies in Windows and provides links to policy descriptions. ms.assetid: 711b3797-b87a-4cd9-a2e3-1f8ef18688fb ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/accounts-administrator-account-status.md b/windows/security/threat-protection/security-policy-settings/accounts-administrator-account-status.md index e247a80951..23e43f6d45 100644 --- a/windows/security/threat-protection/security-policy-settings/accounts-administrator-account-status.md +++ b/windows/security/threat-protection/security-policy-settings/accounts-administrator-account-status.md @@ -1,5 +1,5 @@ --- -title: Accounts Administrator account status (Windows 10) +title: Accounts Administrator account status description: Describes the best practices, location, values, and security considerations for the Accounts Administrator account status security policy setting. ms.assetid: 71a3bd48-1014-49e0-a936-bfe9433af23e ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/accounts-block-microsoft-accounts.md b/windows/security/threat-protection/security-policy-settings/accounts-block-microsoft-accounts.md index 760392434f..b19acf6ade 100644 --- a/windows/security/threat-protection/security-policy-settings/accounts-block-microsoft-accounts.md +++ b/windows/security/threat-protection/security-policy-settings/accounts-block-microsoft-accounts.md @@ -1,5 +1,5 @@ --- -title: Accounts Block Microsoft accounts (Windows 10) +title: Accounts Block Microsoft accounts description: Describes the best practices, location, values, management, and security considerations for the Accounts Block Microsoft accounts security policy setting. ms.assetid: 94c76f45-057c-4d80-8d01-033cf28ef2f7 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/accounts-guest-account-status.md b/windows/security/threat-protection/security-policy-settings/accounts-guest-account-status.md index f23fc8dd7e..ca1a50819a 100644 --- a/windows/security/threat-protection/security-policy-settings/accounts-guest-account-status.md +++ b/windows/security/threat-protection/security-policy-settings/accounts-guest-account-status.md @@ -1,5 +1,5 @@ --- -title: Accounts Guest account status - security policy setting (Windows 10) +title: Accounts Guest account status - security policy setting description: Describes the best practices, location, values, and security considerations for the Accounts Guest account status security policy setting. ms.assetid: 07e53fc5-b495-4d02-ab42-5b245d10d0ce ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md b/windows/security/threat-protection/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md index 6b3f24d9e6..05b4e8f3ea 100644 --- a/windows/security/threat-protection/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md +++ b/windows/security/threat-protection/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md @@ -1,5 +1,5 @@ --- -title: Accounts Limit local account use of blank passwords (Windows 10) +title: Accounts Limit local account use of blank passwords description: Learn best practices, security considerations, and more for the policy setting, Accounts Limit local account use of blank passwords to console logon only. ms.assetid: a1bfb58b-1ae8-4de9-832b-aa889a6e64bd ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/accounts-rename-administrator-account.md b/windows/security/threat-protection/security-policy-settings/accounts-rename-administrator-account.md index bd8090dfe7..0e9b3c3257 100644 --- a/windows/security/threat-protection/security-policy-settings/accounts-rename-administrator-account.md +++ b/windows/security/threat-protection/security-policy-settings/accounts-rename-administrator-account.md @@ -1,5 +1,5 @@ --- -title: Accounts Rename administrator account (Windows 10) +title: Accounts Rename administrator account description: This security policy reference topic for the IT professional describes the best practices, location, values, and security considerations for this policy setting. ms.assetid: d21308eb-7c60-4e48-8747-62b8109844f9 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/accounts-rename-guest-account.md b/windows/security/threat-protection/security-policy-settings/accounts-rename-guest-account.md index 6bfcf412ae..da35071790 100644 --- a/windows/security/threat-protection/security-policy-settings/accounts-rename-guest-account.md +++ b/windows/security/threat-protection/security-policy-settings/accounts-rename-guest-account.md @@ -1,5 +1,5 @@ --- -title: Accounts Rename guest account - security policy setting (Windows 10) +title: Accounts Rename guest account - security policy setting description: Describes the best practices, location, values, and security considerations for the Accounts Rename guest account security policy setting. ms.assetid: 9b8052b4-bbb9-4cc1-bfee-ce25390db707 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system.md b/windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system.md index ed12776057..d8915c4e18 100644 --- a/windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system.md +++ b/windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system.md @@ -1,5 +1,5 @@ --- -title: Act as part of the operating system (Windows 10) +title: Act as part of the operating system description: Describes the best practices, location, values, policy management, and security considerations for the Act as part of the operating system security policy setting. ms.assetid: c1b7e084-a9f7-4377-b678-07cc913c8b0c ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process.md b/windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process.md index af89003808..5ec3171725 100644 --- a/windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process.md +++ b/windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process.md @@ -1,5 +1,5 @@ --- -title: Adjust memory quotas for a process (Windows 10) +title: Adjust memory quotas for a process description: Describes the best practices, location, values, policy management, and security considerations for the Adjust memory quotas for a process security policy setting. ms.assetid: 6754a2c8-6d07-4567-9af3-335fd8dd7626 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/administer-security-policy-settings.md b/windows/security/threat-protection/security-policy-settings/administer-security-policy-settings.md index 9994324c08..bca371957d 100644 --- a/windows/security/threat-protection/security-policy-settings/administer-security-policy-settings.md +++ b/windows/security/threat-protection/security-policy-settings/administer-security-policy-settings.md @@ -1,5 +1,5 @@ --- -title: Administer security policy settings (Windows 10) +title: Administer security policy settings description: This article discusses different methods to administer security policy settings on a local device or throughout a small- or medium-sized organization. ms.assetid: 7617d885-9d28-437a-9371-171197407599 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/allow-log-on-locally.md b/windows/security/threat-protection/security-policy-settings/allow-log-on-locally.md index 475bd01f46..fd5538b2a7 100644 --- a/windows/security/threat-protection/security-policy-settings/allow-log-on-locally.md +++ b/windows/security/threat-protection/security-policy-settings/allow-log-on-locally.md @@ -1,5 +1,5 @@ --- -title: Allow log on locally - security policy setting (Windows 10) +title: Allow log on locally - security policy setting description: Describes the best practices, location, values, policy management, and security considerations for the Allow log on locally security policy setting. ms.assetid: d9e5e1f3-3bff-4da7-a9a2-4bb3e0c79055 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services.md b/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services.md index fd5a84fe03..aa212b8064 100644 --- a/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services.md +++ b/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services.md @@ -1,5 +1,5 @@ --- -title: Allow log on through Remote Desktop Services (Windows 10) +title: Allow log on through Remote Desktop Services description: Best practices, location, values, policy management, and security considerations for the security policy setting. Allow a sign-in through Remote Desktop Services. ms.assetid: 6267c376-8199-4f2b-ae56-9c5424e76798 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/audit-audit-the-access-of-global-system-objects.md b/windows/security/threat-protection/security-policy-settings/audit-audit-the-access-of-global-system-objects.md index d5f0c9641a..5957adf4ab 100644 --- a/windows/security/threat-protection/security-policy-settings/audit-audit-the-access-of-global-system-objects.md +++ b/windows/security/threat-protection/security-policy-settings/audit-audit-the-access-of-global-system-objects.md @@ -1,5 +1,5 @@ --- -title: Audit the access of global system objects (Windows 10) +title: Audit the access of global system objects description: Describes the best practices, location, values, and security considerations for the audit of the access to global system objects security policy setting. ms.assetid: 20d40a79-ce89-45e6-9bb4-148f83958460 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override.md b/windows/security/threat-protection/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override.md index 42e645eb95..5caf39e495 100644 --- a/windows/security/threat-protection/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override.md +++ b/windows/security/threat-protection/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override.md @@ -1,5 +1,5 @@ --- -title: Audit Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings (Windows 10) +title: Audit Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings description: Learn more about the security policy setting, Audit Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings. ms.assetid: 8ddc06bc-b6d6-4bac-9051-e0d77035bd4e ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/audit-policy.md b/windows/security/threat-protection/security-policy-settings/audit-policy.md index 5130a2112d..a542276f2e 100644 --- a/windows/security/threat-protection/security-policy-settings/audit-policy.md +++ b/windows/security/threat-protection/security-policy-settings/audit-policy.md @@ -1,5 +1,5 @@ --- -title: Audit Policy (Windows 10) +title: Audit Policy description: Provides information about basic audit policies that are available in Windows and links to information about each setting. ms.assetid: 2e8ea400-e555-43e5-89d6-0898cb89da90 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits.md b/windows/security/threat-protection/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits.md index 614fbe0d12..61bd4aecfc 100644 --- a/windows/security/threat-protection/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits.md +++ b/windows/security/threat-protection/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits.md @@ -1,5 +1,5 @@ --- -title: Audit Shut down system immediately if unable to log security audits (Windows 10) +title: Audit Shut down system immediately if unable to log security audits description: Best practices, security considerations, and more for the security policy setting, Audit Shut down system immediately if unable to log security audits. ms.assetid: 2cd23cd9-0e44-4d0b-a1f1-39fc29303826 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/back-up-files-and-directories.md b/windows/security/threat-protection/security-policy-settings/back-up-files-and-directories.md index 99590d638b..40d4bdfda2 100644 --- a/windows/security/threat-protection/security-policy-settings/back-up-files-and-directories.md +++ b/windows/security/threat-protection/security-policy-settings/back-up-files-and-directories.md @@ -1,5 +1,5 @@ --- -title: Back up files and directories - security policy setting (Windows 10) +title: Back up files and directories - security policy setting description: Describes the recommended practices, location, values, policy management, and security considerations for the Back up files and directories security policy setting. ms.assetid: 1cd6bdd5-1501-41f4-98b9-acf29ac173ae ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/bypass-traverse-checking.md b/windows/security/threat-protection/security-policy-settings/bypass-traverse-checking.md index f401dbbe3c..6f06c8e9a2 100644 --- a/windows/security/threat-protection/security-policy-settings/bypass-traverse-checking.md +++ b/windows/security/threat-protection/security-policy-settings/bypass-traverse-checking.md @@ -1,5 +1,5 @@ --- -title: Bypass traverse checking (Windows 10) +title: Bypass traverse checking description: Describes the best practices, location, values, policy management, and security considerations for the Bypass traverse checking security policy setting. ms.assetid: 1c828655-68d3-4140-aa0f-caa903a7087e ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/change-the-system-time.md b/windows/security/threat-protection/security-policy-settings/change-the-system-time.md index 02cbb94d06..e09a09a6bb 100644 --- a/windows/security/threat-protection/security-policy-settings/change-the-system-time.md +++ b/windows/security/threat-protection/security-policy-settings/change-the-system-time.md @@ -1,5 +1,5 @@ --- -title: Change the system time - security policy setting (Windows 10) +title: Change the system time - security policy setting description: Describes the best practices, location, values, policy management, and security considerations for the Change the system time security policy setting. ms.assetid: f2f6637d-acbc-4352-8ca3-ec563f918e65 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/change-the-time-zone.md b/windows/security/threat-protection/security-policy-settings/change-the-time-zone.md index d8dfd97662..dffd58d25b 100644 --- a/windows/security/threat-protection/security-policy-settings/change-the-time-zone.md +++ b/windows/security/threat-protection/security-policy-settings/change-the-time-zone.md @@ -1,5 +1,5 @@ --- -title: Change the time zone - security policy setting (Windows 10) +title: Change the time zone - security policy setting description: Describes the best practices, location, values, policy management, and security considerations for the Change the time zone security policy setting. ms.assetid: 3b1afae4-68bb-472f-a43e-49e300d73e50 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/create-a-pagefile.md b/windows/security/threat-protection/security-policy-settings/create-a-pagefile.md index a5438297fd..0a179de698 100644 --- a/windows/security/threat-protection/security-policy-settings/create-a-pagefile.md +++ b/windows/security/threat-protection/security-policy-settings/create-a-pagefile.md @@ -1,5 +1,5 @@ --- -title: Create a pagefile - security policy setting (Windows 10) +title: Create a pagefile - security policy setting description: Describes the best practices, location, values, policy management, and security considerations for the Create a pagefile security policy setting. ms.assetid: dc087897-459d-414b-abe0-cd86c8dccdea ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/create-a-token-object.md b/windows/security/threat-protection/security-policy-settings/create-a-token-object.md index 727912a7ca..90c8d547a4 100644 --- a/windows/security/threat-protection/security-policy-settings/create-a-token-object.md +++ b/windows/security/threat-protection/security-policy-settings/create-a-token-object.md @@ -1,5 +1,5 @@ --- -title: Create a token object (Windows 10) +title: Create a token object description: Describes the best practices, location, values, policy management, and security considerations for the Create a token object security policy setting. ms.assetid: bfbf52fc-6ba4-442a-9df7-bd277e55729c ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/create-global-objects.md b/windows/security/threat-protection/security-policy-settings/create-global-objects.md index f6be4d3ed7..748588c0e1 100644 --- a/windows/security/threat-protection/security-policy-settings/create-global-objects.md +++ b/windows/security/threat-protection/security-policy-settings/create-global-objects.md @@ -1,5 +1,5 @@ --- -title: Create global objects (Windows 10) +title: Create global objects description: Describes the best practices, location, values, policy management, and security considerations for the Create global objects security policy setting. ms.assetid: 9cb6247b-44fc-4815-86f2-cb59b6f0221e ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects.md b/windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects.md index 38fb6346f9..29994f1b96 100644 --- a/windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects.md +++ b/windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects.md @@ -1,5 +1,5 @@ --- -title: Create permanent shared objects (Windows 10) +title: Create permanent shared objects description: Describes the best practices, location, values, policy management, and security considerations for the Create permanent shared objects security policy setting. ms.assetid: 6a58438d-65ca-4c4a-a584-450eed976649 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/create-symbolic-links.md b/windows/security/threat-protection/security-policy-settings/create-symbolic-links.md index cc0957e9e8..e728e58567 100644 --- a/windows/security/threat-protection/security-policy-settings/create-symbolic-links.md +++ b/windows/security/threat-protection/security-policy-settings/create-symbolic-links.md @@ -1,5 +1,5 @@ --- -title: Create symbolic links (Windows 10) +title: Create symbolic links description: Describes the best practices, location, values, policy management, and security considerations for the Create symbolic links security policy setting. ms.assetid: 882922b9-0ff8-4ee9-8afc-4475515ee3fd ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md b/windows/security/threat-protection/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md index b2b90cdc1f..63272a0b01 100644 --- a/windows/security/threat-protection/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md +++ b/windows/security/threat-protection/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md @@ -1,5 +1,5 @@ --- -title: DCOM Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax (Windows 10) +title: DCOM Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax description: Learn about best practices and more for the syntax policy setting, DCOM Machine Access Restrictions in Security Descriptor Definition Language (SDDL). ms.assetid: 0fe3521a-5252-44df-8a47-8d92cf936e7c ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md b/windows/security/threat-protection/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md index e549425217..81cfb68761 100644 --- a/windows/security/threat-protection/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md +++ b/windows/security/threat-protection/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md @@ -1,5 +1,5 @@ --- -title: DCOM Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax (Windows 10) +title: DCOM Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax description: Best practices and more for the security policy setting, DCOM Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax. ms.assetid: 4b95d45f-dd62-4c34-ba32-43954528dabe ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/debug-programs.md b/windows/security/threat-protection/security-policy-settings/debug-programs.md index 7b72217ab7..d5058a6e3f 100644 --- a/windows/security/threat-protection/security-policy-settings/debug-programs.md +++ b/windows/security/threat-protection/security-policy-settings/debug-programs.md @@ -1,5 +1,5 @@ --- -title: Debug programs (Windows 10) +title: Debug programs description: Describes the best practices, location, values, policy management, and security considerations for the Debug programs security policy setting. ms.assetid: 594d9f2c-8ffc-444b-9522-75615ec87786 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network.md b/windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network.md index 9dc9bb9d38..b069fd1da1 100644 --- a/windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network.md +++ b/windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network.md @@ -1,5 +1,5 @@ --- -title: Deny access to this computer from the network (Windows 10) +title: Deny access to this computer from the network description: Best practices, location, values, policy management, and security considerations for the Deny access to this computer from the network security policy setting. ms.assetid: 935e9f89-951b-4163-b186-fc325682bb0b ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job.md b/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job.md index d832f6a8ba..42bdc8d2a2 100644 --- a/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job.md +++ b/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job.md @@ -1,5 +1,5 @@ --- -title: Deny log on as a batch job (Windows 10) +title: Deny log on as a batch job description: Describes the best practices, location, values, policy management, and security considerations for the Deny log on as a batch job security policy setting. ms.assetid: 0ac36ebd-5e28-4b6a-9b4e-8924c6ecf44b ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service.md b/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service.md index 22b448bed6..8e61df03d2 100644 --- a/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service.md +++ b/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service.md @@ -1,5 +1,5 @@ --- -title: Deny log on as a service (Windows 10) +title: Deny log on as a service description: Describes the best practices, location, values, policy management, and security considerations for the Deny log on as a service security policy setting. ms.assetid: f1114964-df86-4278-9b11-e35c66949794 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/deny-log-on-locally.md b/windows/security/threat-protection/security-policy-settings/deny-log-on-locally.md index 1ef7bc4a08..8cc1881127 100644 --- a/windows/security/threat-protection/security-policy-settings/deny-log-on-locally.md +++ b/windows/security/threat-protection/security-policy-settings/deny-log-on-locally.md @@ -1,5 +1,5 @@ --- -title: Deny log on locally (Windows 10) +title: Deny log on locally description: Describes the best practices, location, values, policy management, and security considerations for the Deny log on locally security policy setting. ms.assetid: 00150e88-ec9c-43e1-a70d-33bfe10434db ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services.md b/windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services.md index 2bc5898d13..6a3f748155 100644 --- a/windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services.md +++ b/windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services.md @@ -1,5 +1,5 @@ --- -title: Deny log on through Remote Desktop Services (Windows 10) +title: Deny log on through Remote Desktop Services description: Best practices, location, values, policy management, and security considerations for the security policy setting, Deny log on through Remote Desktop Services. ms.assetid: 84bbb807-287c-4acc-a094-cf0ffdcbca67 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/devices-allow-undock-without-having-to-log-on.md b/windows/security/threat-protection/security-policy-settings/devices-allow-undock-without-having-to-log-on.md index 42bcd1198e..c0ec06ad12 100644 --- a/windows/security/threat-protection/security-policy-settings/devices-allow-undock-without-having-to-log-on.md +++ b/windows/security/threat-protection/security-policy-settings/devices-allow-undock-without-having-to-log-on.md @@ -1,5 +1,5 @@ --- -title: Devices Allow undock without having to log on (Windows 10) +title: Devices Allow undock without having to log on description: Describes the best practices, location, values, and security considerations for the Devices Allow undock without having to sign in security policy setting. ms.assetid: 1d403f5d-ad41-4bb4-9f4a-0779c1c14b8c ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/devices-allowed-to-format-and-eject-removable-media.md b/windows/security/threat-protection/security-policy-settings/devices-allowed-to-format-and-eject-removable-media.md index f27b736149..c27928a04e 100644 --- a/windows/security/threat-protection/security-policy-settings/devices-allowed-to-format-and-eject-removable-media.md +++ b/windows/security/threat-protection/security-policy-settings/devices-allowed-to-format-and-eject-removable-media.md @@ -1,5 +1,5 @@ --- -title: Devices Allowed to format and eject removable media (Windows 10) +title: Devices Allowed to format and eject removable media description: Describes the best practices, location, values, and security considerations for the Devices Allowed to format and eject removable media security policy setting. ms.assetid: d1b42425-7244-4ab1-9d46-d68de823459c ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/devices-prevent-users-from-installing-printer-drivers.md b/windows/security/threat-protection/security-policy-settings/devices-prevent-users-from-installing-printer-drivers.md index 48ec7ee37d..40487ac65b 100644 --- a/windows/security/threat-protection/security-policy-settings/devices-prevent-users-from-installing-printer-drivers.md +++ b/windows/security/threat-protection/security-policy-settings/devices-prevent-users-from-installing-printer-drivers.md @@ -1,5 +1,5 @@ --- -title: Devices Prevent users from installing printer drivers (Windows 10) +title: Devices Prevent users from installing printer drivers description: Describes the best practices, location, values, and security considerations for the Devices Prevent users from installing printer drivers security policy setting. ms.assetid: ab70a122-f7f9-47e0-ad8c-541f30a27ec3 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md b/windows/security/threat-protection/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md index 606f90388d..2f3acd5122 100644 --- a/windows/security/threat-protection/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md +++ b/windows/security/threat-protection/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md @@ -1,5 +1,5 @@ --- -title: Restrict CD-ROM access to locally logged-on user (Windows 10) +title: Restrict CD-ROM access to locally logged-on user description: Describes the best practices, location, values, and security considerations for the Devices Restrict CD-ROM access to locally logged-on user only security policy setting. ms.assetid: 8b8f44bb-84ce-4f18-af30-ab89910e234d ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only.md b/windows/security/threat-protection/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only.md index f678d28b4a..511ccc907f 100644 --- a/windows/security/threat-protection/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only.md +++ b/windows/security/threat-protection/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only.md @@ -1,5 +1,5 @@ --- -title: Devices Restrict floppy access to locally logged-on user only (Windows 10) +title: Devices Restrict floppy access to locally logged-on user only description: Describes the best practices, location, values, and security considerations for the Devices Restrict floppy access to locally logged-on user only security policy setting. ms.assetid: 92997910-da95-4c03-ae6f-832915423898 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md b/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md index 497ae0dcf3..d918369b03 100644 --- a/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md +++ b/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md @@ -1,5 +1,5 @@ --- -title: Domain member Digitally encrypt or sign secure channel data (always) (Windows 10) +title: Domain member Digitally encrypt or sign secure channel data (always) description: Best practices, location, values, and security considerations for the policy setting, Domain member Digitally encrypt or sign secure channel data (always). ms.assetid: 4480c7cb-adca-4f29-b4b8-06eb68d272bf ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible.md b/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible.md index ee6200237d..c277be4b30 100644 --- a/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible.md +++ b/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible.md @@ -1,5 +1,5 @@ --- -title: Domain member Digitally encrypt secure channel data (when possible) (Windows 10) +title: Domain member Digitally encrypt secure channel data (when possible) description: Best practices, security considerations, and more for the security policy setting, Domain member Digitally encrypt secure channel data (when possible). ms.assetid: 73e6023e-0af3-4531-8238-82f0f0e4965b ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible.md b/windows/security/threat-protection/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible.md index fa4519f654..302edcac50 100644 --- a/windows/security/threat-protection/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible.md +++ b/windows/security/threat-protection/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible.md @@ -1,5 +1,5 @@ --- -title: Domain member Digitally sign secure channel data (when possible) (Windows 10) +title: Domain member Digitally sign secure channel data (when possible) description: Best practices, location, values, and security considerations for the security policy setting, Domain member Digitally sign secure channel data (when possible). ms.assetid: a643e491-4f45-40ea-b12c-4dbe47e54f34 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/domain-member-disable-machine-account-password-changes.md b/windows/security/threat-protection/security-policy-settings/domain-member-disable-machine-account-password-changes.md index 29cc577b0b..72e15d7783 100644 --- a/windows/security/threat-protection/security-policy-settings/domain-member-disable-machine-account-password-changes.md +++ b/windows/security/threat-protection/security-policy-settings/domain-member-disable-machine-account-password-changes.md @@ -1,5 +1,5 @@ --- -title: Domain member Disable machine account password changes (Windows 10) +title: Domain member Disable machine account password changes description: Describes the best practices, location, values, and security considerations for the Domain member Disable machine account password changes security policy setting. ms.assetid: 1f660300-a07a-4243-a09f-140aa1ab8867 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/domain-member-maximum-machine-account-password-age.md b/windows/security/threat-protection/security-policy-settings/domain-member-maximum-machine-account-password-age.md index ac46532629..aacfa76378 100644 --- a/windows/security/threat-protection/security-policy-settings/domain-member-maximum-machine-account-password-age.md +++ b/windows/security/threat-protection/security-policy-settings/domain-member-maximum-machine-account-password-age.md @@ -1,5 +1,5 @@ --- -title: Domain member Maximum machine account password age (Windows 10) +title: Domain member Maximum machine account password age description: Describes the best practices, location, values, and security considerations for the Domain member Maximum machine account password age security policy setting. ms.assetid: 0ec6f7c1-4d82-4339-94c0-debb2d1ac109 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key.md b/windows/security/threat-protection/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key.md index ba84a03cc1..d5c4b65fcc 100644 --- a/windows/security/threat-protection/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key.md +++ b/windows/security/threat-protection/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key.md @@ -1,5 +1,5 @@ --- -title: Domain member Require strong (Windows 2000 or later) session key (Windows 10) +title: Domain member Require strong (Windows 2000 or later) session key description: Best practices, location, values, and security considerations for the security policy setting, Domain member Require strong (Windows 2000 or later) session key. ms.assetid: 5ab8993c-5086-4f09-bc88-1b27454526bd ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md b/windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md index 6c8e9a5f36..ec6ef4ec58 100644 --- a/windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md +++ b/windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md @@ -1,5 +1,5 @@ --- -title: Trust computer and user accounts for delegation (Windows 10) +title: Trust computer and user accounts for delegation description: Learn about best practices, security considerations and more for the security policy setting, Enable computer and user accounts to be trusted for delegation. ms.assetid: 524062d4-1595-41f3-8ce1-9c85fd21497b ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/enforce-password-history.md b/windows/security/threat-protection/security-policy-settings/enforce-password-history.md index 5c1bb1ef3b..69915eba98 100644 --- a/windows/security/threat-protection/security-policy-settings/enforce-password-history.md +++ b/windows/security/threat-protection/security-policy-settings/enforce-password-history.md @@ -1,5 +1,5 @@ --- -title: Enforce password history (Windows 10) +title: Enforce password history description: Describes the best practices, location, values, policy management, and security considerations for the Enforce password history security policy setting. ms.assetid: 8b2ab871-3e52-4dd1-9776-68bb1e935442 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/enforce-user-logon-restrictions.md b/windows/security/threat-protection/security-policy-settings/enforce-user-logon-restrictions.md index 0b360cffa1..a119f6c131 100644 --- a/windows/security/threat-protection/security-policy-settings/enforce-user-logon-restrictions.md +++ b/windows/security/threat-protection/security-policy-settings/enforce-user-logon-restrictions.md @@ -1,5 +1,5 @@ --- -title: Enforce user logon restrictions (Windows 10) +title: Enforce user logon restrictions description: Describes the best practices, location, values, policy management, and security considerations for the Enforce user logon restrictions security policy setting. ms.assetid: 5891cb73-f1ec-48b9-b703-39249e48a29f ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system.md b/windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system.md index 8b13dfac68..bb10d2ce82 100644 --- a/windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system.md +++ b/windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system.md @@ -1,5 +1,5 @@ --- -title: Force shutdown from a remote system (Windows 10) +title: Force shutdown from a remote system description: Describes the best practices, location, values, policy management, and security considerations for the Force shutdown from a remote system security policy setting. ms.assetid: 63129243-31ea-42a4-a598-c7064f48a3df ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/generate-security-audits.md b/windows/security/threat-protection/security-policy-settings/generate-security-audits.md index ed57ea1a97..5b8810a11e 100644 --- a/windows/security/threat-protection/security-policy-settings/generate-security-audits.md +++ b/windows/security/threat-protection/security-policy-settings/generate-security-audits.md @@ -1,5 +1,5 @@ --- -title: Generate security audits (Windows 10) +title: Generate security audits description: Describes the best practices, location, values, policy management, and security considerations for the Generate security audits security policy setting. ms.assetid: c0e1cd80-840e-4c74-917c-5c2349de885f ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/how-to-configure-security-policy-settings.md b/windows/security/threat-protection/security-policy-settings/how-to-configure-security-policy-settings.md index f28c135001..8d0ace0072 100644 --- a/windows/security/threat-protection/security-policy-settings/how-to-configure-security-policy-settings.md +++ b/windows/security/threat-protection/security-policy-settings/how-to-configure-security-policy-settings.md @@ -1,5 +1,5 @@ --- -title: Configure security policy settings (Windows 10) +title: Configure security policy settings description: Describes steps to configure a security policy setting on the local device, on a domain-joined device, and on a domain controller. ms.assetid: 63b0967b-a9fe-4d92-90af-67469ee20320 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md b/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md index e2a1861c80..698d38e82a 100644 --- a/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md +++ b/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md @@ -1,5 +1,5 @@ --- -title: Impersonate a client after authentication (Windows 10) +title: Impersonate a client after authentication description: Describes the best practices, location, values, policy management, and security considerations for the Impersonate a client after authentication security policy setting. ms.assetid: 4cd241e2-c680-4b43-8ed0-3b391925cec5 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/increase-a-process-working-set.md b/windows/security/threat-protection/security-policy-settings/increase-a-process-working-set.md index 0f79c38991..0d6a6d694f 100644 --- a/windows/security/threat-protection/security-policy-settings/increase-a-process-working-set.md +++ b/windows/security/threat-protection/security-policy-settings/increase-a-process-working-set.md @@ -1,5 +1,5 @@ --- -title: Increase a process working set (Windows 10) +title: Increase a process working set description: Describes the best practices, location, values, policy management, and security considerations for the Increase a process working set security policy setting. ms.assetid: b742ad96-37f3-4686-b8f7-f2b48367105b ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md b/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md index 5446601279..1bcfcdb42e 100644 --- a/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md +++ b/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md @@ -1,5 +1,5 @@ --- -title: Increase scheduling priority (Windows 10) +title: Increase scheduling priority description: Describes the best practices, location, values, policy management, and security considerations for the Increase scheduling priority security policy setting. ms.assetid: fbec5973-d35e-4797-9626-d0d56061527f ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked.md index d76c4110fc..a1ee602ed9 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked.md @@ -1,5 +1,5 @@ --- -title: Interactive logon Display user information when the session is locked (Windows 10) +title: Interactive logon Display user information when the session is locked description: Best practices, security considerations, and more for the security policy setting, Interactive logon Display user information when the session is locked. ms.assetid: 9146aa3d-9b2f-47ba-ac03-ff43efb10530 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-display-last-user-name.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-display-last-user-name.md index 6cddf9952d..aba7cdc252 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-display-last-user-name.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-display-last-user-name.md @@ -1,5 +1,5 @@ --- -title: Interactive logon Don't display last signed-in (Windows 10) +title: Interactive logon Don't display last signed-in description: Describes the best practices, location, values, and security considerations for the Interactive logon Don't display last user name security policy setting. ms.prod: windows-client ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del.md index f33b15222c..e4c4d49b0a 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del.md @@ -1,5 +1,5 @@ --- -title: Interactive logon Do not require CTRL+ALT+DEL (Windows 10) +title: Interactive logon Do not require CTRL+ALT+DEL description: Describes the best practices, location, values, and security considerations for the Interactive logon Do not require CTRL+ALT+DEL security policy setting. ms.assetid: 04e2c000-2eb2-4d4b-8179-1e2cb4793e18 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-dont-display-username-at-sign-in.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-dont-display-username-at-sign-in.md index e283a1f14d..29c230e657 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-dont-display-username-at-sign-in.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-dont-display-username-at-sign-in.md @@ -1,5 +1,5 @@ --- -title: Interactive logon Don't display username at sign-in (Windows 10) +title: Interactive logon Don't display username at sign-in description: Describes the best practices, location, values, and security considerations for the Interactive logon Don't display username at sign-in security policy setting. ms.assetid: 98b24b03-95fe-4edc-8e97-cbdaa8e314fd ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-account-lockout-threshold.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-account-lockout-threshold.md index c08ad29828..bc3ee80c44 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-account-lockout-threshold.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-account-lockout-threshold.md @@ -1,5 +1,5 @@ --- -title: Interactive logon Machine account lockout threshold (Windows 10) +title: Interactive logon Machine account lockout threshold description: Best practices, location, values, management, and security considerations for the security policy setting, Interactive logon Machine account lockout threshold. ms.assetid: ebbd8e22-2611-4ebe-9db9-d49344e631e4 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-inactivity-limit.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-inactivity-limit.md index 41c09e6eb4..40c0bcb254 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-inactivity-limit.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-inactivity-limit.md @@ -1,5 +1,5 @@ --- -title: Interactive logon Machine inactivity limit (Windows 10) +title: Interactive logon Machine inactivity limit description: Describes the best practices, location, values, management, and security considerations for the Interactive logon Machine inactivity limit security policy setting. ms.assetid: 7065b4a9-0d52-41d5-afc4-5aedfc4162b5 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on.md index 0b5af8fa19..7f6a3535a6 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on.md @@ -1,5 +1,5 @@ --- -title: Interactive Logon Message text (Windows 10) +title: Interactive Logon Message text description: Learn about best practices, security considerations and more for the security policy setting, Interactive logon Message text for users attempting to log on. ms.assetid: fcfe8a6d-ca65-4403-b9e6-2fa017a31c2e ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on.md index c20c76d1c8..fc861f5e80 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on.md @@ -1,5 +1,5 @@ --- -title: Interactive logon Message title for users attempting to log on (Windows 10) +title: Interactive logon Message title for users attempting to log on description: Best practices, security considerations, and more for the security policy setting, Interactive logon Message title for users attempting to log on. ms.assetid: f2596470-4cc0-4ef1-849c-bef9dc3533c6 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md index 92341b9213..4b962010b1 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md @@ -1,5 +1,5 @@ --- -title: Interactive logon Number of previous logons to cache (in case domain controller is not available) (Windows 10) +title: Interactive logon Number of previous logons to cache (in case domain controller is not available) description: Best practices and more for the security policy setting, Interactive logon Number of previous logons to cache (in case domain controller is not available). ms.assetid: 660e925e-cc3e-4098-a41e-eb8db8062d8d ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration.md index 5508696327..b63d35d0b2 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration.md @@ -1,5 +1,5 @@ --- -title: Interactive log-on prompt user to change password before expiration (Windows 10) +title: Interactive log-on prompt user to change password before expiration description: Best practices and security considerations for an interactive log-on prompt for users to change passwords before expiration. ms.assetid: 8fe94781-40f7-4fbe-8cfd-5e116e6833e9 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md index dea0b48963..c418e7adeb 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md @@ -1,5 +1,5 @@ --- -title: Interactive logon Require Domain Controller authentication to unlock workstation (Windows 10) +title: Interactive logon Require Domain Controller authentication to unlock workstation description: Best practices security considerations, and more for the policy setting, Interactive logon Require Domain Controller authentication to unlock workstation. ms.assetid: 97618ed3-e946-47db-a212-b5e7a4fc6ffc ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-smart-card-removal-behavior.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-smart-card-removal-behavior.md index 804de2d6cb..55213f035f 100644 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-smart-card-removal-behavior.md +++ b/windows/security/threat-protection/security-policy-settings/interactive-logon-smart-card-removal-behavior.md @@ -1,5 +1,5 @@ --- -title: Interactive logon Smart card removal behavior (Windows 10) +title: Interactive logon Smart card removal behavior description: Best practices, location, values, policy management, and security considerations for the security policy setting, Interactive logon Smart card removal behavior. ms.assetid: 61487820-9d49-4979-b15d-c7e735999460 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/kerberos-policy.md b/windows/security/threat-protection/security-policy-settings/kerberos-policy.md index c6fc22a8de..b63e17c8c2 100644 --- a/windows/security/threat-protection/security-policy-settings/kerberos-policy.md +++ b/windows/security/threat-protection/security-policy-settings/kerberos-policy.md @@ -1,5 +1,5 @@ --- -title: Kerberos Policy (Windows 10) +title: Kerberos Policy description: Describes the Kerberos Policy settings and provides links to policy setting descriptions. ms.assetid: 94017dd9-b1a3-4624-af9f-b29161b4bf38 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers.md b/windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers.md index f0f4e5f932..1e9c0d4b8b 100644 --- a/windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers.md +++ b/windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers.md @@ -1,5 +1,5 @@ --- -title: Load and unload device drivers (Windows 10) +title: Load and unload device drivers description: Describes the best practices, location, values, policy management, and security considerations for the Load and unload device drivers security policy setting. ms.assetid: 66262532-c610-470c-9792-35ff4389430f ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/lock-pages-in-memory.md b/windows/security/threat-protection/security-policy-settings/lock-pages-in-memory.md index 5f6ed628f4..c591706f9c 100644 --- a/windows/security/threat-protection/security-policy-settings/lock-pages-in-memory.md +++ b/windows/security/threat-protection/security-policy-settings/lock-pages-in-memory.md @@ -1,5 +1,5 @@ --- -title: Lock pages in memory (Windows 10) +title: Lock pages in memory description: Describes the best practices, location, values, policy management, and security considerations for the Lock pages in memory security policy setting. ms.assetid: cc724979-aec0-496d-be4e-7009aef660a3 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job.md b/windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job.md index 5eb5a6a0b4..cecd34e77c 100644 --- a/windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job.md +++ b/windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job.md @@ -1,5 +1,5 @@ --- -title: Log on as a batch job (Windows 10) +title: Log on as a batch job description: Describes the best practices, location, values, policy management, and security considerations for the Log on as a batch job security policy setting. ms.assetid: 4eaddb51-0a18-470e-9d3d-5e7cd7970b41 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/log-on-as-a-service.md b/windows/security/threat-protection/security-policy-settings/log-on-as-a-service.md index 667a0885f7..d1f486957c 100644 --- a/windows/security/threat-protection/security-policy-settings/log-on-as-a-service.md +++ b/windows/security/threat-protection/security-policy-settings/log-on-as-a-service.md @@ -1,5 +1,5 @@ --- -title: Log on as a service (Windows 10) +title: Log on as a service description: Describes the best practices, location, values, policy management, and security considerations for the Log on as a service security policy setting. ms.assetid: acc9a9e0-fd88-4cda-ab54-503120ba1f42 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log.md b/windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log.md index 0b62095cd7..a2be818c7d 100644 --- a/windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log.md +++ b/windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log.md @@ -1,5 +1,5 @@ --- -title: Manage auditing and security log (Windows 10) +title: Manage auditing and security log description: Describes the best practices, location, values, policy management, and security considerations for the Manage auditing and security log security policy setting. ms.assetid: 4b946c0d-f904-43db-b2d5-7f0917575347 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-service-ticket.md b/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-service-ticket.md index e60f5b8019..bdc180ccf0 100644 --- a/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-service-ticket.md +++ b/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-service-ticket.md @@ -1,5 +1,5 @@ --- -title: Maximum lifetime for service ticket (Windows 10) +title: Maximum lifetime for service ticket description: Describes the best practices, location, values, policy management, and security considerations for the Maximum lifetime for service ticket security policy setting. ms.assetid: 484bf05a-3858-47fc-bc02-6599ca860247 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket-renewal.md b/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket-renewal.md index d048ad2d5b..43935998f5 100644 --- a/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket-renewal.md +++ b/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket-renewal.md @@ -1,5 +1,5 @@ --- -title: Maximum lifetime for user ticket renewal (Windows 10) +title: Maximum lifetime for user ticket renewal description: Describes the best practices, location, values, policy management, and security considerations for the Maximum lifetime for user ticket renewal security policy setting. ms.assetid: f88cd819-3dd1-4e38-b560-13fe6881b609 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket.md b/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket.md index 7117941bbe..1d6f14a767 100644 --- a/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket.md +++ b/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket.md @@ -1,5 +1,5 @@ --- -title: Maximum lifetime for user ticket (Windows 10) +title: Maximum lifetime for user ticket description: Describes the best practices, location, values, policy management, and security considerations for the Maximum lifetime for user ticket policy setting. ms.assetid: bcb4ff59-334d-4c2f-99af-eca2b64011dc ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/maximum-password-age.md b/windows/security/threat-protection/security-policy-settings/maximum-password-age.md index 7c99d562b8..87337b86b8 100644 --- a/windows/security/threat-protection/security-policy-settings/maximum-password-age.md +++ b/windows/security/threat-protection/security-policy-settings/maximum-password-age.md @@ -1,5 +1,5 @@ --- -title: Maximum password age (Windows 10) +title: Maximum password age description: Describes the best practices, location, values, policy management, and security considerations for the Maximum password age security policy setting. ms.assetid: 2d6e70e7-c8b0-44fb-8113-870c6120871d ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization.md b/windows/security/threat-protection/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization.md index e6976b9407..5b2ae28406 100644 --- a/windows/security/threat-protection/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization.md +++ b/windows/security/threat-protection/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization.md @@ -1,5 +1,5 @@ --- -title: Maximum tolerance for computer clock synchronization (Windows 10) +title: Maximum tolerance for computer clock synchronization description: Best practices, location, values, policy management, and security considerations for the policy setting, Maximum tolerance for computer clock synchronization. ms.assetid: ba2cf59e-d69d-469e-95e3-8e6a0ba643af ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md index 131ca7ef0e..343e8a2eb7 100644 --- a/windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md +++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md @@ -1,5 +1,5 @@ --- -title: Microsoft network client Send unencrypted password (Windows 10) +title: Microsoft network client Send unencrypted password description: Learn about best practices and more for the security policy setting, Microsoft network client Send unencrypted password to third-party SMB servers. ms.assetid: 97a76b93-afa7-4dd9-bb52-7c9e289b6017 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md index 9b4f9c1021..72d11c51b4 100644 --- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md +++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md @@ -1,5 +1,5 @@ --- -title: Microsoft network server Amount of idle time required before suspending session (Windows 10) +title: Microsoft network server Amount of idle time required before suspending session description: Best practices, security considerations, and more for the policy setting, Microsoft network server Amount of idle time required before suspending session. ms.assetid: 8227842a-569d-480f-b43c-43450bbaa722 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md index 18eb849aa7..f8096dec04 100644 --- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md +++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md @@ -1,5 +1,5 @@ --- -title: Microsoft network server Attempt S4U2Self (Windows 10) +title: Microsoft network server Attempt S4U2Self description: Learn about the security policy setting, Microsoft network server Attempt S4U2Self to obtain claim information. ms.assetid: e4508387-35ed-4a3f-a47c-27f8396adbba ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md index 02f163e1c5..c560912610 100644 --- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md +++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md @@ -1,5 +1,5 @@ --- -title: Microsoft network server Disconnect clients when sign-in hours expire (Windows 10) +title: Microsoft network server Disconnect clients when sign-in hours expire description: Best practices, location, values, and security considerations for the policy setting, Microsoft network server Disconnect clients when sign-in hours expire. ms.assetid: 48b5c424-9ba8-416d-be7d-ccaabb3f49af ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md index 21c41369f9..b0119771b5 100644 --- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md +++ b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md @@ -1,5 +1,5 @@ --- -title: Microsoft network server Server SPN target name validation level (Windows 10) +title: Microsoft network server Server SPN target name validation level description: Best practices, security considerations, and more for the security policy setting, Microsoft network server Server SPN target name validation level. ms.assetid: 18337f78-eb45-42fd-bdbd-f8cd02c3e154 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/minimum-password-age.md b/windows/security/threat-protection/security-policy-settings/minimum-password-age.md index f9b90574fd..c193b4ef7d 100644 --- a/windows/security/threat-protection/security-policy-settings/minimum-password-age.md +++ b/windows/security/threat-protection/security-policy-settings/minimum-password-age.md @@ -1,5 +1,5 @@ --- -title: Minimum password age (Windows 10) +title: Minimum password age description: Describes the best practices, location, values, policy management, and security considerations for the Minimum password age security policy setting. ms.assetid: 91915cb2-1b3f-4fb7-afa0-d03df95e8161 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/minimum-password-length.md b/windows/security/threat-protection/security-policy-settings/minimum-password-length.md index b74a12c22c..4ef50144bc 100644 --- a/windows/security/threat-protection/security-policy-settings/minimum-password-length.md +++ b/windows/security/threat-protection/security-policy-settings/minimum-password-length.md @@ -1,5 +1,5 @@ --- -title: Minimum password length (Windows 10) +title: Minimum password length description: Describes the best practices, location, values, policy management, and security considerations for the Minimum password length security policy setting. ms.assetid: 3d22eb9a-859a-4b6f-82f5-c270c427e17e ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/modify-an-object-label.md b/windows/security/threat-protection/security-policy-settings/modify-an-object-label.md index f3d460e68c..0fe460d50d 100644 --- a/windows/security/threat-protection/security-policy-settings/modify-an-object-label.md +++ b/windows/security/threat-protection/security-policy-settings/modify-an-object-label.md @@ -1,5 +1,5 @@ --- -title: Modify an object label (Windows 10) +title: Modify an object label description: Describes the best practices, location, values, policy management, and security considerations for the Modify an object label security policy setting. ms.assetid: 3e5a97dd-d363-43a8-ae80-452e866ebfd5 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values.md b/windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values.md index ae4fa3457e..faff714347 100644 --- a/windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values.md +++ b/windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values.md @@ -1,5 +1,5 @@ --- -title: Modify firmware environment values (Windows 10) +title: Modify firmware environment values description: Describes the best practices, location, values, policy management, and security considerations for the Modify firmware environment values security policy setting. ms.assetid: 80bad5c4-d9eb-4e3a-a5dc-dcb742b83fca ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation.md b/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation.md index af493fdd5f..164da34ecf 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation.md @@ -1,5 +1,5 @@ --- -title: Network access Allow anonymous SID/Name translation (Windows 10) +title: Network access Allow anonymous SID/Name translation description: Best practices, location, values, policy management and security considerations for the policy setting, Network access Allow anonymous SID/Name translation. ms.assetid: 0144477f-22a6-4d06-b70a-9c9c2196e99e ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md index 547733a694..caccbb931a 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md @@ -1,5 +1,5 @@ --- -title: Network access Do not allow anonymous enumeration (Windows 10) +title: Network access Do not allow anonymous enumeration description: Learn about best practices and more for the security policy setting, Network access Do not allow anonymous enumeration of SAM accounts and shares. ms.assetid: 3686788d-4cc7-4222-9163-cbc7c3362d73 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md index 5b7e0c66e6..83888d29df 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md @@ -1,5 +1,5 @@ --- -title: Network access Do not allow anonymous enumeration of SAM accounts (Windows 10) +title: Network access Do not allow anonymous enumeration of SAM accounts description: Describes the best practices, location, values, and security considerations for the Network access Do not allow anonymous enumeration of SAM accounts security policy setting. ms.assetid: 6ee25b33-ad43-4097-b031-7be680f64c7c ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md index a8ded6ea27..a9b7f2583f 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md @@ -1,5 +1,5 @@ --- -title: Network access Do not allow storage of passwords and credentials for network authentication (Windows 10) +title: Network access Do not allow storage of passwords and credentials for network authentication description: Learn about best practices and more for the security policy setting, Network access Do not allow storage of passwords and credentials for network authentication ms.assetid: b9b64360-36ea-40fa-b795-2d6558c46563 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md b/windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md index 3ae0bff29a..618f7ffbc0 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md @@ -1,5 +1,5 @@ --- -title: Let Everyone permissions apply to anonymous users (Windows 10) +title: Let Everyone permissions apply to anonymous users description: Learn about best practices, security considerations and more for the security policy setting, Network access Let Everyone permissions apply to anonymous users. ms.assetid: cdbc5159-9173-497e-b46b-7325f4256353 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md b/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md index e570e96543..7a1acb165d 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md @@ -1,5 +1,5 @@ --- -title: Network access Named Pipes that can be accessed anonymously (Windows 10) +title: Network access Named Pipes that can be accessed anonymously description: Describes best practices, security considerations and more for the security policy setting, Network access Named Pipes that can be accessed anonymously. ms.assetid: 8897d2a4-813e-4d2b-8518-fcee71e1cf2c ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md b/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md index 6bebdb7c99..9c968a3f5c 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md @@ -1,5 +1,5 @@ --- -title: Network access Remotely accessible registry paths and subpaths (Windows 10) +title: Network access Remotely accessible registry paths and subpaths description: Describes best practices, location, values, and security considerations for the policy setting, Network access Remotely accessible registry paths and subpaths. ms.assetid: 3fcbbf70-a002-4f85-8e86-8dabad21928e ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths.md b/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths.md index 1ca60361c7..dd86f8a026 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths.md @@ -1,5 +1,5 @@ --- -title: Network access Remotely accessible registry paths (Windows 10) +title: Network access Remotely accessible registry paths description: Best practices, location, values, policy management and security considerations for the policy setting, Network access Remotely accessible registry paths. ms.assetid: 977f86ea-864f-4f1b-9756-22220efce0bd ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md b/windows/security/threat-protection/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md index 92f62c7e6b..30cbc5b78f 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md @@ -1,5 +1,5 @@ --- -title: Network access Restrict anonymous access to Named Pipes and Shares (Windows 10) +title: Network access Restrict anonymous access to Named Pipes and Shares description: Best practices, security considerations, and more for the security policy setting, Network access Restrict anonymous access to Named Pipes and Shares. ms.assetid: e66cd708-7322-4d49-9b57-1bf8ec7a4c10 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md b/windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md index b9d02af2c4..dc0a2dda77 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md @@ -1,5 +1,5 @@ --- -title: Network access Shares that can be accessed anonymously (Windows 10) +title: Network access Shares that can be accessed anonymously description: Learn about best practices, security considerations, and more for the security policy setting, Network access Shares that can be accessed anonymously. ms.assetid: f3e4b919-8279-4972-b415-5f815e2f0a1a ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md b/windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md index 01d1e937b2..c11be07eab 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md @@ -1,5 +1,5 @@ --- -title: Network access Sharing and security model for local accounts (Windows 10) +title: Network access Sharing and security model for local accounts description: Best practices, security considerations, and more for the security policy setting, Network access Sharing and security model for local accounts. ms.assetid: 0b3d703c-ea27-488f-8f59-b345af75b994 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/network-list-manager-policies.md b/windows/security/threat-protection/security-policy-settings/network-list-manager-policies.md index 6b67b4947f..a946a20ae9 100644 --- a/windows/security/threat-protection/security-policy-settings/network-list-manager-policies.md +++ b/windows/security/threat-protection/security-policy-settings/network-list-manager-policies.md @@ -1,5 +1,5 @@ --- -title: Network List Manager policies (Windows 10) +title: Network List Manager policies description: Network List Manager policies are security settings that configure different aspects of how networks are listed and displayed on one device or on many devices. ms.assetid: bd8109d4-b07c-4beb-a9a6-affae2ba2fda ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md b/windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md index 2bd7b413bb..fd87daba06 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md @@ -1,5 +1,5 @@ --- -title: Network security Allow LocalSystem NULL session fallback (Windows 10) +title: Network security Allow LocalSystem NULL session fallback description: Describes the best practices, location, values, and security considerations for the Network security Allow LocalSystem NULL session fallback security policy setting. ms.assetid: 5b72edaa-bec7-4572-b6f0-648fc38f5395 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md b/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md index c317d27ae4..ce5adb5c59 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md @@ -1,5 +1,5 @@ --- -title: Network security Allow PKU2U authentication requests to this computer to use online identities (Windows 10) +title: Network security Allow PKU2U authentication requests to this computer to use online identities description: Best practices for the Network Security Allow PKU2U authentication requests to this computer to use online identities security setting. ms.assetid: e04a854e-d94d-4306-9fb3-56e9bd7bb926 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md b/windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md index 2f5d913958..7402fd0df1 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md @@ -1,5 +1,5 @@ --- -title: Network security Do not store LAN Manager hash value on next password change (Windows 10) +title: Network security Do not store LAN Manager hash value on next password change description: Best practices, security considerations, and more for the security policy setting, Network security Do not store LAN Manager hash value on next password change. ms.assetid: 6452b268-e5ba-4889-9d38-db28f919af51 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md b/windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md index 1999afcfbb..99826613ed 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md @@ -1,5 +1,5 @@ --- -title: Network security Force logoff when logon hours expire (Windows 10) +title: Network security Force logoff when logon hours expire description: Best practices, location, values, policy management, and security considerations for the policy setting, Network security Force logoff when logon hours expire. ms.assetid: 64d5dde4-58e4-4217-b2c4-73bd554ec926 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level.md b/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level.md index 23edb11516..c6847770d4 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level.md @@ -1,5 +1,5 @@ --- -title: Network security LAN Manager authentication level (Windows 10) +title: Network security LAN Manager authentication level description: Best practices, location, values, policy management and security considerations for the policy setting, Network security LAN Manager authentication level. ms.assetid: bbe1a98c-420a-41e7-9d3c-3a2fe0f1843e ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements.md b/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements.md index 3fb085d04d..3232a699e0 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements.md @@ -1,5 +1,5 @@ --- -title: Network security LDAP client signing requirements (Windows 10) +title: Network security LDAP client signing requirements description: Best practices, location, values, policy management and security considerations for the policy setting, Network security LDAP client signing requirements. ms.assetid: 38b35489-eb5b-4035-bc87-df63de50509c ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md b/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md index aa708a1c42..cd6838a4f8 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md @@ -1,5 +1,5 @@ --- -title: Network security Minimum session security for NTLM SSP based (including secure RPC) clients (Windows 10) +title: Network security Minimum session security for NTLM SSP based (including secure RPC) clients description: Best practices and more for the security policy setting, Network security Minimum session security for NTLM SSP based (including secure RPC) clients. ms.assetid: 89903de8-23d0-4e0f-9bef-c00cb7aebf00 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md b/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md index c53712c5e9..701259d037 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md @@ -1,5 +1,5 @@ --- -title: Network security Minimum session security for NTLM SSP based (including secure RPC) servers (Windows 10) +title: Network security Minimum session security for NTLM SSP based (including secure RPC) servers description: Best practices and security considerations for the policy setting, Network security Minimum session security for NTLM SSP based (including secure RPC) servers. ms.assetid: c6a60c1b-bc8d-4d02-9481-f847a411b4fc ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md index c42e1f65c5..754a7cbc0e 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md @@ -1,5 +1,5 @@ --- -title: Network security Restrict NTLM Add remote server exceptions for NTLM authentication (Windows 10) +title: Network security Restrict NTLM Add remote server exceptions for NTLM authentication description: Best practices, security considerations, and more for the policy setting, Network security Restrict NTLM Add remote server exceptions for NTLM authentication. ms.assetid: 9b017399-0a54-4580-bfae-614c2beda3a1 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md index 86b0883198..c0ebdc1ba5 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md @@ -1,5 +1,5 @@ --- -title: Network security Restrict NTLM Add server exceptions in this domain (Windows 10) +title: Network security Restrict NTLM Add server exceptions in this domain description: Best practices, security considerations, and more for the security policy setting, Network security Restrict NTLM Add server exceptions in this domain. ms.assetid: 2f981b68-6aa7-4dd9-b53d-d88551277cc0 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md index 8d99ff27a8..d5104ea5b7 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md @@ -1,5 +1,5 @@ --- -title: Network security Restrict NTLM Audit incoming NTLM traffic (Windows 10) +title: Network security Restrict NTLM Audit incoming NTLM traffic description: Best practices, security considerations and more for the security policy setting, Network Security Restrict NTLM Audit incoming NTLM traffic. ms.assetid: 37e380c2-22e1-44cd-9993-e12815b845cf ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md index 968acbe1da..3a547350da 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md @@ -1,5 +1,5 @@ --- -title: Network security Restrict NTLM Incoming NTLM traffic (Windows 10) +title: Network security Restrict NTLM Incoming NTLM traffic description: Best practices, security considerations, and more for the security policy setting, Network Security Restrict NTLM Incoming NTLM traffic. ms.assetid: c0eff7d3-ed59-4004-908a-2205295fefb8 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md index 375f27c55c..5aedc2eb5b 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md @@ -1,5 +1,5 @@ --- -title: Network security Restrict NTLM Outgoing traffic (Windows 10) +title: Network security Restrict NTLM Outgoing traffic description: Learn about best practices, security considerations and more for the policy setting, Network Security Restrict NTLM Outgoing NTLM traffic to remote servers. ms.assetid: 63437a90-764b-4f06-aed8-a4a26cf81bd1 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/password-must-meet-complexity-requirements.md b/windows/security/threat-protection/security-policy-settings/password-must-meet-complexity-requirements.md index b84eb1eaf9..a8b2882f5b 100644 --- a/windows/security/threat-protection/security-policy-settings/password-must-meet-complexity-requirements.md +++ b/windows/security/threat-protection/security-policy-settings/password-must-meet-complexity-requirements.md @@ -1,5 +1,5 @@ --- -title: Password must meet complexity requirements (Windows 10) +title: Password must meet complexity requirements description: Describes the best practices, location, values, and security considerations for the Password must meet complexity requirements security policy setting. ms.assetid: 94482ae3-9dda-42df-9782-2f66196e6afe ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/password-policy.md b/windows/security/threat-protection/security-policy-settings/password-policy.md index e28f4796b7..70396092e7 100644 --- a/windows/security/threat-protection/security-policy-settings/password-policy.md +++ b/windows/security/threat-protection/security-policy-settings/password-policy.md @@ -1,5 +1,5 @@ --- -title: Password Policy (Windows 10) +title: Password Policy description: An overview of password policies for Windows and links to information for each policy setting. ms.assetid: aec1220d-a875-4575-9050-f02f9c54a3b6 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks.md b/windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks.md index 60aa01ecc1..e74ff5c974 100644 --- a/windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks.md +++ b/windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks.md @@ -1,5 +1,5 @@ --- -title: Perform volume maintenance tasks (Windows 10) +title: Perform volume maintenance tasks description: Describes the best practices, location, values, policy management, and security considerations for the Perform volume maintenance tasks security policy setting. ms.assetid: b6990813-3898-43e2-8221-c9c06d893244 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/profile-single-process.md b/windows/security/threat-protection/security-policy-settings/profile-single-process.md index d0654f81aa..f77e48438c 100644 --- a/windows/security/threat-protection/security-policy-settings/profile-single-process.md +++ b/windows/security/threat-protection/security-policy-settings/profile-single-process.md @@ -1,5 +1,5 @@ --- -title: Profile single process (Windows 10) +title: Profile single process description: Describes the best practices, location, values, policy management, and security considerations for the Profile single process security policy setting. ms.assetid: c0963de4-4f5e-430e-bfcd-dfd68e66a075 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/profile-system-performance.md b/windows/security/threat-protection/security-policy-settings/profile-system-performance.md index 53ea9e3b07..9c7b9de8c4 100644 --- a/windows/security/threat-protection/security-policy-settings/profile-system-performance.md +++ b/windows/security/threat-protection/security-policy-settings/profile-system-performance.md @@ -1,5 +1,5 @@ --- -title: Profile system performance (Windows 10) +title: Profile system performance description: Best practices, location, values, policy management, and security considerations for the security policy setting, Profile system performance. ms.assetid: ffabc3c5-9206-4105-94ea-84f597a54b2e ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md b/windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md index c6dba7f1f4..34e5e2b851 100644 --- a/windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md +++ b/windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md @@ -1,5 +1,5 @@ --- -title: Recovery console Allow automatic administrative logon (Windows 10) +title: Recovery console Allow automatic administrative logon description: Best practices, location, values, policy management, and security considerations for the policy setting, Recovery console Allow automatic administrative logon. ms.assetid: be2498fc-48f4-43f3-ad09-74664e45e596 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md b/windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md index e530ce19b8..fdb56ca78e 100644 --- a/windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md +++ b/windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md @@ -1,5 +1,5 @@ --- -title: Recovery console Allow floppy copy and access to all drives and folders (Windows 10) +title: Recovery console Allow floppy copy and access to all drives and folders description: Best practices, security considerations, and more for the policy setting, Recovery console Allow floppy copy and access to all drives and folders. ms.assetid: a5b4ac0c-f33d-42b5-a866-72afa7cbd0bd ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station.md b/windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station.md index 0f15781757..c0f395231c 100644 --- a/windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station.md +++ b/windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station.md @@ -1,5 +1,5 @@ --- -title: Remove computer from docking station - security policy setting (Windows 10) +title: Remove computer from docking station - security policy setting description: Describes the best practices, location, values, policy management, and security considerations for the Remove computer from docking station security policy setting. ms.assetid: 229a385a-a862-4973-899a-413b1b5b6c30 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/replace-a-process-level-token.md b/windows/security/threat-protection/security-policy-settings/replace-a-process-level-token.md index af5c5cc7df..5079dab92d 100644 --- a/windows/security/threat-protection/security-policy-settings/replace-a-process-level-token.md +++ b/windows/security/threat-protection/security-policy-settings/replace-a-process-level-token.md @@ -1,5 +1,5 @@ --- -title: Replace a process level token (Windows 10) +title: Replace a process level token description: Describes the best practices, location, values, policy management, and security considerations for the Replace a process level token security policy setting. ms.assetid: 5add02db-6339-489e-ba21-ccc3ccbe8745 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/reset-account-lockout-counter-after.md b/windows/security/threat-protection/security-policy-settings/reset-account-lockout-counter-after.md index 275d4a0bd8..d4cd3aca74 100644 --- a/windows/security/threat-protection/security-policy-settings/reset-account-lockout-counter-after.md +++ b/windows/security/threat-protection/security-policy-settings/reset-account-lockout-counter-after.md @@ -1,5 +1,5 @@ --- -title: Reset account lockout counter after (Windows 10) +title: Reset account lockout counter after description: Describes the best practices, location, values, and security considerations for the Reset account lockout counter after security policy setting. ms.assetid: d5ccf6dd-5ba7-44a9-8e0b-c478d8b1442c ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/restore-files-and-directories.md b/windows/security/threat-protection/security-policy-settings/restore-files-and-directories.md index a80d0249a1..ca2b72c717 100644 --- a/windows/security/threat-protection/security-policy-settings/restore-files-and-directories.md +++ b/windows/security/threat-protection/security-policy-settings/restore-files-and-directories.md @@ -1,5 +1,5 @@ --- -title: Restore files and directories - security policy setting (Windows 10) +title: Restore files and directories - security policy setting description: Describes the best practices, location, values, policy management, and security considerations for the Restore files and directories security policy setting. ms.assetid: c673c0fa-6f49-4edd-8c1f-c5e8513f701d ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/secpol-advanced-security-audit-policy-settings.md b/windows/security/threat-protection/security-policy-settings/secpol-advanced-security-audit-policy-settings.md index 15e8e865fb..7efca79530 100644 --- a/windows/security/threat-protection/security-policy-settings/secpol-advanced-security-audit-policy-settings.md +++ b/windows/security/threat-protection/security-policy-settings/secpol-advanced-security-audit-policy-settings.md @@ -1,5 +1,5 @@ --- -title: Advanced security audit policy settings in brief (Windows 10) +title: Advanced security audit policy settings in brief description: Provides information about the advanced security audit policy settings that are available in Windows and the audit events that they generate. ms.assetid: 6BF9A642-DBC3-4101-94A3-B2316C553CE3 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/security-policy-settings-reference.md b/windows/security/threat-protection/security-policy-settings/security-policy-settings-reference.md index 5aecd1228b..259ebfec01 100644 --- a/windows/security/threat-protection/security-policy-settings/security-policy-settings-reference.md +++ b/windows/security/threat-protection/security-policy-settings/security-policy-settings-reference.md @@ -1,5 +1,5 @@ --- -title: Security policy settings reference (Windows 10) +title: Security policy settings reference description: This reference of security settings provides information about how to implement and manage security policies, including setting options and security considerations. ms.assetid: ef5a4579-15a8-4507-9a43-b7ccddcb0ed1 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/security-policy-settings.md b/windows/security/threat-protection/security-policy-settings/security-policy-settings.md index e5a2bba1d9..397c3a1138 100644 --- a/windows/security/threat-protection/security-policy-settings/security-policy-settings.md +++ b/windows/security/threat-protection/security-policy-settings/security-policy-settings.md @@ -1,5 +1,5 @@ --- -title: Security policy settings (Windows 10) +title: Security policy settings description: This reference topic describes the common scenarios, architecture, and processes for security settings. ms.assetid: e7ac5204-7f6c-4708-a9f6-6af712ca43b9 ms.reviewer: @@ -71,6 +71,8 @@ The Security Settings extension of the Local Group Policy Editor includes the fo - **IP Security Policies on Local Computer.** Specify settings to ensure private, secure communications over IP networks by using cryptographic security services. IPsec establishes trust and security from a source IP address to a destination IP address. - **Advanced Audit Policy Configuration.** Specify settings that control the logging of security events into the security log on the device. The settings under Advanced Audit Policy Configuration provide finer control over which activities to monitor as opposed to the Audit Policy settings under Local Policies. +[!INCLUDE [windows-security-policy-settings-and-auditing](../../../../includes/licensing/windows-security-policy-settings-and-auditing.md)] + ## Policy-based security settings management The Security Settings extension to Group Policy provides an integrated policy-based management infrastructure to help you manage and enforce your security policies. diff --git a/windows/security/threat-protection/security-policy-settings/shut-down-the-system.md b/windows/security/threat-protection/security-policy-settings/shut-down-the-system.md index e238e91c99..f6a3fe8228 100644 --- a/windows/security/threat-protection/security-policy-settings/shut-down-the-system.md +++ b/windows/security/threat-protection/security-policy-settings/shut-down-the-system.md @@ -1,5 +1,5 @@ --- -title: Shut down the system - security policy setting (Windows 10) +title: Shut down the system - security policy setting description: Describes the best practices, location, values, policy management, and security considerations for the Shut down the system security policy setting. ms.assetid: c8e8f890-153a-401e-a957-ba6a130304bf ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md b/windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md index e0fa746d50..a21dde7fda 100644 --- a/windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md +++ b/windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md @@ -1,5 +1,5 @@ --- -title: Shutdown Allow system to be shut down without having to log on (Windows 10) +title: Shutdown Allow system to be shut down without having to log on description: Best practices, security considerations, and more for the security policy setting Shutdown Allow system to be shut down without having to log on. ms.assetid: f3964767-5377-4416-8eb3-e14d553a7315 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md b/windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md index 24a66f59c2..7c6df9fb82 100644 --- a/windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md +++ b/windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md @@ -1,5 +1,5 @@ --- -title: Shutdown Clear virtual memory pagefile (Windows 10) +title: Shutdown Clear virtual memory pagefile description: Describes the best practices, location, values, policy management and security considerations for the Shutdown Clear virtual memory pagefile security policy setting. ms.assetid: 31400078-6c56-4891-a6df-6dfb403c4bc9 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/store-passwords-using-reversible-encryption.md b/windows/security/threat-protection/security-policy-settings/store-passwords-using-reversible-encryption.md index 93c6889650..adb43f0fea 100644 --- a/windows/security/threat-protection/security-policy-settings/store-passwords-using-reversible-encryption.md +++ b/windows/security/threat-protection/security-policy-settings/store-passwords-using-reversible-encryption.md @@ -1,5 +1,5 @@ --- -title: Store passwords using reversible encryption (Windows 10) +title: Store passwords using reversible encryption description: Describes the best practices, location, values, and security considerations for the Store passwords using reversible encryption security policy setting. ms.assetid: 57f958c2-f1e9-48bf-871b-0a9b3299e238 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data.md b/windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data.md index bfd1681088..3949729b08 100644 --- a/windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data.md +++ b/windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data.md @@ -1,5 +1,5 @@ --- -title: Synchronize directory service data (Windows 10) +title: Synchronize directory service data description: Describes the best practices, location, values, policy management, and security considerations for the Synchronize directory service data security policy setting. ms.assetid: 97b0aaa4-674f-40f4-8974-b4bfb12c232c ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md b/windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md index 8c12b88790..ce8f451033 100644 --- a/windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md +++ b/windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md @@ -1,5 +1,5 @@ --- -title: System cryptography Force strong key protection for user keys stored on the computer (Windows 10) +title: System cryptography Force strong key protection for user keys stored on the computer description: Best practices, security considerations, and more for the policy setting, System cryptography Force strong key protection for user keys stored on the computer. ms.assetid: 8cbff267-881e-4bf6-920d-b583a5ff7de0 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md b/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md index 205e5f9c9a..69fa47377e 100644 --- a/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md +++ b/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md @@ -1,5 +1,5 @@ --- -title: System cryptography Use FIPS compliant algorithms for encryption, hashing, and signing (Windows 10) +title: System cryptography Use FIPS compliant algorithms for encryption, hashing, and signing description: Best practices, security considerations, and more for the policy setting System cryptography Use FIPS compliant algorithms for encryption, hashing, and signing ms.assetid: 83988865-dc0f-45eb-90d1-ee33495eb045 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md b/windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md index e40e3772a0..ae93fe4482 100644 --- a/windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md +++ b/windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md @@ -1,5 +1,5 @@ --- -title: System objects Require case insensitivity for non-Windows subsystems (Windows 10) +title: System objects Require case insensitivity for non-Windows subsystems description: Best practices, security considerations and more for the security policy setting, System objects Require case insensitivity for non-Windows subsystems. ms.assetid: 340d6769-8f33-4067-8470-1458978d1522 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md b/windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md index 3f5107710b..74bf9dee10 100644 --- a/windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md +++ b/windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md @@ -1,5 +1,5 @@ --- -title: System objects Strengthen default permissions of internal system objects (for example, Symbolic Links) (Windows 10) +title: System objects Strengthen default permissions of internal system objects (for example, Symbolic Links) description: Best practices and more for the security policy setting, System objects Strengthen default permissions of internal system objects (for example, Symbolic Links). ms.assetid: 3a592097-9cf5-4fd0-a504-7cbfab050bb6 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems.md b/windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems.md index 1634b509b2..af54bf48ab 100644 --- a/windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems.md +++ b/windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems.md @@ -1,5 +1,5 @@ --- -title: System settings Optional subsystems (Windows 10) +title: System settings Optional subsystems description: Describes the best practices, location, values, policy management, and security considerations for the System settings Optional subsystems security policy setting. ms.assetid: 5cb6519a-4f84-4b45-8072-e2aa8a72fb78 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md b/windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md index cce46ae1bc..81fce5ee99 100644 --- a/windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md +++ b/windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md @@ -1,5 +1,5 @@ --- -title: System settings Use certificate rules on Windows executables for Software Restriction Policies (Windows 10) +title: System settings Use certificate rules on Windows executables for Software Restriction Policies description: Best practices and more for the security policy setting, System settings Use certificate rules on Windows executables for Software Restriction Policies. ms.assetid: 2380d93b-b553-4e56-a0c0-d1ef740d089c ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects.md b/windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects.md index 4010dae1ca..179d04747b 100644 --- a/windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects.md +++ b/windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects.md @@ -1,5 +1,5 @@ --- -title: Take ownership of files or other objects (Windows 10) +title: Take ownership of files or other objects description: Describes the best practices, location, values, policy management, and security considerations for the Take ownership of files or other objects security policy setting. ms.assetid: cb8595d1-74cc-4176-bb15-d97663eebb2d ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md b/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md index 21d8236c79..d4b0a95f6a 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md @@ -1,5 +1,5 @@ --- -title: User Account Control Admin Approval Mode for the Built-in Administrator account (Windows 10) +title: User Account Control Admin Approval Mode for the Built-in Administrator account description: Best practices, security considerations, and more for the policy setting, User Account Control Admin Approval Mode for the Built-in Administrator account. ms.assetid: d465fc27-1cd2-498b-9cf6-7ad2276e5998 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md b/windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md index f5fc92749b..4d0f0eac5b 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md @@ -1,5 +1,5 @@ --- -title: User Account Control Allow UIAccess applications to prompt for elevation without using the secure desktop (Windows 10) +title: User Account Control Allow UIAccess applications to prompt for elevation without using the secure desktop description: Best practices and more for the policy setting, User Account Control Allow UIAccess applications to prompt for elevation without using the secure desktop. ms.assetid: fce20472-3c93-449d-b520-13c4c74a9892 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md b/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md index ce19aa2735..b5175062ac 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md @@ -1,5 +1,5 @@ --- -title: User Account Control Behavior of the elevation prompt for administrators in Admin Approval Mode (Windows 10) +title: User Account Control Behavior of the elevation prompt for administrators in Admin Approval Mode description: Best practices and more for the security policy setting, User Account Control Behavior of the elevation prompt for administrators in Admin Approval Mode. ms.assetid: 46a3c3a2-1d2e-4a6f-b5e6-29f9592f535d ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md b/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md index 57b797bc2c..b18e302adf 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md @@ -1,5 +1,5 @@ --- -title: User Account Control Detect application installations and prompt for elevation (Windows 10) +title: User Account Control Detect application installations and prompt for elevation description: Learn about best practices and more for the security policy setting, User Account Control Detect application installations and prompt for elevation. ms.assetid: 3f8cb170-ba77-4c9f-abb3-c3ed1ef264fc ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md b/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md index 674025df05..e7e8643f8e 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md @@ -1,5 +1,5 @@ --- -title: User Account Control Only elevate executables that are signed and validated (Windows 10) +title: User Account Control Only elevate executables that are signed and validated description: Best practices, security considerations, and more for the security policy setting, User Account Control Only elevate executables that are signed and validated. ms.assetid: 64950a95-6985-4db6-9905-1db18557352d ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md b/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md index 8814018506..564d86f514 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md @@ -1,5 +1,5 @@ --- -title: Only elevate UIAccess app installed in secure location (Windows 10) +title: Only elevate UIAccess app installed in secure location description: Learn about best practices and more for the policy setting, User Account Control Only elevate UIAccess applications that are installed in secure locations. ms.assetid: 4333409e-a5be-4f2f-8808-618f53abd22c ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md b/windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md index a206b627a3..d79b6fa29c 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md @@ -1,5 +1,5 @@ --- -title: UAC Run all administrators in Admin Approval Mode (Windows 10) +title: UAC Run all administrators in Admin Approval Mode description: Learn about best practices, security considerations and more for the security policy setting, User Account Control Run all administrators in Admin Approval Mode. ms.assetid: b838c561-7bfc-41ef-a7a5-55857259c7bf ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md b/windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md index c0fb6ba1cc..90d853997d 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md @@ -1,5 +1,5 @@ --- -title: User Account Control Switch to the secure desktop when prompting for elevation (Windows 10) +title: User Account Control Switch to the secure desktop when prompting for elevation description: Best practices, security considerations, and more for the policy setting, User Account Control Switch to the secure desktop when prompting for elevation. ms.assetid: 77a067db-c70d-4b02-9861-027503311b8b ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md b/windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md index 678f1180d6..e7bf8758a8 100644 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md +++ b/windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md @@ -1,5 +1,5 @@ --- -title: User Account Control Virtualize file and registry write failures to per-user locations (Windows 10) +title: User Account Control Virtualize file and registry write failures to per-user locations description: Best practices, security considerations and more for the policy setting, User Account Control Virtualize file and registry write failures to per-user locations. ms.assetid: a7b47420-cc41-4b1c-b03e-f67a05221261 ms.reviewer: diff --git a/windows/security/threat-protection/security-policy-settings/user-rights-assignment.md b/windows/security/threat-protection/security-policy-settings/user-rights-assignment.md index 7e7e14c8c0..17f39e5b1f 100644 --- a/windows/security/threat-protection/security-policy-settings/user-rights-assignment.md +++ b/windows/security/threat-protection/security-policy-settings/user-rights-assignment.md @@ -1,5 +1,5 @@ --- -title: User Rights Assignment (Windows 10) +title: User Rights Assignment description: Provides an overview and links to information about the User Rights Assignment security policy settings user rights that are available in Windows. ms.assetid: 99340252-60be-4c79-b0a5-56fbe1a9b0c5 ms.reviewer: diff --git a/windows/security/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection.md b/windows/security/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection.md index 1675344520..d6fe96c0ba 100644 --- a/windows/security/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection.md +++ b/windows/security/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection.md @@ -1,5 +1,5 @@ --- -title: Use Windows Event Forwarding to help with intrusion detection (Windows 10) +title: Use Windows Event Forwarding to help with intrusion detection description: Learn about an approach to collect events from devices in your organization. This article talks about events in both normal operations and when an intrusion is suspected. ms.prod: windows-client author: aczechowski diff --git a/windows/security/threat-protection/windows-defender-application-control/AppIdTagging/windows-defender-application-control-appid-tagging-guide.md b/windows/security/threat-protection/windows-defender-application-control/AppIdTagging/windows-defender-application-control-appid-tagging-guide.md index ffde0b7c8e..a509bcee48 100644 --- a/windows/security/threat-protection/windows-defender-application-control/AppIdTagging/windows-defender-application-control-appid-tagging-guide.md +++ b/windows/security/threat-protection/windows-defender-application-control/AppIdTagging/windows-defender-application-control-appid-tagging-guide.md @@ -1,5 +1,5 @@ --- -title: Designing, creating, managing and troubleshooting Windows Defender Application Control AppId Tagging policies (Windows) +title: Designing, creating, managing and troubleshooting Windows Defender Application Control AppId Tagging policies description: How to design, create, manage and troubleshoot your WDAC AppId Tagging policies keywords: security, malware, firewall ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb diff --git a/windows/security/threat-protection/windows-defender-application-control/allow-com-object-registration-in-windows-defender-application-control-policy.md b/windows/security/threat-protection/windows-defender-application-control/allow-com-object-registration-in-windows-defender-application-control-policy.md index 02d40db723..abfdd65aed 100644 --- a/windows/security/threat-protection/windows-defender-application-control/allow-com-object-registration-in-windows-defender-application-control-policy.md +++ b/windows/security/threat-protection/windows-defender-application-control/allow-com-object-registration-in-windows-defender-application-control-policy.md @@ -1,5 +1,5 @@ --- -title: Allow COM object registration in a WDAC policy (Windows) +title: Allow COM object registration in a WDAC policy description: You can allow COM object registration in a Windows Defender Application Control policy. keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set.md b/windows/security/threat-protection/windows-defender-application-control/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set.md index c41d4b9e24..0400b53abf 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/add-rules-for-packaged-apps-to-existing-applocker-rule-set.md @@ -1,5 +1,5 @@ --- -title: Add rules for packaged apps to existing AppLocker rule-set (Windows) +title: Add rules for packaged apps to existing AppLocker rule-set description: This topic for IT professionals describes how to update your existing AppLocker policies for packaged apps using the Remote Server Administration Toolkit (RSAT). ms.assetid: 758c2a9f-c2a3-418c-83bc-fd335a94097f ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/administer-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/administer-applocker.md index 0b93872957..3746acc1c8 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/administer-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/administer-applocker.md @@ -1,5 +1,5 @@ --- -title: Administer AppLocker (Windows) +title: Administer AppLocker description: This topic for IT professionals provides links to specific procedures to use when administering AppLocker policies. ms.assetid: 511a3b6a-175f-4d6d-a6e0-c1780c02e818 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-architecture-and-components.md b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-architecture-and-components.md index 4ffbf7a507..fee5823096 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-architecture-and-components.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-architecture-and-components.md @@ -1,5 +1,5 @@ --- -title: AppLocker architecture and components (Windows) +title: AppLocker architecture and components description: This topic for IT professional describes AppLocker’s basic architecture and its major components. ms.assetid: efdd8494-553c-443f-bd5f-c8976535135a ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-functions.md b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-functions.md index ab19a6f3c0..dccdeafe16 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-functions.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-functions.md @@ -1,5 +1,5 @@ --- -title: AppLocker functions (Windows) +title: AppLocker functions description: This article for the IT professional lists the functions and security levels for the Software Restriction Policies (SRP) and AppLocker features. ms.assetid: bf704198-9e74-4731-8c5a-ee0512df34d2 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-overview.md b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-overview.md index bf315dd58b..238a5d1884 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-overview.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-overview.md @@ -1,5 +1,5 @@ --- -title: AppLocker (Windows) +title: AppLocker description: This topic provides a description of AppLocker and can help you decide if your organization can benefit from deploying AppLocker application control policies. ms.assetid: 94b57864-2112-43b6-96fb-2863c985dc9a ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-deployment-guide.md b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-deployment-guide.md index ff9dab0871..a651d67814 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-deployment-guide.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-deployment-guide.md @@ -1,5 +1,5 @@ --- -title: AppLocker deployment guide (Windows) +title: AppLocker deployment guide description: This topic for IT professionals introduces the concepts and describes the steps required to deploy AppLocker policies. ms.assetid: 38632795-be13-46b0-a7af-487a4340bea1 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-design-guide.md b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-design-guide.md index ae89b01ff7..6aff5add05 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-design-guide.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policies-design-guide.md @@ -1,5 +1,5 @@ --- -title: AppLocker design guide (Windows) +title: AppLocker design guide description: This topic for the IT professional introduces the design and planning steps required to deploy application control policies by using AppLocker. ms.assetid: 1c8e4a7b-3164-4eb4-9277-11b1d5a09c7b ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policy-use-scenarios.md b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policy-use-scenarios.md index bd9c843bda..46d2994927 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policy-use-scenarios.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-policy-use-scenarios.md @@ -1,5 +1,5 @@ --- -title: AppLocker policy use scenarios (Windows) +title: AppLocker policy use scenarios description: This topic for the IT professional lists the various application control scenarios in which AppLocker policies can be effectively implemented. ms.assetid: 33f71578-89f0-4063-ac04-cf4f4ca5c31f ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-processes-and-interactions.md b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-processes-and-interactions.md index 354f073ff9..82be229c35 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-processes-and-interactions.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-processes-and-interactions.md @@ -1,5 +1,5 @@ --- -title: AppLocker processes and interactions (Windows) +title: AppLocker processes and interactions description: This topic for the IT professional describes the process dependencies and interactions when AppLocker evaluates and enforces rules. ms.assetid: 0beec616-6040-4be7-8703-b6c919755d8e ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-settings.md b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-settings.md index 43fe8a1ef2..4d62e1248b 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-settings.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-settings.md @@ -1,5 +1,5 @@ --- -title: AppLocker settings (Windows) +title: AppLocker settings description: This topic for the IT professional lists the settings used by AppLocker. ms.assetid: 9cb4aa19-77c0-4415-9968-bd07dab86839 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-technical-reference.md b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-technical-reference.md index f9b9a77466..24739dbfcd 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-technical-reference.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-technical-reference.md @@ -1,5 +1,5 @@ --- -title: AppLocker technical reference (Windows) +title: AppLocker technical reference description: This overview topic for IT professionals provides links to the topics in the technical reference. ms.assetid: 2b2678f8-c46b-4e1d-b8c5-037c0be255ab ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-audit-only.md b/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-audit-only.md index ba4c5228a2..db47a41ae0 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-audit-only.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-audit-only.md @@ -1,5 +1,5 @@ --- -title: Configure an AppLocker policy for audit only (Windows) +title: Configure an AppLocker policy for audit only description: This topic for IT professionals describes how to set AppLocker policies to Audit only within your IT environment by using AppLocker. ms.assetid: 10bc87d5-cc7f-4500-b7b3-9006e50afa50 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-enforce-rules.md b/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-enforce-rules.md index 32d94d0af1..0eaf785afa 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-enforce-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/configure-an-applocker-policy-for-enforce-rules.md @@ -1,5 +1,5 @@ --- -title: Configure an AppLocker policy for enforce rules (Windows) +title: Configure an AppLocker policy for enforce rules description: This topic for IT professionals describes the steps to enable the AppLocker policy enforcement setting. ms.assetid: 5dbbb290-a5ae-4f88-82b3-21e95972e66c ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/configure-exceptions-for-an-applocker-rule.md b/windows/security/threat-protection/windows-defender-application-control/applocker/configure-exceptions-for-an-applocker-rule.md index 66826b4b00..2f81ecf9ea 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/configure-exceptions-for-an-applocker-rule.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/configure-exceptions-for-an-applocker-rule.md @@ -1,5 +1,5 @@ --- -title: Add exceptions for an AppLocker rule (Windows) +title: Add exceptions for an AppLocker rule description: This topic for IT professionals describes the steps to specify which apps can or cannot run as exceptions to an AppLocker rule. ms.assetid: d15c9d84-c14b-488d-9f48-bf31ff7ff0c5 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-appLocker-reference-device.md b/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-appLocker-reference-device.md index f2263ece50..a9229d7b60 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-appLocker-reference-device.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-appLocker-reference-device.md @@ -1,5 +1,5 @@ --- -title: Configure the AppLocker reference device (Windows) +title: Configure the AppLocker reference device description: This topic for the IT professional describes the steps to create an AppLocker policy platform structure on a reference computer. ms.assetid: 034bd367-146d-4956-873c-e1e09e6fefee ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-application-identity-service.md b/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-application-identity-service.md index 5f081ad311..7b55776a9f 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-application-identity-service.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/configure-the-application-identity-service.md @@ -1,5 +1,5 @@ --- -title: Configure the Application Identity service (Windows) +title: Configure the Application Identity service description: This topic for IT professionals shows how to configure the Application Identity service to start automatically or manually. ms.assetid: dc469599-37fd-448b-b23e-5b8e4f17e561 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-for-packaged-apps.md b/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-for-packaged-apps.md index ff60b9add8..bda3579c22 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-for-packaged-apps.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-for-packaged-apps.md @@ -1,5 +1,5 @@ --- -title: Create a rule for packaged apps (Windows) +title: Create a rule for packaged apps description: This article for IT professionals shows how to create an AppLocker rule for packaged apps with a publisher condition. ms.assetid: e4ffd400-7860-47b3-9118-0e6853c3dfa0 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-file-hash-condition.md b/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-file-hash-condition.md index 894151f16f..f03d446082 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-file-hash-condition.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-file-hash-condition.md @@ -1,5 +1,5 @@ --- -title: Create a rule that uses a file hash condition (Windows) +title: Create a rule that uses a file hash condition description: This topic for IT professionals shows how to create an AppLocker rule with a file hash condition. ms.assetid: eb3b3524-1b3b-4979-ba5a-0a0b1280c5c7 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-path-condition.md b/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-path-condition.md index 6399a404d9..c79af9cb24 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-path-condition.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-path-condition.md @@ -1,5 +1,5 @@ --- -title: Create a rule that uses a path condition (Windows) +title: Create a rule that uses a path condition description: This topic for IT professionals shows how to create an AppLocker rule with a path condition. ms.assetid: 9b2093f5-5976-45fa-90c3-da1e0e845d95 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-publisher-condition.md b/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-publisher-condition.md index 89b0d672cf..66440056c3 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-publisher-condition.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/create-a-rule-that-uses-a-publisher-condition.md @@ -1,5 +1,5 @@ --- -title: Create a rule that uses a publisher condition (Windows) +title: Create a rule that uses a publisher condition description: This topic for IT professionals shows how to create an AppLocker rule with a publisher condition. ms.assetid: 345ad45f-2bc1-4c4c-946f-17804e29f55b ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/create-applocker-default-rules.md b/windows/security/threat-protection/windows-defender-application-control/applocker/create-applocker-default-rules.md index 33534d6a32..d9ad04fc74 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/create-applocker-default-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/create-applocker-default-rules.md @@ -1,5 +1,5 @@ --- -title: Create AppLocker default rules (Windows) +title: Create AppLocker default rules description: This topic for IT professionals describes the steps to create a standard set of AppLocker rules that will allow Windows system files to run. ms.assetid: 21e9dc68-a6f4-4ebe-ac28-4c66a7ab6e18 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/create-list-of-applications-deployed-to-each-business-group.md b/windows/security/threat-protection/windows-defender-application-control/applocker/create-list-of-applications-deployed-to-each-business-group.md index 6c8c9389cb..014f1edcd3 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/create-list-of-applications-deployed-to-each-business-group.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/create-list-of-applications-deployed-to-each-business-group.md @@ -1,5 +1,5 @@ --- -title: Create a list of apps deployed to each business group (Windows) +title: Create a list of apps deployed to each business group description: This topic describes the process of gathering app usage requirements from each business group to implement application control policies by using AppLocker. ms.assetid: d713aa07-d732-4bdc-8656-ba616d779321 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-policies.md b/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-policies.md index 68d616c899..d632badeea 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-policies.md @@ -1,5 +1,5 @@ --- -title: Create Your AppLocker policies (Windows) +title: Create Your AppLocker policies description: This overview topic for the IT professional describes the steps to create an AppLocker policy and prepare it for deployment. ms.assetid: d339dee2-4da2-4d4a-b46e-f1dfb7cb4bf0 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-rules.md b/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-rules.md index 56981ee10e..7f416d3255 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/create-your-applocker-rules.md @@ -1,5 +1,5 @@ --- -title: Create Your AppLocker rules (Windows) +title: Create Your AppLocker rules description: This topic for the IT professional describes what you need to know about AppLocker rules and the methods that you can to create rules. ms.assetid: b684a3a5-929c-4f70-8742-04088022f232 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/delete-an-applocker-rule.md b/windows/security/threat-protection/windows-defender-application-control/applocker/delete-an-applocker-rule.md index 3d51267223..88f67e4728 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/delete-an-applocker-rule.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/delete-an-applocker-rule.md @@ -1,5 +1,5 @@ --- -title: Delete an AppLocker rule (Windows) +title: Delete an AppLocker rule description: This article for IT professionals describes the steps to delete an AppLocker rule. ms.assetid: 382b4be3-0df9-4308-89b2-dcf9df351eb5 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting.md b/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting.md index 3e30ca5a13..21b28d7b69 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-applocker-policies-by-using-the-enforce-rules-setting.md @@ -1,5 +1,5 @@ --- -title: Deploy AppLocker policies by using the enforce rules setting (Windows) +title: Deploy AppLocker policies by using the enforce rules setting description: This topic for IT professionals describes the steps to deploy AppLocker policies by using the enforcement setting method. ms.assetid: fd3a3d25-ff3b-4060-8390-6262a90749ba ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-the-applocker-policy-into-production.md b/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-the-applocker-policy-into-production.md index 40c44e6764..ae2ca63f83 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-the-applocker-policy-into-production.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/deploy-the-applocker-policy-into-production.md @@ -1,5 +1,5 @@ --- -title: Deploy the AppLocker policy into production (Windows) +title: Deploy the AppLocker policy into production description: This topic for the IT professional describes the tasks that should be completed before you deploy AppLocker application control settings. ms.assetid: ebbb1907-92dc-499e-8cee-8e637483c9ae ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/determine-group-policy-structure-and-rule-enforcement.md b/windows/security/threat-protection/windows-defender-application-control/applocker/determine-group-policy-structure-and-rule-enforcement.md index ccc988d5ff..21bcfc2b31 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/determine-group-policy-structure-and-rule-enforcement.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/determine-group-policy-structure-and-rule-enforcement.md @@ -1,5 +1,5 @@ --- -title: Determine the Group Policy structure and rule enforcement (Windows) +title: Determine the Group Policy structure and rule enforcement description: This overview topic describes the process to follow when you're planning to deploy AppLocker rules. ms.assetid: f435fcbe-c7ac-4ef0-9702-729aab64163f ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer.md b/windows/security/threat-protection/windows-defender-application-control/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer.md index 975a812d0d..8308562822 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/determine-which-applications-are-digitally-signed-on-a-reference-computer.md @@ -1,5 +1,5 @@ --- -title: Find digitally signed apps on a reference device (Windows) +title: Find digitally signed apps on a reference device description: This topic for the IT professional describes how to use AppLocker logs and tools to determine which applications are digitally signed. ms.assetid: 24609a6b-fdcb-4083-b234-73e23ff8bcb8 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/determine-your-application-control-objectives.md b/windows/security/threat-protection/windows-defender-application-control/applocker/determine-your-application-control-objectives.md index ed337dd53d..84e059c69f 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/determine-your-application-control-objectives.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/determine-your-application-control-objectives.md @@ -1,5 +1,5 @@ --- -title: Determine your application control objectives (Windows) +title: Determine your application control objectives description: Determine which applications to control and how to control them by comparing Software Restriction Policies (SRP) and AppLocker. ms.assetid: 0e84003e-6095-46fb-8c4e-2065869bb53b ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md b/windows/security/threat-protection/windows-defender-application-control/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md index 8b93a5a341..a06323374d 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md @@ -1,5 +1,5 @@ --- -title: Display a custom URL message when users try to run a blocked app (Windows) +title: Display a custom URL message when users try to run a blocked app description: This topic for IT professionals describes the steps for displaying a customized message to users when an AppLocker policy denies access to an app. ms.assetid: 9a2534a5-d1fa-48a9-93c6-989d4857cf85 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/dll-rules-in-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/dll-rules-in-applocker.md index 4ef55c919d..46473d9aea 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/dll-rules-in-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/dll-rules-in-applocker.md @@ -1,5 +1,5 @@ --- -title: DLL rules in AppLocker (Windows) +title: DLL rules in AppLocker description: This topic describes the file formats and available default rules for the DLL rule collection. ms.assetid: a083fd08-c07e-4534-b0e7-1e15d932ce8f ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/document-group-policy-structure-and-applocker-rule-enforcement.md b/windows/security/threat-protection/windows-defender-application-control/applocker/document-group-policy-structure-and-applocker-rule-enforcement.md index 2ef4d45309..23268ed540 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/document-group-policy-structure-and-applocker-rule-enforcement.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/document-group-policy-structure-and-applocker-rule-enforcement.md @@ -1,5 +1,5 @@ --- -title: Document Group Policy structure & AppLocker rule enforcement (Windows) +title: Document Group Policy structure & AppLocker rule enforcement description: This planning topic describes what you need to investigate, determine, and record in your application control policies plan when you use AppLocker. ms.assetid: 389ffa8e-11fc-49ff-b0b1-89553e6fb6e5 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-application-list.md b/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-application-list.md index 46c2d4bd75..9748146d20 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-application-list.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-application-list.md @@ -1,5 +1,5 @@ --- -title: Document your app list (Windows) +title: Document your app list description: This planning topic describes the app information that you should document when you create a list of apps for AppLocker policies. ms.assetid: b155284b-f75d-4405-aecf-b74221622dc0 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-applocker-rules.md b/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-applocker-rules.md index 51b3644c43..e5f75fa28f 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-applocker-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/document-your-applocker-rules.md @@ -1,5 +1,5 @@ --- -title: Document your AppLocker rules (Windows) +title: Document your AppLocker rules description: Learn how to document your AppLocker rules and associate rule conditions with files, permissions, rule source, and implementation. ms.assetid: 91a198ce-104a-45ff-b49b-487fb40cd2dd ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/edit-an-applocker-policy.md b/windows/security/threat-protection/windows-defender-application-control/applocker/edit-an-applocker-policy.md index 3486c2c96a..b336d09cf5 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/edit-an-applocker-policy.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/edit-an-applocker-policy.md @@ -1,5 +1,5 @@ --- -title: Edit an AppLocker policy (Windows) +title: Edit an AppLocker policy description: This topic for IT professionals describes the steps required to modify an AppLocker policy. ms.assetid: dbc72d1f-3fe0-46c2-aeeb-96621fce7637 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/edit-applocker-rules.md b/windows/security/threat-protection/windows-defender-application-control/applocker/edit-applocker-rules.md index d73311a429..46acb129b9 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/edit-applocker-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/edit-applocker-rules.md @@ -1,5 +1,5 @@ --- -title: Edit AppLocker rules (Windows) +title: Edit AppLocker rules description: This topic for IT professionals describes the steps to edit a publisher rule, path rule, and file hash rule in AppLocker. ms.assetid: 80016cda-b915-46a0-83c6-5e6b0b958e32 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/enable-the-dll-rule-collection.md b/windows/security/threat-protection/windows-defender-application-control/applocker/enable-the-dll-rule-collection.md index 53383e51c3..e38beaacec 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/enable-the-dll-rule-collection.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/enable-the-dll-rule-collection.md @@ -1,5 +1,5 @@ --- -title: Enable the DLL rule collection (Windows) +title: Enable the DLL rule collection description: This topic for IT professionals describes the steps to enable the DLL rule collection feature for AppLocker. ms.assetid: 88ef9561-6eb2-491a-803a-b8cdbfebae27 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/enforce-applocker-rules.md b/windows/security/threat-protection/windows-defender-application-control/applocker/enforce-applocker-rules.md index 269b7e0c0a..70a2dfe070 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/enforce-applocker-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/enforce-applocker-rules.md @@ -1,5 +1,5 @@ --- -title: Enforce AppLocker rules (Windows) +title: Enforce AppLocker rules description: This topic for IT professionals describes how to enforce application control rules by using AppLocker. ms.assetid: e1528b7b-77f2-4419-8e27-c9cc3721d96d ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/executable-rules-in-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/executable-rules-in-applocker.md index 1be63d7bd3..1d3fbf552a 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/executable-rules-in-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/executable-rules-in-applocker.md @@ -1,5 +1,5 @@ --- -title: Executable rules in AppLocker (Windows) +title: Executable rules in AppLocker description: This topic describes the file formats and available default rules for the executable rule collection. ms.assetid: 65e62f90-6caa-48f8-836a-91f8ac9018ee ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-from-a-gpo.md b/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-from-a-gpo.md index 103730016d..7b838b91ae 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-from-a-gpo.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-from-a-gpo.md @@ -1,5 +1,5 @@ --- -title: Export an AppLocker policy from a GPO (Windows) +title: Export an AppLocker policy from a GPO description: This topic for IT professionals describes the steps to export an AppLocker policy from a Group Policy Object (GPO) so that it can be modified. ms.assetid: 7db59719-a8be-418b-bbfd-22cf2176c9c0 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-to-an-xml-file.md b/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-to-an-xml-file.md index 136220fec8..2dc105b517 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-to-an-xml-file.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/export-an-applocker-policy-to-an-xml-file.md @@ -1,5 +1,5 @@ --- -title: Export an AppLocker policy to an XML file (Windows) +title: Export an AppLocker policy to an XML file description: This topic for IT professionals describes the steps to export an AppLocker policy to an XML file for review or testing. ms.assetid: 979bd23f-6815-478b-a6a4-a25239cb1080 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/how-applocker-works-techref.md b/windows/security/threat-protection/windows-defender-application-control/applocker/how-applocker-works-techref.md index a684de3cd7..40f88e9b91 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/how-applocker-works-techref.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/how-applocker-works-techref.md @@ -1,5 +1,5 @@ --- -title: How AppLocker works (Windows) +title: How AppLocker works description: This topic for the IT professional provides links to topics about AppLocker architecture and components, processes and interactions, rules and policies. ms.assetid: 24bb1d73-0ff5-4af7-8b8a-2fa44d4ddbcd ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-from-another-computer.md b/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-from-another-computer.md index c25ac7d908..4ce5fe6eb6 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-from-another-computer.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-from-another-computer.md @@ -1,5 +1,5 @@ --- -title: Import an AppLocker policy from another computer (Windows) +title: Import an AppLocker policy from another computer description: This topic for IT professionals describes how to import an AppLocker policy. ms.assetid: b48cb2b2-8ef8-4cc0-89bd-309d0b1832f6 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-into-a-gpo.md b/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-into-a-gpo.md index 9683aef8f7..71fb649374 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-into-a-gpo.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/import-an-applocker-policy-into-a-gpo.md @@ -1,5 +1,5 @@ --- -title: Import an AppLocker policy into a GPO (Windows) +title: Import an AppLocker policy into a GPO description: This topic for IT professionals describes the steps to import an AppLocker policy into a Group Policy Object (GPO). ms.assetid: 0629ce44-f5e2-48a8-ba47-06544c73261f ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/maintain-applocker-policies.md b/windows/security/threat-protection/windows-defender-application-control/applocker/maintain-applocker-policies.md index 41c1a9a0e4..551719338a 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/maintain-applocker-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/maintain-applocker-policies.md @@ -1,5 +1,5 @@ --- -title: Maintain AppLocker policies (Windows) +title: Maintain AppLocker policies description: Learn how to maintain rules within AppLocker policies. View common AppLocker maintenance scenarios and see the methods to use to maintain AppLocker policies. ms.assetid: b4fbfdfe-ef3d-49e0-a390-f2dfe74602bc ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/manage-packaged-apps-with-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/manage-packaged-apps-with-applocker.md index 814136c5f1..1f192ee5b6 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/manage-packaged-apps-with-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/manage-packaged-apps-with-applocker.md @@ -1,5 +1,5 @@ --- -title: Manage packaged apps with AppLocker (Windows) +title: Manage packaged apps with AppLocker description: Learn concepts and lists procedures to help you manage packaged apps with AppLocker as part of your overall application control strategy. ms.assetid: 6d0c99e7-0284-4547-a30a-0685a9916650 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-by-using-set-applockerpolicy.md b/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-by-using-set-applockerpolicy.md index 63bcac7d18..f800cda2fe 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-by-using-set-applockerpolicy.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-by-using-set-applockerpolicy.md @@ -1,5 +1,5 @@ --- -title: Merge AppLocker policies by using Set-ApplockerPolicy (Windows) +title: Merge AppLocker policies by using Set-ApplockerPolicy description: This topic for IT professionals describes the steps to merge AppLocker policies by using Windows PowerShell. ms.assetid: f1c7d5c0-463e-4fe2-a410-844a404f18d0 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-manually.md b/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-manually.md index 4b8c2836f8..07851d0989 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-manually.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-manually.md @@ -1,5 +1,5 @@ --- -title: Merge AppLocker policies manually (Windows) +title: Merge AppLocker policies manually description: This topic for IT professionals describes the steps to manually merge AppLocker policies to update the Group Policy Object (GPO). ms.assetid: 3605f293-e5f2-481d-8efd-775f9f23c30f ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/monitor-application-usage-with-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/monitor-application-usage-with-applocker.md index 9df3828e59..c0e644de33 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/monitor-application-usage-with-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/monitor-application-usage-with-applocker.md @@ -1,5 +1,5 @@ --- -title: Monitor app usage with AppLocker (Windows) +title: Monitor app usage with AppLocker description: This topic for IT professionals describes how to monitor app usage when AppLocker policies are applied. ms.assetid: 0516da6e-ebe4-45b4-a97b-31daba96d1cf ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/optimize-applocker-performance.md b/windows/security/threat-protection/windows-defender-application-control/applocker/optimize-applocker-performance.md index b588a17ed6..cca5552fbb 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/optimize-applocker-performance.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/optimize-applocker-performance.md @@ -1,5 +1,5 @@ --- -title: Optimize AppLocker performance (Windows) +title: Optimize AppLocker performance description: This topic for IT professionals describes how to optimize AppLocker policy enforcement. ms.assetid: a20efa20-bc98-40fe-bd81-28ec4905e0f6 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker.md index 74a9350ddd..3c367e9dad 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/packaged-apps-and-packaged-app-installer-rules-in-applocker.md @@ -1,5 +1,5 @@ --- -title: Packaged apps and packaged app installer rules in AppLocker (Windows) +title: Packaged apps and packaged app installer rules in AppLocker description: This topic explains the AppLocker rule collection for packaged app installers and packaged apps. ms.assetid: 8fd44d08-a0c2-4c5b-a91f-5cb9989f971d ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/plan-for-applocker-policy-management.md b/windows/security/threat-protection/windows-defender-application-control/applocker/plan-for-applocker-policy-management.md index b45b475826..8384c7debf 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/plan-for-applocker-policy-management.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/plan-for-applocker-policy-management.md @@ -1,5 +1,5 @@ --- -title: Plan for AppLocker policy management (Windows) +title: Plan for AppLocker policy management description: This topic describes the decisions you need to make to establish the processes for managing and maintaining AppLocker policies. ms.assetid: dccc196f-6ae0-4ae4-853a-a3312b18751b ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/refresh-an-applocker-policy.md b/windows/security/threat-protection/windows-defender-application-control/applocker/refresh-an-applocker-policy.md index 5deca1e65f..5aa365b37a 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/refresh-an-applocker-policy.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/refresh-an-applocker-policy.md @@ -1,5 +1,5 @@ --- -title: Refresh an AppLocker policy (Windows) +title: Refresh an AppLocker policy description: This topic for IT professionals describes the steps to force an update for an AppLocker policy. ms.assetid: 3f24fcbc-3926-46b9-a1a2-dd036edab8a9 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-for-deploying-applocker-policies.md b/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-for-deploying-applocker-policies.md index 3b4cf38cad..5df2060dbd 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-for-deploying-applocker-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-for-deploying-applocker-policies.md @@ -1,5 +1,5 @@ --- -title: Requirements for deploying AppLocker policies (Windows) +title: Requirements for deploying AppLocker policies description: This deployment topic for the IT professional lists the requirements that you need to consider before you deploy AppLocker policies. ms.assetid: 3e55bda2-3cd7-42c7-bad3-c7dfbe193d48 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-to-use-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-to-use-applocker.md index 56ce82d42e..23c6363413 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-to-use-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-to-use-applocker.md @@ -1,5 +1,5 @@ --- -title: Requirements to use AppLocker (Windows) +title: Requirements to use AppLocker description: This topic for the IT professional lists software requirements to use AppLocker on the supported Windows operating systems. ms.assetid: dc380535-071e-4794-8f9d-e5d1858156f0 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/run-the-automatically-generate-rules-wizard.md b/windows/security/threat-protection/windows-defender-application-control/applocker/run-the-automatically-generate-rules-wizard.md index 150729a9d8..f02e55d1b8 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/run-the-automatically-generate-rules-wizard.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/run-the-automatically-generate-rules-wizard.md @@ -1,5 +1,5 @@ --- -title: Run the Automatically Generate Rules wizard (Windows) +title: Run the Automatically Generate Rules wizard description: This topic for IT professionals describes steps to run the wizard to create AppLocker rules on a reference device. ms.assetid: 8cad1e14-d5b2-437c-8f88-70cffd7b3d8e ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/script-rules-in-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/script-rules-in-applocker.md index baee48ce11..77e77e2f49 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/script-rules-in-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/script-rules-in-applocker.md @@ -1,5 +1,5 @@ --- -title: Script rules in AppLocker (Windows) +title: Script rules in AppLocker description: This article describes the file formats and available default rules for the script rule collection. ms.assetid: fee24ca4-935a-4c5e-8a92-8cf1d134d35f ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/security-considerations-for-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/security-considerations-for-applocker.md index ac8ec9e988..ddcf98dc38 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/security-considerations-for-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/security-considerations-for-applocker.md @@ -1,5 +1,5 @@ --- -title: Security considerations for AppLocker (Windows) +title: Security considerations for AppLocker description: This topic for the IT professional describes the security considerations you need to address when implementing AppLocker. ms.assetid: 354a5abb-7b31-4bea-a442-aa9666117625 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/select-types-of-rules-to-create.md b/windows/security/threat-protection/windows-defender-application-control/applocker/select-types-of-rules-to-create.md index 2e5f803568..43ddf77312 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/select-types-of-rules-to-create.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/select-types-of-rules-to-create.md @@ -1,5 +1,5 @@ --- -title: Select the types of rules to create (Windows) +title: Select the types of rules to create description: This topic lists resources you can use when selecting your application control policy rules by using AppLocker. ms.assetid: 14751169-0ed1-47cc-822c-8c01a7477784 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/test-an-applocker-policy-by-using-test-applockerpolicy.md b/windows/security/threat-protection/windows-defender-application-control/applocker/test-an-applocker-policy-by-using-test-applockerpolicy.md index 7fb6397c08..44df75bc53 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/test-an-applocker-policy-by-using-test-applockerpolicy.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/test-an-applocker-policy-by-using-test-applockerpolicy.md @@ -1,5 +1,5 @@ --- -title: Test an AppLocker policy by using Test-AppLockerPolicy (Windows) +title: Test an AppLocker policy by using Test-AppLockerPolicy description: This topic for IT professionals describes the steps to test an AppLocker policy prior to importing it into a Group Policy Object (GPO) or another computer. ms.assetid: 048bfa38-6825-4a9a-ab20-776cf79f402a ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/test-and-update-an-applocker-policy.md b/windows/security/threat-protection/windows-defender-application-control/applocker/test-and-update-an-applocker-policy.md index bbb9138590..9a6dd54ca3 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/test-and-update-an-applocker-policy.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/test-and-update-an-applocker-policy.md @@ -1,5 +1,5 @@ --- -title: Test and update an AppLocker policy (Windows) +title: Test and update an AppLocker policy description: This topic discusses the steps required to test an AppLocker policy prior to deployment. ms.assetid: 7d53cbef-078c-4d20-8b00-e821e33b6ea1 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/tools-to-use-with-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/tools-to-use-with-applocker.md index 2d9b935f73..9ce6b9e70c 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/tools-to-use-with-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/tools-to-use-with-applocker.md @@ -1,5 +1,5 @@ --- -title: Tools to use with AppLocker (Windows) +title: Tools to use with AppLocker description: This topic for the IT professional describes the tools available to create and administer AppLocker policies. ms.assetid: db2b7cb3-7643-4be5-84eb-46ba551e1ad1 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-enforcement-settings.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-enforcement-settings.md index 47499212fa..9b4ba84412 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-enforcement-settings.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-enforcement-settings.md @@ -1,5 +1,5 @@ --- -title: Understand AppLocker enforcement settings (Windows) +title: Understand AppLocker enforcement settings description: This topic describes the AppLocker enforcement settings for rule collections. ms.assetid: 48773007-a343-40bf-8961-b3ff0a450d7e ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-policy-design-decisions.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-policy-design-decisions.md index f7ca9620ab..7fb08dd316 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-policy-design-decisions.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-policy-design-decisions.md @@ -1,5 +1,5 @@ --- -title: Understand AppLocker policy design decisions (Windows) +title: Understand AppLocker policy design decisions description: Review some common considerations while you're planning to use AppLocker to deploy application control policies within a Windows environment. ms.assetid: 3475def8-949a-4b51-b480-dc88b5c1e6e6 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md index d763f4b0e4..e0f5c0575d 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md @@ -1,5 +1,5 @@ --- -title: Understand AppLocker rules and enforcement setting inheritance in Group Policy (Windows) +title: Understand AppLocker rules and enforcement setting inheritance in Group Policy description: This topic for the IT professional describes how application control policies configured in AppLocker are applied through Group Policy. ms.assetid: c1c5a3d3-540a-4698-83b5-0dab5d27d871 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understand-the-applocker-policy-deployment-process.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understand-the-applocker-policy-deployment-process.md index d151bd9066..82fc009a1b 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understand-the-applocker-policy-deployment-process.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understand-the-applocker-policy-deployment-process.md @@ -1,5 +1,5 @@ --- -title: Understand the AppLocker policy deployment process (Windows) +title: Understand the AppLocker policy deployment process description: This planning and deployment topic for the IT professional describes the process for using AppLocker when deploying application control policies. ms.assetid: 4cfd95c1-fbd3-41fa-8efc-d23c1ea6fb16 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-allow-and-deny-actions-on-rules.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-allow-and-deny-actions-on-rules.md index d400c84233..1e8aee1c7e 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-allow-and-deny-actions-on-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-allow-and-deny-actions-on-rules.md @@ -1,5 +1,5 @@ --- -title: Understanding AppLocker allow and deny actions on rules (Windows) +title: Understanding AppLocker allow and deny actions on rules description: This topic explains the differences between allow and deny actions on AppLocker rules. ms.assetid: ea0370fa-2086-46b5-a0a4-4a7ead8cbed9 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-default-rules.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-default-rules.md index b788a6f151..d15cdff954 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-default-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-default-rules.md @@ -1,5 +1,5 @@ --- -title: Understanding AppLocker default rules (Windows) +title: Understanding AppLocker default rules description: This topic for IT professional describes the set of rules that can be used to ensure that required Windows system files are allowed to run when the policy is applied. ms.assetid: bdb03d71-05b7-41fb-96e3-a289ce1866e1 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-behavior.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-behavior.md index 2d992cfb44..a54b284804 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-behavior.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-behavior.md @@ -1,5 +1,5 @@ --- -title: Understanding AppLocker rule behavior (Windows) +title: Understanding AppLocker rule behavior description: This topic describes how AppLocker rules are enforced by using the allow and deny options in AppLocker. ms.assetid: 3e2738a3-8041-4095-8a84-45c1894c97d0 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-collections.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-collections.md index 19e74d5246..94c277a12b 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-collections.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-collections.md @@ -1,5 +1,5 @@ --- -title: Understanding AppLocker rule collections (Windows) +title: Understanding AppLocker rule collections description: This topic explains the five different types of AppLocker rules used to enforce AppLocker policies. ms.assetid: 03c05466-4fb3-4880-8d3c-0f6f59fc5579 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-condition-types.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-condition-types.md index 06884a0057..7bdf8b04f3 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-condition-types.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-condition-types.md @@ -1,5 +1,5 @@ --- -title: Understanding AppLocker rule condition types (Windows) +title: Understanding AppLocker rule condition types description: This topic for the IT professional describes the three types of AppLocker rule conditions. ms.assetid: c21af67f-60a1-4f7d-952c-a6f769c74729 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-exceptions.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-exceptions.md index 2696d75f86..4ac6b603d7 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-exceptions.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-applocker-rule-exceptions.md @@ -1,5 +1,5 @@ --- -title: Understanding AppLocker rule exceptions (Windows) +title: Understanding AppLocker rule exceptions description: This topic describes the result of applying AppLocker rule exceptions to rule collections. ms.assetid: e6bb349f-ee60-4c8d-91cd-6442f2d0eb9c ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-file-hash-rule-condition-in-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-file-hash-rule-condition-in-applocker.md index a89e0a624e..0582d50ebd 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-file-hash-rule-condition-in-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-file-hash-rule-condition-in-applocker.md @@ -1,5 +1,5 @@ --- -title: Understanding the file hash rule condition in AppLocker (Windows) +title: Understanding the file hash rule condition in AppLocker description: This topic explains the AppLocker file hash rule condition, the advantages and disadvantages, and how it's applied. ms.assetid: 4c6d9af4-2b1a-40f4-8758-1a6f9f147756 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-path-rule-condition-in-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-path-rule-condition-in-applocker.md index 7dbac718ff..2e970ac2c4 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-path-rule-condition-in-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-path-rule-condition-in-applocker.md @@ -1,5 +1,5 @@ --- -title: Understanding the path rule condition in AppLocker (Windows) +title: Understanding the path rule condition in AppLocker description: This topic explains the AppLocker path rule condition, the advantages and disadvantages, and how it's applied. ms.assetid: 3fa54ded-4466-4f72-bea4-2612031cad43 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-publisher-rule-condition-in-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-publisher-rule-condition-in-applocker.md index 351eeb599a..76fed21426 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-publisher-rule-condition-in-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/understanding-the-publisher-rule-condition-in-applocker.md @@ -1,5 +1,5 @@ --- -title: Understanding the publisher rule condition in AppLocker (Windows) +title: Understanding the publisher rule condition in AppLocker description: This topic explains the AppLocker publisher rule condition, what controls are available, and how it's applied. ms.assetid: df61ed8f-a97e-4644-9d0a-2169f18c1c4f ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md b/windows/security/threat-protection/windows-defender-application-control/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md index 2a927654c2..e63ab0e64b 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/use-a-reference-computer-to-create-and-maintain-applocker-policies.md @@ -1,5 +1,5 @@ --- -title: Use a reference device to create and maintain AppLocker policies (Windows) +title: Use a reference device to create and maintain AppLocker policies description: This topic for the IT professional describes the steps to create and maintain AppLocker policies by using a reference computer. ms.assetid: 10c3597f-f44c-4c8e-8fe5-105d4ac016a6 ms.author: vinpa diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain.md b/windows/security/threat-protection/windows-defender-application-control/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain.md index e78953a494..1cfb01105a 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/use-applocker-and-software-restriction-policies-in-the-same-domain.md @@ -1,5 +1,5 @@ --- -title: Use AppLocker and Software Restriction Policies in the same domain (Windows) +title: Use AppLocker and Software Restriction Policies in the same domain description: This article for IT professionals describes concepts and procedures to help you manage your application control strategy using Software Restriction Policies and AppLocker. ms.assetid: 2b7e0cec-df62-49d6-a2b7-6b8e30180943 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/use-the-applocker-windows-powershell-cmdlets.md b/windows/security/threat-protection/windows-defender-application-control/applocker/use-the-applocker-windows-powershell-cmdlets.md index e73b867fa3..6c0c369c78 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/use-the-applocker-windows-powershell-cmdlets.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/use-the-applocker-windows-powershell-cmdlets.md @@ -1,5 +1,5 @@ --- -title: Use the AppLocker Windows PowerShell cmdlets (Windows) +title: Use the AppLocker Windows PowerShell cmdlets description: This topic for IT professionals describes how each AppLocker Windows PowerShell cmdlet can help you administer your AppLocker application control policies. ms.assetid: 374e029c-5c0a-44ab-a57a-2a9dd17dc57d ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/using-event-viewer-with-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/using-event-viewer-with-applocker.md index 00a6cb48d3..c7de76bb21 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/using-event-viewer-with-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/using-event-viewer-with-applocker.md @@ -1,5 +1,5 @@ --- -title: Using Event Viewer with AppLocker (Windows) +title: Using Event Viewer with AppLocker description: This article lists AppLocker events and describes how to use Event Viewer with AppLocker. ms.assetid: 109abb10-78b1-4c29-a576-e5a17dfeb916 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/using-software-restriction-policies-and-applocker-policies.md b/windows/security/threat-protection/windows-defender-application-control/applocker/using-software-restriction-policies-and-applocker-policies.md index 0ec75fc106..b7aec02c5b 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/using-software-restriction-policies-and-applocker-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/using-software-restriction-policies-and-applocker-policies.md @@ -1,5 +1,5 @@ --- -title: Use Software Restriction Policies and AppLocker policies (Windows) +title: Use Software Restriction Policies and AppLocker policies description: This topic for the IT professional describes how to use Software Restriction Policies (SRP) and AppLocker policies in the same Windows deployment. ms.assetid: c3366be7-e632-4add-bd10-9df088f74c6d ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/what-is-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/what-is-applocker.md index 3f53833251..3a6fb08e52 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/what-is-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/what-is-applocker.md @@ -1,5 +1,5 @@ --- -title: What Is AppLocker (Windows) +title: What Is AppLocker description: This topic for the IT professional describes what AppLocker is and how its features differ from Software Restriction Policies. ms.assetid: 44a8a2bb-0f83-4f95-828e-1f364fb65869 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/windows-installer-rules-in-applocker.md b/windows/security/threat-protection/windows-defender-application-control/applocker/windows-installer-rules-in-applocker.md index 252b66b015..43981062e8 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/windows-installer-rules-in-applocker.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/windows-installer-rules-in-applocker.md @@ -1,5 +1,5 @@ --- -title: Windows Installer rules in AppLocker (Windows) +title: Windows Installer rules in AppLocker description: This topic describes the file formats and available default rules for the Windows Installer rule collection. ms.assetid: 3fecde5b-88b3-4040-81fa-a2d36d052ec9 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-policies.md b/windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-policies.md index 85bfc0c2f0..ca6e21acbd 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-policies.md @@ -1,5 +1,5 @@ --- -title: Working with AppLocker policies (Windows) +title: Working with AppLocker policies description: This topic for IT professionals provides links to procedural topics about creating, maintaining, and testing AppLocker policies. ms.assetid: 7062d2e0-9cbb-4cb8-aa8c-b24945c3771d ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-rules.md b/windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-rules.md index e746c84f0f..2cec2568d1 100644 --- a/windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/applocker/working-with-applocker-rules.md @@ -1,5 +1,5 @@ --- -title: Working with AppLocker rules (Windows) +title: Working with AppLocker rules description: This topic for IT professionals describes AppLocker rule types and how to work with them for your application control policies. ms.assetid: 3966b35b-f2da-4371-8b5f-aec031db6bc9 ms.reviewer: diff --git a/windows/security/threat-protection/windows-defender-application-control/audit-windows-defender-application-control-policies.md b/windows/security/threat-protection/windows-defender-application-control/audit-windows-defender-application-control-policies.md index ca6fa6c251..356adb95d7 100644 --- a/windows/security/threat-protection/windows-defender-application-control/audit-windows-defender-application-control-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/audit-windows-defender-application-control-policies.md @@ -1,5 +1,5 @@ --- -title: Use audit events to create WDAC policy rules (Windows) +title: Use audit events to create WDAC policy rules description: Audits allow admins to discover apps, binaries, and scripts that should be added to the WDAC policy. keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb diff --git a/windows/security/threat-protection/windows-defender-application-control/configure-authorized-apps-deployed-with-a-managed-installer.md b/windows/security/threat-protection/windows-defender-application-control/configure-authorized-apps-deployed-with-a-managed-installer.md index 2b03d8a6f4..9c86b54151 100644 --- a/windows/security/threat-protection/windows-defender-application-control/configure-authorized-apps-deployed-with-a-managed-installer.md +++ b/windows/security/threat-protection/windows-defender-application-control/configure-authorized-apps-deployed-with-a-managed-installer.md @@ -1,5 +1,5 @@ --- -title: Allow apps deployed with a WDAC managed installer (Windows) +title: Allow apps deployed with a WDAC managed installer description: Explains how to configure a custom Managed Installer. keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb diff --git a/windows/security/threat-protection/windows-defender-application-control/configure-wdac-managed-installer.md b/windows/security/threat-protection/windows-defender-application-control/configure-wdac-managed-installer.md index d1947bc8fe..6be18a4bd1 100644 --- a/windows/security/threat-protection/windows-defender-application-control/configure-wdac-managed-installer.md +++ b/windows/security/threat-protection/windows-defender-application-control/configure-wdac-managed-installer.md @@ -1,5 +1,5 @@ --- -title: Managed installer and ISG technical reference and troubleshooting guide (Windows) +title: Managed installer and ISG technical reference and troubleshooting guide description: Explains how to configure a custom Manged Installer. keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb diff --git a/windows/security/threat-protection/windows-defender-application-control/create-code-signing-cert-for-windows-defender-application-control.md b/windows/security/threat-protection/windows-defender-application-control/create-code-signing-cert-for-windows-defender-application-control.md index 982c07dd6a..8050e17b08 100644 --- a/windows/security/threat-protection/windows-defender-application-control/create-code-signing-cert-for-windows-defender-application-control.md +++ b/windows/security/threat-protection/windows-defender-application-control/create-code-signing-cert-for-windows-defender-application-control.md @@ -1,5 +1,5 @@ --- -title: Create a code signing cert for Windows Defender Application Control (Windows) +title: Create a code signing cert for Windows Defender Application Control description: Learn how to set up a publicly issued code signing certificate, so you can sign catalog files or WDAC policies internally. keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb diff --git a/windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy.md b/windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy.md index 453207654b..7a10547365 100644 --- a/windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy.md +++ b/windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy.md @@ -1,5 +1,5 @@ --- -title: Create a WDAC policy using a reference computer (Windows) +title: Create a WDAC policy using a reference computer description: To create a Windows Defender Application Control (WDAC) policy that allows all code installed on a reference computer within your organization, follow this guide. keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb diff --git a/windows/security/threat-protection/windows-defender-application-control/create-wdac-policy-for-fully-managed-devices.md b/windows/security/threat-protection/windows-defender-application-control/create-wdac-policy-for-fully-managed-devices.md index a100094dc2..d19e40f9be 100644 --- a/windows/security/threat-protection/windows-defender-application-control/create-wdac-policy-for-fully-managed-devices.md +++ b/windows/security/threat-protection/windows-defender-application-control/create-wdac-policy-for-fully-managed-devices.md @@ -1,5 +1,5 @@ --- -title: Create a WDAC policy for fully managed devices (Windows) +title: Create a WDAC policy for fully managed devices description: Windows Defender Application Control restricts which applications users are allowed to run and the code that runs in system core. keywords: security, malware ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/create-wdac-policy-for-lightly-managed-devices.md b/windows/security/threat-protection/windows-defender-application-control/create-wdac-policy-for-lightly-managed-devices.md index aa3f0aa5f6..af912de157 100644 --- a/windows/security/threat-protection/windows-defender-application-control/create-wdac-policy-for-lightly-managed-devices.md +++ b/windows/security/threat-protection/windows-defender-application-control/create-wdac-policy-for-lightly-managed-devices.md @@ -1,5 +1,5 @@ --- -title: Create a WDAC policy for lightly managed devices (Windows) +title: Create a WDAC policy for lightly managed devices description: Windows Defender Application Control restricts which applications users are allowed to run and the code that runs in the system core. keywords: security, malware ms.topic: conceptual diff --git a/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies.md b/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies.md index 36a2141386..63c927ae1a 100644 --- a/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies.md @@ -1,5 +1,5 @@ --- -title: Use multiple Windows Defender Application Control Policies (Windows) +title: Use multiple Windows Defender Application Control Policies description: Windows Defender Application Control supports multiple code integrity policies for one device. keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb diff --git a/windows/security/threat-protection/windows-defender-application-control/deployment/deploy-wdac-policies-with-script.md b/windows/security/threat-protection/windows-defender-application-control/deployment/deploy-wdac-policies-with-script.md index 75b9c25b5d..cd5c8ce323 100644 --- a/windows/security/threat-protection/windows-defender-application-control/deployment/deploy-wdac-policies-with-script.md +++ b/windows/security/threat-protection/windows-defender-application-control/deployment/deploy-wdac-policies-with-script.md @@ -1,5 +1,5 @@ --- -title: Deploy Windows Defender Application Control (WDAC) policies using script (Windows) +title: Deploy Windows Defender Application Control (WDAC) policies using script description: Use scripts to deploy Windows Defender Application Control (WDAC) policies. Learn how with this step-by-step guide. keywords: security, malware ms.prod: windows-client diff --git a/windows/security/threat-protection/windows-defender-application-control/deployment/deploy-windows-defender-application-control-policies-using-group-policy.md b/windows/security/threat-protection/windows-defender-application-control/deployment/deploy-windows-defender-application-control-policies-using-group-policy.md index 6562b00f12..5c703094c7 100644 --- a/windows/security/threat-protection/windows-defender-application-control/deployment/deploy-windows-defender-application-control-policies-using-group-policy.md +++ b/windows/security/threat-protection/windows-defender-application-control/deployment/deploy-windows-defender-application-control-policies-using-group-policy.md @@ -1,5 +1,5 @@ --- -title: Deploy WDAC policies via Group Policy (Windows) +title: Deploy WDAC policies via Group Policy description: Windows Defender Application Control (WDAC) policies can easily be deployed and managed with Group Policy. Learn how by following this step-by-step guide. keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb diff --git a/windows/security/threat-protection/windows-defender-application-control/deployment/deploy-windows-defender-application-control-policies-using-intune.md b/windows/security/threat-protection/windows-defender-application-control/deployment/deploy-windows-defender-application-control-policies-using-intune.md index 804ef93a26..83e3847164 100644 --- a/windows/security/threat-protection/windows-defender-application-control/deployment/deploy-windows-defender-application-control-policies-using-intune.md +++ b/windows/security/threat-protection/windows-defender-application-control/deployment/deploy-windows-defender-application-control-policies-using-intune.md @@ -1,5 +1,5 @@ --- -title: Deploy WDAC policies using Mobile Device Management (MDM) (Windows) +title: Deploy WDAC policies using Mobile Device Management (MDM) description: You can use an MDM like Microsoft Intune to configure Windows Defender Application Control (WDAC). Learn how with this step-by-step guide. ms.prod: windows-client ms.technology: itpro-security diff --git a/windows/security/threat-protection/windows-defender-application-control/design/script-enforcement.md b/windows/security/threat-protection/windows-defender-application-control/design/script-enforcement.md index 1ddb9f84ba..5975fa917b 100644 --- a/windows/security/threat-protection/windows-defender-application-control/design/script-enforcement.md +++ b/windows/security/threat-protection/windows-defender-application-control/design/script-enforcement.md @@ -9,7 +9,7 @@ ms.reviewer: jogeurte ms.author: jogeurte ms.manager: jsuther manager: aaroncz -ms.date: 04/05/2023 +ms.date: 05/26/2023 ms.technology: itpro-security ms.topic: article ms.localizationpriority: medium @@ -27,7 +27,7 @@ ms.localizationpriority: medium > Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability). > [!IMPORTANT] -> Option **11 Disabled:Script Enforcement** is not supported on **Windows Server 2016** and should not be used on that platform. Doing so may result in unexpected script enforcement behaviors. +> Option **11 Disabled:Script Enforcement** is not supported on **Windows Server 2016** or on **Windows 10 1607 LTSB** and should not be used on those platforms. Doing so will result in unexpected script enforcement behaviors. ## Script enforcement overview diff --git a/windows/security/threat-protection/windows-defender-application-control/disable-windows-defender-application-control-policies.md b/windows/security/threat-protection/windows-defender-application-control/disable-windows-defender-application-control-policies.md index abd3fc56ae..be973cf600 100644 --- a/windows/security/threat-protection/windows-defender-application-control/disable-windows-defender-application-control-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/disable-windows-defender-application-control-policies.md @@ -1,5 +1,5 @@ --- -title: Remove Windows Defender Application Control policies (Windows) +title: Remove Windows Defender Application Control policies description: Learn how to disable both signed and unsigned Windows Defender Application Control policies, within Windows and within the BIOS. keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb diff --git a/windows/security/threat-protection/windows-defender-application-control/enforce-windows-defender-application-control-policies.md b/windows/security/threat-protection/windows-defender-application-control/enforce-windows-defender-application-control-policies.md index 0bf9b9d1f5..082b0a5d27 100644 --- a/windows/security/threat-protection/windows-defender-application-control/enforce-windows-defender-application-control-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/enforce-windows-defender-application-control-policies.md @@ -1,5 +1,5 @@ --- -title: Enforce Windows Defender Application Control (WDAC) policies (Windows) +title: Enforce Windows Defender Application Control (WDAC) policies description: Learn how to switch a WDAC policy from audit to enforced mode. keywords: security, malware ms.prod: windows-client diff --git a/windows/security/threat-protection/windows-defender-application-control/event-tag-explanations.md b/windows/security/threat-protection/windows-defender-application-control/event-tag-explanations.md index cc7b86329f..b48aea608c 100644 --- a/windows/security/threat-protection/windows-defender-application-control/event-tag-explanations.md +++ b/windows/security/threat-protection/windows-defender-application-control/event-tag-explanations.md @@ -1,5 +1,5 @@ --- -title: Understanding Application Control event tags (Windows) +title: Understanding Application Control event tags description: Learn what different Windows Defender Application Control event tags signify. keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb diff --git a/windows/security/threat-protection/windows-defender-application-control/feature-availability.md b/windows/security/threat-protection/windows-defender-application-control/feature-availability.md index 53ab972b90..6a4d3454bd 100644 --- a/windows/security/threat-protection/windows-defender-application-control/feature-availability.md +++ b/windows/security/threat-protection/windows-defender-application-control/feature-availability.md @@ -8,7 +8,7 @@ author: jgeurten ms.reviewer: aaroncz ms.author: jogeurte manager: aaroncz -ms.date: 11/02/2022 +ms.date: 05/26/2023 ms.custom: asr ms.topic: overview --- @@ -31,6 +31,7 @@ ms.topic: overview | Management solutions |

                  • [Intune](./deployment/deploy-windows-defender-application-control-policies-using-intune.md)
                  • [Microsoft Configuration Manager](/configmgr/protect/deploy-use/use-device-guard-with-configuration-manager) (limited built-in policies or custom policy deployment via software distribution)
                  • [Group policy](./deployment/deploy-windows-defender-application-control-policies-using-group-policy.md)
                  • [Script](/windows/security/threat-protection/windows-defender-application-control/deployment/deploy-wdac-policies-with-script)
                  |
                  • [Intune](/windows/client-management/mdm/applocker-csp) (custom policy deployment via OMA-URI only)
                  • Configuration Manager (custom policy deployment via software distribution only)
                  • [Group Policy](./applocker/determine-group-policy-structure-and-rule-enforcement.md)
                  • PowerShell
                    • | | Per-User and Per-User group rules | Not available (policies are device-wide). | Available on Windows 8+. | | Kernel mode policies | Available on Windows 10, Windows 11, and Windows Server 2016 or later. | Not available. | +| [Rule option 11 - Disabled:Script Enforcement](/windows/security/threat-protection/windows-defender-application-control/design/script-enforcement) | Available on all versions of Windows 10 except 1607 LTSB, Windows 11, and Windows Server 2019 and above. **Disabled:Script Enforcement** is not supported on **Windows Server 2016** or on **Windows 10 1607 LTSB** and should not be used on those platforms. Doing so will result in unexpected script enforcement behaviors. | MSI and Script rule collection is separately configurable. | | [Per-app rules](/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-policy-to-control-specific-plug-ins-add-ins-and-modules) | Available on Windows 10, Windows 11, and Windows Server 2019 or later. | Not available. | | [Managed Installer (MI)](/windows/security/threat-protection/windows-defender-application-control/configure-authorized-apps-deployed-with-a-managed-installer) | Available on Windows 10, Windows 11, and Windows Server 2019 or later. | Not available. | | [Reputation-Based intelligence](/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-intelligent-security-graph) | Available on Windows 10, Windows 11, and Windows Server 2019 or later. | Not available. | diff --git a/windows/security/threat-protection/windows-defender-application-control/manage-packaged-apps-with-windows-defender-application-control.md b/windows/security/threat-protection/windows-defender-application-control/manage-packaged-apps-with-windows-defender-application-control.md index 47ef560b03..aa63cd5b61 100644 --- a/windows/security/threat-protection/windows-defender-application-control/manage-packaged-apps-with-windows-defender-application-control.md +++ b/windows/security/threat-protection/windows-defender-application-control/manage-packaged-apps-with-windows-defender-application-control.md @@ -1,5 +1,5 @@ --- -title: Manage packaged apps with WDAC (Windows) +title: Manage packaged apps with WDAC description: Packaged apps, also known as Universal Windows apps, allow you to control the entire app by using a single Windows Defender Application Control (WDAC) rule. keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb diff --git a/windows/security/threat-protection/windows-defender-application-control/merge-windows-defender-application-control-policies.md b/windows/security/threat-protection/windows-defender-application-control/merge-windows-defender-application-control-policies.md index 80865556cc..53b1e0a448 100644 --- a/windows/security/threat-protection/windows-defender-application-control/merge-windows-defender-application-control-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/merge-windows-defender-application-control-policies.md @@ -1,5 +1,5 @@ --- -title: Merge Windows Defender Application Control policies (WDAC) (Windows) +title: Merge Windows Defender Application Control policies (WDAC) description: Learn how to merge WDAC policies as part of your policy lifecycle management. keywords: security, malware ms.prod: windows-client diff --git a/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules.md b/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules.md index 161e563a19..cae9d23e45 100644 --- a/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules.md @@ -1,5 +1,5 @@ --- -title: Microsoft recommended driver block rules (Windows) +title: Microsoft recommended driver block rules description: View a list of recommended block rules to block vulnerable third-party drivers discovered by Microsoft and the security research community. keywords: security, malware, kernel mode, driver ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb @@ -59,6 +59,8 @@ The blocklist is updated with each new major release of Windows, typically 1-2 t Customers who always want the most up-to-date driver blocklist can also use Windows Defender Application Control (WDAC) to apply the latest recommended driver blocklist contained in this article. For your convenience, we've provided a download of the most up-to-date vulnerable driver blocklist along with instructions to apply it on your computer at the end of this article. Otherwise, you can use the XML provided below to create your own custom WDAC policies. +[!INCLUDE [microsoft-vulnerable-driver-blocklist](../../../../includes/licensing/microsoft-vulnerable-driver-blocklist.md)] + ## Blocking vulnerable drivers using WDAC Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity) or S mode to protect your devices against security threats. If this setting isn't possible, Microsoft recommends blocking [this list of drivers](#vulnerable-driver-blocklist-xml) within your existing Windows Defender Application Control policy. Blocking kernel drivers without sufficient testing can cause devices or software to malfunction, and in rare cases, blue screen. It's recommended to first validate this policy in [audit mode](/windows/security/threat-protection/windows-defender-application-control/audit-windows-defender-application-control-policies) and review the audit block events. @@ -98,7 +100,7 @@ To check that the policy was successfully applied on your computer: ```xml - 10.0.25310.0 + 10.0.25860.0 {2E07F7E4-194C-4D20-B7C9-6F44A6C5A234} @@ -581,6 +583,14 @@ To check that the policy was successfully applied on your computer: + + + + + + + + @@ -826,14 +836,6 @@ To check that the policy was successfully applied on your computer: - - - - - - - - @@ -1007,6 +1009,10 @@ To check that the policy was successfully applied on your computer: + + + + @@ -1039,6 +1045,10 @@ To check that the policy was successfully applied on your computer: + + + + @@ -1053,6 +1063,8 @@ To check that the policy was successfully applied on your computer: + + @@ -1066,6 +1078,7 @@ To check that the policy was successfully applied on your computer: + @@ -1116,6 +1129,7 @@ To check that the policy was successfully applied on your computer: + @@ -1124,6 +1138,8 @@ To check that the policy was successfully applied on your computer: + + @@ -1158,6 +1174,10 @@ To check that the policy was successfully applied on your computer: + + + + @@ -1299,6 +1319,7 @@ To check that the policy was successfully applied on your computer: + @@ -1608,8 +1629,8 @@ To check that the policy was successfully applied on your computer: - + @@ -1814,7 +1835,7 @@ To check that the policy was successfully applied on your computer: - + @@ -1838,13 +1859,13 @@ To check that the policy was successfully applied on your computer: + - @@ -1882,6 +1903,7 @@ To check that the policy was successfully applied on your computer: + @@ -1896,7 +1918,7 @@ To check that the policy was successfully applied on your computer: - + @@ -2405,6 +2427,14 @@ To check that the policy was successfully applied on your computer: + + + + + + + + @@ -2896,7 +2926,7 @@ To check that the policy was successfully applied on your computer: - 10.0.25310.0 + 10.0.25860.0 diff --git a/windows/security/threat-protection/windows-defender-application-control/plan-windows-defender-application-control-management.md b/windows/security/threat-protection/windows-defender-application-control/plan-windows-defender-application-control-management.md index 3650147424..ae484f697c 100644 --- a/windows/security/threat-protection/windows-defender-application-control/plan-windows-defender-application-control-management.md +++ b/windows/security/threat-protection/windows-defender-application-control/plan-windows-defender-application-control-management.md @@ -1,5 +1,5 @@ --- -title: Plan for WDAC policy management (Windows) +title: Plan for WDAC policy management description: Learn about the decisions you need to make to establish the processes for managing and maintaining Windows Defender Application Control policies. keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb diff --git a/windows/security/threat-protection/windows-defender-application-control/querying-application-control-events-centrally-using-advanced-hunting.md b/windows/security/threat-protection/windows-defender-application-control/querying-application-control-events-centrally-using-advanced-hunting.md index edebf6678f..22112f4c42 100644 --- a/windows/security/threat-protection/windows-defender-application-control/querying-application-control-events-centrally-using-advanced-hunting.md +++ b/windows/security/threat-protection/windows-defender-application-control/querying-application-control-events-centrally-using-advanced-hunting.md @@ -1,5 +1,5 @@ --- -title: Query Application Control events with Advanced Hunting (Windows) +title: Query Application Control events with Advanced Hunting description: Learn how to query Windows Defender Application Control events across your entire organization by using Advanced Hunting. keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb diff --git a/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md b/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md index ac8c1073a4..3630632cf7 100644 --- a/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md +++ b/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md @@ -1,5 +1,5 @@ --- -title: Understand Windows Defender Application Control (WDAC) policy rules and file rules (Windows) +title: Understand Windows Defender Application Control (WDAC) policy rules and file rules description: Learn how WDAC policy rules and file rules can control your Windows 10 and Windows 11 computers. keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb @@ -13,7 +13,7 @@ author: jgeurten ms.reviewer: jsuther1974 ms.author: vinpa manager: aaroncz -ms.date: 05/09/2023 +ms.date: 05/26/2023 ms.technology: itpro-security ms.topic: article --- @@ -55,7 +55,7 @@ You can set several rule options within a WDAC policy. Table 1 describes each ru | **8 Required:EV Signers** | This option isn't currently supported. | No | | **9 Enabled:Advanced Boot Options Menu** | The F8 preboot menu is disabled by default for all WDAC policies. Setting this rule option allows the F8 menu to appear to physically present users. | No | | **10 Enabled:Boot Audit on Failure** | Used when the WDAC policy is in enforcement mode. When a boot-critical driver fails during startup, the WDAC policy is placed in audit mode so that Windows loads. Administrators can validate the reason for the failure in the CodeIntegrity event log. | No | -| **11 Disabled:Script Enforcement** | This option disables script enforcement options, covering PowerShell, Windows Based Script Host (wscript.exe), Windows Console Based Script Host (cscript.exe), HTA files run in Microsoft HTML Application Host (mshta.exe), and MSXML. For more information on script enforcement, see [Script enforcement with WDAC](/windows/security/threat-protection/windows-defender-application-control/design/script-enforcement).
                      NOTE: This option isn't supported on Windows Server 2016 and shouldn't be used on that operating system. | No | +| **11 Disabled:Script Enforcement** | This option disables script enforcement options, covering PowerShell, Windows Based Script Host (wscript.exe), Windows Console Based Script Host (cscript.exe), HTA files run in Microsoft HTML Application Host (mshta.exe), and MSXML. For more information on script enforcement, see [Script enforcement with WDAC](/windows/security/threat-protection/windows-defender-application-control/design/script-enforcement).
                      NOTE: This option isn't supported on Windows Server 2016 or Windows 10 1607 LTSB and shouldn't be used on those operating systems. | No | | **12 Required:Enforce Store Applications** | If this rule option is enabled, WDAC policies also apply to Universal Windows applications. | No | | **13 Enabled:Managed Installer** | Use this option to automatically allow applications installed by a managed installer. For more information, see [Authorize apps deployed with a WDAC managed installer](configure-authorized-apps-deployed-with-a-managed-installer.md) | Yes | | **14 Enabled:Intelligent Security Graph Authorization** | Use this option to automatically allow applications with "known good" reputation as defined by Microsoft's Intelligent Security Graph (ISG). | Yes | diff --git a/windows/security/threat-protection/windows-defender-application-control/types-of-devices.md b/windows/security/threat-protection/windows-defender-application-control/types-of-devices.md index 7dd82c84a1..4d96a0ba7f 100644 --- a/windows/security/threat-protection/windows-defender-application-control/types-of-devices.md +++ b/windows/security/threat-protection/windows-defender-application-control/types-of-devices.md @@ -1,5 +1,5 @@ --- -title: Policy creation for common WDAC usage scenarios (Windows) +title: Policy creation for common WDAC usage scenarios description: Develop a plan for deploying Windows Defender Application Control (WDAC) in your organization based on these common scenarios. keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb diff --git a/windows/security/threat-protection/windows-defender-application-control/understand-windows-defender-application-control-policy-design-decisions.md b/windows/security/threat-protection/windows-defender-application-control/understand-windows-defender-application-control-policy-design-decisions.md index 0e68f7beb2..a32f372530 100644 --- a/windows/security/threat-protection/windows-defender-application-control/understand-windows-defender-application-control-policy-design-decisions.md +++ b/windows/security/threat-protection/windows-defender-application-control/understand-windows-defender-application-control-policy-design-decisions.md @@ -1,5 +1,5 @@ --- -title: Understand Windows Defender Application Control policy design decisions (Windows) +title: Understand Windows Defender Application Control policy design decisions description: Understand Windows Defender Application Control policy design decisions. keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb diff --git a/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-policy-to-control-specific-plug-ins-add-ins-and-modules.md b/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-policy-to-control-specific-plug-ins-add-ins-and-modules.md index 3d284b33dd..041c912aaf 100644 --- a/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-policy-to-control-specific-plug-ins-add-ins-and-modules.md +++ b/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-policy-to-control-specific-plug-ins-add-ins-and-modules.md @@ -1,5 +1,5 @@ --- -title: Use a Windows Defender Application Control policy to control specific plug-ins, add-ins, and modules (Windows) +title: Use a Windows Defender Application Control policy to control specific plug-ins, add-ins, and modules description: WDAC policies can be used not only to control applications, but also to control whether specific plug-ins, add-ins, and modules can run from specific apps. keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb diff --git a/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-dynamic-code-security.md b/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-dynamic-code-security.md index d00682891d..c00f4edca6 100644 --- a/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-dynamic-code-security.md +++ b/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-dynamic-code-security.md @@ -1,5 +1,5 @@ --- -title: Windows Defender Application Control and .NET (Windows) +title: Windows Defender Application Control and .NET description: Understand how WDAC and .NET work together and use Dynamic Code Security to verify code loaded by .NET at runtime. keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb diff --git a/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-intelligent-security-graph.md b/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-intelligent-security-graph.md index 8f03c660cd..6fbf9468f0 100644 --- a/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-intelligent-security-graph.md +++ b/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-intelligent-security-graph.md @@ -1,5 +1,5 @@ --- -title: Authorize reputable apps with the Intelligent Security Graph (ISG) (Windows) +title: Authorize reputable apps with the Intelligent Security Graph (ISG) description: Automatically authorize applications that Microsoft’s ISG recognizes as having known good reputation. keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb diff --git a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-design-guide.md b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-design-guide.md index 4b3cdb445f..11fc572242 100644 --- a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-design-guide.md +++ b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-design-guide.md @@ -1,5 +1,5 @@ --- -title: Windows Defender Application Control design guide (Windows) +title: Windows Defender Application Control design guide description: Microsoft Windows Defender Application Control allows organizations to control what apps and drivers will run on their managed Windows devices. keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb diff --git a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-operational-guide.md b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-operational-guide.md index 5697c8f256..6acc9a240c 100644 --- a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-operational-guide.md +++ b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-operational-guide.md @@ -1,5 +1,5 @@ --- -title: Managing and troubleshooting Windows Defender Application Control policies (Windows) +title: Managing and troubleshooting Windows Defender Application Control policies description: Gather information about how your deployed Windows Defender Application Control policies are behaving. keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb diff --git a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control.md b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control.md index 2ba7d43f84..9f1f0f96d3 100644 --- a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control.md +++ b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control.md @@ -73,6 +73,8 @@ Smart App Control enforces the [Microsoft Recommended Driver Block rules](micros - Microsoft.Build.Framework.dll - Wslhost.dll +[!INCLUDE [windows-defender-application-control-wdac](../../../../includes/licensing/windows-defender-application-control-wdac.md)] + ## Related articles - [WDAC design guide](windows-defender-application-control-design-guide.md) diff --git a/windows/security/threat-protection/windows-defender-system-guard/how-hardware-based-root-of-trust-helps-protect-windows.md b/windows/security/threat-protection/windows-defender-system-guard/how-hardware-based-root-of-trust-helps-protect-windows.md index 10b4f41000..74e332cb87 100644 --- a/windows/security/threat-protection/windows-defender-system-guard/how-hardware-based-root-of-trust-helps-protect-windows.md +++ b/windows/security/threat-protection/windows-defender-system-guard/how-hardware-based-root-of-trust-helps-protect-windows.md @@ -30,7 +30,7 @@ With Windows 7, one of the means attackers would use to persist and evade detect This malicious software would start before Windows started, or during the boot process itself, enabling it to start with the highest level of privilege. With Windows 10 running on modern hardware (that is, Windows 8-certified or greater) a hardware-based root of trust helps ensure that no unauthorized firmware or software (such as a bootkit) can start before the Windows bootloader. -This hardware-based root of trust comes from the device’s Secure Boot feature, which is part of the Unified Extensible Firmware Interface (UEFI). +This hardware-based root of trust comes from the device's Secure Boot feature, which is part of the Unified Extensible Firmware Interface (UEFI). This technique of measuring the static early boot UEFI components is called the Static Root of Trust for Measurement (SRTM). As there are thousands of PC vendors that produce many models with different UEFI BIOS versions, there becomes an incredibly large number of SRTM measurements upon bootup. @@ -69,18 +69,20 @@ Paging protection can be implemented to lock certain code tables to be read-only A hardware-enforced processor feature known as a supervisor SMI handler can monitor the SMM and make sure it doesn't access any part of the address space that it isn't supposed to. SMM protection is built on top of the Secure Launch technology and requires it to function. -In the future, Windows 10 will also measure this SMI Handler’s behavior and attest that no OS-owned memory has been tampered with. +In the future, Windows 10 will also measure this SMI Handler's behavior and attest that no OS-owned memory has been tampered with. ## Validating platform integrity after Windows is running (run time) -While Windows Defender System Guard provides advanced protection that will help protect and maintain the integrity of the platform during boot and at run time, the reality is that we must apply an "assume breach" mentality to even our most sophisticated security technologies. We can trust that the technologies are successfully doing their jobs, but we also need the ability to verify that they were successful in achieving their goals. For platform integrity, we can’t just trust the platform, which potentially could be compromised, to self-attest to its security state. So Windows Defender System Guard includes a series of technologies that enable remote analysis of the device’s integrity. +While Windows Defender System Guard provides advanced protection that will help protect and maintain the integrity of the platform during boot and at run time, the reality is that we must apply an "assume breach" mentality to even our most sophisticated security technologies. We can trust that the technologies are successfully doing their jobs, but we also need the ability to verify that they were successful in achieving their goals. For platform integrity, we can't just trust the platform, which potentially could be compromised, to self-attest to its security state. So Windows Defender System Guard includes a series of technologies that enable remote analysis of the device's integrity. -As Windows 10 boots, a series of integrity measurements are taken by Windows Defender System Guard using the device’s Trusted Platform Module 2.0 (TPM 2.0). System Guard Secure Launch won't support earlier TPM versions, such as TPM 1.2. This process and data are hardware-isolated away from Windows to help ensure that the measurement data isn't subject to the type of tampering that could happen if the platform was compromised. From here, the measurements can be used to determine the integrity of the device’s firmware, hardware configuration state, and Windows boot-related components, just to name a few. +As Windows 10 boots, a series of integrity measurements are taken by Windows Defender System Guard using the device's Trusted Platform Module 2.0 (TPM 2.0). System Guard Secure Launch won't support earlier TPM versions, such as TPM 1.2. This process and data are hardware-isolated away from Windows to help ensure that the measurement data isn't subject to the type of tampering that could happen if the platform was compromised. From here, the measurements can be used to determine the integrity of the device's firmware, hardware configuration state, and Windows boot-related components, just to name a few. ![Boot time integrity.](images/windows-defender-system-guard-boot-time-integrity.png) After the system boots, Windows Defender System Guard signs and seals these measurements using the TPM. Upon request, a management system like Intune or Microsoft Configuration Manager can acquire them for remote analysis. If Windows Defender System Guard indicates that the device lacks integrity, the management system can take a series of actions, such as denying the device access to resources. +[!INCLUDE [windows-defender-system-guard](../../../../includes/licensing/windows-defender-system-guard.md)] + ## System requirements for System Guard This feature is available for the following processors: diff --git a/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md b/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md index 6c14ed44e0..2db72ad602 100644 --- a/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md +++ b/windows/security/threat-protection/windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md @@ -1,5 +1,5 @@ --- -title: System Guard Secure Launch and SMM protection (Windows 10) +title: System Guard Secure Launch and SMM protection description: Explains how to configure System Guard Secure Launch and System Management Mode (SMM protection) to improve the startup security of Windows 10 devices. search.appverid: met150 ms.prod: windows-client diff --git a/windows/security/threat-protection/windows-firewall/TOC.yml b/windows/security/threat-protection/windows-firewall/TOC.yml deleted file mode 100644 index ca84e461a5..0000000000 --- a/windows/security/threat-protection/windows-firewall/TOC.yml +++ /dev/null @@ -1,254 +0,0 @@ -- name: Windows Firewall with Advanced Security - href: windows-firewall-with-advanced-security.md - items: - - name: Plan deployment - items: - - name: Design guide - href: windows-firewall-with-advanced-security-design-guide.md - - name: Design process - href: understanding-the-windows-firewall-with-advanced-security-design-process.md - - name: Implementation goals - items: - - name: Identify implementation goals - href: identifying-your-windows-firewall-with-advanced-security-deployment-goals.md - - name: Protect devices from unwanted network traffic - href: protect-devices-from-unwanted-network-traffic.md - - name: Restrict access to only trusted devices - href: restrict-access-to-only-trusted-devices.md - - name: Require encryption - href: require-encryption-when-accessing-sensitive-network-resources.md - - name: Restrict access - href: restrict-access-to-only-specified-users-or-devices.md - - name: Implementation designs - items: - - name: Mapping goals to a design - href: mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md - - name: Basic firewall design - href: basic-firewall-policy-design.md - items: - - name: Basic firewall design example - href: firewall-policy-design-example.md - - name: Domain isolation design - href: domain-isolation-policy-design.md - items: - - name: Domain isolation design example - href: domain-isolation-policy-design-example.md - - name: Server isolation design - href: server-isolation-policy-design.md - items: - - name: Server Isolation design example - href: server-isolation-policy-design-example.md - - name: Certificate-based isolation design - href: certificate-based-isolation-policy-design.md - items: - - name: Certificate-based Isolation design example - href: certificate-based-isolation-policy-design-example.md - - name: Design planning - items: - - name: Planning your design - href: planning-your-windows-firewall-with-advanced-security-design.md - - name: Planning settings for a basic firewall policy - href: planning-settings-for-a-basic-firewall-policy.md - - name: Planning domain isolation zones - items: - - name: Domain isolation zones - href: planning-domain-isolation-zones.md - - name: Exemption list - href: exemption-list.md - - name: Isolated domain - href: isolated-domain.md - - name: Boundary zone - href: boundary-zone.md - - name: Encryption zone - href: encryption-zone.md - - name: Planning server isolation zones - href: planning-server-isolation-zones.md - - name: Planning certificate-based authentication - href: planning-certificate-based-authentication.md - items: - - name: Documenting the Zones - href: documenting-the-zones.md - - name: Planning group policy deployment for your isolation zones - href: planning-group-policy-deployment-for-your-isolation-zones.md - items: - - name: Planning isolation groups for the zones - href: planning-isolation-groups-for-the-zones.md - - name: Planning network access groups - href: planning-network-access-groups.md - - name: Planning the GPOs - href: planning-the-gpos.md - items: - - name: Firewall GPOs - href: firewall-gpos.md - items: - - name: GPO_DOMISO_Firewall - href: gpo-domiso-firewall.md - - name: Isolated domain GPOs - href: isolated-domain-gpos.md - items: - - name: GPO_DOMISO_IsolatedDomain_Clients - href: gpo-domiso-isolateddomain-clients.md - - name: GPO_DOMISO_IsolatedDomain_Servers - href: gpo-domiso-isolateddomain-servers.md - - name: Boundary zone GPOs - href: boundary-zone-gpos.md - items: - - name: GPO_DOMISO_Boundary - href: gpo-domiso-boundary.md - - name: Encryption zone GPOs - href: encryption-zone-gpos.md - items: - - name: GPO_DOMISO_Encryption - href: gpo-domiso-encryption.md - - name: Server isolation GPOs - href: server-isolation-gpos.md - - name: Planning GPO deployment - href: planning-gpo-deployment.md - - name: Planning to deploy - href: planning-to-deploy-windows-firewall-with-advanced-security.md - - name: Deployment guide - items: - - name: Deployment overview - href: windows-firewall-with-advanced-security-deployment-guide.md - - name: Implementing your plan - href: implementing-your-windows-firewall-with-advanced-security-design-plan.md - - name: Basic firewall deployment - items: - - name: "Checklist: Implementing a basic firewall policy design" - href: checklist-implementing-a-basic-firewall-policy-design.md - - name: Domain isolation deployment - items: - - name: "Checklist: Implementing a Domain Isolation Policy Design" - href: checklist-implementing-a-domain-isolation-policy-design.md - - name: Server isolation deployment - items: - - name: "Checklist: Implementing a Standalone Server Isolation Policy Design" - href: checklist-implementing-a-standalone-server-isolation-policy-design.md - - name: Certificate-based authentication - items: - - name: "Checklist: Implementing a Certificate-based Isolation Policy Design" - href: checklist-implementing-a-certificate-based-isolation-policy-design.md - - name: Best practices - items: - - name: Configuring the firewall - href: best-practices-configuring.md - - name: Securing IPsec - href: securing-end-to-end-ipsec-connections-by-using-ikev2.md - - name: PowerShell - href: windows-firewall-with-advanced-security-administration-with-windows-powershell.md - - name: Isolating Microsoft Store Apps on Your Network - href: isolating-apps-on-your-network.md - - name: How-to - items: - - name: Add Production devices to the membership group for a zone - href: add-production-devices-to-the-membership-group-for-a-zone.md - - name: Add test devices to the membership group for a zone - href: add-test-devices-to-the-membership-group-for-a-zone.md - - name: Assign security group filters to the GPO - href: assign-security-group-filters-to-the-gpo.md - - name: Change rules from request to require mode - href: Change-Rules-From-Request-To-Require-Mode.Md - - name: Configure authentication methods - href: Configure-authentication-methods.md - - name: Configure data protection (Quick Mode) settings - href: configure-data-protection-quick-mode-settings.md - - name: Configure Group Policy to autoenroll and deploy certificates - href: configure-group-policy-to-autoenroll-and-deploy-certificates.md - - name: Configure key exchange (main mode) settings - href: configure-key-exchange-main-mode-settings.md - - name: Configure the rules to require encryption - href: configure-the-rules-to-require-encryption.md - - name: Configure the Windows Firewall log - href: configure-the-windows-firewall-log.md - - name: Configure the workstation authentication certificate template - href: configure-the-workstation-authentication-certificate-template.md - - name: Configure Windows Firewall to suppress notifications when a program is blocked - href: configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md - - name: Confirm that certificates are deployed correctly - href: confirm-that-certificates-are-deployed-correctly.md - - name: Copy a GPO to create a new GPO - href: copy-a-gpo-to-create-a-new-gpo.md - - name: Create a Group Account in Active Directory - href: create-a-group-account-in-active-directory.md - - name: Create a Group Policy Object - href: create-a-group-policy-object.md - - name: Create an authentication exemption list rule - href: create-an-authentication-exemption-list-rule.md - - name: Create an authentication request rule - href: create-an-authentication-request-rule.md - - name: Create an inbound ICMP rule - href: create-an-inbound-icmp-rule.md - - name: Create an inbound port rule - href: create-an-inbound-port-rule.md - - name: Create an inbound program or service rule - href: create-an-inbound-program-or-service-rule.md - - name: Create an outbound port rule - href: create-an-outbound-port-rule.md - - name: Create an outbound program or service rule - href: create-an-outbound-program-or-service-rule.md - - name: Create inbound rules to support RPC - href: create-inbound-rules-to-support-rpc.md - - name: Create WMI filters for the GPO - href: create-wmi-filters-for-the-gpo.md - - name: Create Windows Firewall rules in Intune - href: create-windows-firewall-rules-in-intune.md - - name: Enable predefined inbound rules - href: enable-predefined-inbound-rules.md - - name: Enable predefined outbound rules - href: enable-predefined-outbound-rules.md - - name: Exempt ICMP from authentication - href: exempt-icmp-from-authentication.md - - name: Link the GPO to the domain - href: link-the-gpo-to-the-domain.md - - name: Modify GPO filters - href: modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md - - name: Open IP security policies - href: open-the-group-policy-management-console-to-ip-security-policies.md - - name: Open Group Policy - href: open-the-group-policy-management-console-to-windows-firewall.md - - name: Open Group Policy - href: open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md - - name: Open Windows Firewall - href: open-windows-firewall-with-advanced-security.md - - name: Restrict server access - href: restrict-server-access-to-members-of-a-group-only.md - - name: Enable Windows Firewall - href: turn-on-windows-firewall-and-configure-default-behavior.md - - name: Verify Network Traffic - href: verify-that-network-traffic-is-authenticated.md - - name: References - items: - - name: "Checklist: Creating Group Policy objects" - href: checklist-creating-group-policy-objects.md - - name: "Checklist: Creating inbound firewall rules" - href: checklist-creating-inbound-firewall-rules.md - - name: "Checklist: Creating outbound firewall rules" - href: checklist-creating-outbound-firewall-rules.md - - name: "Checklist: Configuring basic firewall settings" - href: checklist-configuring-basic-firewall-settings.md - - name: "Checklist: Configuring rules for the isolated domain" - href: checklist-configuring-rules-for-the-isolated-domain.md - - name: "Checklist: Configuring rules for the boundary zone" - href: checklist-configuring-rules-for-the-boundary-zone.md - - name: "Checklist: Configuring rules for the encryption zone" - href: checklist-configuring-rules-for-the-encryption-zone.md - - name: "Checklist: Configuring rules for an isolated server zone" - href: checklist-configuring-rules-for-an-isolated-server-zone.md - - name: "Checklist: Configuring rules for servers in a standalone isolated server zone" - href: checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md - - name: "Checklist: Creating rules for clients of a standalone isolated server zone" - href: checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md - - name: "Appendix A: Sample GPO template files for settings used in this guide" - href: appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md - - name: Troubleshooting - items: - - name: Troubleshooting UWP app connectivity issues in Windows Firewall - href: troubleshooting-uwp-firewall.md - - name: Filter origin audit log improvements - href: filter-origin-documentation.md - - name: Quarantine behavior - href: quarantine.md - - name: Firewall settings lost on upgrade - href: firewall-settings-lost-on-upgrade.md -- name: Windows security - href: /windows/security/ diff --git a/windows/security/threat-protection/windows-security-configuration-framework/windows-security-baselines.md b/windows/security/threat-protection/windows-security-configuration-framework/windows-security-baselines.md index 238193ef00..b4829615f9 100644 --- a/windows/security/threat-protection/windows-security-configuration-framework/windows-security-baselines.md +++ b/windows/security/threat-protection/windows-security-configuration-framework/windows-security-baselines.md @@ -41,6 +41,8 @@ For example, there are over 3,000 group policy settings for Windows 10, which do In modern organizations, the security threat landscape is constantly evolving, and IT pros and policy-makers must keep up with security threats and make required changes to security settings to help mitigate these threats. To enable faster deployments and make managing Microsoft products easier, Microsoft provides customers with security baselines that are available in consumable formats, such as group policy object backups. +[!INCLUDE [security-baselines](../../../../includes/licensing/security-baselines.md)] + ## Baseline principles Our recommendations follow a streamlined and efficient approach to baseline definitions. The foundation of that approach is essentially: diff --git a/windows/security/trusted-boot.md b/windows/security/trusted-boot.md index ad5c50ecc7..8790964196 100644 --- a/windows/security/trusted-boot.md +++ b/windows/security/trusted-boot.md @@ -29,6 +29,8 @@ Trusted Boot picks up the process that started with Secure Boot. The Windows boo Often, Windows can automatically repair the corrupted component, restoring the integrity of Windows and allowing the Windows 11 device to start normally. +[!INCLUDE [secure-boot-and-trusted-boot](../../includes/licensing/secure-boot-and-trusted-boot.md)] + ## See also [Secure the Windows boot process](information-protection/secure-the-windows-10-boot-process.md) \ No newline at end of file diff --git a/windows/security/zero-trust-windows-device-health.md b/windows/security/zero-trust-windows-device-health.md index d6159d39a6..64a4233745 100644 --- a/windows/security/zero-trust-windows-device-health.md +++ b/windows/security/zero-trust-windows-device-health.md @@ -13,7 +13,7 @@ ms.date: 12/31/2017 --- # Zero Trust and Windows device health -Organizations need a security model that more effectively adapts to the complexity of the modern work environment. IT admins need to embrace the hybrid workplace, while protecting people, devices, apps, and data wherever they’re located. Implementing a Zero Trust model for security helps address today's complex environments. +Organizations need a security model that more effectively adapts to the complexity of the modern work environment. IT admins need to embrace the hybrid workplace, while protecting people, devices, apps, and data wherever they're located. Implementing a Zero Trust model for security helps address today's complex environments. The [Zero Trust](https://www.microsoft.com/security/business/zero-trust) principles are: @@ -27,12 +27,12 @@ The Zero Trust concept of **verify explicitly** applies to the risks introduced [Conditional access](/azure/active-directory/conditional-access/overview) evaluates identity signals to confirm that users are who they say they are before they're granted access to corporate resources. -Windows 11 supports device health attestation, helping to confirm that devices are in a good state and haven't been tampered with. This capability helps users access corporate resources whether they’re in the office, at home, or when they’re traveling. +Windows 11 supports device health attestation, helping to confirm that devices are in a good state and haven't been tampered with. This capability helps users access corporate resources whether they're in the office, at home, or when they're traveling. Attestation helps verify the identity and status of essential components and that the device, firmware, and boot process haven't been altered. Information about the firmware, boot process, and software, is used to validate the security state of the device. This information is cryptographically stored in the security co-processor Trusted Platform Module (TPM). Once the device is attested, it can be granted access to resources. ## Device health attestation on Windows - Many security risks can emerge during the boot process as this process can be the most privileged component of the whole system. The verification process uses remote attestation as the secure channel to determine and present the device’s health. Remote attestation determines: + Many security risks can emerge during the boot process as this process can be the most privileged component of the whole system. The verification process uses remote attestation as the secure channel to determine and present the device's health. Remote attestation determines: - If the device can be trusted - If the operating system booted correctly diff --git a/windows/whats-new/TOC.yml b/windows/whats-new/TOC.yml index 0e145097a8..2e144448b8 100644 --- a/windows/whats-new/TOC.yml +++ b/windows/whats-new/TOC.yml @@ -11,6 +11,8 @@ href: windows-11-plan.md - name: Prepare for Windows 11 href: windows-11-prepare.md + - name: Windows 11 temporary enterprise feature control + href: temporary-enterprise-feature-control.md - name: What's new in Windows 11, version 22H2 href: whats-new-windows-11-version-22h2.md - name: Windows 10 @@ -24,6 +26,8 @@ href: whats-new-windows-10-version-21H1.md - name: What's new in Windows 10, version 20H2 href: whats-new-windows-10-version-20H2.md +- name: Windows commercial licensing overview + href: windows-licensing.md - name: Deprecated and removed Windows features expanded: false items: diff --git a/windows/whats-new/deprecated-features-resources.md b/windows/whats-new/deprecated-features-resources.md index 6728e2b1bd..330293213d 100644 --- a/windows/whats-new/deprecated-features-resources.md +++ b/windows/whats-new/deprecated-features-resources.md @@ -12,15 +12,13 @@ ms.topic: reference ms.collection: - highpri - tier1 +appliesto: + - ✅ Windows 11 + - ✅ Windows 10 --- # Resources for deprecated features -**Applies to** - -- Windows 10 -- Windows 11 - This article provides additional resources about [deprecated features for Windows client](deprecated-features.md) that may be needed by IT professionals. The following information is provided to help IT professionals plan for the removal of deprecated features: ## Microsoft Support Diagnostic Tool resources diff --git a/windows/whats-new/deprecated-features.md b/windows/whats-new/deprecated-features.md index 84ceba70f7..073c3bf2f2 100644 --- a/windows/whats-new/deprecated-features.md +++ b/windows/whats-new/deprecated-features.md @@ -12,15 +12,13 @@ ms.topic: conceptual ms.collection: - highpri - tier1 +appliesto: + - ✅ Windows 11 + - ✅ Windows 10 --- # Deprecated features for Windows client -**Applies to** - -- Windows 10 -- Windows 11 - Each version of Windows client adds new features and functionality. Occasionally, new versions also remove features and functionality, often because they've added a newer option. This article provides details about the features and functionalities that are no longer being developed in Windows client. For more information about features that have been removed, see [Windows features removed](removed-features.md). For more information about features in Windows 11, see [Feature deprecations and removals](https://www.microsoft.com/windows/windows-11-specifications#table3). diff --git a/windows/whats-new/feature-lifecycle.md b/windows/whats-new/feature-lifecycle.md index d987cfd951..ffbc2050c9 100644 --- a/windows/whats-new/feature-lifecycle.md +++ b/windows/whats-new/feature-lifecycle.md @@ -12,13 +12,12 @@ ms.date: 10/28/2022 ms.collection: - highpri - tier2 +appliesto: + - ✅ Windows 11 + - ✅ Windows 10 --- # Windows client features lifecycle -Applies to: -- Windows 10 -- Windows 11 - Each release of Windows 10 and Windows 11 contains many new and improved features. Occasionally we also remove features and functionality, usually because there is a better option. ## Windows 11 features diff --git a/windows/whats-new/index.yml b/windows/whats-new/index.yml index c988c8ebb4..b99c54cd1c 100644 --- a/windows/whats-new/index.yml +++ b/windows/whats-new/index.yml @@ -32,6 +32,8 @@ landingContent: url: windows-11-plan.md - text: Prepare for Windows 11 url: windows-11-prepare.md + - text: Windows commercial licensing overview + url: windows-licensing.md - title: Windows 10 linkLists: @@ -63,4 +65,4 @@ landingContent: - text: Compare Windows 11 Editions url: https://www.microsoft.com/windows/business/compare-windows-11 - text: Windows 10 Enterprise LTSC - url: ltsc/index.md + url: ltsc/overview.md diff --git a/windows/whats-new/ltsc/TOC.yml b/windows/whats-new/ltsc/TOC.yml index d7d88350ef..3dede78331 100644 --- a/windows/whats-new/ltsc/TOC.yml +++ b/windows/whats-new/ltsc/TOC.yml @@ -1,6 +1,8 @@ - name: Windows 10 Enterprise LTSC - href: index.md + href: index.yml items: + - name: Windows 10 Enterprise LTSC overview + href: overview.md - name: What's new in Windows 10 Enterprise LTSC 2021 href: whats-new-windows-10-2021.md - name: What's new in Windows 10 Enterprise LTSC 2019 diff --git a/windows/whats-new/ltsc/index.yml b/windows/whats-new/ltsc/index.yml new file mode 100644 index 0000000000..4744f04260 --- /dev/null +++ b/windows/whats-new/ltsc/index.yml @@ -0,0 +1,49 @@ +### YamlMime:Landing + +title: What's new in Windows 10 Enterprise LTSC +summary: Find out about new features and capabilities in the latest release of Windows 10 Enterprise LTSC for IT professionals. + +metadata: + title: What's new in Windows 10 Enterprise LTSC + description: Find out about new features and capabilities in the latest release of Windows 10 Enterprise LTSC for IT professionals. + ms.prod: windows-client + ms.technology: itpro-fundamentals + ms.topic: landing-page + ms.collection: + - highpri + - tier1 + author: mestew + ms.author: mstewart + manager: aaroncz + ms.date: 05/22/2023 + localization_priority: medium + +landingContent: + + - title: Windows 10 Enterprise LTSC + linkLists: + - linkListType: overview + links: + - text: Windows 10 Enterprise LTSC overview + url: overview.md + - text: What's new in Windows 10 Enterprise LTSC 2021 + url: whats-new-windows-10-2021.md + - text: What's new in Windows 10 Enterprise LTSC 2019 + url: whats-new-windows-10-2019.md + - text: What's new in Windows 10 Enterprise LTSC 2016 + url: whats-new-windows-10-2016.md + - text: What's new in Windows 10 Enterprise LTSC 2015 + url: whats-new-windows-10-2015.md + + - title: Learn more + linkLists: + - linkListType: overview + links: + - text: Windows release health dashboard + url: /windows/release-health/ + - text: Windows 10 update history + url: https://support.microsoft.com/topic/windows-10-update-history-857b8ccb-71e4-49e5-b3f6-7073197d98fb + - text: Windows features we're no longer developing + url: ../deprecated-features.md + - text: Features and functionality removed in Windows + url: ../removed-features.md diff --git a/windows/whats-new/ltsc/index.md b/windows/whats-new/ltsc/overview.md similarity index 90% rename from windows/whats-new/ltsc/index.md rename to windows/whats-new/ltsc/overview.md index e294bee159..2faae9d8de 100644 --- a/windows/whats-new/ltsc/index.md +++ b/windows/whats-new/ltsc/overview.md @@ -1,5 +1,5 @@ --- -title: Windows 10 Enterprise LTSC +title: Windows 10 Enterprise LTSC overview description: New and updated IT Pro content about new features in Windows 10, LTSC (also known as Windows 10 LTSB). ms.prod: windows-client author: mestew @@ -9,16 +9,13 @@ ms.localizationpriority: low ms.topic: overview ms.technology: itpro-fundamentals ms.date: 12/31/2017 +appliesto: + - ✅ Windows 10 Enterprise LTSC --- # Windows 10 Enterprise LTSC -**Applies to** -- Windows 10 Enterprise LTSC - -## In this topic - -This topic provides links to articles with information about what's new in each release of Windows 10 Enterprise LTSC, and includes a short description of this servicing channel. +This article provides links to information about what's new in each release of Windows 10 Enterprise LTSC, and includes a short description of this servicing channel. [What's New in Windows 10 Enterprise LTSC 2021](whats-new-windows-10-2021.md)
                      [What's New in Windows 10 Enterprise LTSC 2019](whats-new-windows-10-2019.md)
                      diff --git a/windows/whats-new/ltsc/whats-new-windows-10-2015.md b/windows/whats-new/ltsc/whats-new-windows-10-2015.md index 0663fe6cd9..da9e6df080 100644 --- a/windows/whats-new/ltsc/whats-new-windows-10-2015.md +++ b/windows/whats-new/ltsc/whats-new-windows-10-2015.md @@ -8,15 +8,14 @@ author: mestew ms.localizationpriority: low ms.topic: article ms.technology: itpro-fundamentals -ms.date: 12/31/2017 +ms.date: 02/26/2023 +appliesto: + - ✅ Windows 10 Enterprise LTSC 2015 --- # What's new in Windows 10 Enterprise LTSC 2015 -**Applies to** -- Windows 10 Enterprise LTSC 2015 - -This article lists new and updated features and content that are of interest to IT Pros for Windows 10 Enterprise LTSC 2015 (LTSB). For a brief description of the LTSC servicing channel, see [Windows 10 Enterprise LTSC](index.md). +This article lists new and updated features and content that are of interest to IT Pros for Windows 10 Enterprise LTSC 2015 (LTSB). For a brief description of the LTSC servicing channel, see [Windows 10 Enterprise LTSC](overview.md). ## Deployment @@ -289,4 +288,4 @@ The new chromium-based Microsoft Edge isn't included in the LTSC release of Wind ## See Also -[Windows 10 Enterprise LTSC](index.md): A description of the LTSC servicing channel with links to information about each release. +[Windows 10 Enterprise LTSC](overview.md): A description of the LTSC servicing channel with links to information about each release. diff --git a/windows/whats-new/ltsc/whats-new-windows-10-2016.md b/windows/whats-new/ltsc/whats-new-windows-10-2016.md index 1b70c22e66..ba451305fd 100644 --- a/windows/whats-new/ltsc/whats-new-windows-10-2016.md +++ b/windows/whats-new/ltsc/whats-new-windows-10-2016.md @@ -9,14 +9,13 @@ ms.localizationpriority: low ms.topic: article ms.technology: itpro-fundamentals ms.date: 12/31/2017 +appliesto: + - ✅ Windows 10 Enterprise LTSC 2016 --- # What's new in Windows 10 Enterprise LTSC 2016 -**Applies to** -- Windows 10 Enterprise LTSC 2016 - -This article lists new and updated features and content that are of interest to IT Pros for Windows 10 Enterprise LTSC 2016 (LTSB), compared to Windows 10 Enterprise LTSC 2015 (LTSB). For a brief description of the LTSC servicing channel, see [Windows 10 Enterprise LTSC](index.md). +This article lists new and updated features and content that are of interest to IT Pros for Windows 10 Enterprise LTSC 2016 (LTSB), compared to Windows 10 Enterprise LTSC 2015 (LTSB). For a brief description of the LTSC servicing channel, see [Windows 10 Enterprise LTSC](overview.md). >[!NOTE] >Features in Windows 10 Enterprise LTSC 2016 are equivalent to Windows 10, version 1607. @@ -177,4 +176,4 @@ The new chromium-based Microsoft Edge isn't included in the LTSC release of Wind ## See Also -[Windows 10 Enterprise LTSC](index.md): A description of the LTSC servicing channel with links to information about each release. +[Windows 10 Enterprise LTSC](overview.md): A description of the LTSC servicing channel with links to information about each release. diff --git a/windows/whats-new/ltsc/whats-new-windows-10-2019.md b/windows/whats-new/ltsc/whats-new-windows-10-2019.md index d5d3090339..52223f9e9b 100644 --- a/windows/whats-new/ltsc/whats-new-windows-10-2019.md +++ b/windows/whats-new/ltsc/whats-new-windows-10-2019.md @@ -9,14 +9,13 @@ ms.localizationpriority: medium ms.topic: conceptual ms.technology: itpro-fundamentals ms.date: 04/05/2023 +appliesto: + - ✅ Windows 10 Enterprise LTSC 2019 --- # What's new in Windows 10 Enterprise LTSC 2019 -**Applies to** -- Windows 10 Enterprise LTSC 2019 - -This article lists new and updated features and content that are of interest to IT Pros for Windows 10 Enterprise LTSC 2019, compared to Windows 10 Enterprise LTSC 2016 (LTSB). For a brief description of the LTSC servicing channel and associated support, see [Windows 10 Enterprise LTSC](index.md). +This article lists new and updated features and content that are of interest to IT Pros for Windows 10 Enterprise LTSC 2019, compared to Windows 10 Enterprise LTSC 2016 (LTSB). For a brief description of the LTSC servicing channel and associated support, see [Windows 10 Enterprise LTSC](overview.md). >[!NOTE] >Features in Windows 10 Enterprise LTSC 2019 are equivalent to Windows 10, version 1809. @@ -577,4 +576,4 @@ See the following example: ## See also -[Windows 10 Enterprise LTSC](index.md): A short description of the LTSC servicing channel with links to information about each release. +[Windows 10 Enterprise LTSC](overview.md): A short description of the LTSC servicing channel with links to information about each release. diff --git a/windows/whats-new/ltsc/whats-new-windows-10-2021.md b/windows/whats-new/ltsc/whats-new-windows-10-2021.md index 79dff6896a..48b3e3b651 100644 --- a/windows/whats-new/ltsc/whats-new-windows-10-2021.md +++ b/windows/whats-new/ltsc/whats-new-windows-10-2021.md @@ -9,14 +9,13 @@ ms.localizationpriority: high ms.topic: conceptual ms.technology: itpro-fundamentals ms.date: 04/05/2023 +appliesto: + - ✅ Windows 10 Enterprise LTSC 2021 --- # What's new in Windows 10 Enterprise LTSC 2021 -**Applies to** -- Windows 10 Enterprise LTSC 2021 - -This article lists new and updated features and content that is of interest to IT Pros for Windows 10 Enterprise LTSC 2021, compared to Windows 10 Enterprise LTSC 2019 (LTSB). For a brief description of the LTSC servicing channel and associated support, see [Windows 10 Enterprise LTSC](index.md). +This article lists new and updated features and content that is of interest to IT Pros for Windows 10 Enterprise LTSC 2021, compared to Windows 10 Enterprise LTSC 2019 (LTSB). For a brief description of the LTSC servicing channel and associated support, see [Windows 10 Enterprise LTSC](overview.md). > [!NOTE] > Features in Windows 10 Enterprise LTSC 2021 are equivalent to Windows 10, version 21H2.
                      @@ -244,4 +243,4 @@ WPA3 H2E standards are supported for enhanced Wi-Fi security. ## See Also -[Windows 10 Enterprise LTSC](index.md): A short description of the LTSC servicing channel with links to information about each release. +[Windows 10 Enterprise LTSC](overview.md): A short description of the LTSC servicing channel with links to information about each release. diff --git a/windows/whats-new/removed-features.md b/windows/whats-new/removed-features.md index 0cfa8fb10e..d837c8fa8c 100644 --- a/windows/whats-new/removed-features.md +++ b/windows/whats-new/removed-features.md @@ -12,15 +12,13 @@ ms.date: 01/05/2023 ms.collection: - highpri - tier1 +appliesto: + - ✅ Windows 11 + - ✅ Windows 10 --- # Features and functionality removed in Windows client -**Applies to** - -- Windows 10 -- Windows 11 - Each version of Windows client adds new features and functionality. Occasionally, new versions also remove features and functionality, often because they've added a newer option. This article provides details about the features and functionality that have been removed in Windows client. For more information about features that might be removed in a future release, see [Deprecated features for Windows client](deprecated-features.md). diff --git a/windows/whats-new/temporary-enterprise-feature-control.md b/windows/whats-new/temporary-enterprise-feature-control.md new file mode 100644 index 0000000000..b20be1c0ab --- /dev/null +++ b/windows/whats-new/temporary-enterprise-feature-control.md @@ -0,0 +1,48 @@ +--- +title: Temporary enterprise feature control in Windows 11 +description: Learn about the Windows 11 features behind temporary enterprise feature control. +ms.prod: windows-client +ms.technology: itpro-fundamentals +ms.author: mstewart +author: mestew +manager: aaroncz +ms.localizationpriority: medium +ms.topic: reference +ms.date: 05/19/2023 +ms.collection: + - highpri + - tier2 +appliesto: + - ✅ Windows 11, version 22H2 and later +--- + +# Temporary enterprise feature control in Windows 11 + +New features and enhancements are introduced through the monthly cumulative update to provide continuous innovation for Windows 11. To give organizations time to plan and prepare, some of these new features are temporarily turned off by default. Features that are turned off by default are listed in the KB article for the monthly cumulative update. Typically, a feature is selected to be off by default because it either impacts the user experience or IT administrators significantly. + +Features behind temporary enterprise control are automatically disabled for devices that have their Windows updates managed by policies. + +## Windows 11 features behind temporary enterprise feature control + +The following features are behind temporary enterprise control in Windows 11: + +| Feature | KB article where the feature was introduced | Feature update that ends temporary control | +|---|---|---| +| Touch-optimized taskbar for 2-in-1 devices | [February 28, 2023 - KB5022913](https://support.microsoft.com/topic/february-28-2023-kb5022913-os-build-22621-1344-preview-3e38c0d9-924d-4f3f-b0b6-3bd49b2657b9) | 2023 annual feature update | + +## Enable features behind temporary enterprise feature control + +Features that are behind temporary enterprise control will be enabled when one of the following conditions is met: + +- The device installs the annual feature update that enables the new features by default +- The device receives a policy that enables features behind temporary enterprise control + - When the policy is enabled, all features on the device behind temporary control are turned on when the device next restarts. + +## Policy settings for temporary enterprise feature control + +You can use a policy to enable features that are behind temporary enterprise feature control. When this policy is enabled, all features that were disabled behind temporary enterprise feature control are turned on when the device next reboots. The following polices apply to Windows 11, version 22H2 with [KB5022845](https://support.microsoft.com/en-us/topic/february-14-2023-kb5022845-os-build-22621-1265-90a807f4-d2e8-486e-8a43-d09e66319f38) and later: + +- **Group Policy:** Computer Configuration\Administrative Templates\Windows Components\Windows Update\Manage end user experience\\**Enable features introduced via servicing that are off by default** + +- **CSP**: ./Device/Vendor/MSFT/Policy/Config/Update/[AllowTemporaryEnterpriseFeatureControl](/windows/client-management/mdm/policy-csp-update?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json#allowtemporaryenterprisefeaturecontrol) + - In the Intune [settings catalog](/mem/intune/configuration/settings-catalog), this setting is named **Allow Temporary Enterprise Feature Control** under the **Windows Update for Business** category. diff --git a/windows/whats-new/whats-new-windows-10-version-20H2.md b/windows/whats-new/whats-new-windows-10-version-20H2.md index 3030181ea5..37a10475d2 100644 --- a/windows/whats-new/whats-new-windows-10-version-20H2.md +++ b/windows/whats-new/whats-new-windows-10-version-20H2.md @@ -12,13 +12,12 @@ ms.collection: - tier2 ms.technology: itpro-fundamentals ms.date: 12/31/2017 +appliesto: + - ✅ Windows 10, version 20H2 --- # What's new in Windows 10, version 20H2 for IT Pros -**Applies to** -- Windows 10, version 20H2 - This article lists new and updated features and content that is of interest to IT Pros for Windows 10, version 20H2, also known as the Windows 10 October 2020 Update. This update also contains all features and fixes included in previous cumulative updates to Windows 10, version 2004. > [!NOTE] diff --git a/windows/whats-new/whats-new-windows-10-version-21H1.md b/windows/whats-new/whats-new-windows-10-version-21H1.md index af47ae3987..3b134e5092 100644 --- a/windows/whats-new/whats-new-windows-10-version-21H1.md +++ b/windows/whats-new/whats-new-windows-10-version-21H1.md @@ -12,13 +12,12 @@ ms.collection: - tier2 ms.technology: itpro-fundamentals ms.date: 12/31/2017 +appliesto: + - ✅ Windows 10, version 21H1 --- # What's new in Windows 10, version 21H1 for IT Pros -**Applies to** -- Windows 10, version 21H1 - This article lists new and updated features and content that is of interest to IT Pros for Windows 10, version 21H1, also known as the **Windows 10 May 2021 Update**. This update also contains all features and fixes included in previous cumulative updates to Windows 10, version 20H2. Windows 10, version 21H1 is a scoped set of features for select performance improvements, enterprise features, and quality enhancements. As an [H1-targeted release](/lifecycle/faq/windows#what-is-the-servicing-timeline-for-a-version--feature-update--of-windows-10-), 21H1 is serviced for 18 months from the release date for devices running Windows 10 Enterprise or Windows 10 Education editions. diff --git a/windows/whats-new/whats-new-windows-10-version-21H2.md b/windows/whats-new/whats-new-windows-10-version-21H2.md index 0e8808f228..8b06af0956 100644 --- a/windows/whats-new/whats-new-windows-10-version-21H2.md +++ b/windows/whats-new/whats-new-windows-10-version-21H2.md @@ -12,14 +12,12 @@ ms.collection: - tier2 ms.technology: itpro-fundamentals ms.date: 12/31/2017 +appliesto: + - ✅ Windows 10, version 21H2 --- # What's new in Windows 10, version 21H2 -**Applies to**: - -- Windows 10, version 21H2 - Windows 10, version 21H2 is the next feature update. This article lists the new and updated features IT Pros should know. Windows 10, version 21H2 is also known as the Windows 10 November 2021 Update. It includes all features and fixes in previous cumulative updates to Windows 10, version 21H1. Windows 10, version 21H2 is an [H2-targeted release](/lifecycle/faq/windows#what-is-the-servicing-timeline-for-a-version--feature-update--of-windows-10-), and has the following servicing schedule: diff --git a/windows/whats-new/whats-new-windows-10-version-22H2.md b/windows/whats-new/whats-new-windows-10-version-22H2.md index e1ecaecbb0..5c158152d8 100644 --- a/windows/whats-new/whats-new-windows-10-version-22H2.md +++ b/windows/whats-new/whats-new-windows-10-version-22H2.md @@ -12,6 +12,8 @@ ms.date: 10/18/2022 ms.collection: - highpri - tier2 +appliesto: + - ✅ Windows 10, version 22H2 --- # What's new in Windows 10, version 22H2 diff --git a/windows/whats-new/whats-new-windows-11-version-22H2.md b/windows/whats-new/whats-new-windows-11-version-22H2.md index bb565c5358..dbefc450e8 100644 --- a/windows/whats-new/whats-new-windows-11-version-22H2.md +++ b/windows/whats-new/whats-new-windows-11-version-22H2.md @@ -12,11 +12,11 @@ ms.collection: - tier2 ms.technology: itpro-fundamentals ms.date: 12/31/2017 +appliesto: + - ✅ Windows 11, version 22H2 --- # What's new in Windows 11, version 22H2 - -**Applies to**: Windows 11, version 22H2 Windows 11, version 22H2 is a feature update for Windows 11. It includes all features and fixes in previous cumulative updates to Windows 11, version 21H2, the original Windows 11 release version. This article lists the new and updated features IT Pros should know. @@ -40,7 +40,7 @@ For more information, see [Microsoft Pluton security processor](/windows/securit **Enhanced Phishing Protection** in **Microsoft Defender SmartScreen** helps protect Microsoft school or work passwords against phishing and unsafe usage on websites and in applications. Enhanced Phishing Protection works alongside Windows security protections to help protect Windows 11 work or school sign-in passwords. -For more information, see [Enhanced Phishing Protection in Microsoft Defender SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/phishing-protection-microsoft-defender-smartscreen) and [Protect passwords with enhanced phishing protection](https://aka.ms/EnhancedPhishingProtectionBlog) in the Windows IT Pro blog. +For more information, see [Enhanced Phishing Protection in Microsoft Defender SmartScreen](/windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/enhanced-phishing-protection) and [Protect passwords with enhanced phishing protection](https://aka.ms/EnhancedPhishingProtectionBlog) in the Windows IT Pro blog. ## Smart App Control diff --git a/windows/whats-new/windows-11-overview.md b/windows/whats-new/windows-11-overview.md index df91262622..90928f5742 100644 --- a/windows/whats-new/windows-11-overview.md +++ b/windows/whats-new/windows-11-overview.md @@ -12,14 +12,12 @@ ms.topic: overview ms.collection: - highpri - tier1 +appliesto: + - ✅ Windows 11 --- # Windows 11 overview -**Applies to**: - -- Windows 11 - Windows 11 is the next client operating system, and includes features that organizations should know. Windows 11 is built on the same foundation as Windows 10. If you use Windows 10, then Windows 11 is a natural transition. It's an update to what you know, and what you're familiar with. It offers innovations focused on enhancing end-user productivity, and is designed to support today's hybrid work environment. diff --git a/windows/whats-new/windows-11-plan.md b/windows/whats-new/windows-11-plan.md index ce4a6efa32..346990f31f 100644 --- a/windows/whats-new/windows-11-plan.md +++ b/windows/whats-new/windows-11-plan.md @@ -12,17 +12,14 @@ ms.collection: - tier1 ms.technology: itpro-fundamentals ms.date: 12/31/2017 +appliesto: + - ✅ Windows 11 --- # Plan for Windows 11 -**Applies to** - -- Windows 11 - -## Deployment planning - This article provides guidance to help you plan for Windows 11 in your organization. +## Deployment planning Since Windows 11 is built on the same foundation as Windows 10, you can use the same deployment capabilities, scenarios, and tools—and the same basic deployment strategy that you use today for Windows 10. You'll need to review and update your servicing strategy to adjust for changes in [Servicing and support](#servicing-and-support) for Windows 11. diff --git a/windows/whats-new/windows-11-prepare.md b/windows/whats-new/windows-11-prepare.md index 9a0cdaf844..6e9047c606 100644 --- a/windows/whats-new/windows-11-prepare.md +++ b/windows/whats-new/windows-11-prepare.md @@ -12,15 +12,13 @@ ms.collection: - tier1 ms.technology: itpro-fundamentals ms.date: 12/31/2017 +appliesto: + - ✅ Windows 11 + - ✅ Windows 10 --- # Prepare for Windows 11 -**Applies to** - -- Windows 11 -- Windows 10 - Windows 10 and Windows 11 are designed to coexist, so that you can use the same familiar tools and process to manage both operating systems. Using a single management infrastructure that supports common applications across both Windows 10 and Windows 11 helps to simplify the migration process. You can analyze endpoints, determine application compatibility, and manage Windows 11 deployments in the same way that you do with Windows 10. After you evaluate your hardware to see if it meets [requirements](windows-11-requirements.md) for Windows 11, it's a good time to review your deployment infrastructure, tools, and overall endpoint and update management processes and look for opportunities to simplify and optimize. This article provides some helpful guidance to accomplish these tasks. diff --git a/windows/whats-new/windows-11-requirements.md b/windows/whats-new/windows-11-requirements.md index 74230a9b73..f596c4e962 100644 --- a/windows/whats-new/windows-11-requirements.md +++ b/windows/whats-new/windows-11-requirements.md @@ -12,14 +12,13 @@ ms.collection: - tier1 ms.technology: itpro-fundamentals ms.date: 02/13/2023 +appliesto: + - ✅ Windows 11 + --- # Windows 11 requirements -**Applies to** - -- Windows 11 - This article lists the system requirements for Windows 11. Windows 11 is also [supported on a virtual machine (VM)](#virtual-machine-support). ## Hardware requirements diff --git a/windows/whats-new/windows-licensing.md b/windows/whats-new/windows-licensing.md new file mode 100644 index 0000000000..3a56385d67 --- /dev/null +++ b/windows/whats-new/windows-licensing.md @@ -0,0 +1,213 @@ +--- +title: Windows commercial licensing overview +description: Learn about products and use rights available through Windows commercial licensing. +ms.prod: windows-client +author: paolomatarazzo +ms.author: paoloma +manager: aaroncz +ms.collection: +- tier2 +ms.topic: conceptual +ms.date: 05/04/2023 +appliesto: +- ✅ Windows 11 +ms.technology: itpro-security +--- + +# Windows Commercial Licensing overview + +This document provides an overview of the products and use rights available through Microsoft Commercial Licensing, information about the products that are eligible for upgrades, and the key choices you have for using Windows in your organization. + +> [!NOTE] +> The content of this article doesn't replace or override other licensing documentation, such as the Windows 11 End User License Agreement or [Commercial Licensing Product Terms][EXT-4]. + +## Windows 11 editions + +The following table lists the editions of Windows 11 available through each Microsoft distribution channel: + +| Full Packaged Product (Retail) | Preinstalled on device (OEM)|Commercial Licensing| +|-|-|-| +|Windows 11 Home
                      Windows 11 Pro|Windows 11 Home
                      Windows 11 Pro|Windows 11 Pro
                      Windows 11 Enterprise
                      Windows 11 Enterprise LTSC| + +## Windows desktop offerings available through Commercial Licensing + +The following offerings are available for purchase through [Microsoft Commercial Licensing][EXT-5]: + +|Product|Description|Availability| +|-|-|-| +|Windows 11 Pro Upgrade |Windows 11 Pro is designed for small and medium businesses. Windows 11 Pro enables organizations to manage devices and apps, protect their data, facilitate remote and mobile scenarios, while taking advantage of the cloud technologies that support their business. Windows 11 Pro devices are a good choice for organizations that support *choose your own device (CYOD)* programs and *prosumer* customers. | The Windows 11 Pro Upgrade in Commercial Licensing upgrades a device from a previous version of Windows Pro.| +|Windows 11 Enterprise E3|Windows 11 Enterprise E3 is intended for large and medium-sized organizations. It includes Windows Enterprise edition with cloud-powered capabilities and subscription use rights. Examples include advanced identity protection, the broadest range of options for operating system deployment, update control, and device management. |Windows 11 Enterprise E3 is available **per-user** in Commercial Licensing programs. It requires Windows Pro as qualifying operating systems.| +|Windows 11 Enterprise E5|Windows 11 Enterprise E5 is for organizations that want to take advantage of everything in Windows 11 Enterprise E3 with the addition of **Microsoft Defender for Endpoint Plan 2**, a service that helps enterprises detect, investigate, and respond to advanced cybersecurity attacks on their endpoints and networks.| Windows 11 Enterprise E5 is available **per-user** in Commercial Licensing programs. It requires Windows Pro as qualifying operating systems.| +|Windows 10 Enterprise LTSC |Windows 10 Enterprise LTSC is designed for devices that have strict change-management policies with only security and critical bug fixes. By using a Long-Term Servicing Channel edition, you can apply monthly Windows 10 security updates for specialized devices while holding back new-feature updates for an extended period of time, up to five years. | Windows Enterprise LTSC is available in the **per-user** and **per-device** model, depending on the Volume Licensing program through which it's acquired.| +|Windows Virtual Desktop Access (VDA) Subscription License|The Windows VDA subscription license provides the right to access virtual Windows desktop environments from devices that aren't covered by a Commercial Licensing offer that includes VDA rights, such as thin clients. |Windows VDA is available on a **per-device** and **per-user** basis.| + +## Windows 11 Pro Upgrade license + +Windows 11 Pro is designed for small and medium businesses. Windows 11 Pro enables you to manage your devices and apps, protect your business data, facilitate remote and mobile scenarios, and take advantage of the cloud technologies for your organization. + +The Windows 11 Pro Upgrade license is recommended if you want to: + +- Upgrade a Windows 10 Pro device to Windows 11 Pro +- Upgrade Windows 7/8/8.1 Pro devices to Windows 10 Pro + +## Windows 11 Enterprise + +There are two core Windows 11 Enterprise offers: **Windows 11 Enterprise E3** and **Windows 11 Enterprise E5**. These offers can be purchased on a **per-user basis**, and are only available through **Commercial Licensing**, including the **Cloud Solution Provider** program. + +### Windows 11 Enterprise E3 + +Windows 11 Enterprise E3 builds on Windows 11 Pro by adding more advanced features designed to address the needs of large and mid-size organizations. Examples include advanced protection against modern security threats, the broadest range of options for operating system deployment and update, and comprehensive device and app management. + +> [!NOTE] +> Windows Enterprise E3 is a **per user subscription**, intended for organizations. It includes **Windows Enterprise edition** with cloud-powered capabilities and **subscription use rights**. Windows Enterprise E3 is usually licensed through Volume Licensing programs and is an upgrade from Windows Pro. + +#### Windows 11 Enterprise features + +The following table describes the unique Windows Enterprise edition features: + +| OS-based feature | Description | +|-|-| +|**[Windows Defender Credential Guard][WIN-1]**|Protects against user credential harvesting and pass-the-hash attacks or pass the token attacks.| +|**[Managed Microsoft Defender Application Guard (MDAG) for Microsoft Edge][WIN-11]**| Isolates enterprise-defined untrusted sites with virtualization-based security from Windows, protecting your organization while users browse the Internet.| +|**[Modern BitLocker Management][WIN-2]** | Allows you to eliminate on-premises tools to monitor and support BitLocker recovery scenarios. | +|**[Personal Data Encryption][WIN-3]**|Encrypts individual's content using Windows Hello for Business to link the encryption keys to user credentials.| +|**[Direct Access][WINS-1]**|Connect remote users to the organization network without the need for traditional VPN connections.| +|**[Always-On VPN device tunnel][WINS-2]**|Advanced security capabilities to restrict the type of traffic and which applications can use the VPN connection.| +|**[Windows Experience customization][WIN-4]**|Settings to lock down the user experience of corporate desktops and Shell Launcher with Unified Write Filter for frontline workers devices or public kiosks.| + +#### Windows 11 Enterprise cloud-based capabilities + +The following table describes the unique Windows Enterprise cloud-based features: + +|Cloud-based feature | Description | +|-|-| +|**[Windows subscription activation][WIN-5]**|Enables you to *step-up* from **Windows Pro edition** to **Enterprise edition**. You can eliminate license key management and the deployment of Enterprise edition images.| +|**[Windows Autopatch][WIN-6]**|Cloud service that puts Microsoft in control of automating updates to Windows, Microsoft 365 Apps for enterprise, Microsoft Edge, and Microsoft Teams.| +|**[Windows Update For Business deployment service][WIN-7]**|This cloud service gives you the control over the approval, scheduling, and safeguarding of quality, feature upgrades, and driver updates delivered from Windows Update.| +|**[Universal Print][UP-1]**|Removes the need for on-premises print servers and enables any endpoint to print to cloud registered printers.| +|**[Microsoft Connected Cache][WIN-8]**|A software solution that caches app and OS updates on the local network to save Internet bandwidth in locations with limited connectivity.| +|**[Endpoint analytics proactive remediation][MEM-1]**|Helps you fix common support issues before end-users notice them.| +|**[Organizational messages][MEM-2]**|Keeps employees informed with organizational messages directly inserted in Windows UI surfaces.| + +#### Windows 11 Enterprise licensing use rights + +The following table describes the Windows Enterprise licensing use rights: + +|Licensing use rights|Description| +|-|-| +|**[Five Windows instances per licensed user][EXT-1]**|Allows your employees to simultaneously use a Windows laptop, a cloud PC and a specialized device with Windows LTSC, and more.| +|**[36 months (3 years) support on annual feature releases][WIN-9]**|Get extra time to deploy feature releases.| +|**[Azure Virtual Desktop, Windows 365 Enterprise and Virtual Desktop Access][AZ-1]**|Empower flexible work styles and smarter work with the included virtualization access rights. Includes FSLogix for a consistent experience of +Windows user profiles in virtual desktop environments.| +|**[Windows release health in the Microsoft 365 admin center][EXT-2]**|Gives you essential information about monthly quality and feature updates in the Microsoft 365 admin center.| +|**[Windows feature update device readiness report][MEM-3]**|Provides per-device information about compatibility risks that are associated with an upgrade or update to a chosen version of Windows.| +|**[Windows feature update compatibility risks reports][MEM-3]**|Provides a summary view of the top compatibility risks, so you understand which compatibility risks impact the greatest number of devices in your organization.| +|**[Windows LTSC Enterprise][WIN-10]**|Intended for highly specialized devices that require limited changes due to regulations and certification| +|**[Microsoft Desktop Optimization Pack (MDOP) ][MDOP-1]**|Help improve compatibility and management, reduce support costs, improve asset management, and improve policy control.| + +Learn more about [Windows 11 Enterprise E3][EXT-3]. + +### Windows 11 Enterprise E5 + +Windows 11 Enterprise E5 is for organizations that want to take advantage of everything in Windows 11 Enterprise E3 with the addition of **Microsoft Defender for Endpoint Plan 2**, a cloud service that helps enterprises detect, investigate, and respond to advanced cybersecurity attacks on their endpoints and networks. + +Building on the existing security defenses in Windows 11, Microsoft Defender for Device provides a post-breach layer of protection to the Windows 11 security stack. With a combination of client technology built into Windows 11 and a robust cloud service, it can help detect threats that have made it past other defenses, provide enterprises with information to investigate the breach across endpoints, and offer response recommendations. + +> [!NOTE] +> Windows 11 Enterprise E5 is available per user in Commercial Licensing programs. + +### Windows Enterprise E3 in Microsoft 365 F3 + +Windows Enterprise E3 subscription license in Microsoft 365 F3 has all the OS features, and most of the cloud services and use rights, included with regular Windows Enterprise E3. +Windows Enterprise E3 in Microsoft 365 F3 does not include some use rights previously included in Software Assurance benefits that come with the regular E3 user subscription license. F3 does not come with: + +- Microsoft Desktop Optimization Pack (MDOP) +- Windows LTSC Enterprise +- Windows Autopatch + +## Use a Windows Pro device with the Windows Enterprise user subscription license + +In most cases, the Windows Pro edition comes pre-installed on a business-class device. Microsoft recommends upgrading your Windows Pro devices to Enterprise edition when you have acquired a user subscription license for Windows. However, there are cases that require to keep devices on the Pro edition and not upgrade them to Enterprise edition. With Windows 11 Enterprise E3, you can take advantage of features, services and use rights not licensed to the Windows Pro license bound to the device. It includes Windows Enterprise edition with cloud-powered capabilities and subscription use rights, and these capabilities are not always technically enforced. Some scenarios that may require to not upgrade to Windows Enterprise edition: + +- Devices not properly provisioned that don't automatically upgrade to Windows Enterprise edition +- Devices may have been acquired for a business process that was not under control of a central IT department or outside of the IT department's knowledge +- Devices may be used temporarily for a project by vendors and added to the IT infrastructure, but not upgraded to Enterprise edition +- A developer that is developing applications that must be tested and certified on Pro, as that is how it will be delivered to customers +- A Windows Pro device that was pre-configured for a specific purpose and is certified on Pro only + +In these cases, you want the PC to be configured, secured, monitored, and updated with the enterprise management and security tools that come with the Windows Enterprise user subscription. Your Windows Enterprise E3 subscriptions does not block these scenarios. + +The following table lists the Windows 11 Enterprise features and their Windows edition requirements: + +| OS-based feature |Windows Pro|Windows Enterprise| +|-|-|-| +|**[Windows Defender Credential Guard][WIN-1]**|❌|Yes| +|**[Microsoft Defender Application Guard (MDAG) for Microsoft Edge][WIN-11]**|Yes|Yes| +|**[Modern BitLocker Management][WIN-2]**|Yes|Yes| +|**[Personal data encryption (PDE)][WIN-3]**|❌|Yes| +|**[Direct Access][WINS-1]**|Yes|Yes| +|**[Always On VPN][WINS-2]**|Yes|Yes| +|**[Windows Experience customization][WIN-4]**|❌|Yes| + +The following table lists the Windows 11 Enterprise cloud-based features and their Windows edition requirements: + +| Cloud-based feature |Windows Pro|Windows Enterprise| +|-|-|-| +|**[Windows subscription activation][WIN-5]**|Yes|Yes| +|**[Windows Autopatch][WIN-6]**|Yes|Yes| +|**[Windows Update For Business deployment service][WIN-7]**|Yes|Yes| +|**[Universal Print][UP-1]**|Yes|Yes| +|**[Microsoft Connected Cache][WIN-8]**|Yes|Yes| +|**[Endpoint analytics proactive remediation][MEM-1]**|Yes|Yes| +|**[Organizational messages][MEM-2]**|❌|Yes| + +The following table lists the Windows 11 Enterprise E3 licensing use rights and their Windows edition requirements: + +|Licensing use rights|Windows Pro|Windows Enterprise| +|-|-|-| +|**[Five Windows instances per licensed user][EXT-1]**|n/a|n/a| +|**[36 months (3 years) support on annual feature releases][WIN-9]**|❌|Yes| +|**[Azure Virtual Desktop, Windows 365 Enterprise and Virtual Desktop Access][AZ-1]**|n/a|n/a| +|**[Windows release health in the Microsoft 365 admin center][EXT-2]**|n/a|n/a| +|**[Windows feature update device readiness report][MEM-3]**|Yes|Yes| +|**[Windows feature update compatibility risks reports][MEM-3]**|Yes|Yes| +|**[Windows LTSC Enterprise][WIN-10]**|n/a|n/a| +|**[Microsoft Desktop Optimization Pack (MDOP)][MDOP-1]**|Yes|Yes| + +## Next steps + +To learn more about Windows 11 Enterprise E3 and E5 licensing, download the [Windows 11 licensing guide][EXT-6]. The guide provides additional information to complement the information in this article, including: + +- Description of qualifying operating systems +- Availability of Windows desktop operating system products in licensing programs +- Deciding between per-device and per-user licensing +- Windows 11 downgrade rights +- Volume license activation methods +- How to acquire licenses through Commercial Licensing + +[AZ-1]: /azure/virtual-desktop/prerequisites#operating-systems-and-licenses +[EXT-1]: https://www.microsoft.com/licensing/terms/productoffering/WindowsDesktopOperatingSystem/EAEAS +[EXT-2]: https://techcommunity.microsoft.com/t5/windows-it-pro-blog/windows-release-health-now-available-in-the-microsoft-365-admin/ba-p/2235908 +[EXT-3]: https://windows.com/enterprise +[EXT-4]: https://www.microsoft.com/licensing/product-licensing/products.aspx +[EXT-5]: https://www.microsoft.com/licensing +[EXT-6]: https://aka.ms/WindowsLicensingGuide +[MDOP-1]: /microsoft-desktop-optimization-pack +[MEM-1]: /mem/analytics/proactive-remediations +[MEM-2]: /mem/intune/remote-actions/organizational-messages-overview +[MEM-3]: /mem/intune/protect/windows-update-compatibility-reports +[UP-1]: /universal-print/ +[WIN-1]: /windows/security/identity-protection/credential-guard/credential-guard +[WIN-2]: /windows/security/information-protection/bitlocker/bitlocker-management-for-enterprises +[WIN-3]: /windows/security/information-protection/personal-data-encryption/overview-pde +[WIN-4]: /windows/client-management/mdm/policy-csp-experience +[WIN-5]: /windows/deployment/windows-10-subscription-activation +[WIN-6]: /windows/deployment/windows-autopatch +[WIN-7]: /windows/deployment/update/deployment-service-overview +[WIN-8]: /windows/deployment/do/waas-microsoft-connected-cache +[WIN-9]: /windows/release-health/supported-versions-windows-client#enterprise-and-iot-enterprise-ltsbltsc-editions +[WIN-10]: /windows/whats-new/ltsc/ +[WIN-11]: /windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-overview +[WINS-1]: /windows-server/remote/remote-access/directaccess/directaccess +[WINS-2]: /windows-server/remote/remote-access/vpn/always-on-vpn/ +